Unit1 Cms CN
Unit1 Cms CN
Data Communications
• Data communication is the exchange of data
between two devices via some form of
transmission media
• local or Remote
• Effectiveness of data communication
• Delivery
• Accuracy
• Timeliness
A Communications Model
• Source
– generates data to be transmitted
• Transmitter
– Converts data into transmittable signals
• Transmission System
– Carries data
• Receiver
– Converts received signal into data
• Destination
– Takes incoming data
Simplified Communications Model -
Diagram
Why Networking??
• Point to point communication not usually
practical
– Devices are too far apart
– Large set of devices would need impractical
number of connections
• Solution is a communications network
Definition : A computer network is a
system for communicating between
two or more computers and
associated devices. It is an
interconnection of two or more
autonomous computers for the
purposes of sharing information and
resources.
Simplified Network Model
An example of a network
Router
Hub
Bridge Segment Node
Hub
Internet
8
Components
• Sender
• Receiver
• Data
• Transmission media
• Hardware & software units
• Storage
Computer Networks
• Goals • Performance
Resource sharing Performance
Reliability Reliability
Scalability Speed
Saving money Security
Best Communication
media
Features of Computer networks
Applications of Communication & Computer Network
17
Types of Networks
LAN stands for local area network.
• It is a group of network devices that allow communication between various connected
devices.
• Private ownership has control over the local area network rather than the public.
• LAN has a short propagation delay than MAN as well as WAN. It covers the smallest area
such as colleges, schools, hospitals, and so on.
Stands for
Ownership
Transmission
speed
Propagation
delay
Congestion
Maintenance
Fault
tolerance
20
Topology
Topology: physical layout combined with logical path
or
The arrangement of a network which comprises of nodes and connecting
lines via sender and receiver is referred as network topology.
21
Network Topologies (continued)
• Main topologies: bus, ring, star, mesh, hierarchical,
• Hybrid topologies: star-bus, star-ring
• Selecting topology for network
– Consider intended purpose
• Throughput
• Systems grow or shrink in size
• network traffic (number of frames to transmit)
• Cost
• Centralized
• complexity
• Connection to other networks
• Security needs
• If the common cable fails, then the whole system will crash down.
• If the network traffic is heavy, it increases collisions in the network.
To avoid this, various protocols are used in MAC layer known as
Pure Aloha, Slotted Aloha, CSMA/CD etc
Star Topology
• In star topology, all the devices are connected to a single hub
through a cable.
• This hub is the central node and all others nodes are
connected to the central node.
• The hub can be passive in nature i.e. not intelligent hub such
as broadcasting devices, at the same time the hub can be
intelligent known as active hubs.
• Active hubs have repeaters in them.
Star Topology
Advantages of this topology :
• If N devices are connected to each other in star topology, then the
number of cables required to connect them is N. So, it is easy to set up.
• Each device require only 1 port i.e. to connect to the hub.
Problems with this topology :
• If the concentrator (hub) on which the whole topology relies fails, the
whole system will crash down.
• Cost of installation is high.
• Performance is based on the single concentrator i.e. hub.
Ring topology
• In this topology, it forms a ring connecting devices with its exactly two neighboring
devices.
• A number of repeaters are used for Ring topology with a large number of nodes,
because if someone wants to send some data to the last node in the ring topology
with 100 nodes, then the data will have to pass through 99 nodes to reach the
100th node.
• Hence to prevent data loss repeaters are used in the network.
• The transmission is unidirectional, but it can be made bidirectional by having 2
connections between each Network Node, it is called Dual Ring Topology.
Ring Topology
The following operations takes place in ring topology are :
• One station is known as monitor station which takes all the responsibility to perform the
operations.
• To transmit the data, station has to hold the token. After the transmission is done, the
token is to be released for other stations to use.
• When no station is transmitting the data, then the token will circulate in the ring.
• There are two types of token release techniques : Early token release releases the token
just after the transmitting the data and Delay token release releases the token after the
acknowledgement is received from the receiver.
Advantages of this topology :
• It is robust.
• Fault is diagnosed easily. Data is reliable because data is transferred
among the devices through dedicated channels or links.
• Provides security and privacy.
• Problems with this topology :
• Circuit Switching
• Message Switching
• Packet Switching
Circuit Switching
• Circuit switching is a technique that directly connects the
sender and the receiver in an unbroken path.
• Telephone switching equipment, for example, establishes
a path that connects the caller's telephone to the
receiver's telephone by making a physical connection.
• With this type of switching technique, once a connection
is established, a dedicated path exists between both ends
until the connection is terminated.
• Routing decisions must be made when the circuit is first
established, but there are no decisions made after that
time.
Example of circuit switching
Message Switching
VIRTUAL CIRCUIT
• Connection ORIENTED
• Path is fixed
• Packets follow same path
Example: Datagram Approach
Packet Switching: Virtual Circuit
Approaches to Network Design
• Framing
• Node to node delivery
• Flow control
• Error control
• Access control
• Synchronization
Hop-to-hop delivery
Network layer
Note
• Logical addressing
• Source to destination delivery
• Routing
• Congestion
• tunnelling
Note
• Damage
• Loss
• Duplication
2.74
Presentation layer
Note
• Translation
– The presentation layer at the sender changes the
information from its sender-dependent format
into a common format
– The presentation layer at the receiving machine
changes the common format into its receiver-
dependent format
• Encryption and decryption
• Compression
Application layer
Note