0% found this document useful (0 votes)
3 views

Module1.1

Uploaded by

ppspratik3
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Module1.1

Uploaded by

ppspratik3
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 74

CSE3155 DATA COMMUNICATION AND

COMPUTER NETWORKS

Module-1.1
Data Communication
and Network Model

1
DATA COMMUNICATION

• Data communications and networking are changing today's world.


Why wait for a week for some report from UK to arrive by post where
you can receive instantaneously through computer networks?

• The term telecommunication means communication at a distance.

• The word data refers to information presented in whatever form is


agreed upon by the parties creating and using the data.

• Data communications are the exchange of data


between two devices via some form of transmission
medium such as a wire cable.
CHARACTERISTICS OF DC
The four fundamental characteristics of data communications are:-
Delivery: The system must deliver data to the correct destination. Data must be
received by the intended device or user and only by that device or user.

Accuracy: The system must deliver the data accurately. Data that have been altered
in transmission and left uncorrected are unusable.
CHARACTERISTICS OF DC
Timeliness: The system must deliver data in a timely manner.Data delivered late are
useless. In the case of video and audio, timely delivery means delivering data as they are
produced, in the same order that they are produced, and without significant delay.

Jitter: Jitter refers to the variation in the packet arrival time. It is the uneven delay in the
delivery of audio or video packets. For example, let us assume that video packets are sent
every 30ms. If some of the packets arrive with 30-ms delay and others with 40-ms delay, an
uneven quality in the video is the result.
COMPONENTS OF DC
COMPONENTS OF DC
The five components of data communications are:
Message: The message is the information (data) to be communicated. Popular
forms of information include text, numbers, pictures, audio, and video.
Sender: The sender is the device that sends the data message. It can be a
computer, workstation, telephone handset, mobile, and so on.
Receiver: The receiver is the device that receives the message. It can be a
computer, workstation, telephone handset, television, and so on.
Transmission medium: The transmission medium is the physical path by which
a message travels from sender to receiver. Some examples of transmission media
include twisted-pair wire, coaxial cable, fibre-optic cable, and radio waves.
Protocol: A protocol is a set of rules that govern data communications. It
represents an agreement between the communicating devices. Without a
protocol, two devices may be connected but not communicating.
DATA REPRESENTATION

Information today comes in different forms such as :

Text

Numbers

Images

Audio

Video
DATA FLOW (SIMPLEX, HALF-DUPLEX, AND FULL-DUPLEX)
DATA FLOW(CNTD)
Communication between two devices can be simplex, half-duplex, or full-
duplex as shown in figure above.
Simplex
• In simplex mode, the communication is unidirectional, as on a one-way
street.Only one of the two devices on a link can transmit; the other can
only receive.
• Example:Keyboards and traditional monitors

Half-Duplex
• In half-duplex mode, each station can both transmit and receive, but not
at the same time. When one device is sending, the other can only
receive, and vice versa.
• In a half-duplex transmission, the entire capacity of a channel is taken
over by whichever of the two devices is transmitting at the time.
Example: Walkie-Talkie
INTRODUCTION TO NETWORKS

A network is a set of devices (often referred to as nodes)


connected by communication links.

A node can be a computer, printer, or any other device


capable of sending and/or receiving data generated by
other nodes on the network.

A link can be a cable, air, optical fiber, or any medium


which can transport a signal carrying information.
DATA FLOW(CNTD)

Full-Duplex

• In full-duplex mode (also called duplex), both stations can transmit and
receive simultaneously.
• In full-duplex mode, signals going in one direction share the capacity of
the link with signals going in the other direction.
Example: Telephone
NETWORK CRITERIA

Performance
• Depends on Network Elements
• Measured in terms of Delay and Throughput
Reliability
• Failure rate of network components
• Measured in terms of availability/robustness
Security
• Data protection against corruption/loss of data due to:
• Errors
• Malicious users
PHYSICAL STRUCTURES

Type of Connection
• Point to Point - single transmitter and receiver
• Multipoint - multiple recipients of single transmission

Physical Topology
• Connection of devices
• Type of transmission - unicast, mulitcast, broadcast
Types of connections: point-to-point and multipoint
NETWORK TOPOLOGY

Network Topology is the schematic description of a


network arrangement, connecting various
nodes(sender and receiver) through lines of
connection.
TYPES OF NETWORK TOPOLOGIES

1. Bus Topology
2. Ring Topology
3. Star Topology
4. Mesh Topology
5. Tree Topology
6. Hybrid Topology
BUS TOPOLOGY
Bus topology is a network type in which every computer and
network device connected to single cable. When it has exactly
two endpoints, then it is called Linear Bus topology.

Features of Bus Topology


• It transmits data only in one direction.
• Every device is connected to a single cable
Bus Topology
Advantages of Bus Disadvantages of Bus
Topology Topology
It is cost effective and Cables fails then whole
network fails.
used in small networks.
If network traffic is heavy or
It is easy to understand. nodes are more the
Easy to expand joining performance of the network
two cables together. decreases.

Cable has a limited length.


Cable required is least
It is slower than the ring
compared to other topology.
network topology.
RING TOPOLOGY
It is called ring topology because it forms a ring as each
computer is connected to another computer, with the last one
connected to the first. Exactly two neighbors for each device.

Features of Ring Topology


• The transmission is unidirectional
• Data is transferred in a sequential manner that is bit by
bit. Data transmitted, has to pass through each node of
the network, till the destination node.
Ring Topology
Advantages of Ring Disadvantages of Ring
Topology Topology
• Transmitting network is • Troubleshooting is
not affected by high difficult in ring topology.
traffic or by adding • Adding or deleting the
more nodes, as only the computers disturbs the
nodes having tokens can network activity.
transmit data. • Failure of one computer
• Cheap to install and
disturbs the whole
expand
network.
MESH TOPOLOGY
It is a point-to-point connection to other nodes or devices.
All the network nodes are connected to each other. Mesh has
n(n-1)/2 physical channels to link n devices.

Features of Mesh Topology


• Fully connected
• Robust.
• Not flexible.
Mesh Topology
Advantages of Mesh Topology Disadvantages of Mesh
• Each connection can carry its Topology
own data load. • Installation and
• It is robust. configuration is difficult.
• Fault is diagnosed easily. • Cabling cost is more.
• Provides security and • Bulk wiring is required.
privacy.
TREE TOPOLOGY
It has a root node and all other nodes are connected to it forming a
hierarchy. It is also called hierarchical topology. It should at least
have three levels to the hierarchy.

Features of Tree Topology


• Used in Wide Area Network.
• Expansion of nodes is possible and easy.
Tree Topology
Advantages of Tree Disadvantages of Tree
Topology Topology
• Extension of bus and star • Heavily cabled.
topologies. • Costly.
• Expansion of nodes is • If more nodes are added
possible and easy. maintenance is difficult.
• Easily managed and • Central hub fails, network fails.
maintained.
• Error detection is easily
done.
STAR TOPOLOGY
In this type of topology all the computers are connected to a
single hub through a cable. This hub is the central node and
all others nodes are connected to the central node.

Features of Star Topology


• Every node has its own dedicated connection to the hub.
• Hub acts as a repeater for data flow.
• Can be used with twisted pair, Optical Fiber or coaxial cable.
Star Topology
Advantages of Star
Topology Disadvantages of Star
• Fast performance with few Topology
nodes and low network • Cost of installation is high.
traffic. • Expensive to use.
• Hub can be upgraded • If the hub fails then the
easily. whole network is stopped
• Easy to troubleshoot. because all the nodes
• Easy to setup and modify. depend on the hub.
• Only that node is affected • Performance is based on
which has failed, rest of the hub that is it depends
the nodes can work on its capacity
smoothly.
HYBRID TOPOLOGY
• It is different type of topology which is a mixture of two
or more topologies.
• For example if in an office in one department ring
topology is used and in another star topology is used,
connecting these topologies will result in Hybrid
Topology (ring topology and star topology).
Features of Hybrid Topology
• It is a combination of two or topologies
• Inherits the advantages and disadvantages of the
topologies included
Hybrid Topology
Advantages of Hybrid Disadvantages of Hybrid
Topology Topology
• Reliable as Error detecting • Complex in design.
and trouble shooting is • Costly
easy.
• Effective
• Scalable as size can be
increased easily.
• Flexible
PROTOCOLS

A protocol is synonymous with rule. It consists of a set of


rules that govern data communications. It determines
what is communicated, how it is communicated and when
it is communicated. The key elements of a protocol are
syntax, semantics and timing.

1.36
ELEMENTS OF A PROTOCOL
Syntax
• Structure or format of the data
• Indicates how to read the bits - field delineation
Semantics
• Interprets the meaning of the bits
• Knows which fields define what action
Timing
• When data should be sent and what
• Speed at which data should be sent or speed at which it
is being received.
NETWORK MODEL
LAYERED TASKS
• Computer networks are complex systems
Tasks involve varieties of hardware and software components,
and protocols
• Networking task is divided into several subtasks, or layers.

WHY LAYERING?
• Networks are complex!
• We need a way to organize the structure of network
functionalities and to reduce the design complexities
• Benefits of layering
 Interoperability
 Reuse
 Hiding underlying details

39
PROTOCOL INTERFACES
• Each protocol offers an interface to its users, and
expects one from the layers on which it builds
▫ Syntax and semantics
 Data formats
 Interface characteristics, e.g. IP service model
• Protocols build upon each other
▫ Add value
 E.g., a reliable protocol running on top of IP
▫ Reuse
 E.g., OS provides TCP, so apps don’t have to rewrite

2
REAL WORLD EXAMPLE

Communication between managers of two companies

Communicate

41
LOGICAL CONNECTION
Communication takes place through many layers
Logical communication

Secretary:
Secretary: reads and reports
types a letter the message

Delivery boy: Delivery boy:


drops the letter takes the letter

Postal truck

Post office:
Processes and routes the letter
LAYER MODEL

Layer N uses services provided by Layer N-1


HOST A HOST B
Logical
communication path
Layer N Layer N
Layer N protocol
Using
services Providing
services

Layer N-1 Layer N-1

Layer N-2 Layer N-2

Virtual Communication System


43
NETWORK MODEL

• Network models are responsible or establishing a


connection among the sender and receiver and
transmitting the data.

• There are two computer network models on which


data communication process relies :
▫ TCP/IP Model
▫ OSI Model

44
TCP/IP MODEL
• The TCP/IP model was developed prior to the OSI model.

• The TCP/IP model is not exactly similar to the OSI model.

• The TCP/IP model consists of five layers: the application layer, transport
layer, network layer, data link layer and physical layer.

• The first four layers provide physical standards, network interface,


internetworking, and transport functions that correspond to the first four
layers of the OSI model .

• TCP/IP is a hierarchical protocol made up of interactive modules, and each


of them provides specific functionality.

45
TCP/INTERNET LAYER MODEL

The Internet Protocol Stack

User
Application Layer Software

Transport Layer
Network Layer
Data Link Layer
Physical Layer Hardware

Transmission
Medium
46
TCP/IP Model: the Internet model
• Each layer relies on services from layer below
• Each layer exports services to layer above
• Interface between layers defines interaction
• Hides implementation details
• Layers can change without disturbing other layers

5 Application
Application Application
Application

4 Transport
Transport Transport
Transport
3 Network
Network Network
Network Network
Network
2 Data
Datalink
link Data
Datalink
link Data
Datalink
link
1 Physical
Physical Physical
Physical Physical
Physical

2
48
APPLICATION LAYER
 It is the topmost layer in the TCP/IP model.

 It is responsible for handling high-level protocols, issues of representation.

 This layer allows the user to interact with the application.

 It facilitates the user to use the services of the network.

 It is used to develop network-based applications.

 It provides user services like user login, naming network devices, formatting messages, and
e-mails, transfer of files etc.

 When one application layer protocol wants to communicate with another application layer, it
forwards its data to the transport layer.

49
APPLICATION LAYER

The only layer to interact with user

Data Data
Logical communication

Application SMTP HTTP FTP SMTP HTTP FTP


Layer
Data H5 Data H5

to Transport from Transport

Responsible
Responsible for
for providing
providing services
services to
to the
the user
user
50
TRANSPORT LAYER

• The transport layer is a 4th layer from the top.

• It is responsible for end to end data transmission service using connection oriented or
either through connection-less protocols.

• TCP and UDP are two transport layer protocols that provide a different set of services
to the network layer.

• It provide multiplexing/demultiplexing service.

• It also provides other services such as reliable data transfer, bandwidth guarantees,
and delay guarantees,flow control.

51
TRANSPORT LAYER

Responsible
Responsible for
for delivery
delivery of
of aa message
message
from
from one
one process
process to
to another
another

• Duties/services
▫ Service-point addressing/Port Address
▫ Segmentation and reassembly
▫ Connection control
▫ Flow control (end-to-end)
▫ Error control (end-to-end)

52
Transport Layer Services
• Segmentation : Large data is divided into smaller segments at the senders end and then
these smaller segments are recombined in exact format before it is received at receivers
end.

• Error Control : Distortion, Un-delivery of data packets and noise in data packets results
in error and this is prevented using Transport Layer too and this feature is called Error
Control.

• Flow Control : Transport-Layer ensures that faster data transmission and slow data
absorption or slow data transmission and faster data absorption must not occur.

• Transport-Layer performs Multiplexing & De-multiplexing.

• Connection Control: Connection oriented service using TCP(Transmission Control


Protocol) Protocol & Connection less service using UDP(User Data-gram Protocol)
Protocol are performed by transport layer.

53
Transport Layer

Process Process … Process Process …

PORT # PORT #

Data Data

Transport Data1 H4 Data2 H4 Data3 H4 Data1 H4 Data2 H4 Data3 H4


Layer (segments)

to Network from Network

54
NETWORK LAYER

Responsible
Responsible for
for the
the delivery
delivery ofof packets
packets
from
from the
the original
original source
source toto the
the destination
destination

• Duties/services
▫ Logical addressing
▫ Routing

55
NETWORK LAYER

from Transport to Transport

Data Data

Network Data H3 Data H3


Layer (packet)

to Data Link from Data Link

56
DATA LINK LAYER
 Framing: The data link layer divides the stream of bits received from the network layer into
manageable data units called frames.

 Physical addressing: If frames are to be distributed to different systems on the network, the data link
layer adds a header to the frame to define the sender and/or receiver of the frame. If the frame is
intended for a system outside the sender's network, the receiver address is the address of the device
that connects the network to the next one.

 Flow control (hop-to-hop): A receiving node can receive the frames at a faster rate than it can process
the frame. Without flow control, the receiver's buffer can overflow, and frames can get lost. To
overcome this problem, the data link layer uses the flow control to prevent the sending node on one
side of the link from overwhelming the receiving node on another side of the link.

 Error control (hop-to-hop):The data link layer adds reliability to the physical layer by adding
mechanisms to detect and retransmit damaged or lost frames. It also uses a mechanism to recognize
duplicate frames. Error control is normally achieved through a trailer added to the end of the frame.

 Access control:. When two or more devices are connected to the same link, data link layer protocols
are necessary to determine which device has control over the link at any given time.

57
DATA LINK LAYER

from Network to Network

Data Data

Data Link T2 Data H2 T2 Data H2


Layer (frame)

to Physical from Physical

Responsible
Responsible for
for transmitting
transmitting frames
frames
from
from one
one hop
hop (node)
(node) to
to the
the next
next
58
PHYSICAL LAYER

The
The physical
physical layer
layer is
is responsible
responsible for
for
movements
movements of of individual
individual bits
bits from
from
one
one hop
hop (node)
(node) toto the
the next
next
• Physical Layer is the bottom-most layer.
• It is associated with the electrical, mechanical and transmission media .
• Physical layer deals with all the physical devices that can be used for data
communication.

59
PHYSICAL LAYER

from Data Link to Data Link

Data Data

Physical 01001011 01001011


Layer (bits)

Transmission medium

60
Physical Layer Functions

• Physical characteristics of interfaces and medium

• Representation of bits: Data consists of a stream of bits (sequence of 0s or 1s) with no


interpretation.

• Data rate: The number of bits sent per second.

• Synchronization of bits: the sender and the receiver clocks must be synchronized.

• Line configuration: Point to Point or Multipoint

• Physical topology: Bus/ Star/Mesh…

• Transmission mode: Simplex/Half/Full

61
INTERNET MODEL

sender router
router receiver

Applicati Applicati
on on
Transport Transport
Network Network
Network Network
D.L. D.L. D.L. D.L.
Data Link Data Link
P.L. P.L. P.L. P.L.
Physical Physical
Transmission medium
62
INTERNET MODEL

63
INTERNET PROTOCOL SUITE

Layer Protocols
Application HTTP, FTP, Telnet, SMTP, ...
Transport TCP, UDP, SCTP, ...
Network IP (IPv4), IPv6, ICMP,
IGMP, ...
Data Link Ethernet, Wi-Fi, PPP, ...
Physical RS-232, DSL, 10Base-T, ...

64
OSI MODEL
• OSI stands for Open System Interconnection.
• Before networks came into existence, computers could only
communicate from the same manufacturers.
• OSI was designed by ISO (International Organization for
Standardization) in late 1970’s.
• To break this barrier so that Computers from different manufacturer
could communicate with each other.
• OSI is a “Layered Approach”, which is a logical representation of
how Data Communication should occur.

65
OSI Model

UserLayer
7.Application OSI has 7 different layers
6.Presentation Two new layers is added
Layer Presentation Layer
Session Layer
5.Session Layer It is divided into two groups,
4.Transport Layer Top 3 layers defines how
application within end stations will
3.Network Layer communicate with each other and
with the user (Software Layer).
2.Data Link Layer
Bottom 4 layers defines how
1.Physical Layer actually data is transferred
Transmission (Hardware Layer).
Medium

66
The OSI Reference Model
The interaction between layers in the OSI model
SESSION LAYER
• This layer is responsible for establishment of
connection, maintenance of sessions,
authentication and also ensures security.

• Duties/services
▫ Dialog Controller :
 Allows the two processes to establish, use and terminate
a connection.
 Communication in half-duplex or full-duplex.
▫ Synchronization :
 allows a process to add checkpoints
 data is re-synchronized
 Session recovery

69
PRESENTATION LAYER
• A Presentation layer is mainly concerned with
the syntax and semantics of the information
exchanged between the two systems.
• It acts as a data translator for a network.
• This layer is a part of the operating system that
converts the data from one presentation format
to another format.
• The Presentation layer is also known as the
syntax layer.

70
PRESENTATION LAYER FUNCTIONS

• Duties/services
▫ Data translation: For example, ASCII to
EBCDIC.

▫ Encryption/Decryption

▫ Compression: Reduces the number of bits


that need to be transmitted on the network.

71
OSI LAYERS IN REAL WORLD

7.Manager Handwrite Reads


s the
a message message
Prepares Summarizes or
6.Assistant
final translates
version letter
Provides Opens
5.Secretary address letter
and packs letter
Delivers Withdraws
4.Driver letter letter
to post office from mailbox
Checks Checks
3.Postal staff
address address
and sorts letter and sorts letter
Packs letters Unpacks
2.Postal staff for certain package
directions s
Loads on Unloads
1.Postal staff truck from
transmission medium truck
Pictures from Wikipedia72
OSI TCP/IP
It is developed by ISO (International It is developed by ARPANET (Advanced Research
Standard Organization) Project Agency Network).
OSI refers to Open Systems Interconnection. TCP refers to Transmission Control Protocol.

OSI follows a vertical approach. TCP/IP follows a horizontal approach.


In the OSI model, the transport layer is only A layer of the TCP/IP model is both connection-
connection-oriented. oriented and connectionless.
Session and presentation layers are a part of There is no session and presentation layer in the
the OSI model. TCP model.

TCP/IP is more reliable OSI is less reliable


73
END OF MODULE 1.1

You might also like