0% found this document useful (0 votes)
21 views32 pages

Data Communication

The document provides an overview of data communication, including its definition, components, and the OSI model, which outlines how different computer systems communicate over a network. It describes the seven layers of the OSI model, their functions, and the protocols associated with each layer, as well as the criteria for evaluating network performance, reliability, and security. Additionally, it highlights the importance of protocols like TCP and IP in ensuring effective data transmission.

Uploaded by

richietawiah0432
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views32 pages

Data Communication

The document provides an overview of data communication, including its definition, components, and the OSI model, which outlines how different computer systems communicate over a network. It describes the seven layers of the OSI model, their functions, and the protocols associated with each layer, as well as the criteria for evaluating network performance, reliability, and security. Additionally, it highlights the importance of protocols like TCP and IP in ensuring effective data transmission.

Uploaded by

richietawiah0432
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 32

Data Communication

YEAR8
INTRODUCTION

 Computer networks are the basis of communication


in Information Technology.

A computer Network is a set of connected computers.

Computers on the networks are called Nodes, the


connection of computers can be done via cabling, most
commonly the ethernet cable or fiber optic cable and it
can also be wireless(WIFI – wireless fidelity).
Data Communication – Definition, Components, Types, Channels

 Transferring data over a transmission medium


between two or more devices, systems, or places is
known as data communication. Nowadays,
computing and telecommunications depend heavily
on this data transmission, which makes a variety of
applications conceivable, including email, video
chatting, the Internet, and many more things.
Components of Data Communication

A communication system is made up of the following components:

1. Message: A message is a piece of information that is to be transmitted


from one person to another. It could be a text file, an audio file, a video
file, etc.

2. Sender: It is simply a device that sends data messages. It can be a


computer, mobile, telephone, laptop, video camera, or workstation, etc.

3. Receiver: It is a device that receives messages. It can be a computer,


telephone mobile, workstation, etc.
Components of Data Communication

4. Transmission Medium / Communication


Channels: Communication channels are the medium that connect
two or more workstations. Workstations can be connected by either
wired media or wireless media.

5. Set of rules (Protocol): When someone sends the data (The


sender), it should be understandable to the receiver also otherwise it
is meaningless. For example, Sonali sends a message to Chetan. If
Sonali writes in Hindi and Chetan cannot understand Hindi, it is a
meaningless conversation.
Therefore, there are some set of rules (protocols) that is followed by
every computer connected to the internet and they are:

 TCP(Transmission Control Protocol): It is responsible for dividing


messages into packets on the source computer and reassembling the
received packet at the destination or recipient computer. It also
makes sure that the packets have the information about the source of
the message data, the destination of the message data, the sequence
in which the message data should be re-assembled, and checks if the
message has been sent correctly to the specific destination.
 IP(Internet Protocol): Do You ever wonder how computer
determines which packet belongs to which device. What
happens if the message you sent to your friend is received by
your father? Scary Right. Well! IP is responsible for handling
the address of the destination computer so that each packet is
sent to its proper destination.
OPEN SYSTEM INTERCONNECTION(OSI) MODEL

 The OSI (Open Systems Interconnection) Model is a set of


rules that explains how different computer systems
communicate over a network. OSI Model was developed by
the International Organization for Standardization (ISO). The
OSI Model consists of 7 layers and each layer has specific
functions and responsibilities. This layered approach makes
it easier for different devices and technologies to work
together.
Layers of the OSI Model
 There are 7 layers in the OSI Model and each layer has its specific role in handling data.

1. Physical Layer

2. Data Link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer
Layer 1 – Physical Layer

 The lowest layer of the OSI reference model is the Physical Layer.
It is responsible for the actual physical connection between the
devices. The physical layer contains information in the form of
bits. Physical Layer is responsible for transmitting individual bits
from one node to the next. When receiving data, this layer will get
the signal received and convert it into 0s and 1s and send them
to the Data Link layer, which will put the frame back together.
Common physical layer devices are Hub, Repeater, Modem, and
Cables.
Layer 2 – Data Link Layer (DLL)

 The data link layer is responsible for the node-to-node delivery


of the message. The main function of this layer is to make sure
data transfer is error-free from one node to another, over the
physical layer. When a packet arrives in a network, it is the
responsibility of the DLL to transmit it to the Host using its
MAC address. Packets in the Data Link layer is referred to as
Frame. Switches and Bridges are common Data Link Layer
devices.
A SWITCH

This is a hardware device


that connects multiple
devices on a computer
network. It uses MAC
addresses to forward data
to the correct destination
within a local area network
(LAN).
A BRIDGE
In computing, a bridge is a
device or software component
that connects two or more
network segments, allowing
them to communicate and share
data.

NB: Bridges enhance network


efficiency and performance by
controlling data flow and
reducing collisions.
Layer 3 – Network Layer

 The network layer works for the transmission of data from


one host to the other located in different networks. It also
takes care of packet routing i.e. selection of the shortest path
to transmit the packet, from the number of routes available.
The sender and receiver’s IP address are placed in the
header by the network layer. Segment in the Network layer is
referred to as Packet. The Network layer is implemented by
networking devices such as routers and switches.
ROUTER

A router is a networking
device that forwards data
packets between different
networks, directing traffic to
ensure that information
reaches its intended
destination effectively.
Layer 4 – Transport Layer

 The transport layer provides services to the application layer


and takes services from the network layer. The data in the
transport layer is referred to as Segments. It is responsible for
the end-to-end delivery of the complete message. The transport
layer also provides the acknowledgment of the successful data
transmission and re-transmits the data if an error is found.

 Protocols used in Transport Layer are (TCP-Transmission Control


Protocol), (UDP-User Datagram Protocol).
Layer 5 – Session Layer

 Session Layer in the OSI Model is responsible for the


establishment of connections, management of
connections, termination of sessions between two
devices. It also provides authentication and security.
Protocols used in the Session Layer are NetBIOS, PPTP.

 PPTP (Point-to-Point Tunneling Protocol) is a network


protocol used to establish a secure VPN connection
over the internet
Layer 6 – Presentation Layer

 The presentation layer is also called the Translation layer.


The data from the application layer is extracted here and
manipulated as per the required format to transmit over the
network.
 Protocols used in the Presentation Layer are JPEG, MPEG, GIF,
TLS/SSL, etc.

 Encryption/ Decryption: Data encryption translates the data


into another form or code. The encrypted data is known as
the ciphertext
Layer 7 – Application Layer

 These applications produce the data to be transferred


over the network. This layer also serves as a window
for the application services to access the network and
for displaying the received information to the user.

 Protocols used in the Application layer are SMTP, FTP,


DNS, etc.
How Data Flows in the OSI Model?
NOTE:

When we transfer information from one device to another, it


travels through 7 layers of OSI model. First data travels down
through 7 layers from the sender’s end and then climbs back 7
layers on the receiver’s end.

 Data flows through the OSI model in a step-by-step process:

 Application Layer: Applications create the data.

 Presentation Layer: Data is formatted and encrypted.


CONTINUATION

 Session Layer: Connections are established and managed.

 Transport Layer: Data is broken into segments for reliable delivery.

 Network Layer : Segments are packaged into packets and routed.

 Data Link Layer: Packets are framed and sent to the next device.

 Physical Layer: Frames are converted into bits and transmitted


physically.
Protocols Used in the OSI Layers
Protocol
Layer Working Data Unit Protocols

Establishing Physical
1 – Physical
Connections between Bits USB, SONET/SDH, etc.
Layer
Devices.

2 – Data Link Node to Node Delivery


Frames Ethernet, PPP, etc.
Layer of Message.

Transmission of data
3 – Network from one host to IP, ICMP, IGMP, OSPF,
Packets
Layer another, located in etc.
different networks.

Take Service from Segments (for


4 – Transport Network Layer and TCP) or
TCP, UDP, SCTP, etc.
Layer provide it to the Datagrams
Application Layer. (for UDP)

Establishes Connection,
5 – Session Maintenance, Ensures
Data NetBIOS, RPC, PPTP, etc.
Layer Authentication and
Ensures security.

Data from the


application layer is
6 –
extracted and TLS/SSL, MIME, JPEG,
Presentation Data
manipulated in the PNG, ASCII, etc.
Layer
required format for
transmission.

7 – Helps in identifying the


FTP, SMTP, DNS, DHCP,
Application client and synchronizing Data
etc.
Layer communication.
Advantages of OSI Model

 • It divides network communication into 7 layers which makes


it easier to understand and troubleshoot.
 • It standardizes network communications, as each layer has
fixed functions and protocols.
 • Diagnosing network problems is easier with the OSI model.
 • It is easier to improve with advancements as each layer can
get updates separately.
Disadvantages of OSI Model

 The OSI Model has seven layers, which can be

complicated and hard to understand for beginners.

 Each layer in the OSI Model adds its own set of rules

and operations, which can make the process more time-

consuming and less efficient.


Network Criteria

 There are a lot of criteria that make a network better than others,
but; there are three basic yet important criteria to be fulfilled for a
network:

o Performance

o Reliability

o Security
o Performance

 It measures how well a network can support


communication between two nodes in the Network or
with nodes of other networks in the global scope. The
two major tasks in a network are the Transmission and
reception of information. We need to focus on how fast
a message is transmitted and how fast a node can
receive a request and find the needed information.
 Transit time: The total time a node takes to transmit a
message from the beginning until the last character of the
message. Transit stands for Transmission.

 Response time: The total time a node takes to process an


inquiry or a request from another node/ device and respond. It
is the time between the inquiry's end and the response's
beginning.
o Reliability

 It is the degree to which a network is trustworthy,


consistent, and dependable. The Reliability of a
network is measured by the frequency of failures it
is undergoing and the time it takes to recover from
the failures. Overall, the Robustness of the Network
at times of catastrophic events is measured to
check how reliable the Network is.
o Security

Network security refers to the measures and practices


implemented to protect the integrity, confidentiality, and
availability of data transmitted over a network.

 Data Integrity: Ensuring that data is accurate and unaltered


during transmission.

 Confidentiality: Protecting sensitive information from


unauthorized access.

 Availability: Ensuring that network services and data are


accessible to authorized users when needed.

You might also like