Data Communications and Networking
Data Communications and Networking
INTRODUCTION
MRS NEETA GEORPHIN
COMPUTER NETWORKS
UNIT I 10 Hours
Introduction to Computer Networks and Networking Elements: Network Definition, Network Topologies, Network
Classifications, Network Protocol, Layered Network Architecture, Overview of OSI Reference Model, Overview of TCP/IP
Protocol Suite
UNIT II 13 Hours
Transmission of Digital Data: Digital Data transmission, Parallel, Serial-DTE-DCE Interface, Modems.
Guided media and unguided media: types
Networks Switching Techniques and Access Mechanisms: Circuit Switching, Packet Switching- Connectionless Datagram
Switching, Connection Oriented Virtual
Data Link Layer Functions and Protocol: Error Detection and Error Correction Techniques, Data-Link Control- Framing and
Flow Control, Error Recovery
Protocols-Stop and Wait ARQ, Go-Back-N ARQ, Point to Point Protocol on Internet.
UNIT III 14 Hours
Multiple Access Protocol and Network Layer: CSMA/CD Protocols, Ethernet LANs;
Connecting LAN and Back-Bone Networks: Repeaters, Hubs, Switches, Bridges, Router
and Gateways.
Addressing on the internet- Physical address, Domains names/URLs, Logical Addressing:
IPv4 - Classes, Subnet masks, CIDR, Types - Static, dynamic, loopback, APIPA, Private,
dynamic, broadcast, unicast, multicast, network address.
Subnetting - Subnet mask, NAT, Limitations of IPv4, Introduction to IPv6.
Networks Layer Functions and Protocols: Routing, Routing Algorithms,
Network Layer Protocol of Internet – IP Protocol, Internet Control Protocols.
Networking commands: ping, traceroute, nslookup, ipconfig, ip addr.
UNIT IV 8 Hours
Transport Layer and Application Layer Functions and Protocols: Transport Services Error and Flow Control,
Connection Establishment and Release- Three Way Handshake,
Overview of Application Layer Protocol - Overview of DNS
Protocol; Overview of WWW & HTTP Protocol.
Text Book
1. Behrouz A. Forouzan. Data Communications and Networking. Tata McGraw-Hill
Edition, Fourth Edition.
Reference Books
1. Andrew s. Tanenbaum .Computer Networks. Pearson Education .Fourth Edition.
2. Alberto Leon- Garcia and IndraWidjaja.Communication Networks- Fundamental
Concepts and key Architectures. Tata Mcgraw-Hill. Second Edition.
DATA COMMUNICATION
1. Delivery: The system must deliver data to the correct destination. Data must be received by the
intended device or user and only by that device or user.
2. Accuracy: The system must deliver the data accurately. Data that have been altered in
transmission and left uncorrected are unusable.
3. Timeliness: The system must deliver data in a timely manner. Data delivered late are useless. In
the case of video and audio, timely delivery means delivering data as they are produced, in the
same order that they are produced, and without significant delay. This kind of delivery is called
real-time transmission
FIVE COMPONENTS OF DATA COMMUNICATION
1.Message - It is the information to be communicated. Popular forms of information include text, pictures,
audio, video etc. Text is converted to binary, number doesnt converted, image is converted to pixels, etc.
2. Sender - It is the device which sends the data messages. It can be a computer, workstation, telephone
handset etc.
3. Receiver - It is the device which receives the data messages. It can be a computer, workstation,
telephone handset etc.
4. Transmission Medium - It is the physical path by which a message travels from sender to receiver. Some
examples include twisted-pair wire, coaxial cable, radio waves etc.
5. Protocol - It is a set of rules that governs the data communications. It represents an agreement between
the communicating devices. Without a protocol, two devices may be connected but not communicating.
NETWORKS
• Transit time is the amount of time required for a message to travel from one device to another.
• The performance of a network depends on the number of users, the type of transmission medium, the capacities of the
connected hardware and the efficiency of the software.
1. Number of users: Having a large number of concurrent users can slow response time in a network not designed to coordinate
heavy traffic loads.
2. Type of transmission medium: A medium that can carry data at 100 megabits per second is 10 times more
powerful than a medium that can carry data at only 10 megabits per second.
3.Hardware; A higher speed computer with greater storage capacity provides better performance.
4. Software: The software used to process data at the sender, receiver and intermediate nodes affect network
performance.
Reliability: Is measured by the frequency of failures, the time it takes a link to recover from failure and the
network robustness in a catastrophe.
Security: This refers to the ability to protect data from unauthorized access. Protection can be accomplished at
the lower levels by identification codes and passwords and at higher level using encryption techniques.
PROTOCOLS
A protocol is a set of rules that govern data communication. A protocol defines what is communicated, how it is
communicated and when it is communicated. The key elements of a protocol are syntax, semantics and timing.
1. Syntax: refers to the structure or format of the data, meaning the order in which they are presented.
2. Semantics: refers to the meaning of each section of bits.
3. Timing refers to two characteristics: when data should be sent and how fast they can be sent.
STANDARDS
A standard provides a model for development that makes it possible for a product to work regardless of the
individual manufacturer
Standards provide guidelines to manufacturers, vendors, government agencies, and other service providers to
ensure the kind of interconnectivity necessary in today's marketplace and in international communications.
Standards – two types
1. De jure
2. De Facto
De jure • Those standards that have been legislated by an officially recognized body.
De facto • Standards that have not been approved by an organized body but have been adopted as standards
through widespread use. • De facto standards are often established originally by manufacturers who seek to
define the functionality of a new product or technology.
De facto • Proprietary (Closed Standards) • Standards that are originally invented by a commercial organization as
a basis for the operation of its product. • They are wholly owned by the company. • They are also called Closed
Standards because they close off communication systems. • e.g. IGRP& EIGRP Routing Protocols. • Non
Proprietary (Open Standards) • They are originally developed by groups or communities that have passed them
into public domains. • They are also called Open standards because they open communication between different
systems.
LINE CONFIGURATION
Line configuration defines the attachment of communication devices to a link. A link is the physical communication
pathway that transfers data from one device to another. Two possible line configurations: point to point and multi
point.
POINT-TO-POINT CONNECTION
The term physical topology refers to the way in which a network is laid out physically. One or more devices
connect to a link; two or more links form a topology. The topology of a network is the geometric representation
of the relationship of all the links and linking devices (usually called nodes) to one another. There are four basic
topologies possible: mesh, star, bus, and ring
MESH TOPOLOGY
In mesh, all the computers are interconnected to every other during a network. Each computer not only sends its own signals but also relays data
from other computers.
The nodes are connected to every other completely via a dedicated link during which information is travel from nodes to nodes and there are
N(N-1)/2 links in mesh if there are N nodes.
If suppose, N number of devices are connected with each other in mesh topology, then total number of ports that is required by each device is
N-1. In the Figure there are 5 devices connected to each other, hence total number of ports required is 4.
Every node features a point-to-point connection to the opposite node. The connections within the mesh are often wired or wireless.
Advantages of this topology :
• It is robust.
• Fault is diagnosed easily. Data is reliable because data is transferred among
the devices through dedicated channels or links.
• Provides security and privacy.
In bus topology there is a main cable and all the devices are connected to this main cable through drop lines.
There is a device called tap that connects the drop line to the main cable. Since all the data is transmitted over
the main cable, there is a limit of drop lines and the distance a main cable can have.
The data is transmitted from one device to another device through a transmission
mode. The transmission mode decides the direction of data in which the data
needs to travel to reach the receiver system or node. The transmission mode is
divided in three categories:
1. Simplex
2. Half-Duplex
3. Full-Duplex
SIMPLEX MODE
In simplex mode the data transmits in one direction only, from
one system to another system.
2. The sender device that sends data can only send data and
cannot receive it. On the other hand the receiver device can
only receive the data and cannot send it.
3. Television is an example of simplex mode transmission as the
broadcast sends signals to our TV but never receives signals
back from our TV. This is a unidirectional transmission.
Advantages of Simplex Mode:
The full capacity of the transmission medium is utilised as the
transmission is one way and cannot have traffic issues.
Disadvantages of Simplex Mode:
No bidirectional communication is possible. Two devices cannot
communicate with each other using simplex mode of
transmission.
HALF-DUPLEX MODE
1. In half duplex mode transmission can be done both ways which means if two
systems are connected with half-duplex mode of transmission, they both can send
and receive data but not at the same time.
2. If one device is sending data then other device cannot send data until it
receives the data which is already in transmission.You can say that the
communication is not simultaneous.
3. The radio communication device that our soldiers use at the battle fields are
the examples of half duplex mode transmission as they send message and then
say over and then the person on other hand send his message and this way they
communicate but not simultaneously like we used to do on mobile.
Advantages of Half-Duplex mode:
Both devices can send and receive data.
Whole bandwidth can be utilised as at a time only one signal transmits.
In full duplex mode both the connected devices can send and
receive data simultaneously. The mobile phone we use is an
example of full duplex mode where we can communicate
simultaneously.
2. Both the devices can send and receive the data at the same
time.
It was developed in 1980s.It is basically a bigger version of LAN. It is also called MAN and uses the
similar technology as LAN. It is designed to extend over the entire city. It can be means to
connecting a number of LANs into a larger network or it can be a single cable. It is mainly hold
and operated by single private company or a public company.
WIDE AREA NETWORK (WAN)
It is also called WAN. WAN can be private or it can be public leased network. It is used for the
network that covers large distance such as cover states of a country. It is not easy to design and
maintain. Communication medium used by WAN are PSTN or Satellite links. WAN operates on low
data rates.
INTER NETWORK
Inter Network or Internet is a combination of two or more networks. Inter network can be formed
by joining two or more individual networks by means of various devices such as routers, gateways
and bridges.
NETWORK MODELS
A network is a combination of hardware and software that sends data from one location to another. The hardware
consists of the physical equipment that carries signals from one point of the network to another. The software
consists of instruction sets that make possible the services that we expect from a network.
THE OSI MODEL
The International Standards organization is a multinational body dedicated to worldwide agreement on International
standards. An ISO standard that covers all aspects of network communications is the Open System Interconnection
model.
An open system is a set of protocols that allows any two different systems to communicate regardless of their
underlying architecture.
The OSI model is not a protocol, it is a model for understanding and designing a network architecture that is flexible,
robust and interoperable.
The OSI model is a layered framework for the design of network systems that allows communication between all types
of computer systems.
The purpose of the OSI reference model is to show how to facilitates communication between different systems
without requiring changes to the logic of underlying hardware and software.
There are the seven OSI layers. Each layer has different
functions. A list of seven layers are given below:
Physical Layer
Data-Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
LAYERED ARCHITECTURE
Figure shows the layers involved when a
message is sent from device A to device B.
As the message travels from A to B, it may pass
through many intermediate nodes. These
intermediate nodes usually involves only the
first three layers of the OSI model.
• Within a single machine, each layer calls
upon the services of the layer just below it.
• Layer3 uses the services provided by layer2
and provided services for layer 4.
• Between machines, layer x on one machine
communicates with layer x on another
machine. This communication is governed by
an agreed upon series of rules and
conventions called protocols.
• The processes on each machine that
communicate at a given layer are called
peer-to-peer processes.
INTERFACE BETWEEN LAYERS & ORGANIZATION OF LAYERS
Each interface defines the information and services a layer must provide for the layer above it.
Organization of layers
The seven layers can be thoughts of belonging two- three subgroups. Layers one, two and three (Physical, Data
Link, and Network Layer) are the network support layers. So, they deal with the physical aspects of moving
data from one device to another device.
Layers five, Six and Seven (Session, Presentation, Application) can be thoughts of as the users support layers,
They allow interoperability among unrelated software system. Therefore, the main work of Transport Layer
ensures end-to-end reliable data transmission.
At each layer a header or possibly a
trailer can be added to the data unit.
The trailer is added only at layer 2.
Upon reaching its destination , the
headers and trailers attached to it at
the corresponding sending layer are
removed.
LAYERS IN THE OSI MODEL
Physical Layer
Physical Layer deals with the mechanical(hardware) and electrical specification of the interface and
transmission media. The physical layer is responsible for the movement of individual data from one
hop(node) to next hop.
Other responsibilities of Physical layers :
Physical characteristics of interface and media: This layer defines the features of the interface between the devices
and the transmission media, it also defines the type of transmission media.
Representation of data: To be transmitted, data must be encoded to the signal, electrical and optical. The physical
layer defines the type of encoding (how zero and one change two signals).
Data rate: The number of bits send each second is defined by the physical layer.
Synchronization of data: In this, process the sender and receiver must not only use the same data rate but must
also be synchronized at the bit level, in other words, the sender and receiver clock must be synchronized.
Line Configuration: The physical layer concerned with the connection of the devices to the media either point to
point configuration or multipoint configuration.
Physical Topology: The physical topology defines, how devices are connected to make a network, Ring, Bus, Star
etc.
Transmission mode: This layer support different transmission mode such as Simple, Half-duplex and Full-duplex.
DATA LINK LAYER
The data link layer is responsible for moving the frame from one hop to next hop
Framing: Data link layer divides the stream of data received from the network layer into manageable data
units called frames.
Physical addressing: If frames are to be distributed to different systems on the network, the data link
layer adds a header to the frame to define the sender or receiver of the frame.
Flow Control: If the data rate in which data receives by the receiver is less than the rate produced by the
sender, the data link layer imposes a flow of control mechanism to prevent overwhelming the receiver.
Error Control: The data link layer adds reliability by adding mechanisms to detect and retransmit damaged
or lost frames. It also uses a mechanism to recognize duplicate frames.
Access Control: Data link layer define when two or more devices are connected to the same link; data
link layer protocols are necessary to determine which device has control over the link at any given time.
NETWORK LAYER
The network layer is responsible for the delivery of individual
packets from the source host to the destination host across
multiple networks.
Other responsibilities of the network layer:
Logical addressing: If a packet passes the network
boundary, another addressing system is used to distinguish the
source and destination systems. The network layer adds a
header to the packet which includes the logical addresses of
the sender and the receiver.
Routing: When independent networks or links are connected
to create internetworks or a large network, the connecting
devices called routers route the packet to their final
destination
TRANSPORT LAYER