Professional Documents
Culture Documents
Data communication and its components, Data Representation, Data Flow, Network Criteria,
Types of Connection, Physical Topology, Categories of Network, Study of OSI Model
1. Data Communication:
Data communications are the exchange of data between two devices via some form of
transmission medium such as a wire cable.
For data communications to occur, the communicating devices must be part of a
communication system made up of a combination of hardware (physical equipment) and
software (programs).
The effectiveness of a data communications system depends on four fundamental
characteristics: delivery, accuracy, timeliness, and jitter.
1. Delivery. The system must deliver data to the correct destination. Data must be received
by the intended device or user and only by that device or user.
2. Accuracy. The system must deliver the data accurately. Data that have been altered in
transmission and left uncorrected are unusable.
3. Timeliness. The system must deliver data in a timely manner. Data delivered late are
useless. In the case of video and audio, timely delivery means delivering data as they are
produced, in the same order that they are produced, and without significant delay. This
kind of delivery is called real-time transmission.
4. Jitter. Jitter refers to the variation in the packet arrival time. It is the uneven delay in the
delivery of audio or video packets.
For Example, let us assume that video packets are sent every 30 ms. If some of the packets
arrive with 30 ms delay and others with 40 ms delay, an even quality in the video is the
result.
Page 1
Computer Network-Unit 1 2024
3. Data Representation:
A network is a collection of different devices connected and capable of communicating. For
example, a company's local network connects employees' computers and devices like
printers and scanners. Employees will be able to share information using the network and
also use the common printer/ scanner via the network. Data to be transferred or
communicated from one device to another comes in various formats like audio, video, etc.
Page 2
Computer Network-Unit 1 2024
This tutorial explains how different data types are represented in a computer and
transferred in a network.
3. Images
4. Videos
5. Audios
1) Textual data:
Data in text format is represented using bit patterns (combinations of two binary bits - 0 and 1).
Textual data is nothing but a string, and a string is a collection of characters. Each character is given
a specific number according to an international standard called Unicode. The process of allocating
numbers to characters is called "Coding," and these numbers are called "codes". Now, these codes are
converted into binary bits to represent the textual data in a pattern of bits, and these bits are
transferred as a stream via the network to other devices.
Unicode:
It is the universal standard of character encoding. It gives a unique code to almost all the characters
in every language spoken in the world. It defines more than 1 40 000 characters. It even defined codes
for emojis. The first 128 characters of Unicode point to ASCII characters. ASCII is yet another
character encoding format, but it has only 128 codes to 128 characters. Hence, ASCII is a subset of
Unicode.
File extensions:
.doc, .docx, .pdf, .txt, etc.
For example:
Word: H
Unicode representation: U+0048
Page 3
Computer Network-Unit 1 2024
2. Numerical data
Numbers are directly converted into binary patterns by dividing by 2 without any encoding. The
numbers we want to transfer generally will be of the decimal number system- ( )10. We need to
convert the numbers from ( )10 to a binary number system - ( )2 to get a bit stream.
Number formats:
Integers
Date
Boolean
Decimal
Fixed point
Floating point
Example:
Number: 780
Binary representation: 1100001100
3. Image
Image data is also transferred as a stream of bits like textual data. An image, also called a picture, is
a collection of little elements called "Pixels". A single pixel is the smallest addressable element of a
picture, and it is like a dot with a size of 1/96 inch/ 0.26 mm. The dimensions of an image are given
by the number of pixels along the height of the image X Number of pixels along the width of the
image.
Representation in a computer:
Grayscale images:
A black-and-white/ Grayscale image consists of white, black, and all the shades in between. It can be
considered as just the varying intensity of the White color. The intensity of the white color in a
pixel is given by numbers called "Pixel values". The pixel value in a Grayscale image can be in the
range of 0 to 255, where 0 represents Black and 255 represents White, and all the numbers in the
interval represent different shades. A matrix is created for the image with pixel values of all the pixels
in the image. This matrix is called a "Channel".
Page 4
Computer Network-Unit 1 2024
Colored images:
Each pixel comprises three transistors representing three standard colors: Red, Green, and Blue
(RGB), Yellow, Cyan, and Magenta (YCM). Any color known can be generated by using these three
colors. Based on the intensity of a color in the pixel, three matrices/ channels for each color are
generated.
Suppose there is a colored image, and three matrices are created for Red, Green, and Blue colors in
each pixel in the image:
Page 5
Computer Network-Unit 1 2024
The first pixel's intensities of Red, Green and Blue colors are [141, 35, 31]. In this way, every pixel is
analyzed and converted into binary bits, and this bit stream is transferred to any other device in the
network to communicate the image. N-bit streams are used to represent 2N possible colors. From 0
to 255, we can represent 256 shades of color with different 8-bit patterns.
For example, an image consists of only either black or white colors, only one bit will be enough to
represent the pixels:
White - 1
Black – 0
File extensions:
.jpg, jpeg, .png, etc.
4. Audios
Transferring an audio signal is different from other formats. Audio is broadcasting recorded sound
or music. An audio signal is generated as an analog wave, converted into digital format to be
stored in a computer by representing the wave amplitude at moments in bits. Another parameter is
the sample rate. It represents the number of samples or, in other words, samples saved.
The audio quality depends on the sampling rate and the bit rate. If more bits are used to represent
the amplitudes in moments and more moments are captured accurately, we can save the audio with
every detail accurately.
File extensions:
.mp3, .m4a, .WAV, .AAC, etc.
5. Videos
A video is a collection of frames; each frame is a picture with the same or different dimensions.
These frames/ images are represented as matrices, as we discussed above. All the frames/ images
are displayed continuously, one after the other, to show a video in movement. To represent a video,
the computer will analyze data about the video like:
Page 6
Computer Network-Unit 1 2024
4. Bit depth (Number of bits required to represent a pixel -> number of colors)
A video is mostly combined with an audio component, like a film or a video game.
File extensions:
.mp4, .MOV, .AVI, etc.
Advantages:
Page 7
Computer Network-Unit 1 2024
Disadvantages:
Advantages:
i. Enable to two-way communication.
ii. Low cost than full duplex communication mode.
Disadvantages:
Page 8
Computer Network-Unit 1 2024
In full-duplex mode, signals going in one direction share the capacity of the link: with signals
going in the other direction.
One common example of full-duplex communication is the telephone network. When two
people are communicating by a telephone line, both can talk and listen at the same time.
The full-duplex mode is used when communication in both directions is required all the time.
The capacity of the channel, however, must be divided between the two directions.
Advantages:
Disadvantages:
5. Network Criteria
The major criteria that a Data Communication Network must meet are:
a. Performance
b. Consistency
c. Reliability
d. Recovery
e. Security
a. Performance
Performance is defined as the rate of transferring error free data. It is measured by the Response
Time. Response Time is the elapsed time between the end of an inquiry and the beginning of a
response. Request a file transfer and start the file transfer. Factors that affect Response Time are:
Page 9
Computer Network-Unit 1 2024
Number of Users: More users on a network - slower the network will run
Transmission Speed: speed that data will be transmitted measured in bits per second
(bps)
Media Type: Type of physical connection used to connect nodes together
Hardware Type: Slow computers such as XT or fast such as Pentiums
Software Program: How well is the network operating system (NOS) written
b. Consistency
Consistency is the predictability of response time and accuracy of data.
Users prefer to have consistent response times; they develop a feel for normal operating
conditions. For example: if the "normal" response time is 3 sec. for printing to a Network
Printer and a response time of over 30 sec happens, we know that there is a problem in the
system!
Accuracy of Data determines if the network is reliable! If a system loses data, then the users
will not have confidence in the information and will often not use the system.
c. Reliability
Reliability is the measure of how often a network is useable. MTBF (Mean Time Between Failures)
is a measure of the average time a component is expected to operate between failures. Normally
provided by the manufacturer. A network failure can be: hardware, data carrying medium and
Network Operating System.
d. Recovery
Recovery is the Network's ability to return to a prescribed level of operation after a network
failure. This level is where the amount of lost data is nonexistent or at a minimum. Recovery is
based on having Back-up Files.
e. Security
Security is the protection of Hardware, Software and Data from unauthorized access.
Restricted physical access to computers, password protection, limiting user privileges and
data encryption are common security methods. Anti-Virus monitoring programs to defend
against computer viruses are a security measure.
Page 10
Computer Network-Unit 1 2024
6. Types of Connection
A network is two or more devices connected through links. A link is a communications
pathway that transfers data from one device to another. There are two possible types of
connections:
Point-to-point
Multipoint.
Point-to-Point
A point-to-point connection provides a dedicated link between two devices.
The entire capacity of the link is reserved for transmission between those two
devices.
Most point-to-point connections use an actual length of wire or cable to connect
the two ends, but other options, such as microwave or satellite links, are also
possible.
When you change television channels by infrared remote control, you are
establishing a point-to-point connection between the remote control and the
television’s control system.
Multipoint
A multipoint (also called multidrop) connection is one in which more than two
specific devices share a single link.
In a multipoint environment, the capacity of the channel is shared, either spatially
or temporally.
If several devices can use the link simultaneously, it is a spatially shared
connection. If users must take turns, it is a timeshared connection.
Page 11
Computer Network-Unit 1 2024
7. Physical Topology
a. Introduction:
Network Topology refers to layout of a network. How different nodes in a network are
connected to each other and how they communicate is determined by the network’s
topology.
Topologies are either physical (the physical layout of devices on a network) or logical (the
way that the signals act on the network media, or the way that the data passes through the
network from one device to the next).
b. Definition:
Network Topology is the schematic description of a network arrangement, connecting
various nodes (sender and receiver) through lines of connection.
OR
A Network Topology is the arrangement with which computer systems or network devices
are connected to each other.
OR
It is geometric arrangement of computer and its devices in a network.
Page 12
Computer Network-Unit 1 2024
In this method, the network consists of a direct link between two computers.
This is faster and highly reliable than other types of connections since there is a direct
connection.
No need for a network operating system
Does not need an expensive server as individual workstations are used to access the files
No need for any dedicated network technicians because each user sets their permissions
Disadvantages:
The biggest drawback is that it only be used for small areas where computers are in close
proximity.
You can’t back up files and folders centrally
There is no security besides the permissions. Users often do not require to log onto their
workstations.
2. Bus Topology:
A bus topology is multipoint
Bus Topology is a network setup in which each computer and network devices are connected
to a single cable or backbone. Bus uses a common backbone to connect all devices.
Nodes are connected to the bus cable by drop lines and taps.
A drop line is a connection running between the device and the main cable.
A tap is a connector that either splices into the main cable or punctures the sheathing of a
cable to create a contact with the metallic core.
Page 13
Computer Network-Unit 1 2024
A device wanting to communicate with another device on the network sends a broadcast
message onto the wire that all other devices see, but only the intended recipient actually
accepts and processes the message.
Both ends of the shared channel have line terminator. The data is sent in only one direction
and as soon as it reaches the extreme end, the terminator removes the data from the line.
Page 14
Computer Network-Unit 1 2024
Terminators are required for both ends of the main cable.
Additional devices slow the network down.
If a main cable is damaged, the network fails or splits into two.
Heavy network traffic slows down the bus speed .In bus topology only one computer can
transmit & other have to wait till their turn comes & there is no co-ordination
between computers for reservation of transmitting time slot.
3. Star Topology:
In a star topology, each device has a dedicated point-to-point link only to a central controller,
usually called a hub.
The devices are not directly linked to one another. Unlike a mesh topology, a star topology
does not allow direct traffic between devices.
The controller acts as an exchange: If one device wants to send data to another, it sends the
data to the controller, which then relays the data to the other connected device.
Page 15
Computer Network-Unit 1 2024
Disadvantages of Star topology:
One big disadvantage of a star topology is the dependency of the whole topology on one
single point, the hub. If the hub goes down, the whole system is dead.
Although a star requires far less cable than a mesh, each node must be linked to a central
hub. For this reason, often more cabling is required in a star than in some other
topologies (such as ring or bus).
4. Ring Topology:
In a ring topology, each device has a dedicated point-to-point connection with only the
two devices on either side of it.
A signal is passed along the ring in one direction, from device to device, until it reaches
its destination.
Each device in the ring incorporates a repeater. When a device receives a signal intended
for another device, its repeater regenerates the bits and passes them along.
In ring topology network arrangement, a signal is transferred sequentially using TOKEN
from one station to another. If station wants to transmit, it “grabs” the token, attaches
data and a destination address to it, and sends it around the ring.
The TOKEN travels along the ring until it reaches its destination. Once TOKEN reaches
destination, receiving computer acknowledges receipt with a return message to the
sender.
The sender then releases the token for the token for use by another computer.
Ring topology is a point to point network.
TOKEN: Token is a special three bytes’ frame that travels around the ring network. It can flow
clockwise or anticlockwise.
Page 16
Computer Network-Unit 1 2024
The adding or removing of network nodes is easy, as the process requires changing
only two connections.
The data being transmitted between two nodes passes through all the intermediate
nodes. A central server is not required for the management of this topology
Here, since the system provides point to point flow of data i.e. the data is moving in
one direction from one computer to another i.e. active topology, hence no collision
occurs in the system.
Cable faults are easily identified.
Packet or data delivery is guaranteed.
Every computer is having equal priority.
Unidirectional traffic
In a simple ring, a break in the ring (such as a disabled station) can disable the entire
network.
Slow in speed.
Reconfiguration is needed to add one node; whole network must be down first.
Difficult for troubleshooting the ring.
Page 17
Computer Network-Unit 1 2024
5. Tree Topology:
As its name implies in this topology devices makes a tree structure.
Tree topology integrates the characteristics of star and bus topology.
In this topology, the numbers of star networks are connected using Bus. This main cable
seems like a main stem of a tree, and other star networks as the branches.
It is also called expanded star topology.
Tree topology allows for the expansion of an existing network and enables schools to
configure a network to meet their needs.
Page 18
Computer Network-Unit 1 2024
Here, we divide the whole network into segments (star networks), which can be
easily managed and maintained.
Error detection and correction is easy.
Each segment is provided with dedicated point-to-point wiring to the central hub. If
one segment is damaged, other segments are not affected.
6. Mesh Topology:
A network setup where each computer and network device is interconnected with
one another, allowing for most transmissions to be distributed even if one of the
connections goes down.
It is a topology commonly used for wireless networks.
Page 19
Computer Network-Unit 1 2024
In a partially connected mesh topology, at least two of the computers in the network
have connections to multiple other computers in that network. It is an inexpensive
way to implement redundancy in a network. In the event that one of the primary
computers or connections in the network fails, the rest of the network continues to
operate normally.
Manages high amounts of traffic, because multiple devices can transmit data
simultaneously.
A failure of one device does not cause a break in the network or transmission of data.
Adding additional devices does not disrupt data transmission between other devices.
The cost to implement is higher than other network topologies, making it a less
desirable option.
Building and maintaining the topology is difficult and time consuming.
The chance of redundant connections is high, which adds to the high costs and
potential for reduced efficiency.
7. Hybrid Topology:
A hybrid topology is a type of network topology that uses two or more differing
network topologies.
These topologies include a mix of bus topology, mesh topology, ring topology, star
topology, and tree topology.
In other words, the topology that combines more than two topologies is called as
hybrid topology.
Page 20
Computer Network-Unit 1 2024
Page 21
Computer Network-Unit 1 2024
In above figure, individual nodes of a given Star topology like Star Topology 1 are
interconnected by a central switch which in turn provides an external connection to
other star topologies through a node A in the main ring topology.
Information from a given star topology reaching a connecting node in the main ring
topology like A flows either in a bidirectional or unidirectional manner.
A bidirectional flow will ensure that a failure in one node of the main ring topology
does not lead to the complete breakdown of information flow in the main ring
topology.
b) Star-wired bus Network Topology:
Page 22
Computer Network-Unit 1 2024
Uses of Hybrid Network Topologies:
The decision to use the Hybrid network topology over a basic topology in a network
is mostly based on the organizational needs to be addressed by the network
envisioned. The following are some of the reasons that can make an organization pick
on a hybrid as the preferred network topology.
Where there is need for Flexibility and Ease of network Growth.
Network growth is when more network nodes are added to an existing network. A
hybrid network eases addition of new nodes to the network as changes can be done
at the basic network levels as well as on the main network.
Page 23
Computer Network-Unit 1 2024
work with different architectures and should be function even if a part of network is
down.
3. Costly Infrastructure: As hybrid architectures are usually larger in scale, they
require a lot of cables; cooling systems, sophisticate network devices, etc.
Selection Criteria:
Network Topology refers to layout of a network. How different nodes in a network are connected
to each other and how they communicate is determined by the networks topology.
8. Categories of Network:
8.1 Network:
A network is a set of devices (often referred to as nodes) connected by communication links.
A node can be a computer, printer, or any other device capable of sending and/or receiving data
generated by other nodes on the network.
Page 24
Computer Network-Unit 1 2024
Resource Sharing:
Enable users to share hardware like scanners and printers. This reduces costs by reducing
the number of hardware items bought.
Information Sharing:
Allow users’ access to data stored on others computers. This keeps everyone up-to-date on
the latest data, since it is all in the same file, rather than having copies of the files, which are
immediately out of date.
Electronic business:
Users can place orders electronically as needed.
Interactive entertainment:
Real-time simulation games, like flight simulation, Age of empires etc.
Transfer of data between various computers.
Banking
Video conferencing
School
Radio
Television
E-mail
Page 25
Computer Network-Unit 1 2024
Financial services
Marketing and sales
Characteristics of LAN:
Every computer has the potential to communicate with any other computers of the network.
High degree of interconnection between computers.
Easy physical connection of computer in a network.
Inexpensive medium of data transmission.
High data transmission rate.
Page 26
Computer Network-Unit 1 2024
Internet
Modem
Switch/Hub
Printer
Advantages of LAN:
The reliability of network is high because the failure of the computer in the network does not
affect the functioning for other computers.
Addition of new computer to network is easy.
High rate of data transmission is possible.
Less expensive to install.
Disadvantages:
Page 27
Computer Network-Unit 1 2024
2. MAN (Metropolitan Area Network):
A Metropolitan Area Network (MAN) is a large computer network that spans a
metropolitan area or city.
It was developed in 1980s.It is basically a bigger version of LAN. It is also called MAN and
uses the similar technology as LAN.
It is smaller than a Wide Area Network (WAN) but larger than a Local Area Network
(LAN).
A MAN typically covers an area up to 10 km (city).
The best example of MAN is the cable Television network, available in many cities.
For an organization, the common use of a MAN is to extend their LAN connectivity
between buildings/offices that are within the same city or urban area (hence the name
Metropolitan Area Network).
Fig: MAN
Characteristics of MAN:
It generally covers towns and cities.
Communication medium used for MAN are optical fibers, cables etc.
Data rates adequate for distributed computing applications.
Advantages of MAN
Extremely efficient and provide fast communication via high-speed carriers, such as fiber
optic cables.
It provides a good back bone for large network and provides greater access to WANs.
Page 28
Computer Network-Unit 1 2024
MAN spans large geographical area than LAN.
MAN falls in between the LAN and WAN therefore, increases the efficiency at handling data.
Disadvantages of MAN
More cable required for a MAN connection from one place to another.
It is difficult to make the system secure from hackers and industrial espionage (spying)
graphical regions.
A WAN provides long-distance transmission of data, voice, image and video information over
larger geographical areas that may comprise a country or even whole world.
Characteristics of WAN
It generally covers large distances (states, countries, continents).
Communication medium used are satellite, public telephone networks which are connected
by routers.
Advantages of WAN
Covers a large geographical area so long distance business can connect on the one network.
Shares software and resources with connecting workstations.
Messages can be sent very quickly to anyone else on the network. These messages can have
picture, sounds or data included with them (called attachments).
Expensive things (such as printers or phone lines to the internet) can be shared by all the
computers on the network without having to buy a different peripheral for each computer.
Page 29
Computer Network-Unit 1 2024
Disadvantages of WAN
Need a good firewall to restrict outsiders from entering and disrupting the network.
Setting up a network can be an expensive, slow and complicated. The bigger the network the
more expensive it is.
Once set up, maintaining a network is a full-time job which requires network supervisors and
technicians to be employed.
Security is a real issue when many different people have the ability to use information from
other computers. Protection against hackers and viruses adds more complexity and expense.
Page 30
Computer Network-Unit 1 2024
Compare LAN, MAN and WAN:
A Metropolitan Area
LAN is privately-owned WAN is a long-distance
Network (MAN) is a
networks covering a small communication network
large computer
geographic area (less than 1 that covers a wide
Definition network that spans a
km), like a home, office, geographic area, such as
metropolitan area or
building or group of state or country.
city.
buildings
The OSI model is based on a proposal developed by the International Standards Organization
(ISO) The model is called the ISO-OSI (Open Systems Interconnection).
Reference Model because it deals with connecting open systems—that is, systems that are
open for communication with other systems.
Page 31
Computer Network-Unit 1 2024
An open system is a set of protocols that allows any two different systems to communicate
regardless of their underlying architecture.
The purpose of the OSI model is to show how to facilitate communication between different
systems without requiring changes to the logic of the underlying hardware and software.
The OSI model is not a protocol; it is a model for understanding and designing a network
architecture that is flexible, robust and interoperable.
The OSI model is a layered framework for the design of network system that allows
communication between all types of computer system.
It consists of seven separate but related layers, each of which defines a part of the process of
moving information across a network. They are: Application Layer, Presentation Layer,
Session Layer, Transport Layer, Network Layer, Data link Layer and Physical Layer.
Page 32
Computer Network-Unit 1 2024
1. Physical Layer:
Physical layer is the lowest layer of the OSI reference model.
It is responsible for sending bits from one computer to another.
It is responsible for the actual physical connection between the devices. The physical layer
contains information in the form of bits.
It deals with mechanical and electrical specifications of interface and transmission medium.
For transmission, it defines procedures and functions that devices and transmission medium
has to perform.
Page 33
Computer Network-Unit 1 2024
Functions of data link layer are:
a) Framing: Frames are the streams of bits received from the network layer into manageable
data units. This division of stream of bits is done by Data Link Layer.
b) Physical Addressing: The Data Link layer adds a header to the frame in order to define
physical address of the sender or receiver of the frame, if the frames are to be distributed to
different systems on the network.
c) Flow Control: A flow control mechanism to avoid a fast transmitter from running a slow
receiver by buffering the extra bit is provided by flow control. This prevents traffic jam at the
receiver side.
d) Error Control: Error control is achieved by adding a trailer at the end of the frame.
Duplication of frames are also prevented by using this mechanism. Data Link Layers adds
mechanism to prevent duplication of frames.
e) Access Control: Protocols of this layer determine which of the devices has control over the
link at any given time, when two or more devices are connected to the same link.
3. Network Layer:
It is the third layer of the OSI Reference model.
It is responsible for routing the packets within the subnet i.e. from source to destination.
It is responsible for source to destination delivery of individual packets across multiple
networks.
It ensures that packet is delivered from point of origin to destination
It also takes care of packet routing i.e. selection of the shortest path to transmit the packet,
from the number of routes available.
Page 34
Computer Network-Unit 1 2024
d) Fragmentation and reassembly: When network layer has big data packet, Network layer must
send big data packets to the data link layer for transmission, but data link layer has limit on the length
of the message size. So network layer split the packet in small segments it called fragmentation and
send small pieces to data link layer. When data link layer sends small pieces of segments to network
layer, network layers assembles all pieces and make big packet is called reassembly.
e) Source host to destination host error free delivery of packet
Transport Layer:
The fourth and middle layer of the OSI Reference model is transport layer.
It is responsible for process to process delivery of the entire message.
The basic function of the Transport layer is to accept data from the layer above, split it up into
smaller units, pass these data units to the Network layer, and ensure that all the pieces arrive
correctly at the other end.
The services provided by transport layer:
Connection Oriented Service: It is a three-phase process which include
Connection Establishment
Data Transfer
Termination / disconnection
In this type of transmission, the receiving device sends an acknowledgment, back to
the source after a packet or group of packet is received. This type of transmission is
reliable and secure.
Connection less service: It is a one phase process and includes Data Transfer. In this
type of transmission, the receiver does not acknowledge receipt of a packet. This
approach allows for much faster communication between devices. Connection
oriented Service is more reliable than connection less Service.
The functions of the transport layer are:
a) Segmentation and Reassembly: This layer accepts the message from the (session) layer, breaks
the message into smaller units. Each of the segments produced has a header associated with it. The
transport layer at the destination station reassembles the message.
b) Service Point Addressing: In order to deliver the message to correct process, transport layer
header includes a type of address called service point address or port address. Thus by specifying
this address, transport layer makes sure that the message is delivered to the correct process.
c) Flow Control: In this layer, flow control is performed end to end.
d) Error Control: Error Control is performed end to end in this layer to ensure that the complete
message arrives at the receiving transport layer without any error. Error Correction is done through
retransmission.
e) Connection Control: It includes 2 types:
Connectionless Transport Layer: Each segment is considered as an independent
packet and delivered to the transport layer at the destination machine.
Page 35
Computer Network-Unit 1 2024
Connection Oriented Transport Layer: Before delivering packets, connection is
made with transport layer at the destination machine.
5. Session Layer:
The Session Layer allows users on different machines to establish active communication
sessions between them.
Its main aim is to establish, maintain and synchronize the interaction between
communicating systems.
This layer is responsible for establishment of connection, maintenance of sessions,
authentication and also ensures security.
6) Presentation Layer:
It is concerned with syntax, semantics of information exchanged between the two systems.
It is responsible for data formatting and presenting data for display. It deals with the
presentation of data.
The functions of the presentation layer are:
1. Translation: For example, ASCII to EBCDIC.
2. Encryption/ Decryption: Data encryption translates the data into another form or code. The
encrypted data is known as the cipher text and the decrypted data is known as plain text. A key value
is used for encrypting as well as decrypting data.
3. Compression: Reduces the number of bits that need to be transmitted on the network.
7) Application Layer:
It enables user to access the network. It provides user interfaces and support for services like
email, remote file access.
Page 36
Computer Network-Unit 1 2024
terminal which in turn talks to the host and vice versa. Then the remote host believes it is
communicating with one of its own terminals and allows user to log on.
3. Directory Services: This layer provides access for global information about various services.
4. File Transfer, Access and Management (FTAM): It is a standard mechanism to access files and
manages it. Users can access files in a remote computer and manage it. They can also retrieve files
from a remote computer.
Page 37