0 ratings 0% found this document useful (0 votes) 30 views 88 pages Netwrking P-I
The document outlines the fundamentals of data communications, including key concepts such as delivery, accuracy, and timeliness, as well as the components of a data communication system like sender, receiver, medium, and protocols. It discusses network criteria including performance, reliability, and security, and highlights various applications of data communications in sectors like finance, manufacturing, and entertainment. Additionally, it covers network topologies, line configurations, and the importance of protocols and standards in ensuring effective communication between devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items
Save Netwrking P-I For Later
MAR GREGORIOS COLLEGE
SUBJECT: DATA COMMUNICATIONS AND
Chass: mt csc
STAFF NAME: T.HEMALATHA, M.C.A
fee UNIT-L
aye: DATA COMMUNICATION:
+ ICis the exchange of data(O&1) between two devices through some transmission
medium,
yx ‘© Itcan be local or remote communication,
* Ifthe devices are in the same building iis said to betasate and If the devices aré
farther apart itis said 10 be remote, \
Fundamental characteristie:
‘1 Delivery : They system must delivers the data to the correct reelpient,
. o + Accuracy: The system must deliver data accurately without any alteration,
Timeliness: The system must deliver data in a timely manner.Timely delivery means
delivering data as they ere produceé in the same order without any delay.This is called
real-time transr
Gomponents:
Ca 7
A data communication
ystem is made up of five components.
VP) 2 Message: Its the information to be communicated.tt ean consist of text,
humbers,pictures.sound or Video
Sender: It is the device that sends the data message.Ex:computer,telephone handset
oO ele.
a : er NO"
€ Message
— Receiver
¢ Medium
SC
“KReceiver: The receiver is the device which receives the message.
S Ex: Computer, telepHlone handset. television ete,
€ Medium: It isa physical path by which a message travels from sender to receiver.
g It can be of twisted pair wire, coaxial cable, fibre-optic ete...
JS. Protocol: It is a set of rules that govern data communication.
xX +xMAR GREGORIOS COLLEGE SUBJECT: DATA CONIMUNICATIONS AND NETWORKING.
Class: esc STAFE NAME: THEMALATHA. MCA
+ Also to identify and replace fs Packets that was lost in transmission. wo
connec t
3 Transport layer can be either Conhectioniess or connectiori oriented,
* Aconnectioniess transport layer treats each SERMENE 8S Separate packet and deliver:
the transport layer at the destinttion. 7
© Gygennection oriented transportlayer makes connection with the transport layer at the
destination,
* After delivering ail the data, the connection is terminated, i
4.Flow rol
* tis performed end-to-end rather than across a Fink,
8.Error control
* Error contro! is performed End-to. eng,
© Pe sending transport layer makes sure thet the entice message arrives at the receiving
transport layer without error,
* Cie) Damage, loss or duplication, Error Yorrection is achieved by retransmission
SESSION LAYER
* Itis the network dialogue controttér.
* Westablishes, maintains and synchronizes {he interaction between communicating
devices, ‘i
> MAR GREGORIOS COLLEGE SUBJECT: DATA COMMUNICATIONS AND NETWORKING,
. CLASS: MISC STAFF NAME: T.HEMALATHA. M.C.A
> :
oe :
oo} * A network isa set of devices connected by media links. I can be computer, printer or any
2» y\ _ other device capable of sending éereceiving dala wa'éther nodes on the network.
v
?s * The tinks connecting the devices are called communication channels.
7 Distributed processing:
% » * A task is divided among multiple computers.
* Being large machine responsible for all provess, a single separate computer can handle
“eo a subset
e Advantage:
a. -
e . |. Security/Eneapsulation:
@
* A system designer can Jimit the kind of interaction to the user.
& Ex: ATM
®@
‘+ Bank allows users to access only their own account without allowing to access bank's
entire database. *
é
oO
2. Distributed Database:
+ No one system needs to provide storage capacity. for the entire database.
Ex: WWW
Cc
a)
ereees
«User access to information may be actually stored anywhere on Internet.
'
3. Faster problem solving:
* Multiple computer working an parts ofa problem concurrently can solve faster than a
single machine.
oO "4, Security through redundaney:
* Multiple computers running the sane program af same time provide security through
redundancy,
Oo Ex: [f three computers run the Same program so that if one has hardware error other two
can override it,
ove
5, Collaborative processing:
* Both multipl computers and multiple users may interact on a single'task.
Ex: Network games
eveee|
3 .
MAR GREGORIOS COLLEGE SUBJECT: DATA CONIMUNICATIONS AND NETWORKING,
CLASS: HI CSC STAFF NAME: TNEMALATHA, M.A
Network criteria: x
The most important criteria are performance reliability and security
1, Performance:
Tt-can be measured in two ways by transmit time and response time.
+ Transmit time:
It is the amount of time required for a message to travel from one device to another.
© Response time:
* It is the elapsed time between an inquiry and a response.
* Network performance is based on number of factors.
‘The performance of a network depénds on a number of factors such as,
i) Number of users:
. * A large number of concurrent users can slow respouse time where thy network is not
designed to coordinate heavy traffic loads.
(Ge)In peak load periods, ifthe average numbers users exceeds, theni decreased
performance ns
eu Types of transmission medium: .
11 defines the speed at which data can travel,through a consiection. ‘The faster and
faster transmission media is fiber. optic cabling
iii) Hardware:
* The types of hardware included in a network affect both the speed and capacity of
transmission.
* A speed computer with greater storage capacity will give better perform
er 8 :
iv) Software:
The software used to process data at sender, receiver and intermediate nodes affects *
network performance,
* Moving a message from node to node requires transmission processing,
‘
* Ihis to ensure error-free-delivery.
* It affects both the speed and reliability of a network, so a well defined software should
be used, .
oo
Ph,
°
«
°
e.
°
e
°
{
0eeene
neA
SUBJECT: DATA COMMUNICATIONS AND NETWORKING
Mak GREGORIOS COLLEGE
STAFF NAME: T.HEMALATHA. M.GA
CLASS: I CSC.
2. Reliability:
kis measied by
“Frequency of failure: All network fails occesionally, a network fails often is a
litte value to the user.
It is the time taken by the network
“Recovery time of a network after a failure:
re useful to the user,
'o restore its service. A network that recovers quickly is mor
* Catastrophe:
* Network must be protected from catastrophe events like fire, earthquake,
* One protection is to backup network software,
3.Security:
Ivis the protection of data from unauthorized access and viruses.
i) Unauthorized access:
* Sensitive data must be protected from unauthorized users.
* One protection is user identification and passwords,
* Other Te is to use encryption techniques
(.¢ to putthe information into special code).
iiVir ‘uses:
“Network are decessed from many points so it can be affected by computer viruses,
* A virus is a code that damages the system
“To prevent the system from viruses hardware and software should be designed well.
Rom
Applications:
\ess, industry and entertainment.
"Networks bécame part of bu:
|, Marketing and sales:
"It is used to collect and exchange data
Example: Teleshopping, order entry, online reservation, airline, hotel ete,s -
MAR GREGORIOS COLLEGE SUBJECT: DATA COMMUNICATIONS AND NETWORKING.
CLASS: It CSC STAFF NAME: T.HEMALATHA, M.C.A
2.Financial services: 4 i
* It depends totally on computer network.
“ Iincludes foreign exchange, EFT (Electronic Fund Transfer).
* EFT allows users to transfer money
thout going to bank.
3. Manufacturing:
* The two applications that use network ale CAD and CAM,
(Computer-assisted design and Computer-assisted manufacturing) 7
“CAD and CAM allows multiple users to works on a project simultaneously.
4. Electronic messaging:
* It is used to store and forward e-mails.
8. Directory services:
* It allows list of files to be stored in a central location to speed www.
Information services: :
* World wide web offers information about a new product.
7. EDI (Electronic Data Interchange);
* Itallows business information to be transferred without using paper such as
purchase order and invoices,
8. Teleconferencin,
* To allows conferences to occur without the participants being in the same. place.
Applications are,
i) Simple text conferencing:
* Communication through keyboard and monitors,
ii) Voice conferencing:
* Participants at a number of locations can communicate simultaneously over the phone.
iii) Video conferencing:
* Participants can sce as well as talk to each other.
@veceresecoevesete sa xf
e0¢0040600880
«MAR GREGORIOS doLLEGE SYBIECT: DATA COMMUNICATIONS AND NETWORKING,
Lass: ies STAFF NAME: T.HEMALATHA, M.CA
9. Cellular telephone:
Cellular network is possible as a
Tess phone connections even while travelling
over a distance,
‘able television:
KR A
3. PROTOCOLS AND STANDARDS.
(Protocols) # LA
of © Misa set of rules shed ge tn communication,
*_ K-defines what is communicated? How itis communicated? And when itis
a
eeevvrvevsuwvuse
s
é
?
g
8
3
g
3
&
3
3
2
g
e
g
communicated?
* For communication to occur between two devices they must agree on a protocols,
* The key elements are syntax, semantics and timing, Po
Syntax:
* [refers to the structure or Format ofthe data (Le) the order in which they are presented,
Example:
* Gis 8 bits to be address of sender, next 8 bits to be addoss of ecevier and the rest of*
stream to be message
Seman
+ Wrefers to the meaning of each section of bits
‘Timing: :
+ Ithas two characteristics: ”
When data should he sent and how fast they ean be sent,
Ge) If sender produces the data at 100mbp but receiver can Process data at mbps, then
‘ransmission will overfoad the receiver and data will be lost
Standards: i
A Standard provides a hodel for development that makes it possible for a product to
work regardless of the individual manufactures, 7
Example:
* A steering witee! from one manufactures of car will not fit into another
modification,7
SUBJECT: DATA COMMUNICATIONS AND NETWORKING
STAFF NAME: T.HEMALATHA, M.C.A.
MAR GREGORIOS COLLEGE
CLASS: I CSC
“It is essential in creating and manufacturing an open and competitive market for
equipment manufacturer.
* It also guarantecing national and international interoperability of data and
telecommunication technology.
* They provide guidelines to manufacturers, vendors, government agencies and other
service providers to become popular in today’s world
* Consume pressure have forced the industry to recognize the product.
Categories of Standards(REFER TO NOTES{._
XX ( ASTANDARD ORGANIZATIONS:(REFER TO NOTES}.
(; Forum:
* Forums are made up of representatives from interestedicorporation
* It work with universities and users co test, evaluate and standardize new technologies
* They present their.conclusion on to the standard bodies,
Forums for telecommunication industries are
i) Frame relay forum:
* Itis formed by DEC, northern telecom, cisco and stratacomn,
* Ithas around 40 members. .
* Issues under review include flow control, encapsulation, translation and multicasting,
* Its results are submitted to ISO. :
ii) ATM forum and ATM consortium:
* Itis to promote the use of ATM, technology.
* tis made up of vendors of hardware and software that suppért ATM,
* Itis made up of customer premises equipment (PBX systems) vendors and central
office (Telephone exchenge) providers,
Internet society (ISOC) and Internet Engineering task force (IETF)
* Itis concerned with speeding growth of Internet communication.
* ISOC concentrates on user issues and TCP/IP
* It reviews Internet hardware & software
a
“a
@
@
eo
°
e
a
o
@
oe
e
e
e
oe
e
a
e
e
®
{
g@ee0¢4020208006080080664.
$
SUBJECT: DATA COMMUNICATIONS AND NETWORKING,
MAR GREGORIOS COLLEGE
STAFF NAME: T.HEMALATHA, M.C.A
class: csc
7 “IETF developed SNMP (Simple Network Management Protocol) and review
performance standards for bridges, routers and routes protocols
Regulatory Agencies:
* All communication is subject to government agencies such as FCC in the us
(federal communications commission),
* 1¢4s o’protect the public interest by regulating radio, tv, wire/cable communication,
Fcc:
* Ithas authority over interstate end international commerce,
* Every piece of communication technology: must have FFC approval before it may be
marketed.
Ex: Check bottom of your Telephone,
Responsibilities: ‘
* To review rate and service charges applications made by telegraph and telephone providers.
* To review the technical specification of communication hardware,
* To establish common carrier rates of return.
“To divide & allocate radio frequencies.
* To assign carrier frequencies for radio
“Tv broadewsts, yO
BASIC CONCEPTS OF NETWORKS:
4.LINE CONFIGURATIO}
* Itefers to the way two or more communication devices attach to a link,
* A Link is the physical communication pathway that transfers data from one device to
another.
* For communication to occur, two devices must be connected in some way to the same
+ Tink at the same time. [link as’ link between two points}
Two types:
1. Point -to- Point,
2. Multipoint,ey srop td Y: Ke WRESTA Trov
eS
iF
MAR GREGORIOS COLLEGE SUBJECT: DATA COMMUNICATIONS AND NETWORKING
CLASS: III CSC ‘STAFF NAME: T.HEMALATHA. M.C.A,
L.Point -to -Point:
* Point to Point line configuration provides a dedicated link between 2 devices.
* It uses actual length of wire or cable to connect the two ends. Other options such as
microwave or satellite links are also possible.
Ex: When you change tv channels by IR remote control. It are establishing @ point to
point line configuration between remote control & tv's control system.
ge > — eh
WORK § fecbinn WRKSTAT ron
‘
Multipoint:(multi drop)
* Multi drop line configuration is one in which more than 2 specific devices share a
single link.
* The capacity of the channel is shared, either spatially or temporarily.
* If several devices can use the link simultaneously it is spatially shared line
configuration.
* Ifusers must take turns ,i
a time shared line configuration.
* It defines the physical or logical arrangement of links in a n/w,
* The term topology refers to the way a network is laid out either physically or logically.
* Two or more devices connect to a link. ff
* Two or more links from topology.
* Itis the relationship of all the links & linking devices(nodes) to each other.
Five types of topology are
eaennnagaeaeeeoeeoesdegvaa
'2
> Be
a MAR GREGORIOS COLLEGE SUBJECT. DATA COMMUNICATIONS AND NETWORKING.
CLASS: CSC ‘ STAFF NAME: T.HEMALATHA, M.CA
B
> z -
8 . |. Mesh topology)!
B 2, Star topology |
>» 3. Tree topology
> a
“p 4. Bus topology *
®
5. Ring topology 10"
Two relationship are possible:
1. Peer —to- Peer,
2. Primary.
jecondary.
1. Peer ~to- Peer: :
* Where the devices share the link equally,
2 Primary-Secondary: 1
"+ Where one device controls ratte other must transmit through it
* Ring and mesh topology convenient for peer to peer.
* Star and tree topology convenient for primary to secondary,
* Bus topology convenient for both
| Mesh topology:
* Every devite has a dedicated point to point link to every other devices,
“Dedicated : The link carties traffic only between the two devices {t connects.B .
‘MAR GREGORIOS COLLEGE SUBJECT: DATA COMMUNICATIONS AND NETWORKING
CLASS: tl ESC 7 STAFF NAME: T.HEMALATHA, M.C.A,
* A fully connected mesh network has n(n-1)/2 physical charinel to link n devices.
* Every devices on the network must have n-I i/o ports.
Advantages:
* Use of dedicated links guarantees that each connection can carry its own data load &
eliminates traffic problems that occurs when links are shared by multiple devices
te the entire system)
* It is robust.{if one link becomes unusable, it does not incapa
acy or security.[when every message sent travels along a dedicated line, only the
jients see it, It prevents other users from gaining access to messages.]
* Point to Point links make fault identification & fault isolation easy, which enables the
network messages to discover the fault and connect it.
Disadvantage:
* Due to amount of cabling & number of /O ports.
* Installation and reconfiguration are difficult,
* Sheer bulk of the wiring can be greuter than the space
* Hardware required to connect each link (I/O ports & cable)can be expensive and limited
use.
Star topology:
* Bach device has a dedicated point to point link only to a central controller, called hub.(not
linked directly tp each other).
* The controller acts as an exchange.(ie) If one device wants to sends data to another, it
sends the data to the controller, which then sends the data to other connected device,
| |eww
G
€
o
1
MAR GREGORIOS COLLEGE. 4 SUBJECT: DATA COMMUNICATIONS AND NETWORKING.
CLASS: HL CSC STAFF NAME: THEMALATHA. M.C.A
Advantages
* Iti less expensive than a mesh topology, because each device needs only one link & one
1/0 port to connect it to any number of devices.
* Easy to install & reconfigure, requires less cabling is used only one connection between
devices & hub enables addition moves & deletion.
* Robustness (if one link fails, only that link is affected all other remain active.
Tree topology:
* It is a variation of star. Not every plugs directly into hub, The majority of devices
connected (0 the secondaty hub that in turn is connected to the central hub,
* The central hub in a tree is active hub.
* An active hub contains a repeater, which is a network device that regenerates the received
bit patterns before sending them out
* Repeating strengthens transmission & increases the distance a signal can travel.
* The secondary hubs may be active of passive.
* A passive hub provides a simple physical connection between the attached devices.
eee eds
Hub J .
[ aeaaie al
U,
: ‘ply
Zed =a
advantages are same'as star,
Advantages and
The advantage of secondary hubs‘in tree:
* It allows more devices to be attached to a single central hub &therefore increase the
distancesa signal can travel between devices.
* Itallows the network to isolate and prioritize communications from different computers,
Ex: Cable Tv technology, where the main cable from the mein office divide into branches
and each branch is divided into smaller branches and so onMAR GREGORIOS COLLEGE 1S SUBIECT: OATA COMMUNICATIONS AND NETWORKING
CLASS: II CSC STAFF NAME: T.HEMALATHA, M.C.A\
‘
Bus topology:
* It is a multipoint; one long cable acts as a backbone to link all the devices in the network.
* Nodes are connected to able by drop lines & taps.
* A drop line is a connection running between the devices & the main cable.
., A taPis a connector that either splices into the main cable or punctures the sheathing of @
cable tocreate a contact with the metallic core.
Mg ep
* Easy for install
n, It uses less cable than mess,sstar or tree topologies.
Disadvantage:
* Different reconfiguration & fault isolation.
* A fault or break in the same side of the problem. The damayed area reflects signals buck
in the direction of origin, creating noise in both directions.
Ring topology:
* Each device has a dedicated point to point line configuration only with the two devices
on either side of it.
* The signal is passed along one direction unt
reaches the destination,
* Each device incorporates a repeater which regenerates the bits & passes them,
* Basy to install & reconfigure. .
*Bach device is linked only to its neighbors. :
* To add or delete 2 device requires moving only two connections.
* Fault Isolation is simple.
Here signal is circulating at all time if are devices does not receive a signal within a
specified period, it issues an alarm
@eeooeo oe De Oe 2.
(@9n00e04e4e@e0a
evvwv ys we wo
-O
a
oO
MAR GREGORIOS COLLEGE 14 SUBIECT: DATA COMMUNICATIONS AND NETWORKING.
CLASS: IN CSC ‘ ‘STAFF NAME: T.HEMALATHA. M.C.A
Disadvantage:
* Unidirectional traffic. | &
* A break in the ring can disable the entire network dual ring can be used to overcome this.
problem, . i
Hybrid topotogies:
The combination of several topologies as subnetworks that are linked together in a laiger
topology.
Ex: One department use a bus topology another department use 4 ring. The two
department can be connected to each other through a central controller in a star topology
6-TRANSMISSION MopE; 7 * TWprlafy er do
* It is used to define the direction of signal flow between two linked devices,
wyMAR GREGORIOS COLLEGE J%f SUBJECT: DATA COMMUNICATIONS AND NETWORKING.
CLASS: IH CSC STAPF NAME: THEMALATHA, M.CA
i
Types of transmission modes:
* Simplex
* Half duplex
* Pull duplex
Simplex:
@eo0oaeoeoeseeoeeoesd
* The communication is unidirectional.
* Only one of the two stations on ¢ link can transmit other can only receive.
| Ex: keyboard,monitor. Cnidey
Half duplex: A
* Each station can transmit & receive but not at the same time. When one device can
send, the other can only réceive & vice versa
Ex: Walkie talkies, citizen's band radios(CB).
Divegton F date of ret ee
°
°
Fall duplex:
* Both stations can transmit & receive simultaneously.
* The signals going in either direction share the capacity of the link.
The:sharing can be in two ways.
1.The link can have two separate transmission paths, one for sending & other for
receiving,
4002040008068* MAR GREGORIOS COLLEGE (8 susiect: para COMMUNICATIONS AND NETWORKING,
CLASS: CSC STAFF NAME: .HEMALATHA, M.CA
2-The capacity of the channel is divided between signals travelling in opposite direction,
Ex: Telephone network(Both persons can talk and listen at the same time),
Dreton qa aft Hime |
(a
” ra
2 SS,
°
7. CATEGORIES OF NETWORKS:
Ge
e
5 * The category of @ network is determined by its size, ownership, distance it covers and
® of} physical architecture,
Ry 1, Local Area Networks(LAN)
Ge * Itis privately owned and links the devices in a single office ,building or campus.
—
Ex:
es
| Two PCs and one printer in an office
2. Extended to a company and include voice, sound and video devices.
“© LAN size is limited to few kms.
* It is used to share the resources between computers.
* The resources can be a hardware, software or data,
* One computer can have large capacity and it becomes a server to.other clients,
* Software can be installed in the central system and can be used by the whole group of the
company. 7
* LAN has restrictions on the number of users to access the ‘operating system,
* Tris distinguished from other type of networks by transmission media and topology.
* LAN will use only one type of transmission medium,
‘The most common LAN topologies are bus, ring and star. '
LANs data rate can reach 100mbps.
'MAR GREGORIOS COLLEGE 1q__ SUBIECT: DATA COMMUNICATIONS AND NETWORKING.
CLASS: IH CSC T “STAFF NAME: THEMALATHA, MCA ‘
| an
eeaeeaeocpeseoaooeascoea 2266 @i
\
| 2.METROPOLITAN AREA NETWORK(MAN)
+ Metropolitan Area Network.
* Itextends over an entire city.
* Itcan be a single network like cable tv.
tke core.
eoe
* I¢may be of connecting a number of LANs into larger network.
'
+ Therefore, resources are sharcid from LAN-LAN and device to device.
LAN-LAN and deviee to devie
Ex: A’company can connect the LAN in all of its offices throughout a city by MAN.
‘Telephone companies provide a popular megabit data services(SMDS).
ot slog
e
°
e
e
e
e
e
e
e
@
a
e
eok
8
MAR GREGORIDS COLLEGE RD SUBIECT; DATA COMMUNICATIONS AND NETWORKING.
CLASS: CSC STAFF NAME: LHEMALATHA, M.C.A
3.WIDE AREA NATWORK(WAN):
* It provides a long distance transmission of data, voice, image and video information over
largeg geographical reas. ~~
* Itmay use public, leased or private communication devices.
* It is wholly owned and used by a single company.
* Also known as enterprise networks, which covers a country, a continent, even the whole
An
world,
EX: Internet,
8.INTERNETWORKS:
“ Two or more networks connected together are called Internetworks or Internet,
* Individual networks are joined into internetworks by the use of intemetworking
devices,
* The term internet(i) is different from Internet(I)
* internet is the interconnection of networks,
* Internet is the name of the world wide networks,
eee Wide nerworiMAR GREGORIOS COLLEGE SUBJECT: OAT COMMUNICATIONS AND NETWORKING
CLASS: eC CO stARF Namie: THEMALATHA. M.CA
: 4 osimopeL
(+ An ISO was the first organization to define model for network communication
* The model is the open systems interconnection (OS! Model)
* It wgs.established in 1947.
* Itisa model that allows any two different systems to communicate. ‘
‘THE MODEL: .
FR \or
* Itisa layered framework for the design of network systems,
+ Itconsist if seven different layers.
* Each layer defines 2 segment of the process of moving information acrossa networks
Layered Architecture:
Itis built of seven ordered layers.
Physical layer
Data link layer
|. Network layer
Transport layer '
5. Session layer
6. Presentation layer
7. Application tayer
RYRR
These are the layers involved when a message is sent from device A to device B.
pit gee, devs shane nein
Peer éo peer processes: a
* The processes on each machine that communicate at a given layer are called peer 10
peer processes. :
* At the physical layer ,the communication is direct,
* At the higher layers, the communication must move down through the layers on
machine A t machine B and then back up through the layers.
* Bach layer add its own information to the message it receives from upper layer and it
passes the whole package,to the lower layer.
* The information added in the form of headers or trailers.
Interface between layers: ‘
* The passing of data through the layers is possible by interfaces.
a
@
a
®
&
9
e
e
6
e
eMAR GREGORIOS CoWLEGE 28, SUBJECT: DATA COMMUNICATIONS AND NETWORKING
cass: mi csc STAFF NAME: T.HEMAGATHA, Mica
* Hedefines what information and services a lay
. a
yer must provide for its upper layer.
Fee views
ww
(
oe
PISTOL Coauriahen
Organization of the layer:
* The 7 layers belong too 3 subgroups,
“Layer I 2and3(physical, data link, network) are called Network support layers,
ee Steport layers
"They deal with moving data from one deviee to another.
“Layers 5,6,7(Session, Presentation, Application) are celled user support layers,
* Layer 4(Transport layer) used for end to end reliable deta transmission.MAR GREGORIOS COLLEGE 23 SUBJECT: DATA COMMUNICATIONS AND NETWORKING.
Lass: i eS STAFF NAME: THEMALATHA. M.C.A
* The process stats at layer 7 moves from layer to layer in descenaing order.
* At each layer except 7 and 1, header is added to the date.
* At layer 2 trailer is added
* When the data passes through ‘physical layer(layer 1),it is changed to electromagnetic
signal and transmitted over the link,
* When it reaches the destination, the signal passes into layer I' and it is transformed
back into bits,
* Then it moves backup through layers
+ At each corresponding higher-layer, the headers and trailers attached to it are removed.
* When the data reaches layer’ it is again in the form appropriate to the user.
CB aa
fy
1 Bie i biolo 0/010 ooa! 0GT
[eal
{clo F016 To Tora TROT BST |
=] fs) ee ,
c| [¢| (Gaga
7. || Gee
: (Ee date Ted
4) Al (Zidala is
3) BY
a
1
Crunrrons OF THE LAYERS:
PHYSICAL LAYER:
* It is used.to transmit a bit stream over a physical mediui
* It deals with the mechanical and electrical specifications of the interface and
transmission medium.
@seaese
,@en2nenneowne/seegeasd«fink,
medium.
MAR GREGORIOS COLLEGE 2% SUBJECT: DATA COMMUNICATIONS AND NETWORKING.
CLASS: ESC STAFF NAME: T.HEMALATHA, M.C.A
RESPONSIBILITIES OF PHYSICAL LAYER:
1, Physical charactéristios of interfaces and media
“It defines the characteristics of the interface between the device and the transmission
“It defines the type of transmission medium ,
2. Represen: tation of bits:
* The bits are represented in a sequence of Qs and ts, :
* It must be encoded into signals for transmission,
3. Data rate: ‘
* The transmission rate is the number of bits sent each second.
Conte duration of « bit, which is how long it lasts.
4, Svehronizationof bits:
* The sender and receiver must be synchronized at the bit level.
5. Line configuration:
‘n 2 point to point configuration ,2 devices are connected together to a dedicated
ee ‘
* In a multipoint configuratiot, a link is shared between several devices,
&Physical topology:MAR GREGORIOS COLLEGE SUBJECT; DATA COMMUNICATIONS AND NETWORKING
CLASS: III CSC DB STAFE NANE: THEMALATHA, M.CA
* [defines how the devices are connected to make a networks.
* Itcan be done using a mesh, a star, a ring or a bus topology
‘ransmission mode:
* It defines the direction of transmission between 2 devices they are 3 types
simple, helf duplex, full duplex.
DATALINK LAYER:
* Itis used for raw transmission of data to a reliable link and is responsible for node
—tenode delivery. To stam loapany
13
;.
ee ' I
va
7
L
loio loowalala
sIBILITIES R
‘The data fink layer divides the stream of bit received from the network layer into
data unis called frames.
2. Physical addressing:
+ The data link layer, add a,header to the frame to define the physical address of
the sender(source address) and receiver(destination address) of the frame.
* Suppose if you want to send a frame to the sy$tem outside of your network, the
receiver address is the addresses of the device which connects your network too another .
3.Flow control:
* Flow control mechanism is used when the transmission rate of the receiver is
less than that of the sender,
4.Ertor control:
o
e
a
e
@eee@eeseaes8
a0
©
‘
6
6
e
‘
@
e
e
naanpaeoo~eae)edeMAR GREGORIOS coLLeGe 26 Suse: PATA COMMUNICATIONS AND NETWORKING
CLASS: CSC STAFF NAME: T.HEMALATHA, M.CA
* lis used to detect and retransmit damaged or lost frames,
acct and retransmit damaged 9
* It is also used to prevent duplication of frames by adding sequence number to
each frame,
S.Access control:
S Access control:
When mote devices are connected to a single link, data link layer protocols are
used to find which device has contro! over the link. E
NETWORK Layi R
NETWORK LAYER :
+ Itis responsible for the source to destination delivery ofa packet across multiple
networks, T
+ Iftwo systems are soe nesied to the same link, then there is no need for a network layer,
* Ifthe two systems are attaches to different Betworks with connecting devices between the
networks, then there is a need of network layer”
LLogical addressin,
{fa packet passes through the network we need another address to differentiate the Source
and destination systems
Therefore the network layer adds a header t sees of the \
See 3 ~Eteader to the packet. the lagical addresses of the |
2.Routing : :
“Independent network or links ate connected together to form a large network, those 7
connectis LYS.“|
MAR GREGORIOS COLLEGE” ap susecr: para COMMUNICATIONS AND NETWORKING.
CLASS: IN CSC STAFF NAME: THEMALATHA. M.C.A
TRANSPORT LAYER
«Iris responsible for the source to destination delivery of the entite message.
© For security, the transport layer creates a connection between the two devices,
Creating a connection involves 3 steps
@
6
e
oe
a
a
@
@
e
@
1.Connection establishment
2,Datatransfer
3,Connection Release.
Lydian
by date.
[Aa (hee
i Te nto lower - From savepot lawyer
RESPONSIBILITIES OF TRANSPORT LAYER
LService point. ins
Computers run severa! programs at the same time. _
The delivery of data from a specifie process of one computer to a specific process of the
others.
For this purpose transpért layer add an address called service point addressing.
.
‘¢ - ‘The transport layer, ges entire message to the cozect process on that computer.
© Whereas network layer gets each packet to the correct computer.
2. and. sembh
© Amessage is divided into number of smaller units with a sequence number, ‘
© These numbers are used to the reassemble the message correctly.
mt mendkgéeeeéesdMAR GREGORIOS COLLEGE
CLASS: CSC
Also.t0 identify and reatace the packets that was lost in transmission,
3.Connection control
SConnection control
* Transport layer can be either connectionle,
in oriented,
* ¢h gonnectionless transport layer treats cack segment
the transport layer at ni
as Separate packet and delivers it to
the destination,
* A connection
Oriented transport layer makes cénnection With the transport layer at the
destination, at
* After delivering all the deta, the corinection is terminated,
Flow control
* Iris performed end-to-end rather
than across a link,
S.Error contro}
+ Errorcontrol i
* The sending transport layer makes sure hat the entire message arrives at the receiving
\ransport layer without error
(ie) Damage, loss or duplication. Error Gorrection is achieved by retransmission,
SESSION LAYER Sa
7 Ils the network dialogue consestler,
. deatablshes, maintains and ssnctuontzes the interaction between
devi .
communicatin,
Simcetans VB presbrlatn Jaen
Lb date | Myew [Lp di)24
MAR GREGORIOS COLLEGE SUBJECT: DATA COMMUNICATIONS AND NETWORKING.
CLASS: mt CSC STAFF NAME: T.HEMALATHA, M.C.A,
RESPONSIBILITIES OF SESSION LAYER
LDialog control
full duplex.
Example:
‘The dialog between a terminals connected to @ mainframe can be a half duplex.
2, Synchronization
Session layer allows a process to add checkpoints (Synchronisation points) ingo a stream of
Sat.
Example:
+ ICoystem sends a fle of boro pages, you can insert checkpoints after every 100 pages. for
connect retriéval and acknowledgement.
+ Suppose if cfash happens during the transmission of page 523, the setransmission
begins at page $01.
© No need to retransmit from Page I 500.
PRESENTATION LAYER :
It is concerned with the syritax and semantics of the information.
scars 4
It allows the communication between two procésses to take place either in half duplex or
eecanesea ss eaannesvaeecewR,
MAR GREGORIOS COLLEGE 2D sumsect: onta COMMUNICATIONS AND NETWORKING,
CuASS:imcsC |
: STAFF NAME: T.HEMALATHA, M.CA
Sew ee via
‘ Responsipritie: OF PRESENTATION LAYER
oe IRITIES OF PRESENTATION LAYER
LZranslation
coding systems.
* The presentation layer at the sender. changes the information from its sender-dependent
i See
‘ format inte a'témmon Format,
* The presentation layer at the receiver c|
dependent formst, ~—.
hanges the common format into its receiver
RR ito iis receiver
3. Decryption: The receiver reverses the origi
original form,
4.Compression
al process to transform the message back to its
Process to transh sShge back toi
It reduces the number of bits to be tranmitted,
{tis important in the transmission of multimedia such as.text, audio and video,
APPLICATION LAYER '
7 “It cnabies the user to access the network,
* It provides User interfaces and support sarvi such as electronic mail, remote
greteeess and transter, shared database management arch other types of
distributed information services,
X.400 ~ Message handling services
X.500 = Dicectory services
FTAM—File transfer, access and management
* No ‘header or trailers are added in this layer,
Se eeeeeEEE ES Eee34
MAR GREGORIOS COLLEGE SUBJECT: DATA COMMUNICATIONS AND NETWORKING
CLASS: CSC STAFE NAME: T.HEMALATHA, M.CA
”
Q BI PLICATION LAYER won
i i A
L.Netwok virtual terminal
L.Netwok virtual terminal x ok
© ‘Iris a software version of a physical terminal.
© [tallow a userto log on to a remote host
+ The user’s computer talks to the software terminal.
«This software talks to the remote Hiost and believes that it is oné of its own terminals.
# . Then allows you to log on.
File transfer, access & management(FTAM)
Itallows a user to agcess files in a remote computer, to retrieve files and to manage or
control files. —
Mail services
It provides the basis for e-mail forwarding and storage.
4.Directory services
'
it provides distributed database source and access for global information about various
objects and services.
Rg
*
g
§
4
6
‘
%
«
&
«
e
e
&
«
g
®
e
e
°
°
e
e
e
e
4
e
‘
c
:Ree
Crean — Comeni
rpshernd “Oiporizatin Qa, Shindordi ain CT
Pe Te & a mublinahenad body 5) 9
ackve ova hese pry opera han re dred
a Suvenk y we, Fechnofgrcad Sf eeencmre ach
tw) ko beo rabincd Tele tomar tra ten bien Onroo _
Te le tormemtunite hin Saoolardn Seek (Prv-z):
FY clejeass —roboned — Skandneds Sov
Tebe Gammenr es hion
"0 American Nakened, Shodan Tas htt: Cansa),
Spe tette teal completely private, Non profit
Cospofa hoa.
"V) Dshhati. A Lluctrical f Plestnies Eryn |
(Leeg),
ha Olevele prrerd- # adog te,
A, Inher oO xhona)) Sis da rels er
Corn msi tm
Tp a
Jt oversees
Compu h a sf
Kon
WD Electmnin, Bodustvies A ssoe'ahen (82.4)
Dy ve ca! ehacbronre rans fading
Con urnRoe 7 Entiruahon
* De facts
¥ Pe Sure
Pe facts.’
corer b beep
i that have 7
oe bab fave
ani bod
approved by og zed ¢ he
been adop Fed as Shondarde ir
Widespread Ure.
1 Pro prcrarg Jc loses ‘Seodaxd’]}
Fayested . . Bi Comme 6 ve) or ganisahen |
thak
They are owned by Com pang
(oven fed — them :
&. Non Proprie Fary Copen Standard ]
* Developed by grep or lommi ttee
eee
Those. that hove bean hegis ba lee by
2
ofidally ; Tetogni ved body
Standort Organiza lieve:
Stan dords are davelleped fhevghs
Shag darde Crea lion Committe
4 hot
aan teen
Coolre va hoa
O92029,8 99 F9FECPGHHDE
2026000046000 @% &
Lt
&
SEER EEE Cre'2R0%i0 College, Mogaapair West, Chennai
#7 Sub: Data commu, Meations and Networking
Mea. ston @O SWAKSH MAN
: ‘ETAT “IL ¢s¢
Hission of Digital Data:
“Interfaces and M dems, Section 1
Sgital Date Trevsmission
the transmission of binary data. across a link can be accdémplished either in
parallel mode or seal mode.
SE oe
mode, multiple bits are sent with each clock pulse,
i mode, ore bit is sent with each clock pulse.
* There are two subclasses of Serial transmission:
2 Synchronous 7
2 Asynctvoncus “]
Synchronous Asynchronous
ET] Asynetronousy“@@S2e@e900000GCeR0e0G68000 8000089909 09 5 "*%‘Spyright Wargregorios College, Mogappair West
"+37 Sub, Data communications and Networking
ies SQ baal MEA, MPhil
Paralte! Transmission
l Sinary data, consisting of is and Os, ma
* Computers produce and consume data in grou
bits at a time instead of one. T1
'y be organized into groups of n bits each,
PS of bits. By grouping, we can send data n
his is called parallel transmission
(ihe mechanism for parallel transmission is a conc:
to send n bits at one time]
eptually simple one: use n wires
ge is i i ission requires n
The advantage of parallel transmission is speed) Parallel transmission requi
communication lines just to transmit the data stream, Because this is expensive( parallel
transmission is usually limited to short di ances. Dsedv
30‘opynignt: margregorios Coltege, Mogappair West, Chennai-37 Sub: Data communications and Networking
Mrs.Lakshoi MCA, M.Phil
+ Serial Transmission
In serial transmission gne bit follows another. So we need only one communication
channel rather than n to transmit data between two communicating devices. f
The eight bits are sent
one after another.
Receiver
We need only
one line (wire).
Nee ee
Parallel/serial Serial/parallel
converter : converter
The advantage of serial over parallel transmission is that with only one
* communication channel, serial transmission reduces the cost of transmission)over parallel
By roughly a factor of n.
(sera transmission occurs in one of two ways:
+ Asynchronous 5
+ Synchronous
Asynebronous Transmission
Asynchronous transmission is so named because the {iming of a signal is
unimportant) ama is received and translated byJagreed-upon patterns
Pattems are based orfGrouping the bit stream into bytes(Each group) usually eight bits,
(is sont along the link as a unit)
+ (Te alert the receiver to the arrival of a new group, therefore, an extra bit is
added to the beginning of each byte. This bit usually a 0, is called the start
bit.) ;
3A3 Capyriaht: Margregoris College, Mogappair West, Chennai-37 Sub: Data Communications and Networking
Mist
shmi M.CA,, MPhil
>
a + (a tet the receiver know that the byte is finished, one or more additional bits
> 26 bpended to the end of the byte. These bits, usually 1s, are called stop
> bits. ) 7
>
>
* By this method, each byte is increased in size to at least 10 bits, of which 8
are information and 2 or more are signals to the receiver, ,
Direction of flow
Stop bit Data Start bit
ios)
onote) Be iiier
lat ELL 101
Gaps between
lata units
Synchronous Transmission
synchronous transmission, the bit stream is combined into longer
“frames’, which may contain multiple bytes) It is left to the receiver to
Separate the bit stream into bytes for decoding purposes.
* ‘ata are transmitted as an unbroken string of 1s and Os, and the receiver
Separates that string into the bytes, or characters, it needs to reconstruct
the information.
©,
32
seuuveCopyright: Margregorios College, Mogappair West, Chennai-37 Sub: Data communications and Networking
(Mrs..Lakshmi M.A, M.Phil
Direction of flow
>
10100011 |14111011 | 00010000 | 110
Cire advantage of synchronous transmission is spi own no extra bits or
gaps to introduce at the sending end and remove at the receiving end and,
by extension, with fewer bits to move across the link, synchronous is faster
than asynchronous transmission. Dats Tyuntmtmtin Corwpal
UNG eat oO fe
DTE-DCE Interface x Da e@
89a 68288020098 @B &
| (Data terminal equipment (OTE) and data circuit-terminating equipment (DCE) are
two important terms in computer networking. There are usually four basic functional units
involved in the communication of data: a DTE and DCE on one end and a OCE and DTE
on.other end as shown in the following diagram.
Che DTE generates the data and passes them, along with any necessary control
characters, to a DCE. The DCE converts the signal to a format appropriate to the
33 .
oF
eee See ECE