0% found this document useful (0 votes)
30 views88 pages

Netwrking P-I

The document outlines the fundamentals of data communications, including key concepts such as delivery, accuracy, and timeliness, as well as the components of a data communication system like sender, receiver, medium, and protocols. It discusses network criteria including performance, reliability, and security, and highlights various applications of data communications in sectors like finance, manufacturing, and entertainment. Additionally, it covers network topologies, line configurations, and the importance of protocols and standards in ensuring effective communication between devices.

Uploaded by

Manish Bujji
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
30 views88 pages

Netwrking P-I

The document outlines the fundamentals of data communications, including key concepts such as delivery, accuracy, and timeliness, as well as the components of a data communication system like sender, receiver, medium, and protocols. It discusses network criteria including performance, reliability, and security, and highlights various applications of data communications in sectors like finance, manufacturing, and entertainment. Additionally, it covers network topologies, line configurations, and the importance of protocols and standards in ensuring effective communication between devices.

Uploaded by

Manish Bujji
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
MAR GREGORIOS COLLEGE SUBJECT: DATA COMMUNICATIONS AND Chass: mt csc STAFF NAME: T.HEMALATHA, M.C.A fee UNIT-L aye: DATA COMMUNICATION: + ICis the exchange of data(O&1) between two devices through some transmission medium, yx ‘© Itcan be local or remote communication, * Ifthe devices are in the same building iis said to betasate and If the devices aré farther apart itis said 10 be remote, \ Fundamental characteristie: ‘1 Delivery : They system must delivers the data to the correct reelpient, . o + Accuracy: The system must deliver data accurately without any alteration, Timeliness: The system must deliver data in a timely manner.Timely delivery means delivering data as they ere produceé in the same order without any delay.This is called real-time transr Gomponents: Ca 7 A data communication ystem is made up of five components. VP) 2 Message: Its the information to be communicated.tt ean consist of text, humbers,pictures.sound or Video Sender: It is the device that sends the data message.Ex:computer,telephone handset oO ele. a : er NO" € Message — Receiver ¢ Medium SC “KReceiver: The receiver is the device which receives the message. S Ex: Computer, telepHlone handset. television ete, € Medium: It isa physical path by which a message travels from sender to receiver. g It can be of twisted pair wire, coaxial cable, fibre-optic ete... JS. Protocol: It is a set of rules that govern data communication. xX +x MAR GREGORIOS COLLEGE SUBJECT: DATA CONIMUNICATIONS AND NETWORKING. Class: esc STAFE NAME: THEMALATHA. MCA + Also to identify and replace fs Packets that was lost in transmission. wo connec t 3 Transport layer can be either Conhectioniess or connectiori oriented, * Aconnectioniess transport layer treats each SERMENE 8S Separate packet and deliver: the transport layer at the destinttion. 7 © Gygennection oriented transportlayer makes connection with the transport layer at the destination, * After delivering ail the data, the connection is terminated, i 4.Flow rol * tis performed end-to-end rather than across a Fink, 8.Error control * Error contro! is performed End-to. eng, © Pe sending transport layer makes sure thet the entice message arrives at the receiving transport layer without error, * Cie) Damage, loss or duplication, Error Yorrection is achieved by retransmission SESSION LAYER * Itis the network dialogue controttér. * Westablishes, maintains and synchronizes {he interaction between communicating devices, ‘ i > MAR GREGORIOS COLLEGE SUBJECT: DATA COMMUNICATIONS AND NETWORKING, . CLASS: MISC STAFF NAME: T.HEMALATHA. M.C.A > : oe : oo} * A network isa set of devices connected by media links. I can be computer, printer or any 2» y\ _ other device capable of sending éereceiving dala wa'éther nodes on the network. v ?s * The tinks connecting the devices are called communication channels. 7 Distributed processing: % » * A task is divided among multiple computers. * Being large machine responsible for all provess, a single separate computer can handle “eo a subset e Advantage: a. - e . |. Security/Eneapsulation: @ * A system designer can Jimit the kind of interaction to the user. & Ex: ATM ®@ ‘+ Bank allows users to access only their own account without allowing to access bank's entire database. * é oO 2. Distributed Database: + No one system needs to provide storage capacity. for the entire database. Ex: WWW Cc a) ereees «User access to information may be actually stored anywhere on Internet. ' 3. Faster problem solving: * Multiple computer working an parts ofa problem concurrently can solve faster than a single machine. oO "4, Security through redundaney: * Multiple computers running the sane program af same time provide security through redundancy, Oo Ex: [f three computers run the Same program so that if one has hardware error other two can override it, ove 5, Collaborative processing: * Both multipl computers and multiple users may interact on a single'task. Ex: Network games eveee | 3 . MAR GREGORIOS COLLEGE SUBJECT: DATA CONIMUNICATIONS AND NETWORKING, CLASS: HI CSC STAFF NAME: TNEMALATHA, M.A Network criteria: x The most important criteria are performance reliability and security 1, Performance: Tt-can be measured in two ways by transmit time and response time. + Transmit time: It is the amount of time required for a message to travel from one device to another. © Response time: * It is the elapsed time between an inquiry and a response. * Network performance is based on number of factors. ‘The performance of a network depénds on a number of factors such as, i) Number of users: . * A large number of concurrent users can slow respouse time where thy network is not designed to coordinate heavy traffic loads. (Ge)In peak load periods, ifthe average numbers users exceeds, theni decreased performance ns eu Types of transmission medium: . 11 defines the speed at which data can travel,through a consiection. ‘The faster and faster transmission media is fiber. optic cabling iii) Hardware: * The types of hardware included in a network affect both the speed and capacity of transmission. * A speed computer with greater storage capacity will give better perform er 8 : iv) Software: The software used to process data at sender, receiver and intermediate nodes affects * network performance, * Moving a message from node to node requires transmission processing, ‘ * Ihis to ensure error-free-delivery. * It affects both the speed and reliability of a network, so a well defined software should be used, . oo Ph, ° « ° e. ° e ° { 0eeene ne A SUBJECT: DATA COMMUNICATIONS AND NETWORKING Mak GREGORIOS COLLEGE STAFF NAME: T.HEMALATHA. M.GA CLASS: I CSC. 2. Reliability: kis measied by “Frequency of failure: All network fails occesionally, a network fails often is a litte value to the user. It is the time taken by the network “Recovery time of a network after a failure: re useful to the user, 'o restore its service. A network that recovers quickly is mor * Catastrophe: * Network must be protected from catastrophe events like fire, earthquake, * One protection is to backup network software, 3.Security: Ivis the protection of data from unauthorized access and viruses. i) Unauthorized access: * Sensitive data must be protected from unauthorized users. * One protection is user identification and passwords, * Other Te is to use encryption techniques (.¢ to putthe information into special code). iiVir ‘uses: “Network are decessed from many points so it can be affected by computer viruses, * A virus is a code that damages the system “To prevent the system from viruses hardware and software should be designed well. Rom Applications: \ess, industry and entertainment. "Networks bécame part of bu: |, Marketing and sales: "It is used to collect and exchange data Example: Teleshopping, order entry, online reservation, airline, hotel ete, s - MAR GREGORIOS COLLEGE SUBJECT: DATA COMMUNICATIONS AND NETWORKING. CLASS: It CSC STAFF NAME: T.HEMALATHA, M.C.A 2.Financial services: 4 i * It depends totally on computer network. “ Iincludes foreign exchange, EFT (Electronic Fund Transfer). * EFT allows users to transfer money thout going to bank. 3. Manufacturing: * The two applications that use network ale CAD and CAM, (Computer-assisted design and Computer-assisted manufacturing) 7 “CAD and CAM allows multiple users to works on a project simultaneously. 4. Electronic messaging: * It is used to store and forward e-mails. 8. Directory services: * It allows list of files to be stored in a central location to speed www. Information services: : * World wide web offers information about a new product. 7. EDI (Electronic Data Interchange); * Itallows business information to be transferred without using paper such as purchase order and invoices, 8. Teleconferencin, * To allows conferences to occur without the participants being in the same. place. Applications are, i) Simple text conferencing: * Communication through keyboard and monitors, ii) Voice conferencing: * Participants at a number of locations can communicate simultaneously over the phone. iii) Video conferencing: * Participants can sce as well as talk to each other. @veceresecoevesete sa xf e0¢0040600880 « MAR GREGORIOS doLLEGE SYBIECT: DATA COMMUNICATIONS AND NETWORKING, Lass: ies STAFF NAME: T.HEMALATHA, M.CA 9. Cellular telephone: Cellular network is possible as a Tess phone connections even while travelling over a distance, ‘able television: KR A 3. PROTOCOLS AND STANDARDS. (Protocols) # LA of © Misa set of rules shed ge tn communication, *_ K-defines what is communicated? How itis communicated? And when itis a eeevvrvevsuwvuse s é ? g 8 3 g 3 & 3 3 2 g e g communicated? * For communication to occur between two devices they must agree on a protocols, * The key elements are syntax, semantics and timing, Po Syntax: * [refers to the structure or Format ofthe data (Le) the order in which they are presented, Example: * Gis 8 bits to be address of sender, next 8 bits to be addoss of ecevier and the rest of* stream to be message Seman + Wrefers to the meaning of each section of bits ‘Timing: : + Ithas two characteristics: ” When data should he sent and how fast they ean be sent, Ge) If sender produces the data at 100mbp but receiver can Process data at mbps, then ‘ransmission will overfoad the receiver and data will be lost Standards: i A Standard provides a hodel for development that makes it possible for a product to work regardless of the individual manufactures, 7 Example: * A steering witee! from one manufactures of car will not fit into another modification, 7 SUBJECT: DATA COMMUNICATIONS AND NETWORKING STAFF NAME: T.HEMALATHA, M.C.A. MAR GREGORIOS COLLEGE CLASS: I CSC “It is essential in creating and manufacturing an open and competitive market for equipment manufacturer. * It also guarantecing national and international interoperability of data and telecommunication technology. * They provide guidelines to manufacturers, vendors, government agencies and other service providers to become popular in today’s world * Consume pressure have forced the industry to recognize the product. Categories of Standards(REFER TO NOTES{._ XX ( ASTANDARD ORGANIZATIONS:(REFER TO NOTES}. (; Forum: * Forums are made up of representatives from interestedicorporation * It work with universities and users co test, evaluate and standardize new technologies * They present their.conclusion on to the standard bodies, Forums for telecommunication industries are i) Frame relay forum: * Itis formed by DEC, northern telecom, cisco and stratacomn, * Ithas around 40 members. . * Issues under review include flow control, encapsulation, translation and multicasting, * Its results are submitted to ISO. : ii) ATM forum and ATM consortium: * Itis to promote the use of ATM, technology. * tis made up of vendors of hardware and software that suppért ATM, * Itis made up of customer premises equipment (PBX systems) vendors and central office (Telephone exchenge) providers, Internet society (ISOC) and Internet Engineering task force (IETF) * Itis concerned with speeding growth of Internet communication. * ISOC concentrates on user issues and TCP/IP * It reviews Internet hardware & software a “a @ @ eo ° e a o @ oe e e e oe e a e e ® { g@ee0¢4020208006080080664 . $ SUBJECT: DATA COMMUNICATIONS AND NETWORKING, MAR GREGORIOS COLLEGE STAFF NAME: T.HEMALATHA, M.C.A class: csc 7 “IETF developed SNMP (Simple Network Management Protocol) and review performance standards for bridges, routers and routes protocols Regulatory Agencies: * All communication is subject to government agencies such as FCC in the us (federal communications commission), * 1¢4s o’protect the public interest by regulating radio, tv, wire/cable communication, Fcc: * Ithas authority over interstate end international commerce, * Every piece of communication technology: must have FFC approval before it may be marketed. Ex: Check bottom of your Telephone, Responsibilities: ‘ * To review rate and service charges applications made by telegraph and telephone providers. * To review the technical specification of communication hardware, * To establish common carrier rates of return. “To divide & allocate radio frequencies. * To assign carrier frequencies for radio “Tv broadewsts, yO BASIC CONCEPTS OF NETWORKS: 4.LINE CONFIGURATIO} * Itefers to the way two or more communication devices attach to a link, * A Link is the physical communication pathway that transfers data from one device to another. * For communication to occur, two devices must be connected in some way to the same + Tink at the same time. [link as’ link between two points} Two types: 1. Point -to- Point, 2. Multipoint, ey srop td Y: Ke WRESTA Trov eS iF MAR GREGORIOS COLLEGE SUBJECT: DATA COMMUNICATIONS AND NETWORKING CLASS: III CSC ‘STAFF NAME: T.HEMALATHA. M.C.A, L.Point -to -Point: * Point to Point line configuration provides a dedicated link between 2 devices. * It uses actual length of wire or cable to connect the two ends. Other options such as microwave or satellite links are also possible. Ex: When you change tv channels by IR remote control. It are establishing @ point to point line configuration between remote control & tv's control system. ge > — eh WORK § fecbinn WRKSTAT ron ‘ Multipoint:(multi drop) * Multi drop line configuration is one in which more than 2 specific devices share a single link. * The capacity of the channel is shared, either spatially or temporarily. * If several devices can use the link simultaneously it is spatially shared line configuration. * Ifusers must take turns ,i a time shared line configuration. * It defines the physical or logical arrangement of links in a n/w, * The term topology refers to the way a network is laid out either physically or logically. * Two or more devices connect to a link. ff * Two or more links from topology. * Itis the relationship of all the links & linking devices(nodes) to each other. Five types of topology are eaennnagaeaeeeoeeoesdegvaa ' 2 > Be a MAR GREGORIOS COLLEGE SUBJECT. DATA COMMUNICATIONS AND NETWORKING. CLASS: CSC ‘ STAFF NAME: T.HEMALATHA, M.CA B > z - 8 . |. Mesh topology)! B 2, Star topology | >» 3. Tree topology > a “p 4. Bus topology * ® 5. Ring topology 10" Two relationship are possible: 1. Peer —to- Peer, 2. Primary. jecondary. 1. Peer ~to- Peer: : * Where the devices share the link equally, 2 Primary-Secondary: 1 "+ Where one device controls ratte other must transmit through it * Ring and mesh topology convenient for peer to peer. * Star and tree topology convenient for primary to secondary, * Bus topology convenient for both | Mesh topology: * Every devite has a dedicated point to point link to every other devices, “Dedicated : The link carties traffic only between the two devices {t connects. B . ‘MAR GREGORIOS COLLEGE SUBJECT: DATA COMMUNICATIONS AND NETWORKING CLASS: tl ESC 7 STAFF NAME: T.HEMALATHA, M.C.A, * A fully connected mesh network has n(n-1)/2 physical charinel to link n devices. * Every devices on the network must have n-I i/o ports. Advantages: * Use of dedicated links guarantees that each connection can carry its own data load & eliminates traffic problems that occurs when links are shared by multiple devices te the entire system) * It is robust.{if one link becomes unusable, it does not incapa acy or security.[when every message sent travels along a dedicated line, only the jients see it, It prevents other users from gaining access to messages.] * Point to Point links make fault identification & fault isolation easy, which enables the network messages to discover the fault and connect it. Disadvantage: * Due to amount of cabling & number of /O ports. * Installation and reconfiguration are difficult, * Sheer bulk of the wiring can be greuter than the space * Hardware required to connect each link (I/O ports & cable)can be expensive and limited use. Star topology: * Bach device has a dedicated point to point link only to a central controller, called hub.(not linked directly tp each other). * The controller acts as an exchange.(ie) If one device wants to sends data to another, it sends the data to the controller, which then sends the data to other connected device, | | eww G € o 1 MAR GREGORIOS COLLEGE. 4 SUBJECT: DATA COMMUNICATIONS AND NETWORKING. CLASS: HL CSC STAFF NAME: THEMALATHA. M.C.A Advantages * Iti less expensive than a mesh topology, because each device needs only one link & one 1/0 port to connect it to any number of devices. * Easy to install & reconfigure, requires less cabling is used only one connection between devices & hub enables addition moves & deletion. * Robustness (if one link fails, only that link is affected all other remain active. Tree topology: * It is a variation of star. Not every plugs directly into hub, The majority of devices connected (0 the secondaty hub that in turn is connected to the central hub, * The central hub in a tree is active hub. * An active hub contains a repeater, which is a network device that regenerates the received bit patterns before sending them out * Repeating strengthens transmission & increases the distance a signal can travel. * The secondary hubs may be active of passive. * A passive hub provides a simple physical connection between the attached devices. eee eds Hub J . [ aeaaie al U, : ‘ply Zed =a advantages are same'as star, Advantages and The advantage of secondary hubs‘in tree: * It allows more devices to be attached to a single central hub &therefore increase the distancesa signal can travel between devices. * Itallows the network to isolate and prioritize communications from different computers, Ex: Cable Tv technology, where the main cable from the mein office divide into branches and each branch is divided into smaller branches and so on MAR GREGORIOS COLLEGE 1S SUBIECT: OATA COMMUNICATIONS AND NETWORKING CLASS: II CSC STAFF NAME: T.HEMALATHA, M.C.A\ ‘ Bus topology: * It is a multipoint; one long cable acts as a backbone to link all the devices in the network. * Nodes are connected to able by drop lines & taps. * A drop line is a connection running between the devices & the main cable. ., A taPis a connector that either splices into the main cable or punctures the sheathing of @ cable tocreate a contact with the metallic core. Mg ep * Easy for install n, It uses less cable than mess,sstar or tree topologies. Disadvantage: * Different reconfiguration & fault isolation. * A fault or break in the same side of the problem. The damayed area reflects signals buck in the direction of origin, creating noise in both directions. Ring topology: * Each device has a dedicated point to point line configuration only with the two devices on either side of it. * The signal is passed along one direction unt reaches the destination, * Each device incorporates a repeater which regenerates the bits & passes them, * Basy to install & reconfigure. . *Bach device is linked only to its neighbors. : * To add or delete 2 device requires moving only two connections. * Fault Isolation is simple. Here signal is circulating at all time if are devices does not receive a signal within a specified period, it issues an alarm @eeooeo oe De Oe 2. (@9n00e04e4e@e0 a evvwv ys we wo -O a oO MAR GREGORIOS COLLEGE 14 SUBIECT: DATA COMMUNICATIONS AND NETWORKING. CLASS: IN CSC ‘ ‘STAFF NAME: T.HEMALATHA. M.C.A Disadvantage: * Unidirectional traffic. | & * A break in the ring can disable the entire network dual ring can be used to overcome this. problem, . i Hybrid topotogies: The combination of several topologies as subnetworks that are linked together in a laiger topology. Ex: One department use a bus topology another department use 4 ring. The two department can be connected to each other through a central controller in a star topology 6-TRANSMISSION MopE; 7 * TWprlafy er do * It is used to define the direction of signal flow between two linked devices, wy MAR GREGORIOS COLLEGE J%f SUBJECT: DATA COMMUNICATIONS AND NETWORKING. CLASS: IH CSC STAPF NAME: THEMALATHA, M.CA i Types of transmission modes: * Simplex * Half duplex * Pull duplex Simplex: @eo0oaeoeoeseeoeeoesd * The communication is unidirectional. * Only one of the two stations on ¢ link can transmit other can only receive. | Ex: keyboard,monitor. Cnidey Half duplex: A * Each station can transmit & receive but not at the same time. When one device can send, the other can only réceive & vice versa Ex: Walkie talkies, citizen's band radios(CB). Divegton F date of ret ee ° ° Fall duplex: * Both stations can transmit & receive simultaneously. * The signals going in either direction share the capacity of the link. The:sharing can be in two ways. 1.The link can have two separate transmission paths, one for sending & other for receiving, 4002040008068 * MAR GREGORIOS COLLEGE (8 susiect: para COMMUNICATIONS AND NETWORKING, CLASS: CSC STAFF NAME: .HEMALATHA, M.CA 2-The capacity of the channel is divided between signals travelling in opposite direction, Ex: Telephone network(Both persons can talk and listen at the same time), Dreton qa aft Hime | (a ” ra 2 SS, ° 7. CATEGORIES OF NETWORKS: Ge e 5 * The category of @ network is determined by its size, ownership, distance it covers and ® of} physical architecture, Ry 1, Local Area Networks(LAN) Ge * Itis privately owned and links the devices in a single office ,building or campus. — Ex: es | Two PCs and one printer in an office 2. Extended to a company and include voice, sound and video devices. “© LAN size is limited to few kms. * It is used to share the resources between computers. * The resources can be a hardware, software or data, * One computer can have large capacity and it becomes a server to.other clients, * Software can be installed in the central system and can be used by the whole group of the company. 7 * LAN has restrictions on the number of users to access the ‘operating system, * Tris distinguished from other type of networks by transmission media and topology. * LAN will use only one type of transmission medium, ‘The most common LAN topologies are bus, ring and star. ' LANs data rate can reach 100mbps. ' MAR GREGORIOS COLLEGE 1q__ SUBIECT: DATA COMMUNICATIONS AND NETWORKING. CLASS: IH CSC T “STAFF NAME: THEMALATHA, MCA ‘ | an eeaeeaeocpeseoaooeascoea 2266 @i \ | 2.METROPOLITAN AREA NETWORK(MAN) + Metropolitan Area Network. * Itextends over an entire city. * Itcan be a single network like cable tv. tke core. eoe * I¢may be of connecting a number of LANs into larger network. ' + Therefore, resources are sharcid from LAN-LAN and device to device. LAN-LAN and deviee to devie Ex: A’company can connect the LAN in all of its offices throughout a city by MAN. ‘Telephone companies provide a popular megabit data services(SMDS). ot slog e ° e e e e e e e @ a e e ok 8 MAR GREGORIDS COLLEGE RD SUBIECT; DATA COMMUNICATIONS AND NETWORKING. CLASS: CSC STAFF NAME: LHEMALATHA, M.C.A 3.WIDE AREA NATWORK(WAN): * It provides a long distance transmission of data, voice, image and video information over largeg geographical reas. ~~ * Itmay use public, leased or private communication devices. * It is wholly owned and used by a single company. * Also known as enterprise networks, which covers a country, a continent, even the whole An world, EX: Internet, 8.INTERNETWORKS: “ Two or more networks connected together are called Internetworks or Internet, * Individual networks are joined into internetworks by the use of intemetworking devices, * The term internet(i) is different from Internet(I) * internet is the interconnection of networks, * Internet is the name of the world wide networks, eee Wide nerwori MAR GREGORIOS COLLEGE SUBJECT: OAT COMMUNICATIONS AND NETWORKING CLASS: eC CO stARF Namie: THEMALATHA. M.CA : 4 osimopeL (+ An ISO was the first organization to define model for network communication * The model is the open systems interconnection (OS! Model) * It wgs.established in 1947. * Itisa model that allows any two different systems to communicate. ‘ ‘THE MODEL: . FR \or * Itisa layered framework for the design of network systems, + Itconsist if seven different layers. * Each layer defines 2 segment of the process of moving information acrossa networks Layered Architecture: Itis built of seven ordered layers. Physical layer Data link layer |. Network layer Transport layer ' 5. Session layer 6. Presentation layer 7. Application tayer RYRR These are the layers involved when a message is sent from device A to device B. pit gee, devs shane nein Peer éo peer processes: a * The processes on each machine that communicate at a given layer are called peer 10 peer processes. : * At the physical layer ,the communication is direct, * At the higher layers, the communication must move down through the layers on machine A t machine B and then back up through the layers. * Bach layer add its own information to the message it receives from upper layer and it passes the whole package,to the lower layer. * The information added in the form of headers or trailers. Interface between layers: ‘ * The passing of data through the layers is possible by interfaces. a @ a ® & 9 e e 6 e e MAR GREGORIOS CoWLEGE 28, SUBJECT: DATA COMMUNICATIONS AND NETWORKING cass: mi csc STAFF NAME: T.HEMAGATHA, Mica * Hedefines what information and services a lay . a yer must provide for its upper layer. Fee views ww ( oe PISTOL Coauriahen Organization of the layer: * The 7 layers belong too 3 subgroups, “Layer I 2and3(physical, data link, network) are called Network support layers, ee Steport layers "They deal with moving data from one deviee to another. “Layers 5,6,7(Session, Presentation, Application) are celled user support layers, * Layer 4(Transport layer) used for end to end reliable deta transmission. MAR GREGORIOS COLLEGE 23 SUBJECT: DATA COMMUNICATIONS AND NETWORKING. Lass: i eS STAFF NAME: THEMALATHA. M.C.A * The process stats at layer 7 moves from layer to layer in descenaing order. * At each layer except 7 and 1, header is added to the date. * At layer 2 trailer is added * When the data passes through ‘physical layer(layer 1),it is changed to electromagnetic signal and transmitted over the link, * When it reaches the destination, the signal passes into layer I' and it is transformed back into bits, * Then it moves backup through layers + At each corresponding higher-layer, the headers and trailers attached to it are removed. * When the data reaches layer’ it is again in the form appropriate to the user. CB aa fy 1 Bie i biolo 0/010 ooa! 0GT [eal {clo F016 To Tora TROT BST | =] fs) ee , c| [¢| (Gaga 7. || Gee : (Ee date Ted 4) Al (Zidala is 3) BY a 1 Crunrrons OF THE LAYERS: PHYSICAL LAYER: * It is used.to transmit a bit stream over a physical mediui * It deals with the mechanical and electrical specifications of the interface and transmission medium. @seaese ,@en2nenneowne/seegeasd «fink, medium. MAR GREGORIOS COLLEGE 2% SUBJECT: DATA COMMUNICATIONS AND NETWORKING. CLASS: ESC STAFF NAME: T.HEMALATHA, M.C.A RESPONSIBILITIES OF PHYSICAL LAYER: 1, Physical charactéristios of interfaces and media “It defines the characteristics of the interface between the device and the transmission “It defines the type of transmission medium , 2. Represen: tation of bits: * The bits are represented in a sequence of Qs and ts, : * It must be encoded into signals for transmission, 3. Data rate: ‘ * The transmission rate is the number of bits sent each second. Conte duration of « bit, which is how long it lasts. 4, Svehronizationof bits: * The sender and receiver must be synchronized at the bit level. 5. Line configuration: ‘n 2 point to point configuration ,2 devices are connected together to a dedicated ee ‘ * In a multipoint configuratiot, a link is shared between several devices, &Physical topology: MAR GREGORIOS COLLEGE SUBJECT; DATA COMMUNICATIONS AND NETWORKING CLASS: III CSC DB STAFE NANE: THEMALATHA, M.CA * [defines how the devices are connected to make a networks. * Itcan be done using a mesh, a star, a ring or a bus topology ‘ransmission mode: * It defines the direction of transmission between 2 devices they are 3 types simple, helf duplex, full duplex. DATALINK LAYER: * Itis used for raw transmission of data to a reliable link and is responsible for node —tenode delivery. To stam loapany 13 ;. ee ' I va 7 L loio loowalala sIBILITIES R ‘The data fink layer divides the stream of bit received from the network layer into data unis called frames. 2. Physical addressing: + The data link layer, add a,header to the frame to define the physical address of the sender(source address) and receiver(destination address) of the frame. * Suppose if you want to send a frame to the sy$tem outside of your network, the receiver address is the addresses of the device which connects your network too another . 3.Flow control: * Flow control mechanism is used when the transmission rate of the receiver is less than that of the sender, 4.Ertor control: o e a e @eee@eeseaes8 a0 © ‘ 6 6 e ‘ @ e e naanpaeoo~eae)ede MAR GREGORIOS coLLeGe 26 Suse: PATA COMMUNICATIONS AND NETWORKING CLASS: CSC STAFF NAME: T.HEMALATHA, M.CA * lis used to detect and retransmit damaged or lost frames, acct and retransmit damaged 9 * It is also used to prevent duplication of frames by adding sequence number to each frame, S.Access control: S Access control: When mote devices are connected to a single link, data link layer protocols are used to find which device has contro! over the link. E NETWORK Layi R NETWORK LAYER : + Itis responsible for the source to destination delivery ofa packet across multiple networks, T + Iftwo systems are soe nesied to the same link, then there is no need for a network layer, * Ifthe two systems are attaches to different Betworks with connecting devices between the networks, then there is a need of network layer” LLogical addressin, {fa packet passes through the network we need another address to differentiate the Source and destination systems Therefore the network layer adds a header t sees of the \ See 3 ~Eteader to the packet. the lagical addresses of the | 2.Routing : : “Independent network or links ate connected together to form a large network, those 7 connectis LYS. “| MAR GREGORIOS COLLEGE” ap susecr: para COMMUNICATIONS AND NETWORKING. CLASS: IN CSC STAFF NAME: THEMALATHA. M.C.A TRANSPORT LAYER «Iris responsible for the source to destination delivery of the entite message. © For security, the transport layer creates a connection between the two devices, Creating a connection involves 3 steps @ 6 e oe a a @ @ e @ 1.Connection establishment 2,Datatransfer 3,Connection Release. Lydian by date. [Aa (hee i Te nto lower - From savepot lawyer RESPONSIBILITIES OF TRANSPORT LAYER LService point. ins Computers run severa! programs at the same time. _ The delivery of data from a specifie process of one computer to a specific process of the others. For this purpose transpért layer add an address called service point addressing. . ‘¢ - ‘The transport layer, ges entire message to the cozect process on that computer. © Whereas network layer gets each packet to the correct computer. 2. and. sembh © Amessage is divided into number of smaller units with a sequence number, ‘ © These numbers are used to the reassemble the message correctly. mt mendkgéeeeéesd MAR GREGORIOS COLLEGE CLASS: CSC Also.t0 identify and reatace the packets that was lost in transmission, 3.Connection control SConnection control * Transport layer can be either connectionle, in oriented, * ¢h gonnectionless transport layer treats cack segment the transport layer at ni as Separate packet and delivers it to the destination, * A connection Oriented transport layer makes cénnection With the transport layer at the destination, at * After delivering all the deta, the corinection is terminated, Flow control * Iris performed end-to-end rather than across a link, S.Error contro} + Errorcontrol i * The sending transport layer makes sure hat the entire message arrives at the receiving \ransport layer without error (ie) Damage, loss or duplication. Error Gorrection is achieved by retransmission, SESSION LAYER Sa 7 Ils the network dialogue consestler, . deatablshes, maintains and ssnctuontzes the interaction between devi . communicatin, Simcetans VB presbrlatn Jaen Lb date | Myew [Lp di) 24 MAR GREGORIOS COLLEGE SUBJECT: DATA COMMUNICATIONS AND NETWORKING. CLASS: mt CSC STAFF NAME: T.HEMALATHA, M.C.A, RESPONSIBILITIES OF SESSION LAYER LDialog control full duplex. Example: ‘The dialog between a terminals connected to @ mainframe can be a half duplex. 2, Synchronization Session layer allows a process to add checkpoints (Synchronisation points) ingo a stream of Sat. Example: + ICoystem sends a fle of boro pages, you can insert checkpoints after every 100 pages. for connect retriéval and acknowledgement. + Suppose if cfash happens during the transmission of page 523, the setransmission begins at page $01. © No need to retransmit from Page I 500. PRESENTATION LAYER : It is concerned with the syritax and semantics of the information. scars 4 It allows the communication between two procésses to take place either in half duplex or eecanesea ss eaannesvaeece wR, MAR GREGORIOS COLLEGE 2D sumsect: onta COMMUNICATIONS AND NETWORKING, CuASS:imcsC | : STAFF NAME: T.HEMALATHA, M.CA Sew ee via ‘ Responsipritie: OF PRESENTATION LAYER oe IRITIES OF PRESENTATION LAYER LZranslation coding systems. * The presentation layer at the sender. changes the information from its sender-dependent i See ‘ format inte a'témmon Format, * The presentation layer at the receiver c| dependent formst, ~—. hanges the common format into its receiver RR ito iis receiver 3. Decryption: The receiver reverses the origi original form, 4.Compression al process to transform the message back to its Process to transh sShge back toi It reduces the number of bits to be tranmitted, {tis important in the transmission of multimedia such as.text, audio and video, APPLICATION LAYER ' 7 “It cnabies the user to access the network, * It provides User interfaces and support sarvi such as electronic mail, remote greteeess and transter, shared database management arch other types of distributed information services, X.400 ~ Message handling services X.500 = Dicectory services FTAM—File transfer, access and management * No ‘header or trailers are added in this layer, Se eeeeeEEE ES Eee 34 MAR GREGORIOS COLLEGE SUBJECT: DATA COMMUNICATIONS AND NETWORKING CLASS: CSC STAFE NAME: T.HEMALATHA, M.CA ” Q BI PLICATION LAYER won i i A L.Netwok virtual terminal L.Netwok virtual terminal x ok © ‘Iris a software version of a physical terminal. © [tallow a userto log on to a remote host + The user’s computer talks to the software terminal. «This software talks to the remote Hiost and believes that it is oné of its own terminals. # . Then allows you to log on. File transfer, access & management(FTAM) Itallows a user to agcess files in a remote computer, to retrieve files and to manage or control files. — Mail services It provides the basis for e-mail forwarding and storage. 4.Directory services ' it provides distributed database source and access for global information about various objects and services. Rg * g § 4 6 ‘ % « & « e e & « g ® e e ° ° e e e e 4 e ‘ c : Ree Crean — Comeni rpshernd “Oiporizatin Qa, Shindordi ain CT Pe Te & a mublinahenad body 5) 9 ackve ova hese pry opera han re dred a Suvenk y we, Fechnofgrcad Sf eeencmre ach tw) ko beo rabincd Tele tomar tra ten bien Onroo _ Te le tormemtunite hin Saoolardn Seek (Prv-z): FY clejeass —roboned — Skandneds Sov Tebe Gammenr es hion "0 American Nakened, Shodan Tas htt: Cansa), Spe tette teal completely private, Non profit Cospofa hoa. "V) Dshhati. A Lluctrical f Plestnies Eryn | (Leeg), ha Olevele prrerd- # adog te, A, Inher oO xhona)) Sis da rels er Corn msi tm Tp a Jt oversees Compu h a sf Kon WD Electmnin, Bodustvies A ssoe'ahen (82.4) Dy ve ca! ehacbronre rans fading Con urn Roe 7 Entiruahon * De facts ¥ Pe Sure Pe facts.’ corer b beep i that have 7 oe bab fave ani bod approved by og zed ¢ he been adop Fed as Shondarde ir Widespread Ure. 1 Pro prcrarg Jc loses ‘Seodaxd’]} Fayested . . Bi Comme 6 ve) or ganisahen | thak They are owned by Com pang (oven fed — them : &. Non Proprie Fary Copen Standard ] * Developed by grep or lommi ttee eee Those. that hove bean hegis ba lee by 2 ofidally ; Tetogni ved body Standort Organiza lieve: Stan dords are davelleped fhevghs Shag darde Crea lion Committe 4 hot aan teen Coolre va hoa O92029,8 99 F9FECPGHHDE 2026000046000 @% & Lt & SEER EEE Cre '2R0%i0 College, Mogaapair West, Chennai #7 Sub: Data commu, Meations and Networking Mea. ston @O SWAKSH MAN : ‘ETAT “IL ¢s¢ Hission of Digital Data: “Interfaces and M dems, Section 1 Sgital Date Trevsmission the transmission of binary data. across a link can be accdémplished either in parallel mode or seal mode. SE oe mode, multiple bits are sent with each clock pulse, i mode, ore bit is sent with each clock pulse. * There are two subclasses of Serial transmission: 2 Synchronous 7 2 Asynctvoncus “] Synchronous Asynchronous ET] Asynetronousy “@@S2e@e900000GCeR0e0G68000 8000089909 09 5 "*% ‘Spyright Wargregorios College, Mogappair West "+37 Sub, Data communications and Networking ies SQ baal MEA, MPhil Paralte! Transmission l Sinary data, consisting of is and Os, ma * Computers produce and consume data in grou bits at a time instead of one. T1 'y be organized into groups of n bits each, PS of bits. By grouping, we can send data n his is called parallel transmission (ihe mechanism for parallel transmission is a conc: to send n bits at one time] eptually simple one: use n wires ge is i i ission requires n The advantage of parallel transmission is speed) Parallel transmission requi communication lines just to transmit the data stream, Because this is expensive( parallel transmission is usually limited to short di ances. Dsedv 30 ‘opynignt: margregorios Coltege, Mogappair West, Chennai-37 Sub: Data communications and Networking Mrs.Lakshoi MCA, M.Phil + Serial Transmission In serial transmission gne bit follows another. So we need only one communication channel rather than n to transmit data between two communicating devices. f The eight bits are sent one after another. Receiver We need only one line (wire). Nee ee Parallel/serial Serial/parallel converter : converter The advantage of serial over parallel transmission is that with only one * communication channel, serial transmission reduces the cost of transmission)over parallel By roughly a factor of n. (sera transmission occurs in one of two ways: + Asynchronous 5 + Synchronous Asynebronous Transmission Asynchronous transmission is so named because the {iming of a signal is unimportant) ama is received and translated byJagreed-upon patterns Pattems are based orfGrouping the bit stream into bytes(Each group) usually eight bits, (is sont along the link as a unit) + (Te alert the receiver to the arrival of a new group, therefore, an extra bit is added to the beginning of each byte. This bit usually a 0, is called the start bit.) ; 3A 3 Capyriaht: Margregoris College, Mogappair West, Chennai-37 Sub: Data Communications and Networking Mist shmi M.CA,, MPhil > a + (a tet the receiver know that the byte is finished, one or more additional bits > 26 bpended to the end of the byte. These bits, usually 1s, are called stop > bits. ) 7 > > * By this method, each byte is increased in size to at least 10 bits, of which 8 are information and 2 or more are signals to the receiver, , Direction of flow Stop bit Data Start bit ios) onote) Be iiier lat ELL 101 Gaps between lata units Synchronous Transmission synchronous transmission, the bit stream is combined into longer “frames’, which may contain multiple bytes) It is left to the receiver to Separate the bit stream into bytes for decoding purposes. * ‘ata are transmitted as an unbroken string of 1s and Os, and the receiver Separates that string into the bytes, or characters, it needs to reconstruct the information. ©, 32 seuuve Copyright: Margregorios College, Mogappair West, Chennai-37 Sub: Data communications and Networking (Mrs..Lakshmi M.A, M.Phil Direction of flow > 10100011 |14111011 | 00010000 | 110 Cire advantage of synchronous transmission is spi own no extra bits or gaps to introduce at the sending end and remove at the receiving end and, by extension, with fewer bits to move across the link, synchronous is faster than asynchronous transmission. Dats Tyuntmtmtin Corwpal UNG eat oO fe DTE-DCE Interface x Da e@ 89a 68288020098 @B & | (Data terminal equipment (OTE) and data circuit-terminating equipment (DCE) are two important terms in computer networking. There are usually four basic functional units involved in the communication of data: a DTE and DCE on one end and a OCE and DTE on.other end as shown in the following diagram. Che DTE generates the data and passes them, along with any necessary control characters, to a DCE. The DCE converts the signal to a format appropriate to the 33 . oF eee See ECE

You might also like