You are on page 1of 29

Unit:1

Data Communication
• Exchange of data between two devices via some form of transmission
medium.
5 components of DC
1.Message
2.Sender
3.Receiver
4. Medium
5.Protocol
Two computers connected to each other with LAN Cable and
OSI Model defines and is used to understand how data
Connectors (RJ-45), sharing data with help of Network interface
is transferred from one computer to another in a
card(NIC) forms a computer network.
computer network
In order to accomplish successful communication between
the computers or network or different architecture- 7 layered
Open System Interconnection (OSI) Model was introduced
by ISO in1984.

But if one computer is based on MSWindows and other


Is MAC OS. Then how are they going to communicate Layered Architecture
with each other? =7 Layers

Please Do Not Touch Steves Pet Allegator


OSI Layers
Figure 3-3
An Exchange Using the OSI Model

WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998


• Each Layer is a package of
protocols.
• Application Layer: Does not
include firefox, chrome,etc.
• It includes Application layer
protocols that are needed to
make these applications work
correctly in a network called
internet
• AL is used by Network Applications
(Computer applications that used internet)
i.e. chrome, firefox,outlook , skype,etc.
• Web browser , is a n/w application running
in your PC, does not reside in AL
• But it uses application layer protocols like
HTTP,HTTPS to do web surfing
• All network applications depend on
application layer protocols
• HTTP,HTTPS,FTP,SMTP, these protocols
collectively called Application Layer
• Application Layer provide services for
network applications with help of protocols
to perform user activities
• Presentation Layer receives data from Application layer
• The data in the form of characters and numbers are converted to binary format:-
Translation
• B4 data is transmitted PL reduces the number of bits to represent original data:-Data
Compression
• To maintain integrity of data, the data is encrypted at sender side and decrypted in
receiver side. SSL protocol used in PL for encryption and decryption.
• Session Layer helps in setting up and managing
Connections and enabling sending data and receiving
data followed by termination of connection
• Session layer has Application programming interfaces
(API’s ) eg: NETBIOS, which allows appln of different
computers to communicate with each other.
• Before a session or connection is established with a
server.
• Server performs function called Authentication
• Authorization : Determines if you have permission to
access the files.
Session layer keeps track of files that are being downloaded.

• Webpage contain text ,images. These files are


stored
separately on the webserver.
• When you request a website in a web browser.
Web browser opens a separate session to the
webserver to Download txt and image files
separately.
• These files received as data packets
• SL keeps a track of which datapacket belong to
which file ie either text or image fileand tracks
where the received data packet goes.
• This is called Session Management
Controls the reliability of Communication through
1. Data is divided into small
data units called segments
2. Each data unit contain source
and destination port number and sequence number
3.PN: helps to direct each segment to the correct application
4. Sequence no: helps to reassemble the segments to form correct message
TL tells the server to slowdown or increase the speed of data transfer to improve the device performance

If data units does not arrive the destination it is error , TL detects and corrects the error
1. UDP: Faster than TCP, it does not give
feedback ,weather the data is delivered or
not.
2. TCP Provide feedback. Hence data lost is
retransmitted.
3. UDP is used where full data delivery is not a
must eg: Movie streaming,
voip,videogames…
4. TCP is used where full data delivery is a
must eg: WWW, FTP, Emails…
• Transport layer passes the data segments to network layer
• Network layer works for the transmission of received data segment
from one network to another network
>> Data units in Network layer are called packets
>> It is a layer where router resides

The function of
• Logical Addressing: IP addressing is done in NL called logical
addressing
• Every computer in a network has unique IP address
• NL assigns sender and receiver IP address to each segment to form a
IP Packet
• Routing: is method to route data packet from src to dstn. It is based
on logical address [IP + Mask].
• Path Determination: Computer can be connected to internet server or other
computer in number of ways. Choosing the best possible path for data delivery
from source to destination is called path determination

-Open shortest path first

- Border Gateway protocol

- Intermediate system to Intermediate system

These protocols determine best possible


path for data packet delivery
• DLL receives data packet from network layer . Data packet contains IP Address of
src and dstn.
• There are two types of addressing: 1.Logical Addressing, 2.Physical Addressing
MAC Address is a 12 digit alphanumeric number embedded in a
network interface card (NIC)of your computer
DLL is embedded as a software in NIC
Figure 3-6 Data Link Layer Example

Media is a physical link between two NICs

WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998

You might also like