Data Communication and Computer Network (DCC) - CT-2 Full Notes Subject Code: 22414
Course: MSBTE Diploma in Computer Engineering – 4th Semester
Exam: Class Test 2 (CT-2)
Total Topics: 20
1. OSI Model with Functions of Each Layer
The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes
the functions of a telecommunication or computing system into seven distinct layers:
Layer
Layer Name Functions
Number
Provides services for end-user applications, like web browsers
7 Application Layer
and email.
Presentation Translates, encrypts, and compresses data. Example: JPEG,
6
Layer MP3.
5 Session Layer Manages sessions and controls dialogues between devices.
Ensures reliable data delivery, error correction, and flow
4 Transport Layer
control.
Handles logical addressing (IP), routing, and packet
3 Network Layer
forwarding.
2 Data Link Layer Error detection/correction, MAC addressing, and framing.
1 Physical Layer Transmits raw bits via physical medium (cables, signals).
2. TCP/IP Model with Functions
The TCP/IP model is a four-layered suite used in modern networking. It is the foundation of the
Internet protocol suite.
Layer Equivalent OSI Layer(s) Functions
Application, Presentation,
Application Provides services like HTTP, FTP, DNS.
Session
Ensures reliable data transmission using
Transport Transport
TCP/UDP.
Internet Network Responsible for addressing and routing (IP).
Network
Data Link + Physical Deals with physical transmission of data.
Access
3. IPv4 vs IPv6
Feature IPv4 IPv6
Address Length 32-bit 128-bit
Decimal (e.g., Hexadecimal (e.g.,
Address Format
192.168.0.1) 2001:0db8:85a3::8a2e:0370:7334)
Header Complexity Less complex More complex but efficient
Security Optional Mandatory (IPSec integrated)
Number of
~4.3 billion Virtually infinite
Addresses
4. Bluetooth Architecture
Bluetooth is a short-range wireless communication standard.
Architecture:
• Piconet: A network with one master and up to 7 active slaves.
• Scatternet: Multiple piconets interconnected.
Protocols:
• L2CAP (Logical Link Control and Adaptation Protocol)
• RFCOMM (Serial Cable Emulation)
• SDP (Service Discovery Protocol)
Layers:
• Radio Layer
• Baseband
• Link Manager Protocol
• Host Controller Interface
• Application Layer
5. IP Configuration (Manual and Automatic)
Manual Configuration:
• User assigns IP, subnet mask, default gateway, DNS manually.
• Used in servers, networks without DHCP.
Automatic Configuration:
• DHCP (Dynamic Host Configuration Protocol) automatically assigns network settings.
• Reduces configuration errors.
6. Error Detection Techniques
Technique Description
Parity Bit Adds a bit to make total 1s even (even parity) or odd (odd).
Checksum Sums segments of data; receiver re-computes and compares.
CRC Uses polynomial division to detect changes in data.
Hamming Code Detects and corrects single-bit errors.
7. ARQ (Automatic Repeat Request) Techniques
Method Description
Stop-and-Wait ARQ Sender sends 1 frame, waits for ACK before sending next.
Go-Back-N ARQ Sender sends multiple frames but must resend all after a lost one.
Selective Repeat ARQ Only the erroneous frames are retransmitted.
8. WLAN Architecture and Types
Components:
• Access Point (AP)
• Wireless Station (Client)
• Distribution System (DS)
Types of WLAN:
• Infrastructure Mode: Clients connect via AP.
• Ad-Hoc Mode: Peer-to-peer network without AP.
• Mesh Network: Nodes relay data to/from each other.
9. Difference Between OSI and TCP/IP Models
Feature OSI Model TCP/IP Model
Layers 7 4
Feature OSI Model TCP/IP Model
Developed By ISO DARPA (U.S. Defense)
Protocol Dependency Protocol independent Protocol-specific
Standardization Conceptual model Practical implementation
10. Types of Transmission Media
Type Medium Features Example
Twisted Pair Copper Cheap, prone to EMI, low data rate LAN, telephone
Coaxial Cable Copper + Shield Better shielding, used for broadband Cable TV
Fiber Optic Glass fiber Immune to EMI, high speed, expensive Backbone, ISPs
Wireless Air No cables, susceptible to interference Wi-Fi, Bluetooth
11. Transmission Modes
Mode Direction Example Features
Simplex One-way only TV Broadcast Sender only
Half-Duplex Two-way (alternate) Walkie Talkie Both sides, but one at a time
Full-Duplex Two-way simultaneous Phone call Fastest, both send & receive
12. Functions of Data Link Layer
• Framing: Encapsulating data into frames.
• Error Detection & Correction: Using CRC, parity.
• Flow Control: Preventing buffer overflow.
• Access Control: Controls access to shared media (MAC).
• Physical Addressing: Adds source/destination MAC address.
13. Functions of Network Layer
• Routing and path selection.
• Logical addressing (IP).
• Packet forwarding.
• Fragmentation and reassembly.
14. Functions of Transport Layer
• End-to-end delivery.
• Error control and retransmission.
• Flow control (via sliding window).
• Multiplexing of connections.
15. TCP vs UDP
Feature TCP UDP
Connection Connection-oriented Connectionless
Reliability Guaranteed delivery, ACKs used No guarantee, best-effort
Speed Slower Faster
Usage FTP, HTTP, Email VoIP, DNS, Streaming
16. Types of Networks
Type Area Covered Example
PAN Within 10 meters Bluetooth, smartwatches
LAN Up to 1 km Home, office networks
MAN City-wide Cable TV networks
WAN Global Internet
17. IP Address Classes
Class Range Subnet Mask Use
A 1.0.0.0 to 126.255.255.255 255.0.0.0 Large organizations
B 128.0.0.0 to 191.255.255.255 255.255.0.0 Medium organizations
C 192.0.0.0 to 223.255.255.255 255.255.255.0 Small networks
D 224.0.0.0 to 239.255.255.255 NA Multicasting
Class Range Subnet Mask Use
E 240.0.0.0 to 255.255.255.255 NA Research & Reserved
18. Unicast, Broadcast, Multicast
Type Description Example
Unicast One-to-one communication Browsing website
Broadcast One-to-all on network ARP request
Multicast One-to-many selected devices Live TV stream
19. Modulation Techniques
Type Principle Usage
ASK Amplitude varies with data Old telephone systems
FSK Frequency changes per bit Radio communication
PSK Phase shift represents data Modern modems
20. Firewall
Definition: A firewall is a network security device/software that filters incoming and outgoing
traffic.
Types:
• Packet Filtering
• Stateful Inspection
• Proxy Firewall
• Next-Gen Firewall (NGFW)
Functions:
• Block unauthorized access
• Monitor traffic
• Protect against malware
• Enforce security policies