[go: up one dir, main page]

0% found this document useful (0 votes)
3 views64 pages

Unit 1 Notes

The document provides an overview of data communication and computer networks, detailing key concepts such as data flow, network criteria, physical structures, and various network topologies including mesh, star, bus, ring, and hybrid. It explains the types of networks (LAN, WAN, MAN) and their components, as well as switching techniques like packet and circuit switching. Additionally, it introduces the OSI model, outlining its seven layers and their functions in network communication.

Uploaded by

Akila V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views64 pages

Unit 1 Notes

The document provides an overview of data communication and computer networks, detailing key concepts such as data flow, network criteria, physical structures, and various network topologies including mesh, star, bus, ring, and hybrid. It explains the types of networks (LAN, WAN, MAN) and their components, as well as switching techniques like packet and circuit switching. Additionally, it introduces the OSI model, outlining its seven layers and their functions in network communication.

Uploaded by

Akila V
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 64

Unit 1

21ECC402P Computer Communication


DATA COMMUNICATION INTRODUCTION

• The term computer networks arised from the concept of data


communication.

The term telecommunication means communication at a distance.


The word data refers to information presented in whatever form is
agreed upon by the parties creating and using the data.

Data communications are the exchange of data between two devices


via some form of transmission medium such as a wire cable.
Components of Data Communication :
Data flow (simplex, half-duplex, and full-duplex) :
COMPUTER NETWORKS INTRODUCTION:

A network is a set of devices (often referred to as nodes) connected by


communication links.
A node can be a computer, printer, or any other device capable of
sending and/or receiving data generated by other nodes on the
network.
A link can be a cable, air, optical fiber, or any medium which can
transport a signal carrying information.
NETWORK CRITERIA:

• Performance
• Depends on Network Elements
• Measured in terms of Delay and Throughput
• Reliability
• Failure rate of network components
• Measured in terms of availability/robustness
• Security
• Data protection against corruption/loss of data due to:
• Errors
• Malicious users
Physical Structure of Networks:

Type of Connection
• Point to Point - single transmitter and receiver
• Multipoint - multiple recipients of single transmission

Physical Topology
• Connection of devices
• Type of transmission - unicast, mulitcast, broadcast
TYPES OF CONNECTIONS:
NETWORK TOPOLOGY:

A network topology diagram describes the physical or logical


arrangement of these components and how they communicate with
each other within the network.
IT administrators benefit from network topology software to ascertain
the ideal layout for each node, facilitating optimized traffic flow.
A well-defined network topology makes it easier for network admins
to locate faults, troubleshoot issues and to allocate network resources.
CATEGORIES OF NETWORK TOPOLOGY:
MESH TOPOLOGY:

A mesh topology is a network setup where each computer and


network device is interconnected with one another.
This topology setup allows most transmissions to be distributed even
if one of the connections goes down. It is a topology commonly used
for wireless networks.
STAR TOPOLOGY:

A star topology, sometimes known as a star network, is a network


topology in which each device is connected to a central hub.
 In this network arrangement, all devices linked to a central network
device are displayed as a star.
Unlike Mesh topology, a device cannot provide communication
directly between the devices in a star topology; it has to communicate
with the help of a hub.
STAR TOPOLOGY:
BUS TOPOLOGY :

Bus topology, alternatively known as line topology, is a type of


network topology where all devices on a network are connected to a
single cable, called a bus or backbone.
A bus network is a local area network (LAN) topology in which each
node -- a workstation or other device -- is connected to a main cable or
link called a bus.
Advantages of bus topology are ease of installation and network
scalability .
Disadvantages of bus topology are limited length of physical cable
and high possibility of data collision.
BUS TOPLOLOGY:
RING TOPOLOGY:

A ring topology is a network configuration where device connections


create a closed circular data path.
Each networked device is connected to two others, like points that
form a circle. Together, devices in a ring topology are called a ring
network.
The term "token" describes a segment of information (like a packet)
sent through that circle.
When a computer on the network can decode that token, it receives
data.
RING TOPOLOGY
HYBRID TOPOLOGY

Hybrid topology is a network structure that combines two or more


different types of topologies, such as star, ring, bus, or mesh.
 It's designed to leverage the strengths and minimize the weaknesses
of the individual topologies it incorporates.
HYBRID TOPOLOGY
NETWORK TYPES

LAN - Local Area Network

WAN – Wide Area Network

MAN – Metropolitan Area Network


NETWORK CATEGORIES:

Local Area Networks (LANs)


• Short distances
• Designed to provide local interconnectivity
Wide Area Networks (WANs)
• Long distances
• Provide connectivity over large areas
Metropolitan Area Networks (MANs)
• Provide connectivity over areas such as a city, a campus
LAN – Local Area Network

A local area network (LAN) is a collection of devices connected


together in one physical location, such as a building, office, or home.
A LAN can be small or large, ranging from a home network with one
user to an enterprise network with thousands of users and devices in
an office or school.
Purpose of LAN:
• Short distances
• Designed to provide local interconnectivity
LAN – Local Area Network
WAN – Wide Area Network

In its simplest form, a wide-area network (WAN) is a collection of


local area networks(LANs) or other networks that communicate with
one another.
 A WAN is essentially a network of networks, with the Internet the
world’s l argest WAN.
A WAN router, also known as an edge router or border router is a
device that routes data packets between WAN locations, giving an
enterprise access to a carrier network.
Several WAN protocols have been developed over time, including
Packet over SONET/SDH (PoS), Multiprotocol Label Switching
(MPLS), ATM, and Frame Relay.
WAN – Wide Area Network - Types

Switched WAN network is used to connect multiple end nodes


through a common WAN network, example is Asynchronous Transfer
Mode (ATM) network .

Point-to-point WAN is one which consists of a two end nodes


connected by a leased line, example is a dial-up line that connects a
home computer to the Internet.
WAN – Wide Area Network - Types
MAN – Metropolitan Area Network

It is a computer network connecting computers in a metropolitan area,


which can be a large city, multiple cities and towns, or any large area
with multiple buildings.
The term “metropolitan” implies the network size.
MAN – Metropolitan Area Network

The basic components of a MAN network include:


• Nodes: Nodes represent the devices connected to the MAN network, such as computers, servers,
routers, switches, and other network devices. These nodes serve as endpoints for data transmission
within the network.
• Transmission Media: The transmission media refers to the physical channels through which data
is transmitted in the MAN network. It can include various media types, such as copper cables (e.g.
• Ethernet cables), fibre optic cables, wireless connections (e.g., Wi-Fi), or a combination.
• Switches: Switches facilitate forwarding data packets within a MAN network. They receive data
packets from one node and forward them to the appropriate destination node based on the MAC
(Media Access Control) address.
• Routers: Routers connect multiple MAN networks or a MAN network to a WAN. They direct
network traffic between different subnets or networks, using routing protocols to determine the
best path for data transmission.
MAN – Metropolitan Area Network
SWITCHING

Switching is a process of transferring data packets from one device to


another in a network using specific devices called switches. through a
network switch.
Switches transfer data from source ports on devices such as computers
to destination ports on devices such as routers.
TYPES OF SWITCHING:
1.Packet Switching
2.Circuit Switching
SWITCHING

Switching in networking is mainly divided into two parts. These are:


Connectionless: With connectionless switching, there is no need for a dedicated
path or any prior agreement between the source and the destination.
In this, the data is divided into smaller components known as packets, which are
transmitted individually on the basis of the destination address.
Connection-oriented: In contrast to connectionless switching, connection-
oriented switching first requires a dedicated path or a prior agreement between the
source and the destination.
Once the dedicated path is set, data is sent in the form of a continuous stream of
bits or bytes. Afterwards, Data is transmitted along the same path by switch.
PACKET SWITCHING:

Packet switching is a type of connectionless switching technique that divides the


message into units of variable length known as packets, each of which is given a
source and destination address.
Packet Switching uses the Store and Forward technique while switching the packets;
while forwarding the packet each hop first stores that packet then forwards. This
technique is very beneficial because packets may get discarded at any hop for some
reason. More than one path is possible between a pair of sources and destinations.
Depending on the network configuration and the availability of pathways, the packets
may travel different paths to reach their destination. The packets are put back together
by the destination device to form the original message.
Packet switching is suitable for applications that require efficient and flexible
communication, such as web browsing or streaming.
PACKET SWITCHING:
PACKET SWITCHING:

It is also known as connectionless switching and also called as datagram packet
switching.
It is a packet switching technology in which packet is known as a datagram, is
considered as an independent entity. Each packet contains the information about
the destination and switch uses this information to forward the packet to the
correct destination.
The packets are reassembled at the receiving end in correct order.
In Datagram Packet Switching technique, the path is not fixed.
Intermediate nodes take the routing decisions to forward the packets.
Datagram Packet Switching is also known as connectionless switching.
PACKET SWITCHING:

Virtual-circuit packet switching: It is also known as connection-oriented


switching; it means that a logical connection is established between the source and
destination before any data is shared, and these logical connections are called
virtual circuits.
In this approach, each data frame follows these logical paths and offers an
efficient way of sharing data without the risk of data loss.
CIRCUIT SWITCHING:

It is also known as connection-oriented switching; it means that a logical


connection is established between the source and destination before any data is
shared, and these logical connections are called virtual circuits.
In this approach, each data frame follows these logical paths and offers an
efficient way of sharing data without the risk of data loss.
Circuit switching is a switching technique that establishes a dedicated path
between sender and receiver.
In the Circuit Switching Technique, once the connection is established then the
dedicated path will remain to exist until the connection is terminated.
Circuit switching in a network operates in a similar way as the telephone works.
A complete end-to-end path must exist before the communication takes place.
CIRCUIT SWITCHING:

In case of circuit switching technique, when any user wants to send
the data, voice, video, a request signal is sent to the receiver then the
receiver sends back the acknowledgment to ensure the availability of
the dedicated path.
After receiving the acknowledgment, dedicated path transfers the data.
Circuit switching is used in public telephone network. It is used for
voice transmission.
Fixed data can be transferred at a time in circuit switching technology.
CIRCUIT SWITCHING:

In the case of Virtual circuit switching, a preplanned route is


established before the messages are sent.
Call request and call accept packets are used to establish the
connection between sender and receiver.
In this case, the path is fixed for the duration of a logical connection.
VIRTUAL CIRCUIT PACKET SWITCHING:
CIRCUIT SWITCHING:

Advantages of circuit switching:


• In the case of Circuit Switching technique, the communication channel
is dedicated.
• It has fixed bandwidth.
CIRCUIT SWITCHING:

Disadvantages of circuit switching:


• Once the dedicated path is established, the only delay occurs in the speed of
data transmission.
• It takes a long time to establish a connection approx 10 seconds during which
no data can be transmitted.
• It is more expensive than other switching techniques as a dedicated path is
required for each connection.
• It is inefficient to use because once the path is established and no data is
transferred, then the capacity of the path is wasted.
• In this case, the connection is dedicated therefore no other data can be
transferred even if the channel is free.
OSI MODEL – Open System Interconnection

Established in 1947, the International Standards Organization (ISO) is


a multinational body dedicated to worldwide agreement on
international standards.
An ISO standard that covers all aspects of network communications is
the Open Systems Interconnection (OSI) model. It was first introduced
in the late 1970s.
SEVEN LAYERS OF OSI MODEL
OSI MODEL - SEVEN LAYERS
Protocols:
• A protocol is synonymous with rule. It consists of a set of rules that govern
data communications. It determines what is communicated, how it is
communicated and when it is communicated. The key elements of a protocol
are syntax, semantics and timing.
• Syntax
• Structure or format of the data
• Indicates how to read the bits - field delineation
• Semantics
• Interprets the meaning of the bits
• Knows which fields define what action
• Timing
• When data should be sent and what
• Speed at which data should be sent or speed at which it is being received.
7-Layer OSI Model
Layer 7 Application Layer • Layers 1-4 relate to
communications technology.
Layer 6 Presentation Layer
• Layers 5-7 relate to user
Layer 5 Session Layer applications.
Layer 4 Transport Layer

Layer 3 Network Layer

Layer 2 Data Link Layer

Layer 1 Physical Layer

Communications subnet boundary


Layer 1: Physical Layer
• Transmits bits from one computer to
another
• Regulates the transmission of a stream of
bits over a physical medium.
• Defines how the cable is attached to the
network adapter and what transmission
technique is used to send data over the
cable. Deals with issues like
• The definition of 0 and 1, e.g. how many volts represents a
1, and how long a bit lasts?
• Whether the channel is simplex or duplex?
• How many pins a connector has, and what the function of
each pin is?
PHYSICAL LAYER
Layer 2: Data Link Layer
· Packages raw bits from the Physical layer
into frames (logical, structured packets for
data).
· Provides reliable transmission of frames
· It waits for an acknowledgment from the
receiving computer.
· Retransmits frames for which
acknowledgement not received
· The data link layer is responsible for moving
frames from one hop (node) to the next.
DATA LINK LAYER:
HOP TO HOP DELIVERY
Layer 3: Network Layer
• Manages addressing/routing of data within the
subnet
• Addresses messages and translates logical addresses
and names into physical addresses.
• Determines the route from the source to the
destination computer
• Manages traffic problems, such as switching, routing,
and controlling the congestion of data packets.
• Routing can be:
• Based on static tables
• determined at start of each session
• Individually determined for each packet, reflecting the current
network load.
• The network layer is responsible for the
delivery of individual packets from the source host to the
destination host.
NETWORK LAYER
SOURCE TO DESTINATION DELIVERY
Layer 4: Transport Layer
• Manages transmission packets
• Repackages long messages when necessary
into small packets for transmission
• Reassembles packets in correct order to get the
original message.
• Handles error recognition and recovery.
• Transport layer at receiving acknowledges
packet delivery.
• Resends missing packets
• The transport layer is responsible for the delivery
of a message from one process to another.
TRANSPORT LAYER
Reliable Process to Process Delivery
of a message:
Layer 5: Session Layer
• Allows two applications on different
computers to establish, use, and end a
session.
• e.g. file transfer, remote login
• Establishes dialog control
• Regulates which side transmits, plus when and
how long it transmits.
• Performs token management and synchronization.
• The session layer is responsible for dialog
control and synchronization.
SESSION LAYER
Layer 6: Presentation

Layer
Related to representation of transmitted
data
• Translates different data representations from
the Application layer into uniform standard
format
• Providing services for secure efficient data
transmission
• e.g. data encryption, and data compression.
The presentation layer is responsible for translation,
compression, and encryption.
PRESENTATION LAYER
Layer 7: Application Layer
• Level at which applications access network
services.
• Represents services that directly support
software applications for file transfers,
database access, and electronic mail etc.
• The application layer is responsible for
providing services to the user.
Protocols supporting for the above services are
SNMP, FTP, HTTP.
APPLICATION LAYER
SUMMARY OF LAYERS:

You might also like