01 pengenalan


Published on

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

01 pengenalan

  1. 1. CHAPTER 1 Data Communications Systems Overview INTRO
  2. 2. 1.1 A COMMUNICATIONS MODEL <ul><li>Source </li></ul><ul><ul><li>generates data to be transmitted </li></ul></ul><ul><li>Transmitter ( eg. Modem: digital  analog signal) </li></ul><ul><ul><li>Converts data into transmittable signals </li></ul></ul><ul><li>Transmission System ( eg. Telephone line) </li></ul><ul><ul><li>Carries data </li></ul></ul><ul><li>Receiver </li></ul><ul><ul><li>Converts received signal into data </li></ul></ul><ul><li>Destination </li></ul><ul><ul><li>Takes incoming data </li></ul></ul>
  4. 4. SIMPLIFIED DATA COMMUNICATIONS MODEL key-in message e-mail char. string sequence of bits modem LAN, Tel. line
  5. 5. 1.2 NETWORKING <ul><li>Point to point communication not usually practical </li></ul><ul><ul><li>Devices are too far apart </li></ul></ul><ul><ul><li>Large set of devices would need impractical number of connections </li></ul></ul><ul><li>Solution is a communications network </li></ul><ul><ul><li>Wide Area Network (WAN) </li></ul></ul><ul><ul><li>Local Area Network (LAN) </li></ul></ul>
  6. 6. WIDE AREA NETWORKS <ul><li>Large geographical area </li></ul><ul><li>Crossing public rights of way </li></ul><ul><li>Rely in part on common carrier circuits </li></ul><ul><li>Alternative technologies </li></ul><ul><ul><li>Circuit switching </li></ul></ul><ul><ul><li>Packet switching </li></ul></ul><ul><ul><li>Frame relay </li></ul></ul><ul><ul><li>Asynchronous Transfer Mode (ATM) </li></ul></ul>
  7. 7. CIRCUIT SWITCHING <ul><li>Dedicated communications path established for the duration of the conversation </li></ul><ul><ul><li>Data transmitted as rapid as possible </li></ul></ul><ul><ul><li>Route to outgoing channel without delay </li></ul></ul><ul><li>e.g. telephone network </li></ul>A B C D F E G I II III
  8. 8. PACKET SWITCHING <ul><li>Data sen Longer t out of sequence </li></ul><ul><ul><li>transmission – broken up into multiple packet </li></ul></ul><ul><ul><li>Stored briefly then routed according to info. in header </li></ul></ul><ul><li>Small chunks (packets) of data at a time </li></ul><ul><ul><li>Variable length block </li></ul></ul><ul><ul><li>Contains data+ header with control info. (priority codes, source & destination add.) </li></ul></ul><ul><li>Packets passed from node to node between source and destination </li></ul><ul><li>Used for terminal to computer and computer to computer communications </li></ul>
  9. 9. FRAME RELAY <ul><li>Packet switching systems have large overheads to compensate for errors </li></ul><ul><li>Variable length block </li></ul><ul><ul><li>Stored briefly then routed according to info. in header </li></ul></ul><ul><li>Modern systems are more reliable </li></ul><ul><li>Errors can be caught in end system </li></ul><ul><li>Most overhead for error control is stripped out </li></ul><ul><li>Advantage : high data rates and low error rates </li></ul><ul><ul><li>Packet Switching network : 64 kbps </li></ul></ul><ul><ul><li>Frame Relay network : up to 2 Mbps </li></ul></ul>
  10. 10. ASYNCHRONOUS TRANSFER MODE (ATM) <ul><li>ATM @ cell relay </li></ul><ul><li>Evolution of frame relay </li></ul><ul><li>Little overhead for error control </li></ul><ul><li>Fixed packet (called cell) length </li></ul><ul><li>Anything from 10Mbps to Gbps </li></ul><ul><li>Constant data rate using packet switching technique </li></ul><ul><ul><li>Stored briefly then routed according to info. in header </li></ul></ul><ul><li>Frame relay vs ATM </li></ul><ul><ul><li>Frame relay : variable-length packets called frames </li></ul></ul><ul><ul><li>ATM : fixed-length packets called cells </li></ul></ul>ATM LAN
  11. 11. LOCAL AREA NETWORKS (LAN) <ul><li>Smaller scope </li></ul><ul><ul><li>Building or small campus </li></ul></ul><ul><li>Usually owned by same organization as attached devices </li></ul><ul><li>Data rates much higher </li></ul><ul><li>Usually broadcast systems </li></ul><ul><ul><li>Transmission from one station is broadcast to and received by all other stations </li></ul></ul><ul><ul><li>Only one station at a time can transmit a packet </li></ul></ul>
  12. 12. LAN CONFIGURATIONS <ul><li>Switched </li></ul><ul><ul><li>Switched Ethernet </li></ul></ul><ul><ul><ul><li>May be single or multiple switches </li></ul></ul></ul><ul><ul><ul><li>Consist a switch with a no. of attached device(s) or no. of interconnected switches </li></ul></ul></ul><ul><ul><li>ATM LAN </li></ul></ul><ul><ul><ul><li>use an ATM network in LAN </li></ul></ul></ul><ul><ul><li>Fibre Channel </li></ul></ul><ul><li>Wireless </li></ul><ul><ul><li>Mobility </li></ul></ul><ul><ul><li>Ease of installation </li></ul></ul>
  13. 13. METROPOLITAN AREA NETWORKS <ul><li>MAN- designed to extend over an entire city </li></ul><ul><li>Middle ground between LAN and WAN </li></ul><ul><ul><li>Connecting a number of LANs </li></ul></ul><ul><li>Private or public network </li></ul><ul><li>High speed </li></ul><ul><li>Large area </li></ul>
  14. 14. 1.3 NEED FOR PROTOCOL ARCHITECTURE <ul><li>Protocol </li></ul><ul><li>Protocol Architecture </li></ul><ul><li>E.g. File transfer </li></ul><ul><ul><li>Source must activate communications path or inform network the identity of desired destination </li></ul></ul><ul><ul><li>Source must check destination is prepared to receive data or not </li></ul></ul><ul><ul><li>File transfer application on source must check destination file management system will accept and store file for his user </li></ul></ul><ul><ul><li>May need file format translation </li></ul></ul><ul><li>Task broken into subtasks </li></ul><ul><li>Implemented separately in layers in vertical stack </li></ul><ul><li>Same set of layered functions needed in both systems </li></ul><ul><li>Peer layers communicate </li></ul>Figure
  15. 15. KEY ELEMENTS OF A PROTOCOL <ul><li>Syntax </li></ul><ul><ul><li>Data formats </li></ul></ul><ul><ul><li>Signal levels </li></ul></ul><ul><li>Semantics </li></ul><ul><ul><li>Control information </li></ul></ul><ul><ul><li>Error handling </li></ul></ul><ul><li>Timing </li></ul><ul><ul><li>Speed matching </li></ul></ul><ul><ul><li>Sequencing </li></ul></ul>Structure/format of data Meaning/ interpretation of a set of bits When data should be sent + The speed of transmission Presentation Layer
  16. 16. PROTOCOL ARCHITECTURE <ul><li>Task of communication broken up into modules </li></ul><ul><li>For example file transfer could use three modules </li></ul><ul><ul><li>File transfer application </li></ul></ul><ul><ul><li>Communication service module </li></ul></ul><ul><ul><li>Network access module </li></ul></ul>
  17. 17. SIMPLIFIED FILE TRANSFER ARCHITECTURE (3) and (4) (2) (1) File transfer
  18. 18. OSI <ul><li>Open Systems Interconnection ( OSI ) </li></ul><ul><li>Developed by the International Organization for Standardization (ISO) </li></ul><ul><li>Seven layers </li></ul>
  19. 19. 1.4 OSI - THE MODEL <ul><li>A layer model </li></ul><ul><li>Each layer performs a subset of the required communication functions </li></ul><ul><li>Each layer relies on the next lower layer to perform more primitive functions </li></ul><ul><li>Each layer provides services to the next higher layer </li></ul><ul><li>Changes in one layer should not require changes in other layers </li></ul>
  20. 20. OSI LAYERS <ul><li>Application </li></ul><ul><li>Presentation </li></ul><ul><li>Session </li></ul><ul><li>Transport </li></ul><ul><li>Network </li></ul><ul><li>Data Link </li></ul><ul><li>Physical </li></ul>Can U remember layers of OSI model?
  22. 22.
  23. 23. Level 1 Level 2 Level 3 Level 4 Level 5 Level 6 Level 7 Message : Balqis Please Help Me Identify sender and intended reciever , is there an e-mail app available? Send as electrical signal over category 5 copper wiring at X volt and X Mbps Keep track of how many hops; open the shortest path first ; go to Ip address Make sure all data has arrived intact Inititate and terminate the session according to X protocol Decode data with X decoding key ; use ASCII characters Is the initial connection set up? Put data into frames according to X standard Balqis Please Help Me Identified sender and intended receiver , found available e-mail app. Send as electrical signal over category 5 copper wiring at X volt and X Mbps Keep track of how many hops; open the shortest path first ; go to Ip address Make sure all data has arrived intact Inititated and terminated the session according to X protocol Decode data with X decoding key ; used ASCII characters Initial connection is set up. Decoding data in frames according to X standard
  24. 24. 1.5 TCP/IP PROTOCOL ARCHITECTURE <ul><li>Developed by the US Defense Advanced Research Project Agency (DARPA) for its packet switched network (ARPANET) </li></ul><ul><li>Used by the global Internet </li></ul><ul><li>No official model but a working one. </li></ul><ul><ul><li>Application layer </li></ul></ul><ul><ul><li>Host to host or transport layer </li></ul></ul><ul><ul><li>Internet layer </li></ul></ul><ul><ul><li>Network access layer </li></ul></ul><ul><ul><li>Physical layer </li></ul></ul>next Corresponds to the 4 layers of OSI model Represent application, presentation, session layer in OSI model
  25. 25. OSI V TCP/IP
  27. 27. SUMMARY <ul><li>Data com. is the transfer of data from one device (eg. computer) to another using some form of transmission medium (eg. wire cable) </li></ul><ul><li>5 basic components of data com. sys. – message/data, sender, receiver, medium and protocol. </li></ul><ul><li>Networks allow shared access to info. devices </li></ul><ul><li>Protocol is a set of rules that govern data com. </li></ul>
  28. 28. SUMMARY CONT…. <ul><li>ISO created a model called OSI which allow multiple sys. to communicate. </li></ul><ul><li>7-layer OSI model provides guidelines for the development of universally compatible architecture, hardware, and software. </li></ul><ul><li>Physical, data link, and network layers – network support layers </li></ul><ul><li>Session, presentation, and application layers – user support layers </li></ul><ul><li>TCP/IP ,a 5-layer hierarchical protocol suite developed before OSI model, is the protocol suite (set) </li></ul>END!!!
  29. 29. KEY POINT PROTOCOL <ul><li>In computing, a protocol is a convention or standard that controls or enables the connection, communication, and data transfer between two computing endpoints. </li></ul><ul><li>In its simplest form, a protocol can be defined as the rules governing the communication. </li></ul><ul><li>Most protocols specify one or more of the following properties: </li></ul><ul><ul><li>How to start and end a message </li></ul></ul><ul><ul><li>How to format a message </li></ul></ul><ul><ul><li>What to do with corrupted or improperly formatted messages (error correction) </li></ul></ul><ul><ul><li>How to detect unexpected loss of the connection, and what to do next </li></ul></ul><ul><ul><li>Termination of the session or connection. </li></ul></ul><ul><ul><li>Common Protocols: </li></ul></ul><ul><ul><li>HTTP (Hyper Text Transfer Protocol) </li></ul></ul><ul><ul><li>FTP (File Transfer Protocol). </li></ul></ul><ul><ul><li>IP (Internet Protocol). </li></ul></ul><ul><li>Sample: </li></ul>
  30. 30. KEY POINT TOPIC 1.3 <ul><li>PROTOCOL ARCHITECTURE </li></ul><ul><li>A layered structure of hardware and software that supports the exchange of data between sys. and supports distributed applications, such as electronic mail and file transfer. </li></ul><ul><li>At each layer of protocol architecture, one or more common protocols are implemented in communicating sys. </li></ul><ul><ul><li>Each protocol provides a set of rules for the exchange of data between sys. </li></ul></ul><ul><li>Most widely used protocol architecture : TCP/IP protocol suite –consist physical, network access, internet, transport, and application layer. </li></ul><ul><li>Another important protocol architecture is the seven- layer OSI model. </li></ul>
  31. 31. KEY POINT TOPIC 1.4 <ul><li>Open system </li></ul><ul><ul><li>Model that allows any two different sys. to communicate regardless of their underlying architecture. </li></ul></ul><ul><li>Purpose of OSI model </li></ul><ul><ul><li>To open communication between different sys. without requiring changes to the logic of the underlying hardware and software. </li></ul></ul>
  32. 32. KEY POINT TOPIC 1.4 -2 <ul><li>Please Do Not Touch Steve’s Pet Alligator ! </li></ul><ul><li>( P hysical, D ata Link, N etwork, T ransport, </li></ul><ul><li>S ession, P resentation, A pplication) !! </li></ul>
  33. 33. <ul><li>At the receiving node, the layered process that sent the message </li></ul><ul><li>on its way is reversed. </li></ul><ul><li>The physical layer recalculates the checksum, confirms arrival, and logs in packets. </li></ul><ul><li>The network layer recounts incoming packets for security. </li></ul><ul><li>The transport layer recalculates the checksum and reassembles the message segments. </li></ul><ul><li>The session layer holds the parts of the message until it is complete and sends it to the next layer. </li></ul><ul><li>The presentation layer decrypts, expands, and translates the message. </li></ul><ul><li>The application layer identifies the recipient, converts the bits into readable characters, and directs the data to the correct application. </li></ul>
  34. 34. INTERMEDIATE NODES An intermediate node calculates and verifies the checksum for each packet. A router might also reroute the message to avoid congestion on the network.
  35. 35. PHYSICAL LAYER The physical layer encodes the packets into the medium that will carry them – such as an analog signal, if the message is going across a telephone line – and sends the packets along that medium.
  36. 36. PHYSICAL LAYER <ul><li>Provide means for bits to be transmitted across physical com. path. </li></ul><ul><li>Defines the electrical and mechanical requirement of com. sys. </li></ul><ul><ul><li>Eg. Type of cable to be used, type of connectors to be employed, the bit rate(s) and signal levels to be used. </li></ul></ul><ul><li>Defines topology of network </li></ul><ul><ul><li>Eg. Bus or ring </li></ul></ul>
  37. 37. DATA-LINK LAYER The data-link layer supervises the transmission. It confirms the checksum, and then addresses and duplicates the packets. This layer keeps a copy of each packet until it receives confirmation from the next point along the route that the packet has arrived undamaged.
  38. 38. DATA-LINK LAYER <ul><li>Divides the stream of bits received from network layer into frames. </li></ul><ul><li>If frames are to be distributed to diff. sys. on network, it adds a header to frame the physical add .(on the same network) of sender and receiver. </li></ul><ul><li>To control the flow of data rate, not to overwhelm receiver. </li></ul><ul><li>Adding mechanisms to detect and retransmit damage or lost frames. </li></ul><ul><li>If >2 devices are connected, it determines which device has control over the link(network(s)) at any given time. </li></ul>
  39. 39. NETWORK LAYER The network layer selects a route for the message. It forms segments into packets, counts them, and adds a header containing the sequence of packets and the receiving computer.
  40. 40. NETWORK LAYER <ul><li>Responsible for the source-to-destination delivery of a packet possible across multiple network(links) </li></ul><ul><li>Not necessary for 2 sys. in the same network/link. </li></ul><ul><li>Adding logical add. (on different network/link) of sender and receiver. </li></ul><ul><li>Provide routing </li></ul><ul><ul><li>When independent networks or links are connected together to create an internetwork (a network of networks) /a large network, the connecting devices(called routers/gateways ) route the packets to their final destination. </li></ul></ul>
  41. 41. TRANSPORT LAYER The transport layer protects the data being sent. It subdivides the data into segments and creates checksum tests- mathematical sums based on the contents of data- that can be used later to determine whether the data was scrambled. It also makes backup copies of the data. The transport header identifies each segment’s checksum and its position in the message
  42. 42. TRANSPORT LAYER <ul><li>Responsible for source-to-destination (end-to-end) delivery of the entire message. </li></ul><ul><ul><li>Network layer oversees end-to-end delivery of individual packet </li></ul></ul><ul><li>Ensure that the whole message arrives intact in order </li></ul><ul><li>Adding port add./ service-point add . (process (running prog.) add.) of sender and receiver. </li></ul><ul><li>Ensures frames arrive at the destination in their correct order </li></ul><ul><li>Provide end-to-end correction and data flow. </li></ul>
  43. 43. SESSION LAYER The session layer opens communications. It sets boundaries (called brackets) for the beginning and end of the message and establishes whether the message will be sent half duplex , with each computer taking turns sending and receiving, or full duplex , with both computers sending and receiving at the same time. The details of these decisions are placed into a session header.
  44. 44. SESSION LAYER <ul><li>Handles logon and logoff procedures and then it established, and later clear down, the connection between two terminals. </li></ul><ul><li>Controls the transfer of messages over network and overall error detection. </li></ul><ul><li>Controls how a message starts and finishes. </li></ul>
  45. 45. PRESENTATION LAYER The presentation layer translates the message into a language that the receiving computer can understand (often ASCII, a way of encoding text as bits). This layer also compresses and perhaps encrypts the data. It adds another header specifying the language as well as the compression and encryption schemes.
  46. 46. PRESENTATION LAYER <ul><li>Concerned with the syntax and semantics of the info. exchange between two sys. </li></ul><ul><li>To translate, encrypt, and compress data </li></ul>
  47. 47. APPLICATION LAYER For a message, file, or any other data to travel through a network, it must pass through several layers, all designed to make sure the data gets through intact and accurate. The first layer, the application layer, is the only part of the process a user sees, and even then the user doesn’t see most of the work the application does to prepare a message for sending over a network. The layer converts a message’s data into bits and attaches a header identifying the sending and receiving computers.
  48. 48. APPLICATION LAYER <ul><li>Enables the user,whether human or software, to access the network </li></ul><ul><li>Provides user interfaces and support for services </li></ul><ul><ul><li>Eg. E-mail, remote file access and transfer, shared database management etc. </li></ul></ul><ul><li>Allows user to log on to a remote host </li></ul><ul><li>Allows user to access files in remote computer (change/read data), retrieve files from a remote comp., manage/control files in a remote comp. </li></ul><ul><li>Provide the basis for e-mail forwarding and storage </li></ul><ul><li>Provides distributed database sources and access for global info. about various abject and services. </li></ul>
  49. 49. ROUTERS <ul><li>A processor that connects 2 networks </li></ul><ul><li>Primary function is to relay data from 1 network to the other on its route from the source to the destination end sys. </li></ul>
  50. 50. SMTP( SIMPLE MAIL TRANSFER PROTOCOL ) <ul><li>The TCP/IP protocol that specifies the process of management in the Internet </li></ul><ul><li>An application service for retrieving a web document </li></ul>http ( Hypertext Transfer Protocol )
  51. 51. INTRO <ul><li>Data com. : transfer of data from one device to another via some form of transmission medium ( perantaraan ) </li></ul><ul><li>How people share data info? </li></ul><ul><ul><li>1970s- data wrote in tape  receiver’s comp. by armored car/airplane -1x/week </li></ul></ul><ul><ul><li>Data  floppy disk  reload onto comp. </li></ul></ul><ul><ul><ul><li>Time consuming, errors, size lim., virus </li></ul></ul></ul><ul><ul><li>Connecting PC  comp. network (comp. can talk to each other) </li></ul></ul>Isn't it amazing???
  52. 52. INTRO (2) <ul><li>Why did U choose to learn about computer? </li></ul><ul><li>Isn’t it amazing that data/instructions in computers ONLY using 0s and 1s??? </li></ul><ul><li>Isn’t it amazing that INTERNET works without actually ANYONE manages it? </li></ul><ul><li>Isn’t it amazing that the message (e-mail with moving char!) you sent your mother could reach her just like what you sent from your computer in just a few minutes? </li></ul>Isn't it amazing???
  53. 53. THE LITTLE NET THAT GREW.. <ul><li>1957-Soviet Union launched 1 st satellite, Sputnik </li></ul><ul><li>Advanced Research Projects Agency (ARPA) to get the U.S into space. </li></ul><ul><li>Role was replaced by NASA,and ARPA sponsor of advanced research projects at univ. and contractor. </li></ul><ul><li>1960-Paul Baran wrote paper to Pentagon of impact in case of Soviet nuclear attack. </li></ul><ul><ul><li>Military command ,messages signals should be carried over a distributed network. </li></ul></ul><ul><ul><li>Break message into blocks, send separately over network. </li></ul></ul>
  54. 54. THE LITTLE NET THAT GREW… <ul><li>1967-ARPA looking for a way its member to distribute messages, data for research. </li></ul><ul><li>1969-ARPAnet (distributed network), build interface message processor (IMP), which connected comp. at univ. research centers. </li></ul><ul><li>Incorporated a tech. called TCP/IP (transmission control protocol/Internet protocol) developed at National Science Foundation (NCF). </li></ul><ul><li>1969- computers at univ. all over US were linked to ARPAnet. </li></ul><ul><li>First letter –”L” </li></ul>
  55. 55. THE LITTLE NET THAT GREW! <ul><li>1972- ARPAnet connected 23 host sites. </li></ul><ul><li>By 1975, one new installation/month. </li></ul><ul><li>CSNET(Computer Science Network) was designed, cheaper than ARPAnet. </li></ul><ul><li>1974- Bob Kahn and Vint Cerf came up with idea “network of networks”-let dissimilar networks communicate with one another. </li></ul><ul><li>By 1982, diff. networks adopting TCP/IP as comm. standard – “Internet” </li></ul>
  56. 56. THE LITTLE NET THAT GREW….. <ul><li>For years, Internet was the territory of colleges and defense contractors. </li></ul><ul><li>1991- NSF lifted restrictions on the commercial use of the Net. </li></ul><ul><li>People sent out advertising over Internet-spam </li></ul><ul><li>World Wide Web – txt-only origins  world of graphics, sound and video. </li></ul>