SlideShare a Scribd company logo
1 of 66
Download to read offline
CS303: Computer Networks
(V Sem)
Unit-1
Dr. Sadhvi
Assistant Professor
Indian Institute of Information Technology Dharwad
Acknowledgement
● The contents of the slides are mostly taken from:
○ “Data Communications and Networking”, Fourth edition,
Behrouz Forouzan - McGraw-Hill, 2007.
● Other contents are taken from:
○ "Computer Networking: a Top-Down Approach”, Eighth
edition, J.F. Kurose, K.W. Ross - Pearson, 2020.
○ Other Internet sources.
Evaluation Scheme
● Assignment/Class Test: 20%
● Mid Sem Exam: 25%
● End Sem Exam: 35%
● Lab Exam & Viva: 20%
Introduction
DATA
COMMUNICATIONS
• The term telecommunication means communication
at a distance.
• The word data refers to information presented in
whatever form is agreed upon by the parties creating
and using the data.
• Data communications is the exchange of data between
two devices via some form of transmission medium
such as a wire cable.
▪ Components of a data communications system
▪ Data Flow
Topics discussed in this section:
Figure 1.1 Components of a data communication system
Figure 1.2 Data flow (simplex, half-duplex, and full-duplex)
NETWORKS
• A network is a set of devices (often referred to as
nodes) connected by communication links.
• A node can be a computer, printer, or any other device
capable of sending and/or receiving data generated by
other nodes on the network.
• A link can be a cable, air, optical fiber, or any
medium which can transport a signal carrying
information.
▪ Network Criteria
▪ Physical Structures
▪ Categories of Networks
Topics discussed in this section:
Network Criteria
■ Performance
■ Depends on Network Elements
■ Measured in terms of Delay and Throughput
■ Reliability
■ Failure rate of network components
■ Measured in terms of availability/robustness
■ Security
■ Data protection against corruption/loss of data due to:
■ Errors
■ Malicious users
Physical Structures
■ Type of Connection
■ Point to Point - single transmitter and receiver
■ Multipoint - multiple recipients of single transmission
■ Physical Topology
■ Connection of devices
■ Type of transmission - unicast, mulitcast, broadcast
Figure 1.3 Types of connections: point-to-point and multipoint
Figure 1.4 Categories of topology
Figure 1.5 A fully connected mesh topology (five devices)
Advantages:
1.Eliminate traffic problems
2.Robust
3.Privacy and Security is
maintained
4.Fault identification and fault
isolation is easy
Disadvantages:
1.Amount of cabling
2.Number of I/O ports
Figure 1.6 A star topology connecting four stations
Advantages:
1.Less cabling and less I/O ports
required
2.Easy to install and configure
3.Fault identification and fault
isolation is easy
Disadvantages:
1.Single point of failure
Figure 1.7 A bus topology connecting three stations
Advantages:
1.Ease of installation
2.Less cabling
Disadvantages:
1.Fault isolation is difficult
2.Limited number of devices can be
connected
3.Fault or break in the bus cable stops
all transmission
Figure 1.8 A ring topology connecting six stations
Advantages:
1.Easy to install and configure
2.Fault isolation is simplified
Disadvantages:
1.Unidirectional traffic
Figure 1.9 A hybrid topology: a star backbone with three bus networks
Categories of Networks
■ Local Area Networks (LANs)
■ Short distances
■ Designed to provide local interconnectivity
■ Wide Area Networks (WANs)
■ Long distances
■ Provide connectivity over large areas
■ Metropolitan Area Networks (MANs)
■ Provide connectivity over areas such as a city, a campus
Figure 1.10 An isolated LAN connecting 12 computers to a hub in a closet
Figure 1.11 WANs: a switched WAN and a point-to-point WAN
Figure 1.12 A heterogeneous network made of four WANs and two LANs
PROTOCOLS
• A protocol is synonymous with rule.
• It consists of a set of rules that govern data
communications.
• It determines what is communicated, how it is
communicated and when it is communicated.
• The key elements of a protocol are syntax, semantics
and timing
▪ Syntax
▪ Semantics
▪ Timing
Topics discussed in this section:
Elements of a Protocol
■ Syntax
■ Structure or format of the data
■ Indicates how to read the bits - field delineation
■ Semantics
■ Interprets the meaning of the bits
■ Knows which fields define what action
■ Timing
■ When data should be sent and
■ Speed at which data should be sent or speed at which it is being
received.
LAYERED
TASKS
• We use the concept of layers in our daily life.
• For example, consider two friends who communicate
through postal mail.
• The process of sending a letter to a friend would be
complex if there were no services available from the
post office.
Sender, Receiver, and Carrier
Hierarchy
Topics discussed in this section:
Figure 2.1 Tasks involved in sending a letter
THE OSI MODEL
• Established in 1947, the International Standards
Organization (ISO) is a multinational body dedicated
to worldwide agreement on international standards.
• An ISO standard that covers all aspects of network
communications is the Open Systems Interconnection
(OSI) model. It was first introduced in the late 1970s.
Layered Architecture
Peer-to-Peer Processes
Encapsulation
Topics discussed in this section:
ISO is the organization.
OSI is the model.
Note
Figure 2.2 Seven layers of the OSI model
Figure 2.3 The interaction between layers in the OSI model
Figure 2.4 An exchange using the OSI model
LAYERS IN THE OSI MODEL
• In this section, we briefly describe the functions of
each layer in the OSI model.
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Topics discussed in this section:
Figure 2.5 Physical layer
The physical layer is responsible for movements of
individual bits from one hop (node) to the next.
Note
Figure 2.6 Data link layer
• The data link layer is responsible for moving frames from
one hop (node) to the next.
• Error detection and correction
• Flow control
• Ensuring well-defined reliable service interface to the
network layer
• Encapsulating packets from network layer to frames
Note
Figure 2.7 Hop-to-hop delivery
Figure 2.8 Network layer
• The network layer is responsible for the delivery of
individual packets from the source host to the destination
host.
• Logical addressing
• Routing
Note
Figure 2.9 Source-to-destination delivery
Figure 2.10 Transport layer
• The transport layer is responsible for the delivery of a message
from one process to another.
• Service-point addressing
• Segmentation and reassembly
• Connection control (Connectionless or connection oriented)
• Error control - Transmission error detection
• Flow Control
Note
Figure 2.11 Reliable process-to-process delivery of a message
Figure 2.12 Session layer
• The session layer is responsible for dialog control and
synchronization.
• Connection parameter negotiations
• Acknowledgement of data received during a session
• Retransmission of data if it is not received by a device
Note
Figure 2.13 Presentation layer
The presentation layer is responsible for
•Content translation
•Graphics formatting
•Compression and expansion of message
•Encryption and decryption of message for security
Note
Figure 2.14 Application layer
The application layer is responsible for providing services to
the user.
•Electronic mail
•File transfers
•Electronic messaging
•Browsing the World Wide Web
•Printing over the network
Note
Figure 2.15 Summary of layers
TCP/IP PROTOCOL SUITE
• The layers in the TCP/IP protocol suite do not exactly
match those in the OSI model.
• The original TCP/IP protocol suite was defined as having
four layers: host-to-network, internet, transport, and
application.
• However, when TCP/IP is compared to OSI, we can say
that the TCP/IP protocol suite is made of five layers:
physical, data link, network, transport, and application.
Physical and Data Link Layers
Network Layer
Transport Layer
Application Layer
Topics discussed in this section:
Figure 2.16 TCP/IP and OSI model
ADDRESSING
• Four levels of addresses are used in an internet
employing the TCP/IP protocols: physical, logical, port,
and specific.
Physical Addresses
Logical Addresses
Port Addresses
Specific Addresses
Topics discussed in this section:
Figure 2.17 Addresses in TCP/IP
Figure 2.18 Relationship of layers and addresses in TCP/IP
• The physical address, also known as the link address, is the
address of a node as defined by its LAN or WAN.
• It is included in the frame used by the data link layer. It is the
lowest-level address.
• The physical addresses have authority over the network (LAN
or WAN).
• For example, Ethernet uses a 6-byte (48-bit) physical address
that is imprinted on the network interface card (NIC).
Physical Addresses
A node with physical address 10 sends a frame to a node
with physical address 87. The two nodes are connected
by a link (bus topology LAN).
Example 2.1 Physical addresses
Most local-area networks use a 48-bit (6-byte) physical
address written as 12 hexadecimal digits; every byte (2
hexadecimal digits) is separated by a colon, as shown
below:
Example 2.2
07:01:02:01:2C:4B
A 6-byte (12 hexadecimal digits) physical address.
• Logical addresses are necessary for universal communications
that are independent of underlying physical networks.
• Physical addresses are not adequate in an internetwork
environment where different networks can have different address
formats universal addressing system is needed.
• Therefore logical addresses A logical address in the Internet is
currently a 32-bit address that can uniquely define a host
connected to the Internet.
• No two publicly addressed and visible hosts on the Internet can
have the same IP address.
Logical Addresses
Figure 2.20 shows a part of an internet with two routers
connecting three LANs. Each device (computer or router) has a
pair of addresses (logical and physical) for each connection. In
this case, each computer is connected to only one link and
therefore has only one pair of addresses. Each router, however, is
connected to three networks (only two are shown in the figure). So
each router has three pairs of addresses, one for each connection.
Example 2.3
Figure 2.20 IP addresses
• The IP address and the physical address are necessary. However,
arrival of the data at the destination is not the final objective.
• Today, computers can run multiple processes at the same time
target process to process communication.
• For example, computer A can communicate with computer C by using
TELNET. At the same time, computer A communicates with computer B by
using the File Transfer Protocol (FTP). For these processes to receive data
simultaneously, we need a method to label the different processes.
• In other words, they need addresses. In the TCP/IP, a 16-bit label,
called as port address, is assigned to the processes.
Port Addresses
Figure 2.21 shows two computers communicating via the Internet.
The sending computer is running three processes at this time with
port addresses a, b, and c. The receiving computer is running two
processes at this time with port addresses j and k.
Process a in the sending computer needs to communicate with
process j in the receiving computer. Note that although physical
addresses change from hop to hop, logical and port addresses
remain the same from the source to destination.
Example 2.4
Figure 2.21 Port addresses
The physical addresses will change from hop to hop,
but the logical addresses usually remain the same.
Note
• Some applications have user-friendly addresses that are designed
for that specific address.
• Examples include the e-mail address (for example, xyz@abc.edu)
and the Universal Resource Locator (URL) (for example,
www.facebook.com).
• The first defines the recipient of an e-mail and the second is used
to find a document on the World Wide Web.
Specific Addresses
Example 2.5
A port address is a 16-bit address represented by one
decimal number as shown.
80
A 16-bit port address represented
as one single number.

More Related Content

Similar to CS303: Computer Networks (V Sem) Unit-1 Overview

Similar to CS303: Computer Networks (V Sem) Unit-1 Overview (20)

Networking lecture1
Networking lecture1Networking lecture1
Networking lecture1
 
CCNA ppt Day 2
CCNA ppt Day 2CCNA ppt Day 2
CCNA ppt Day 2
 
Sept 2017 network standards and models
Sept 2017   network standards and modelsSept 2017   network standards and models
Sept 2017 network standards and models
 
CN Unit-1 PPT.pptx
CN Unit-1 PPT.pptxCN Unit-1 PPT.pptx
CN Unit-1 PPT.pptx
 
networking
networking networking
networking
 
Pankaj YADAV
Pankaj YADAVPankaj YADAV
Pankaj YADAV
 
Iso layer detail
Iso layer detailIso layer detail
Iso layer detail
 
Networking (osi model)
Networking (osi model)Networking (osi model)
Networking (osi model)
 
Cisco ccna certification knowledge to pass the exam
Cisco ccna certification knowledge to pass the examCisco ccna certification knowledge to pass the exam
Cisco ccna certification knowledge to pass the exam
 
OSI model.pptx
OSI model.pptxOSI model.pptx
OSI model.pptx
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
 
Iso osi
Iso osiIso osi
Iso osi
 
Iso osi
Iso osiIso osi
Iso osi
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
 
Paper id 36201527
Paper id 36201527Paper id 36201527
Paper id 36201527
 
OSI model (7 LAYER )
OSI model (7 LAYER )OSI model (7 LAYER )
OSI model (7 LAYER )
 
Lecture 1.ppt
Lecture 1.pptLecture 1.ppt
Lecture 1.ppt
 
3131471Scanned.ppt
3131471Scanned.ppt3131471Scanned.ppt
3131471Scanned.ppt
 
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
PST SC015 Chapter 3 Internet Technology (I)  2017/2018PST SC015 Chapter 3 Internet Technology (I)  2017/2018
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 

CS303: Computer Networks (V Sem) Unit-1 Overview

  • 1. CS303: Computer Networks (V Sem) Unit-1 Dr. Sadhvi Assistant Professor Indian Institute of Information Technology Dharwad
  • 2. Acknowledgement ● The contents of the slides are mostly taken from: ○ “Data Communications and Networking”, Fourth edition, Behrouz Forouzan - McGraw-Hill, 2007. ● Other contents are taken from: ○ "Computer Networking: a Top-Down Approach”, Eighth edition, J.F. Kurose, K.W. Ross - Pearson, 2020. ○ Other Internet sources.
  • 3. Evaluation Scheme ● Assignment/Class Test: 20% ● Mid Sem Exam: 25% ● End Sem Exam: 35% ● Lab Exam & Viva: 20%
  • 5. DATA COMMUNICATIONS • The term telecommunication means communication at a distance. • The word data refers to information presented in whatever form is agreed upon by the parties creating and using the data. • Data communications is the exchange of data between two devices via some form of transmission medium such as a wire cable. ▪ Components of a data communications system ▪ Data Flow Topics discussed in this section:
  • 6. Figure 1.1 Components of a data communication system
  • 7. Figure 1.2 Data flow (simplex, half-duplex, and full-duplex)
  • 8. NETWORKS • A network is a set of devices (often referred to as nodes) connected by communication links. • A node can be a computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the network. • A link can be a cable, air, optical fiber, or any medium which can transport a signal carrying information. ▪ Network Criteria ▪ Physical Structures ▪ Categories of Networks Topics discussed in this section:
  • 9. Network Criteria ■ Performance ■ Depends on Network Elements ■ Measured in terms of Delay and Throughput ■ Reliability ■ Failure rate of network components ■ Measured in terms of availability/robustness ■ Security ■ Data protection against corruption/loss of data due to: ■ Errors ■ Malicious users
  • 10. Physical Structures ■ Type of Connection ■ Point to Point - single transmitter and receiver ■ Multipoint - multiple recipients of single transmission ■ Physical Topology ■ Connection of devices ■ Type of transmission - unicast, mulitcast, broadcast
  • 11. Figure 1.3 Types of connections: point-to-point and multipoint
  • 12. Figure 1.4 Categories of topology
  • 13. Figure 1.5 A fully connected mesh topology (five devices) Advantages: 1.Eliminate traffic problems 2.Robust 3.Privacy and Security is maintained 4.Fault identification and fault isolation is easy Disadvantages: 1.Amount of cabling 2.Number of I/O ports
  • 14. Figure 1.6 A star topology connecting four stations Advantages: 1.Less cabling and less I/O ports required 2.Easy to install and configure 3.Fault identification and fault isolation is easy Disadvantages: 1.Single point of failure
  • 15. Figure 1.7 A bus topology connecting three stations Advantages: 1.Ease of installation 2.Less cabling Disadvantages: 1.Fault isolation is difficult 2.Limited number of devices can be connected 3.Fault or break in the bus cable stops all transmission
  • 16. Figure 1.8 A ring topology connecting six stations Advantages: 1.Easy to install and configure 2.Fault isolation is simplified Disadvantages: 1.Unidirectional traffic
  • 17. Figure 1.9 A hybrid topology: a star backbone with three bus networks
  • 18. Categories of Networks ■ Local Area Networks (LANs) ■ Short distances ■ Designed to provide local interconnectivity ■ Wide Area Networks (WANs) ■ Long distances ■ Provide connectivity over large areas ■ Metropolitan Area Networks (MANs) ■ Provide connectivity over areas such as a city, a campus
  • 19. Figure 1.10 An isolated LAN connecting 12 computers to a hub in a closet
  • 20. Figure 1.11 WANs: a switched WAN and a point-to-point WAN
  • 21. Figure 1.12 A heterogeneous network made of four WANs and two LANs
  • 22. PROTOCOLS • A protocol is synonymous with rule. • It consists of a set of rules that govern data communications. • It determines what is communicated, how it is communicated and when it is communicated. • The key elements of a protocol are syntax, semantics and timing ▪ Syntax ▪ Semantics ▪ Timing Topics discussed in this section:
  • 23. Elements of a Protocol ■ Syntax ■ Structure or format of the data ■ Indicates how to read the bits - field delineation ■ Semantics ■ Interprets the meaning of the bits ■ Knows which fields define what action ■ Timing ■ When data should be sent and ■ Speed at which data should be sent or speed at which it is being received.
  • 24. LAYERED TASKS • We use the concept of layers in our daily life. • For example, consider two friends who communicate through postal mail. • The process of sending a letter to a friend would be complex if there were no services available from the post office. Sender, Receiver, and Carrier Hierarchy Topics discussed in this section:
  • 25. Figure 2.1 Tasks involved in sending a letter
  • 26. THE OSI MODEL • Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. • An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model. It was first introduced in the late 1970s. Layered Architecture Peer-to-Peer Processes Encapsulation Topics discussed in this section:
  • 27. ISO is the organization. OSI is the model. Note
  • 28. Figure 2.2 Seven layers of the OSI model
  • 29. Figure 2.3 The interaction between layers in the OSI model
  • 30. Figure 2.4 An exchange using the OSI model
  • 31. LAYERS IN THE OSI MODEL • In this section, we briefly describe the functions of each layer in the OSI model. Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer Topics discussed in this section:
  • 33. The physical layer is responsible for movements of individual bits from one hop (node) to the next. Note
  • 34. Figure 2.6 Data link layer
  • 35. • The data link layer is responsible for moving frames from one hop (node) to the next. • Error detection and correction • Flow control • Ensuring well-defined reliable service interface to the network layer • Encapsulating packets from network layer to frames Note
  • 38. • The network layer is responsible for the delivery of individual packets from the source host to the destination host. • Logical addressing • Routing Note
  • 41. • The transport layer is responsible for the delivery of a message from one process to another. • Service-point addressing • Segmentation and reassembly • Connection control (Connectionless or connection oriented) • Error control - Transmission error detection • Flow Control Note
  • 42. Figure 2.11 Reliable process-to-process delivery of a message
  • 44. • The session layer is responsible for dialog control and synchronization. • Connection parameter negotiations • Acknowledgement of data received during a session • Retransmission of data if it is not received by a device Note
  • 46. The presentation layer is responsible for •Content translation •Graphics formatting •Compression and expansion of message •Encryption and decryption of message for security Note
  • 48. The application layer is responsible for providing services to the user. •Electronic mail •File transfers •Electronic messaging •Browsing the World Wide Web •Printing over the network Note
  • 49. Figure 2.15 Summary of layers
  • 50. TCP/IP PROTOCOL SUITE • The layers in the TCP/IP protocol suite do not exactly match those in the OSI model. • The original TCP/IP protocol suite was defined as having four layers: host-to-network, internet, transport, and application. • However, when TCP/IP is compared to OSI, we can say that the TCP/IP protocol suite is made of five layers: physical, data link, network, transport, and application. Physical and Data Link Layers Network Layer Transport Layer Application Layer Topics discussed in this section:
  • 51. Figure 2.16 TCP/IP and OSI model
  • 52. ADDRESSING • Four levels of addresses are used in an internet employing the TCP/IP protocols: physical, logical, port, and specific. Physical Addresses Logical Addresses Port Addresses Specific Addresses Topics discussed in this section:
  • 54. Figure 2.18 Relationship of layers and addresses in TCP/IP
  • 55. • The physical address, also known as the link address, is the address of a node as defined by its LAN or WAN. • It is included in the frame used by the data link layer. It is the lowest-level address. • The physical addresses have authority over the network (LAN or WAN). • For example, Ethernet uses a 6-byte (48-bit) physical address that is imprinted on the network interface card (NIC). Physical Addresses
  • 56. A node with physical address 10 sends a frame to a node with physical address 87. The two nodes are connected by a link (bus topology LAN). Example 2.1 Physical addresses
  • 57. Most local-area networks use a 48-bit (6-byte) physical address written as 12 hexadecimal digits; every byte (2 hexadecimal digits) is separated by a colon, as shown below: Example 2.2 07:01:02:01:2C:4B A 6-byte (12 hexadecimal digits) physical address.
  • 58. • Logical addresses are necessary for universal communications that are independent of underlying physical networks. • Physical addresses are not adequate in an internetwork environment where different networks can have different address formats universal addressing system is needed. • Therefore logical addresses A logical address in the Internet is currently a 32-bit address that can uniquely define a host connected to the Internet. • No two publicly addressed and visible hosts on the Internet can have the same IP address. Logical Addresses
  • 59. Figure 2.20 shows a part of an internet with two routers connecting three LANs. Each device (computer or router) has a pair of addresses (logical and physical) for each connection. In this case, each computer is connected to only one link and therefore has only one pair of addresses. Each router, however, is connected to three networks (only two are shown in the figure). So each router has three pairs of addresses, one for each connection. Example 2.3
  • 60. Figure 2.20 IP addresses
  • 61. • The IP address and the physical address are necessary. However, arrival of the data at the destination is not the final objective. • Today, computers can run multiple processes at the same time target process to process communication. • For example, computer A can communicate with computer C by using TELNET. At the same time, computer A communicates with computer B by using the File Transfer Protocol (FTP). For these processes to receive data simultaneously, we need a method to label the different processes. • In other words, they need addresses. In the TCP/IP, a 16-bit label, called as port address, is assigned to the processes. Port Addresses
  • 62. Figure 2.21 shows two computers communicating via the Internet. The sending computer is running three processes at this time with port addresses a, b, and c. The receiving computer is running two processes at this time with port addresses j and k. Process a in the sending computer needs to communicate with process j in the receiving computer. Note that although physical addresses change from hop to hop, logical and port addresses remain the same from the source to destination. Example 2.4
  • 63. Figure 2.21 Port addresses
  • 64. The physical addresses will change from hop to hop, but the logical addresses usually remain the same. Note
  • 65. • Some applications have user-friendly addresses that are designed for that specific address. • Examples include the e-mail address (for example, xyz@abc.edu) and the Universal Resource Locator (URL) (for example, www.facebook.com). • The first defines the recipient of an e-mail and the second is used to find a document on the World Wide Web. Specific Addresses
  • 66. Example 2.5 A port address is a 16-bit address represented by one decimal number as shown. 80 A 16-bit port address represented as one single number.