SlideShare a Scribd company logo
1 of 28
Data Communications & Networking
                      Lecture-04


            Course Instructor : Sehrish Rafiq
            Department Of Computer Science
                     University Of Peshawar
Lecture overview
 Categories of Networks
 Internetworks
 An overview of the communication tasks
 Protocol Architecture
 Characteristics of a protocol
Categories of Networks




 In to which category a network falls is determined by its size, its
  ownership, the distance it covers and its physical architecture.
LAN(Local Area Network)
 A local Area network is usually privately owned and links the
  devices in a single office, building or campus.
 LAN size is limited to a few kilometers.
 LAN’s are designed to allow resources to be shared between
  personal computers or work stations.
 In addition to size LAN are distinguished from other types of
  networks by their transmission media and topology.
 Most common topologies:Bus,Ring & Star.
LAN(Local Area Network)
MAN(Metropolitan Area Network)
 A MAN is designed to extend over an entire city.


 It may be a single network such as cable television network or it
  may be a means of connecting a number of connecting a number
  of LANs in to a larger network so that resources may be shared
  LAN-to-LAN.

 A MAN may be wholly owned and operated by a private company
  such as local telephone company.
MAN(Metropolitan Area
     Network)
WAN(Wide Area Network)
 A WAN provides long distance transmission of voice, data, image
  and video information over large geographic areas that may
  comprise a country, a continent or even the whole world.

 WANs may utilize public, leased or private communication devices
  usually in communications and can therefore span an unlimited
  number of miles.

 A WAN that is wholly owned and used by a single company is often
  referred to as enterprise network.
WAN(Wide Area Network)
Internetworks
 When two or more networks are connected, they became an
  internetwork or internet.

 The Internet from “I” is a Wide area network while the
  internet from “i” refers to the interconnection of networks.

 Internet can be thought as internet but the reverse is not
  necessarily true.
History of Internet
   1960,A project of ARPA of US department of
    Defense
   Stanford Research Institute
   University of California at Los Angeles
   University of California at Santa Barbara
   University of Utah
   Features
   Redundant lines
   Decentralized Computing
   1980, NSF and other Government agencies
   1991,Commercial traffic
   April 1995,US government action
   2000,30 million users on 10 million
    computers,240000 networks, 100 countries
   Monthly growth
Communication Tasks
 Transmission System utilization
 Interfacing
 Signal generation
 Synchronization
 Exchange Management
 Error Detection & Correction
 Flow Control
 Addressing
 Routing
 Recovery
 Message formatting
 Security
 Network Management
Transmission System utilization
 Transmission System utilization refers to the need to make
  efficient use of transmission facilities that are typically shared
  among a number of communicating devices.
 Various techniques (referred to as multiplexing) are used to
  allocate the total capacity of a transmission medium among a
  number of users.
 Congestion Control techniques may be required to assure that the
  system is not overwhelmed by excessive demand for transmission
  services.
Interfacing & Signal generation

 To communicate a device must interface with the transmission
  system.
 Once an interface is established, signal generation is required for
  communication.
 The properties of the signal such as form and intensity must be
  such that they are:
 capable of being propagated through the transmission system
 Interpretable as data at the receiver.
Synchronization
 Not only must the signals be generated to confirm to the
  requirements of the transmission system and receiver, but there
  must be some form of synchronization between transmitter and
  receiver.
Exchange Management
 If data are to be exchanged in both directions over a period of
  time, the two parties must cooperate. e.g. Telephone.

 For data processing devices more will be done than simply
  establishing a connection, certain conventions must be decided
  upon.

 These conventions may include whether both devices may
  transmit simultaneously or must take turns, the amount of data to
  be sent at one time, the format of the data and what to do if
  certain contingencies such as an error arise.
Error Detection and Correction
 Error detection and correction are required in circumstances
  where errors cannot be tolerated.

 This is usually the case with data processing systems.


 For example in transferring a file from one computer to another it
  is simply not acceptable for the contents of the file to be
  accidentally altered.
Flow Control
 Flow Control is required to assure that the source does not
  overwhelm the destination by sending data faster than they can be
  processed and absorbed.
Addressing and routing
 When a transmission facility is shared by more than two devices,
  the source system must indicate the identity of the intended
  destination.

 The transmission system must assure that the destination system
  and only that system receives the data.

 Further the transmission system may itself be a network through
  which various paths may be taken.

 A specific route through this network must be chosen.
Recovery
 Recovery techniques are needed in situations in which an
  information exchange ,such as a database transaction or file
  transfer, is interrupted due to a fault somewhere in the system.

 The objective is either to be able to resume activity at the point of
  interruption or atleast to restore the state of systems involved to
  the condition prior to the beginning of exchange.
Message formatting
Message formatting has to do with an agreement between
  two parties as to the form and format of the data to be
  exchanged or transmitted, such as the binary code for
  characters.
Security
 The sender of data may wish to be assured that only the intended
  receiver actually receives the data.

 And the receiver of the data may wish to be assured that the
  received data have not been altered in transit and the data actually
  come from the purported sender.
Network Management
Finally, a data communication facility is a complex system
  that cannot create or run itself.

Network Management capabilities are needed to configure
  the system, monitor its status, react to failures and overloads
  and plan intelligently for future growth.
Protocol Architecture
Instead of implementing the logic for communication
  between two computers as a single module, the task is
  broken up in to subtasks, each of which is implemented
  separately as a structured set of modules.

That structure is referred to as a protocol architecture.
A Simplified Architecture for File
                      Transfer

 Computer Y                                                    Computer Z
                        Files and File Transfer Commands
File Transfer                                                 File Transfer
Application                                                   Application
Communication             Communications-related data units   Communication
service module                                                service module
Network access                                                Network access
module                           Communic
                                  Communic                    module
                                   ations
                                    ations
                                  Network
                                   Network
            Network Interface                  Network Interface
            Logic                              Logic
Characteristics of a Protocol
Direct/Indirect
Monolithic/Structured
Symmetric / Asymmetric
Standard / Non Standard
Suggested Readings
Section 1.1,Section 1.4, Section 2.1 of Data and computer
 communications sixth edition by william stallings
Section 2.4 Categories of networks Data communications
 and networking 2nd edition by Behrouz A foruzan
Thanks!!!

More Related Content

What's hot

Introduction of digital communication
Introduction of digital communicationIntroduction of digital communication
Introduction of digital communication
asodariyabhavesh
 
Multiplexing and Multiple Access
Multiplexing and Multiple AccessMultiplexing and Multiple Access
Multiplexing and Multiple Access
Ridwanul Hoque
 

What's hot (20)

Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
Wireless network ppt
Wireless network pptWireless network ppt
Wireless network ppt
 
Gsm signalling protocol
Gsm signalling protocolGsm signalling protocol
Gsm signalling protocol
 
Error control
Error controlError control
Error control
 
Switching systems lecture1
Switching  systems lecture1Switching  systems lecture1
Switching systems lecture1
 
Digital switching system ppt
Digital switching system pptDigital switching system ppt
Digital switching system ppt
 
Ethernet
EthernetEthernet
Ethernet
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
 
1 . introduction to communication system
1 . introduction to communication system1 . introduction to communication system
1 . introduction to communication system
 
Introduction of digital communication
Introduction of digital communicationIntroduction of digital communication
Introduction of digital communication
 
Multiplexing and Multiple Access
Multiplexing and Multiple AccessMultiplexing and Multiple Access
Multiplexing and Multiple Access
 
Introduction to Digital Communication
Introduction to Digital CommunicationIntroduction to Digital Communication
Introduction to Digital Communication
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
Chapter#5
Chapter#5Chapter#5
Chapter#5
 
Signalling Techniques & Basics of CCS
Signalling Techniques & Basics of CCSSignalling Techniques & Basics of CCS
Signalling Techniques & Basics of CCS
 
Utran architecture(rashmi)
Utran architecture(rashmi)Utran architecture(rashmi)
Utran architecture(rashmi)
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALA
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design Tools
 

Viewers also liked (6)

Lecture 02
Lecture 02Lecture 02
Lecture 02
 
Lecture 05
Lecture 05Lecture 05
Lecture 05
 
Lecture 09
Lecture 09Lecture 09
Lecture 09
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
Lecture 08
Lecture 08Lecture 08
Lecture 08
 
Data communication - Lecture-01
Data communication - Lecture-01 Data communication - Lecture-01
Data communication - Lecture-01
 

Similar to Lecture 04

934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networks
techbed
 
Chapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network DesignChapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network Design
nakomuri
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
reddydivakara
 
Business Data Communications and Networks
Business Data Communications and NetworksBusiness Data Communications and Networks
Business Data Communications and Networks
Christian Reina
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
ajaymane22
 

Similar to Lecture 04 (20)

934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networks
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
 
Internet
InternetInternet
Internet
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptx
 
Internet
InternetInternet
Internet
 
Chapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network DesignChapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network Design
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Basic concept of networking
Basic concept of networkingBasic concept of networking
Basic concept of networking
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 
Business Data Communications and Networks
Business Data Communications and NetworksBusiness Data Communications and Networks
Business Data Communications and Networks
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M H
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 
Chapter4
Chapter4Chapter4
Chapter4
 
Cn
CnCn
Cn
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 

More from Sehrish Rafiq

Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
Sehrish Rafiq
 

More from Sehrish Rafiq (20)

Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
 
Lecture 24
Lecture 24Lecture 24
Lecture 24
 
Lecture 18
Lecture 18Lecture 18
Lecture 18
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Lecture 04

  • 1. Data Communications & Networking Lecture-04 Course Instructor : Sehrish Rafiq Department Of Computer Science University Of Peshawar
  • 2. Lecture overview  Categories of Networks  Internetworks  An overview of the communication tasks  Protocol Architecture  Characteristics of a protocol
  • 3. Categories of Networks  In to which category a network falls is determined by its size, its ownership, the distance it covers and its physical architecture.
  • 4. LAN(Local Area Network)  A local Area network is usually privately owned and links the devices in a single office, building or campus.  LAN size is limited to a few kilometers.  LAN’s are designed to allow resources to be shared between personal computers or work stations.  In addition to size LAN are distinguished from other types of networks by their transmission media and topology.  Most common topologies:Bus,Ring & Star.
  • 6. MAN(Metropolitan Area Network)  A MAN is designed to extend over an entire city.  It may be a single network such as cable television network or it may be a means of connecting a number of connecting a number of LANs in to a larger network so that resources may be shared LAN-to-LAN.  A MAN may be wholly owned and operated by a private company such as local telephone company.
  • 8. WAN(Wide Area Network)  A WAN provides long distance transmission of voice, data, image and video information over large geographic areas that may comprise a country, a continent or even the whole world.  WANs may utilize public, leased or private communication devices usually in communications and can therefore span an unlimited number of miles.  A WAN that is wholly owned and used by a single company is often referred to as enterprise network.
  • 10. Internetworks  When two or more networks are connected, they became an internetwork or internet.  The Internet from “I” is a Wide area network while the internet from “i” refers to the interconnection of networks.  Internet can be thought as internet but the reverse is not necessarily true.
  • 11. History of Internet  1960,A project of ARPA of US department of Defense  Stanford Research Institute  University of California at Los Angeles  University of California at Santa Barbara  University of Utah  Features  Redundant lines  Decentralized Computing  1980, NSF and other Government agencies  1991,Commercial traffic  April 1995,US government action  2000,30 million users on 10 million computers,240000 networks, 100 countries  Monthly growth
  • 12. Communication Tasks  Transmission System utilization  Interfacing  Signal generation  Synchronization  Exchange Management  Error Detection & Correction  Flow Control  Addressing  Routing  Recovery  Message formatting  Security  Network Management
  • 13. Transmission System utilization  Transmission System utilization refers to the need to make efficient use of transmission facilities that are typically shared among a number of communicating devices.  Various techniques (referred to as multiplexing) are used to allocate the total capacity of a transmission medium among a number of users.  Congestion Control techniques may be required to assure that the system is not overwhelmed by excessive demand for transmission services.
  • 14. Interfacing & Signal generation  To communicate a device must interface with the transmission system.  Once an interface is established, signal generation is required for communication.  The properties of the signal such as form and intensity must be such that they are:  capable of being propagated through the transmission system  Interpretable as data at the receiver.
  • 15. Synchronization  Not only must the signals be generated to confirm to the requirements of the transmission system and receiver, but there must be some form of synchronization between transmitter and receiver.
  • 16. Exchange Management  If data are to be exchanged in both directions over a period of time, the two parties must cooperate. e.g. Telephone.  For data processing devices more will be done than simply establishing a connection, certain conventions must be decided upon.  These conventions may include whether both devices may transmit simultaneously or must take turns, the amount of data to be sent at one time, the format of the data and what to do if certain contingencies such as an error arise.
  • 17. Error Detection and Correction  Error detection and correction are required in circumstances where errors cannot be tolerated.  This is usually the case with data processing systems.  For example in transferring a file from one computer to another it is simply not acceptable for the contents of the file to be accidentally altered.
  • 18. Flow Control  Flow Control is required to assure that the source does not overwhelm the destination by sending data faster than they can be processed and absorbed.
  • 19. Addressing and routing  When a transmission facility is shared by more than two devices, the source system must indicate the identity of the intended destination.  The transmission system must assure that the destination system and only that system receives the data.  Further the transmission system may itself be a network through which various paths may be taken.  A specific route through this network must be chosen.
  • 20. Recovery  Recovery techniques are needed in situations in which an information exchange ,such as a database transaction or file transfer, is interrupted due to a fault somewhere in the system.  The objective is either to be able to resume activity at the point of interruption or atleast to restore the state of systems involved to the condition prior to the beginning of exchange.
  • 21. Message formatting Message formatting has to do with an agreement between two parties as to the form and format of the data to be exchanged or transmitted, such as the binary code for characters.
  • 22. Security  The sender of data may wish to be assured that only the intended receiver actually receives the data.  And the receiver of the data may wish to be assured that the received data have not been altered in transit and the data actually come from the purported sender.
  • 23. Network Management Finally, a data communication facility is a complex system that cannot create or run itself. Network Management capabilities are needed to configure the system, monitor its status, react to failures and overloads and plan intelligently for future growth.
  • 24. Protocol Architecture Instead of implementing the logic for communication between two computers as a single module, the task is broken up in to subtasks, each of which is implemented separately as a structured set of modules. That structure is referred to as a protocol architecture.
  • 25. A Simplified Architecture for File Transfer Computer Y Computer Z Files and File Transfer Commands File Transfer File Transfer Application Application Communication Communications-related data units Communication service module service module Network access Network access module Communic Communic module ations ations Network Network Network Interface Network Interface Logic Logic
  • 26. Characteristics of a Protocol Direct/Indirect Monolithic/Structured Symmetric / Asymmetric Standard / Non Standard
  • 27. Suggested Readings Section 1.1,Section 1.4, Section 2.1 of Data and computer communications sixth edition by william stallings Section 2.4 Categories of networks Data communications and networking 2nd edition by Behrouz A foruzan