SlideShare a Scribd company logo
1 of 28
Data Communications & Networking
                      Lecture-04


            Course Instructor : Sehrish Rafiq
            Department Of Computer Science
                     University Of Peshawar
Lecture overview
 Categories of Networks
 Internetworks
 An overview of the communication tasks
 Protocol Architecture
 Characteristics of a protocol
Categories of Networks




 In to which category a network falls is determined by its size, its
  ownership, the distance it covers and its physical architecture.
LAN(Local Area Network)
 A local Area network is usually privately owned and links the
  devices in a single office, building or campus.
 LAN size is limited to a few kilometers.
 LAN’s are designed to allow resources to be shared between
  personal computers or work stations.
 In addition to size LAN are distinguished from other types of
  networks by their transmission media and topology.
 Most common topologies:Bus,Ring & Star.
LAN(Local Area Network)
MAN(Metropolitan Area Network)
 A MAN is designed to extend over an entire city.


 It may be a single network such as cable television network or it
  may be a means of connecting a number of connecting a number
  of LANs in to a larger network so that resources may be shared
  LAN-to-LAN.

 A MAN may be wholly owned and operated by a private company
  such as local telephone company.
MAN(Metropolitan Area
     Network)
WAN(Wide Area Network)
 A WAN provides long distance transmission of voice, data, image
  and video information over large geographic areas that may
  comprise a country, a continent or even the whole world.

 WANs may utilize public, leased or private communication devices
  usually in communications and can therefore span an unlimited
  number of miles.

 A WAN that is wholly owned and used by a single company is often
  referred to as enterprise network.
WAN(Wide Area Network)
Internetworks
 When two or more networks are connected, they became an
  internetwork or internet.

 The Internet from “I” is a Wide area network while the
  internet from “i” refers to the interconnection of networks.

 Internet can be thought as internet but the reverse is not
  necessarily true.
History of Internet
   1960,A project of ARPA of US department of
    Defense
   Stanford Research Institute
   University of California at Los Angeles
   University of California at Santa Barbara
   University of Utah
   Features
   Redundant lines
   Decentralized Computing
   1980, NSF and other Government agencies
   1991,Commercial traffic
   April 1995,US government action
   2000,30 million users on 10 million
    computers,240000 networks, 100 countries
   Monthly growth
Communication Tasks
 Transmission System utilization
 Interfacing
 Signal generation
 Synchronization
 Exchange Management
 Error Detection & Correction
 Flow Control
 Addressing
 Routing
 Recovery
 Message formatting
 Security
 Network Management
Transmission System utilization
 Transmission System utilization refers to the need to make
  efficient use of transmission facilities that are typically shared
  among a number of communicating devices.
 Various techniques (referred to as multiplexing) are used to
  allocate the total capacity of a transmission medium among a
  number of users.
 Congestion Control techniques may be required to assure that the
  system is not overwhelmed by excessive demand for transmission
  services.
Interfacing & Signal generation

 To communicate a device must interface with the transmission
  system.
 Once an interface is established, signal generation is required for
  communication.
 The properties of the signal such as form and intensity must be
  such that they are:
 capable of being propagated through the transmission system
 Interpretable as data at the receiver.
Synchronization
 Not only must the signals be generated to confirm to the
  requirements of the transmission system and receiver, but there
  must be some form of synchronization between transmitter and
  receiver.
Exchange Management
 If data are to be exchanged in both directions over a period of
  time, the two parties must cooperate. e.g. Telephone.

 For data processing devices more will be done than simply
  establishing a connection, certain conventions must be decided
  upon.

 These conventions may include whether both devices may
  transmit simultaneously or must take turns, the amount of data to
  be sent at one time, the format of the data and what to do if
  certain contingencies such as an error arise.
Error Detection and Correction
 Error detection and correction are required in circumstances
  where errors cannot be tolerated.

 This is usually the case with data processing systems.


 For example in transferring a file from one computer to another it
  is simply not acceptable for the contents of the file to be
  accidentally altered.
Flow Control
 Flow Control is required to assure that the source does not
  overwhelm the destination by sending data faster than they can be
  processed and absorbed.
Addressing and routing
 When a transmission facility is shared by more than two devices,
  the source system must indicate the identity of the intended
  destination.

 The transmission system must assure that the destination system
  and only that system receives the data.

 Further the transmission system may itself be a network through
  which various paths may be taken.

 A specific route through this network must be chosen.
Recovery
 Recovery techniques are needed in situations in which an
  information exchange ,such as a database transaction or file
  transfer, is interrupted due to a fault somewhere in the system.

 The objective is either to be able to resume activity at the point of
  interruption or atleast to restore the state of systems involved to
  the condition prior to the beginning of exchange.
Message formatting
Message formatting has to do with an agreement between
  two parties as to the form and format of the data to be
  exchanged or transmitted, such as the binary code for
  characters.
Security
 The sender of data may wish to be assured that only the intended
  receiver actually receives the data.

 And the receiver of the data may wish to be assured that the
  received data have not been altered in transit and the data actually
  come from the purported sender.
Network Management
Finally, a data communication facility is a complex system
  that cannot create or run itself.

Network Management capabilities are needed to configure
  the system, monitor its status, react to failures and overloads
  and plan intelligently for future growth.
Protocol Architecture
Instead of implementing the logic for communication
  between two computers as a single module, the task is
  broken up in to subtasks, each of which is implemented
  separately as a structured set of modules.

That structure is referred to as a protocol architecture.
A Simplified Architecture for File
                      Transfer

 Computer Y                                                    Computer Z
                        Files and File Transfer Commands
File Transfer                                                 File Transfer
Application                                                   Application
Communication             Communications-related data units   Communication
service module                                                service module
Network access                                                Network access
module                           Communic
                                  Communic                    module
                                   ations
                                    ations
                                  Network
                                   Network
            Network Interface                  Network Interface
            Logic                              Logic
Characteristics of a Protocol
Direct/Indirect
Monolithic/Structured
Symmetric / Asymmetric
Standard / Non Standard
Suggested Readings
Section 1.1,Section 1.4, Section 2.1 of Data and computer
 communications sixth edition by william stallings
Section 2.4 Categories of networks Data communications
 and networking 2nd edition by Behrouz A foruzan
Thanks!!!

More Related Content

What's hot (20)

How PSTN phone works?
How PSTN phone works?How PSTN phone works?
How PSTN phone works?
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
 
NGN Next Generation Network
NGN Next Generation NetworkNGN Next Generation Network
NGN Next Generation Network
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
DATA COMMUNICATION PPT
DATA COMMUNICATION PPTDATA COMMUNICATION PPT
DATA COMMUNICATION PPT
 
Forouzan ppp
Forouzan pppForouzan ppp
Forouzan ppp
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Chap 8 switching
Chap 8 switchingChap 8 switching
Chap 8 switching
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
Telephone networks
Telephone networksTelephone networks
Telephone networks
 
ASk,FSK,PSK
ASk,FSK,PSKASk,FSK,PSK
ASk,FSK,PSK
 
Data encoding and modulation
Data encoding and modulationData encoding and modulation
Data encoding and modulation
 
Crc
CrcCrc
Crc
 
Computer Network-Data Link Layer-Module-2.pdf
Computer Network-Data Link Layer-Module-2.pdfComputer Network-Data Link Layer-Module-2.pdf
Computer Network-Data Link Layer-Module-2.pdf
 
PSTN
PSTNPSTN
PSTN
 
IT8602 Mobile Communication - Unit I Introduction
IT8602 Mobile Communication - Unit I IntroductionIT8602 Mobile Communication - Unit I Introduction
IT8602 Mobile Communication - Unit I Introduction
 
Amps
AmpsAmps
Amps
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 

Viewers also liked

Viewers also liked (6)

Lecture 02
Lecture 02Lecture 02
Lecture 02
 
Lecture 05
Lecture 05Lecture 05
Lecture 05
 
Lecture 09
Lecture 09Lecture 09
Lecture 09
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
Lecture 08
Lecture 08Lecture 08
Lecture 08
 
Data communication - Lecture-01
Data communication - Lecture-01 Data communication - Lecture-01
Data communication - Lecture-01
 

Similar to Lecture 04

934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networkstechbed
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Sehrish Rafiq
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptxsairakesh41
 
Chapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network DesignChapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network Designnakomuri
 
Basic concept of networking
Basic concept of networkingBasic concept of networking
Basic concept of networkingbappyiucse
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
Business Data Communications and Networks
Business Data Communications and NetworksBusiness Data Communications and Networks
Business Data Communications and NetworksChristian Reina
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M HSachidananda M H
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptxAkshayIngole17
 

Similar to Lecture 04 (20)

934 Ch1 Networks
934 Ch1  Networks934 Ch1  Networks
934 Ch1 Networks
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
 
Internet
InternetInternet
Internet
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptx
 
Internet
InternetInternet
Internet
 
Chapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network DesignChapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network Design
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Basic concept of networking
Basic concept of networkingBasic concept of networking
Basic concept of networking
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 
Business Data Communications and Networks
Business Data Communications and NetworksBusiness Data Communications and Networks
Business Data Communications and Networks
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M H
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 
Chapter4
Chapter4Chapter4
Chapter4
 
Cn
CnCn
Cn
 
Cnetworks
CnetworksCnetworks
Cnetworks
 

More from Sehrish Rafiq

Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Sehrish Rafiq
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Sehrish Rafiq
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Sehrish Rafiq
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Sehrish Rafiq
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Sehrish Rafiq
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Sehrish Rafiq
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Sehrish Rafiq
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Sehrish Rafiq
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Sehrish Rafiq
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Sehrish Rafiq
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Sehrish Rafiq
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Sehrish Rafiq
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Sehrish Rafiq
 

More from Sehrish Rafiq (20)

Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 14
 
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
 
Lecture 24
Lecture 24Lecture 24
Lecture 24
 
Lecture 18
Lecture 18Lecture 18
Lecture 18
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

Lecture 04

  • 1. Data Communications & Networking Lecture-04 Course Instructor : Sehrish Rafiq Department Of Computer Science University Of Peshawar
  • 2. Lecture overview  Categories of Networks  Internetworks  An overview of the communication tasks  Protocol Architecture  Characteristics of a protocol
  • 3. Categories of Networks  In to which category a network falls is determined by its size, its ownership, the distance it covers and its physical architecture.
  • 4. LAN(Local Area Network)  A local Area network is usually privately owned and links the devices in a single office, building or campus.  LAN size is limited to a few kilometers.  LAN’s are designed to allow resources to be shared between personal computers or work stations.  In addition to size LAN are distinguished from other types of networks by their transmission media and topology.  Most common topologies:Bus,Ring & Star.
  • 6. MAN(Metropolitan Area Network)  A MAN is designed to extend over an entire city.  It may be a single network such as cable television network or it may be a means of connecting a number of connecting a number of LANs in to a larger network so that resources may be shared LAN-to-LAN.  A MAN may be wholly owned and operated by a private company such as local telephone company.
  • 8. WAN(Wide Area Network)  A WAN provides long distance transmission of voice, data, image and video information over large geographic areas that may comprise a country, a continent or even the whole world.  WANs may utilize public, leased or private communication devices usually in communications and can therefore span an unlimited number of miles.  A WAN that is wholly owned and used by a single company is often referred to as enterprise network.
  • 10. Internetworks  When two or more networks are connected, they became an internetwork or internet.  The Internet from “I” is a Wide area network while the internet from “i” refers to the interconnection of networks.  Internet can be thought as internet but the reverse is not necessarily true.
  • 11. History of Internet  1960,A project of ARPA of US department of Defense  Stanford Research Institute  University of California at Los Angeles  University of California at Santa Barbara  University of Utah  Features  Redundant lines  Decentralized Computing  1980, NSF and other Government agencies  1991,Commercial traffic  April 1995,US government action  2000,30 million users on 10 million computers,240000 networks, 100 countries  Monthly growth
  • 12. Communication Tasks  Transmission System utilization  Interfacing  Signal generation  Synchronization  Exchange Management  Error Detection & Correction  Flow Control  Addressing  Routing  Recovery  Message formatting  Security  Network Management
  • 13. Transmission System utilization  Transmission System utilization refers to the need to make efficient use of transmission facilities that are typically shared among a number of communicating devices.  Various techniques (referred to as multiplexing) are used to allocate the total capacity of a transmission medium among a number of users.  Congestion Control techniques may be required to assure that the system is not overwhelmed by excessive demand for transmission services.
  • 14. Interfacing & Signal generation  To communicate a device must interface with the transmission system.  Once an interface is established, signal generation is required for communication.  The properties of the signal such as form and intensity must be such that they are:  capable of being propagated through the transmission system  Interpretable as data at the receiver.
  • 15. Synchronization  Not only must the signals be generated to confirm to the requirements of the transmission system and receiver, but there must be some form of synchronization between transmitter and receiver.
  • 16. Exchange Management  If data are to be exchanged in both directions over a period of time, the two parties must cooperate. e.g. Telephone.  For data processing devices more will be done than simply establishing a connection, certain conventions must be decided upon.  These conventions may include whether both devices may transmit simultaneously or must take turns, the amount of data to be sent at one time, the format of the data and what to do if certain contingencies such as an error arise.
  • 17. Error Detection and Correction  Error detection and correction are required in circumstances where errors cannot be tolerated.  This is usually the case with data processing systems.  For example in transferring a file from one computer to another it is simply not acceptable for the contents of the file to be accidentally altered.
  • 18. Flow Control  Flow Control is required to assure that the source does not overwhelm the destination by sending data faster than they can be processed and absorbed.
  • 19. Addressing and routing  When a transmission facility is shared by more than two devices, the source system must indicate the identity of the intended destination.  The transmission system must assure that the destination system and only that system receives the data.  Further the transmission system may itself be a network through which various paths may be taken.  A specific route through this network must be chosen.
  • 20. Recovery  Recovery techniques are needed in situations in which an information exchange ,such as a database transaction or file transfer, is interrupted due to a fault somewhere in the system.  The objective is either to be able to resume activity at the point of interruption or atleast to restore the state of systems involved to the condition prior to the beginning of exchange.
  • 21. Message formatting Message formatting has to do with an agreement between two parties as to the form and format of the data to be exchanged or transmitted, such as the binary code for characters.
  • 22. Security  The sender of data may wish to be assured that only the intended receiver actually receives the data.  And the receiver of the data may wish to be assured that the received data have not been altered in transit and the data actually come from the purported sender.
  • 23. Network Management Finally, a data communication facility is a complex system that cannot create or run itself. Network Management capabilities are needed to configure the system, monitor its status, react to failures and overloads and plan intelligently for future growth.
  • 24. Protocol Architecture Instead of implementing the logic for communication between two computers as a single module, the task is broken up in to subtasks, each of which is implemented separately as a structured set of modules. That structure is referred to as a protocol architecture.
  • 25. A Simplified Architecture for File Transfer Computer Y Computer Z Files and File Transfer Commands File Transfer File Transfer Application Application Communication Communications-related data units Communication service module service module Network access Network access module Communic Communic module ations ations Network Network Network Interface Network Interface Logic Logic
  • 26. Characteristics of a Protocol Direct/Indirect Monolithic/Structured Symmetric / Asymmetric Standard / Non Standard
  • 27. Suggested Readings Section 1.1,Section 1.4, Section 2.1 of Data and computer communications sixth edition by william stallings Section 2.4 Categories of networks Data communications and networking 2nd edition by Behrouz A foruzan