SlideShare a Scribd company logo
1 of 70
Download to read offline
DATA COMMUNICATION
AND
Course Instructor: Dr. C. Sreedhar
AND
COMPUTER NETWORKS
Some contents are copied from Internet sources
Unit - I
Unit 1
īąIntroduction:
īƒ˜ Data Communication, Components,
īƒ˜ Data Representations, Dataflow,
īƒ˜ Network Topologies, categories of networks,
īƒ˜ Internet, protocols and standards.
īƒ˜ Internet, protocols and standards.
īąNetwork Models:
īƒ˜ Layered tasks, OSI Reference model, layers in OSI model,
īƒ˜ TCP/IP Protocol suite,
īąAddressing –
īąPhysical address, Logical address, port
Unit 1
ī‚¨ Data Communications
ī‚¤ Definition
ī‚¤ Components of DC
ī‚¤ Data representation
Data flow
ī‚¨ Protocols and
Standards
ī‚¤ Definition
Standards
ī‚¤ Data flow
ī‚¨ Networks
ī‚¤ Network criteria
ī‚¤ Types of connections
ī‚¤ Categories of topology
ī‚¤ Network Models
ī‚¤ Standards
Data Communication: Definition
ī‚¨ Data communications
are the exchange of
data between two
data between two
devices via some
form of transmission
medium such as a
wire cable.
Data Communication
ī‚¨ The effectiveness of a data communications system depends
on four fundamental characteristics:
ī‚¤ Delivery: deliver data to the correct destination
ī‚¤ Accuracy: system must deliver the data accurately
ī‚¤ Timeliness: system must deliver data in a timely manner
ī‚¤ Jitter: refers to the variation in the packet arrival time
Data Communication: Components
ī‚¨ Five components
1. Sender
2. Message
3. Transmission
3. Transmission
medium
4. Protocol
5. Receiver
Protocol & its elements
ī‚¨ Definition: Set of rules that governs data communications.
ī‚¨ Syntax
ī‚¤ Structure or format of the data
ī‚¤ Indicates how to read the bits - field delineation
ī‚¤ Indicates how to read the bits - field delineation
ī‚¨ Semantics
ī‚¤ Interprets the meaning of the bits
ī‚¤ Knows which fields define what action
ī‚¨ Timing
ī‚¤ When data should be sent and what
ī‚¤ Speed at which data should be sent or speed at which it is being received.
Data communication components
ī‚¨ Sender
ī‚¨ Receiver
Message
ī‚¨ Message
ī‚¨ Transmission medium
ī‚¨ Protocol
Data Representation
ī‚¨ Text:
ī‚¤ Text is represented as a bit pattern.
ī‚¤ Unicode uses 32 bits to represent a symbol or character
ī‚¨ Numbers
ī‚¤ Numbers are also represented by bit patterns.
ī‚¤ Numbers are also represented by bit patterns.
ī‚¤ number is directly converted to a binary number
ī‚¨ Images
ī‚¤ Images are also represented by bit patterns.
ī‚¤ image is composed of a matrix of pixels
ī‚¤ each pixel is assigned a bit pattern.
ī‚¨ Audio and Video:
Data Flow
ī‚¨ Communication between two devices can be simplex or
half-duplex, or full-duplex
Networks
ī‚¨ A network is a set of devices (nodes) connected by
communication links.
ī‚¨ Node:
ī‚¨ Node:
ī‚¤ computer, printer, or any other device capable of
sending and/or receiving data.
ī‚¨ Link:
ī‚¤ can be a cable, air, optical fiber, or any medium which
can transport a signal carrying information.
Network Criteria
ī‚¨ Performance:
ī‚¤ Measured: transit time and response time
īŽ Transit time: time required for a message to travel from Aīƒ B
īŽ Transit time: time required for a message to travel from Aīƒ B
īŽ Response time: elapsed time between inquiry and response
ī‚¤ Evaluated using two metrics:
īŽ throughput and delay (more throughput and less delay).
ī‚¨ Reliability: measured by the frequency of failure
ī‚¨ Security: Network security issues include protecting data from
unauthorized access
Network Topology
ī‚¨ Physical Topology
ī‚¤ The way a network is laid out physically
ī‚¤ Two or more links form a topology
ī‚¤ Two or more links form a topology
ī‚¤ The topology of a network is the geometric
representation of the relationship of all the links
and linking devices (nodes) to one another.
Topology
ī‚¨ Physical topology
ī‚¤ Is how the wires are run
ī‚¤ The way in which a network is laid out physically
ī‚¨ Logical topology is how the signal travels.
ī‚¤ A device can be wired to implement any logical topology.
ī‚¤ A device can be wired to implement any logical topology.
ī‚¤ LANs are logical busses or rings, depending on how the hub is wired
ī‚¨ 4 basic types: mesh, star, bus, ring
ī‚¤ The most common physical topology is the star.
ī‚¤ All the wires come back to a central point
ī‚¨ May often hybrid
Mesh Topology
ī‚¨ Every link is dedicated point-to-point link
ī‚¨ The term dedicated means that the link
carries traffic only between the two
carries traffic only between the two
devices it connects
ī‚¨ To link n devices fully connected mesh has:
n ( n - 1) / 2 physical channels (Full-Duplex)
ī‚¨ Every Device on the network must have
n - 1 ports
ī‚¤ Advantages
īŽEach connection carry
its own data load (no
traffic problems)
ī‚¤ Disadvantages
īŽBig amount of cabling
īŽBig number of I/O ports
īŽInstallation and
Mesh Topology
traffic problems)
īŽA mesh topology is
robust
īŽPrivacy or security
īŽFault identification
and fault isolation
īŽInstallation and
reconnection are difficult
īŽSheer bulk of the wiring
can be greater than the
available space
īŽHardware connect to each
I/O could be expensive
A star topology
each device needs only one link and one
I/O port to connect it to any number of
others
Advantages
less expensive than a mesh topology.
robust: If one link fails, only that link is
robust: If one link fails, only that link is
affected
Disadvantages
If the hub goes down, the whole system goes
down.
The star topology is used in local-area
networks (LANs)
bus topology
Nodes are connected to the bus cable by drop lines and taps
A drop line is a connection running between device and main cable.
A tap is a connector
A tap is a connector
One long cable acts as a backbone to link all the devices in a network
Advantages
bus uses less cabling than mesh or star topologies
Disadvantages
difficult reconnection and fault isolation
Signal reflection at the taps can cause degradation
a fault or break in the bus cable stops all transmission
Ring topology
Ring Topology
īļEach device has a dedicated point to point connection with only two devices on either
side of it.
īļSignal is passed along the ring in one direction till it reaches destination
īļEach device has a repeater
īļWhen a device receives signal to be passed, its repeater regenerates bits and
passes along.
Advantages
Easy to install and reconfigure
Fault isolation is simple
Disadvantages
Unidirectional traffic
Break in the ring disables entire network; solved by dual ring
A hybrid topology: a star backbone with three bus networks
Main Star topology with each branch connecting several stations in a
bus topology
Networks Categories
ī‚¨ Network category is determined by its size, ownership, the
distance it cover and its physical architecture
LAN: Local Area Network
ī‚¨ Privately owned and links the devices in a single office, building or campus
ī‚¨ LANs designed to allow resources to be shared between PCs or workstations. The
resources may be hardware or software.
ī‚¨ In LANs one of the computers has a large capacity drive and becomes a server to other
clients.
ī‚¨ Software stored on server and used as needed by the whole group.
23
ī‚¨ Software stored on server and used as needed by the whole group.
ī‚¨ LAN use only one type of transmission medium.
ī‚¨ The most common LAN topologies are bus, ring and star.
ī‚¨ LAN speed can be 100Mbps or 1000MBps(1G)
MAN: Metropolitan Area Network
ī‚¨ Owned by private company or it may be a service provided by public company (
such as local tel.-company)
ī‚¨ Extended over an entire city.
ī‚¨ May be single network such as a cable television network, or it may be connected
number of LANs into a large network so that resources may be shared LAN-TO-LAN.
ī‚¨ Examples:
24
ī‚¨ Examples:
ī‚¤ Company can use MAN to connect the LANs in all its offices throughout the city.
ī‚¤ A part of the telephone line network that can provide DSL line to the customer
WAN: Wide Area Networks
ī‚¨ Provides long distance transmission of data, voice , image and video
information over large areas ( country or whole world)
ī‚¨ In contrast to LAN, WAN may utilize public or private communication
equipment's or combination
25
LAN MAN WAN
LAN is a wired network, i.e., all the
computers and printers are connected
through wires.
The connections in MAN are connected
through modem or cables/ wires.
The network of WAN is
connected through broadband
services, 3G or 4G internet
services, etc.
The ownership of LAN is private.
Ownership of MAN might be public or
private.
private or public.
The internet speed of LAN is very high,
i.e., 1000 Mbps.
The sped of MAN is moderate, i.e., 44-155
Mbps.
The speed of WAN is relatively
less than MAN and LAN, i.e.,
150 Mbps.
26
The maintenance cost of LAN is easy. The maintenance cost of MAN is difficult.
The maintenance cost of WAN is
difficult.
The bandwidth of LAN is high. The bandwidth of MAN is less.
The bandwidth of WAN is
relatively low.
Examples:
ī‚ˇ College
ī‚ˇ School
ī‚ˇ University
ī‚ˇ Hospital
Examples:
ī‚ˇ City
ī‚ˇ Building
Examples:
ī‚ˇ Broadband and internet
throughout the country or
continent.
Elements of Protocol
ī‚¨ Elements of a protocol:
ī‚¤ Syntax
ī‚¤ Semantics
ī‚¤ Timing
ī‚¤ Timing
Syntax: structure or format of data
Elements of protocol
ī‚¤ Semantics: meaning of each section of bits
Timing: when data should be sent and how fast they can be sent
Standards
ī‚¨ Two categories
ī‚¤ De facto: not approved by an organized body but adopted
ī‚¤ De jure: Legislated by an officially recognized body
Standards Creation Committees
a) International Standards Organization (ISO): product: quality, safety
b) International Telecommunications Union (ITU): comm’ spectrum
b) International Telecommunications Union (ITU): comm’ spectrum
c) American National Standards Institute (ANSI): standards
d) Institute of Electrical and Electronics Engineers (IEEE): promote
technology, education, innovation
e) Electronic Industries Association (EIA): protection to envronment, health
f) Internet Engineering Task Force (IETF): standards for TCP/IP
OSI Model
ī‚¨ OSI: Open Systems Interconnection
ī‚¨ Established in 1947, International Standards
Organization (ISO) is a multinational body
Organization (ISO) is a multinational body
dedicated to worldwide agreement on international
standards.
ī‚¨ An ISO standard that covers all aspects of network
communications is the OSI model. It was first
introduced in the late 1970s.
OSI Model: Layers
ī‚¨ Application Layer
ī‚¨ Presentation Layer
ī‚¨ Session Layer
ī‚¨ Transport Layer
ī‚¨ Network Layer
ī‚¨ Data Link Layer
ī‚¨ Physical Layer
The interaction between layers in the OSI model
7 Application
6 Presentation
5 Session
4 Transport
OSI REFERENCE MODEL
1. Physical Layer
1. Movements of individual bits
2. Physical characteristics of interface, medium
3. Representation of bits
4. Data rate
5. Synchronization of bits
4 Transport
1 Physical
2 Data Link
3 Network
5. Synchronization of bits
6. Line configuration
7. Topology
8. Transmission mode
Physical Layer
Responsibilities
1. Movements of individual
bits
2. Physical characteristics of
interface, medium
3. Representation of bits
3. Representation of bits
4. Data rate
5. Synchronization of bits
6. Line configuration
7. Topology
8. Transmission mode
Duties of the Physical layer
ī‚¨ Responsible for movements of individual bits from one hop
(node) to the next
ī‚¨ Physical characteristics of interfaces and media
ī‚¤ It defines the characteristic of the interface between devices and media. It also define
the type of transmission media
ī‚¨ Representation of bits
ī‚¨ Representation of bits
ī‚¤ The bit stream must be encoded into signals. It defines the type of representation ( how
0, 1 are changed to signal).
ī‚¨ Data rate
ī‚¤ It defines the number of bits sent per second and also the duration of bits
ī‚¨ Synchronization of bits
ī‚¤ The sender and receiver must be use the same bit rate also the receiver clock must be synchronized
Duties of the Physical layer
ī‚¨ Line configuration
ī‚¤ Physical layer is concerned with the connection of devices to the media (
point-to point or multipoint)
ī‚¨ Physical topology
How devices connected to make a network
ī‚¤ How devices connected to make a network
ī‚¤ Devices can connected by using Star, mesh , bus, ring or hybrid topology
ī‚¨ Transmission mode
ī‚¤ It defines the direction of transmission between two devices (simplex,
half-duplex, or full duplex)
7 Application
6 Presentation
5 Session
4 Transport
OSI REFERENCE MODEL
2. Data Link Layer
a) Frames
b) Physical addressing (MAC)
c) Flow control
d) Error control
e) Access control
â€ĸError detection and correction methods
4 Transport
1 Physical
2 Data Link
3 Network
â€ĸError detection and correction methods
â€ĸIEEE LAN standards
â€ĸ Bridges
â€ĸ Switches
Data Link Layer: Frame
Data Link Layer
ī‚¨ Flow control
DLL: Flow Control : Stop and Wait
DLL : Error control
DLL: Access Control
DLL: Access Control
DLL: Hop to Hop delivery
Data Link Layer Example
7 Application
6 Presentation
5 Session
4 Transport
OSI REFERENCE MODEL
3. Network Layer
a)Logical Addressing
b)Routing packets from source to destination.
â€ĸ Internetworking
â€ĸ Routing algorithms
â€ĸ Internet Protocol (IP) addressing
â€ĸ Routers
4 Transport
1 Physical
2 Data Link
3 Network
Source-to-Destination delivery
7 Application
6 Presentation
5 Session
4 Transport
OSI REFERENCE MODEL
4.Transport Layer
a)Port Address
b)Segmentation and Reassembly
c)Connection control
d)Flow control
e)Error control
â€ĸ Provides additional Quality of Service.
4 Transport
1 Physical
2 Data Link
3 Network
â€ĸ Provides additional Quality of Service.
â€ĸTCP, UDP
Transport Layer
Transport Layer: Port Numbers
Connection Oriented Service
Connectionless Service
7 Application
6 Presentation
5 Session
4 Transport
OSI REFERENCE MODEL
5.Session Layer
a)Allows users on different machines to establish sessions between them.
b)dialogue control.
c) Token management.
d) Synchronization.
4 Transport
1 Physical
2 Data Link
3 Network
7 Application
6 Presentation
5 Session
4 Transport
OSI REFERENCE MODEL
6. Presentation Layer
a) Concerned with the syntax and semantics of the
information (Translation)
b) Data compression.
c) Data encryption.
4 Transport
1 Physical
2 Data Link
3 Network
c) Data encryption.
7 Application
6 Presentation
5 Session
4 Transport
OSI REFERENCE MODEL
7. Application Layer
a) Provides protocols that are commonly needed.
Main topics:
â€ĸ File Transfer Protocol (FTP)
â€ĸ HyperText Transfer Protocol (HTTP)
â€ĸ Simple Mail Transfer Protocol (SMTP)
â€ĸ Simple Network Management Protocol (SNMP)
4 Transport
1 Physical
2 Data Link
3 Network
â€ĸ Simple Network Management Protocol (SNMP)
â€ĸ Network File System (NFS)
â€ĸ Telnet
OSI Model: Summary
Image is copied from Forouzan
TCP / IP Protocol Suite
ī‚¨ TCP: Transmission Control Protocol
ī‚¨ IP : Internet Protocol
HTTP
Image is copied from Forouzan
ARP
Address Resolution Protocol (ARP) is a communication
protocol used for discovering MAC address, associated
with a given IP address.
Map a logical Address to a physical Address
An ARP request is broadcast; an ARP reply is unicast.
RARP
Reverse Address Resolution Protocol:
Map a Physical Address to a logical Address
RARP request packets are broadcast;RARP reply packets are unicast.
Image is copied from Forouzan
IP Protocol
IP Protocol
â€ĸ
â€ĸIP provides unreliable and connectionless
IP provides unreliable and connectionless
datagram delivery.
datagram delivery.
â€ĸ
â€ĸIP protocol has no error
IP protocol has no error-
-reporting or error
reporting or error-
-
correcting mechanism.
correcting mechanism.
correcting mechanism.
correcting mechanism.
â€ĸ
â€ĸLogical Address in TCP/IP are called IP Address
Logical Address in TCP/IP are called IP Address
ī‚¨ ICMP: Internet Control Message Protocol
ī‚¤ used by network devices (routers etc.,) to send error messages.
ī‚¨ IGMP: Internet Group Management Protocol
ī‚¤ is a communications protocol used by hosts and adjacent routers
on IPv4 networks to establish multicast group memberships
ī‚¨ TCP: Transmission Control Protocol
ī‚¨ TCP: Transmission Control Protocol
ī‚¤ provides Connection oriented service such as reliable, ordered,
and error-checked delivery of data.
ī‚¨ UDP: User Datagram Protocol
ī‚¤ uses a connectionless communication where error checking and
correction are not necessary. Used for time-sensitive applications.
ī‚¨ SMTP: Simple mail transfer protocol
ī‚¤ is an Internet standard for electronic mail (email)
transmission
ī‚¨ HTTP: Hyper Text Transfer Protocol
ī‚¤ is an application protocol and forms foundation for
ī‚¤ is an application protocol and forms foundation for
data communication using World Wide Web(www)
ī‚¨ FTP: File Transfer Protocol
ī‚¤ is a standard network protocol used for transfer of
computer files between a client and server on a
computer network
ī‚¨ DNS: Domain Name System
ī‚¤ hierarchical decentralized naming system, responsible for assigning
domain names and mapping those names to Internet resources
(Phonebook of Internet)
ī‚¨ SNMP: Simple Network Management Protocol
ī‚¤ used for collecting and organizing information about managed devices
on IP networks. Monitor and manage network devices over an IP.
on IP networks. Monitor and manage network devices over an IP.
ī‚¨ RPC: remote procedure call
ī‚¤ Computer program can execute a procedure in a different address
space. Used to communicate bw processes on different workstations.
ī‚¨ POP: Post Office Protocol
ī‚¤ used by e-mail clients to retrieve e-mail from a server in an IP network
Image is copied from Forouzan
Example : physical addresses
Data
87 10
1
packet
discarded
2
packet
discarded
3
packet
accepted
Data
87 10
4
Image is copied from Forouzan
logical addresses
Data
A P
20 10 Data
A P
20 10
Physical
addresses
changed
Data
A P
33 99
69
changed
Data
A P
33 99
Physical
addresses
changed
Data
A P
95 66 Data
A P
95 66
Image is copied from Forouzan
A Sender Receiver P
port numbers
Data Data
Internet
a Data
j
A P
H2
a Data
j
A P
a Data
j
Data
a Data
j
A P
H2
a Data
j
A P
a Data
j
Data
Image is copied from Forouzan

More Related Content

What's hot

Ch 20 UNICAST ROUTING SECTION 2
Ch 20   UNICAST ROUTING  SECTION  2Ch 20   UNICAST ROUTING  SECTION  2
Ch 20 UNICAST ROUTING SECTION 2Hossam El-Deen Osama
 
Bridging in Networking
Bridging in NetworkingBridging in Networking
Bridging in NetworkingMuhammad Arshad
 
1. introduction data comm
1. introduction data comm1. introduction data comm
1. introduction data commHumayoun Kabir
 
Routing, Different types of forwarding technique
Routing, Different types of forwarding techniqueRouting, Different types of forwarding technique
Routing, Different types of forwarding techniquerajib_
 
Topic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingTopic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingDr Rajiv Srivastava
 
Transmission control protocol
Transmission control protocolTransmission control protocol
Transmission control protocolSundra Anand
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram ProtocolPeter R. Egli
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1Hossam El-Deen Osama
 
Ch1 delays, loss, and throughput l5
Ch1 delays, loss, and throughput l5Ch1 delays, loss, and throughput l5
Ch1 delays, loss, and throughput l5Syed Ariful Islam Emon
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networkspavan kumar Thatikonda
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
 
Media Access Control
Media Access ControlMedia Access Control
Media Access ControlVijayaLakshmi514
 
Network delay
Network delayNetwork delay
Network delaySushma Singh
 
Congestion control
Congestion controlCongestion control
Congestion controlKrishna Ranjan
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission mediaManish8976
 

What's hot (20)

Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
 
Ch 20 UNICAST ROUTING SECTION 2
Ch 20   UNICAST ROUTING  SECTION  2Ch 20   UNICAST ROUTING  SECTION  2
Ch 20 UNICAST ROUTING SECTION 2
 
Bridging in Networking
Bridging in NetworkingBridging in Networking
Bridging in Networking
 
1. introduction data comm
1. introduction data comm1. introduction data comm
1. introduction data comm
 
Routing, Different types of forwarding technique
Routing, Different types of forwarding techniqueRouting, Different types of forwarding technique
Routing, Different types of forwarding technique
 
Topic: Virtual circuit & message switching
Topic: Virtual circuit & message switchingTopic: Virtual circuit & message switching
Topic: Virtual circuit & message switching
 
Transmission control protocol
Transmission control protocolTransmission control protocol
Transmission control protocol
 
UDP - User Datagram Protocol
UDP - User Datagram ProtocolUDP - User Datagram Protocol
UDP - User Datagram Protocol
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
Ch1 delays, loss, and throughput l5
Ch1 delays, loss, and throughput l5Ch1 delays, loss, and throughput l5
Ch1 delays, loss, and throughput l5
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Network layer tanenbaum
Network layer tanenbaumNetwork layer tanenbaum
Network layer tanenbaum
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Tcp and udp
Tcp and udpTcp and udp
Tcp and udp
 
Network delay
Network delayNetwork delay
Network delay
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
TCP/IP
TCP/IPTCP/IP
TCP/IP
 

Similar to DCCN Unit 1.pdf

Osi models
Osi modelsOsi models
Osi modelssivasarah
 
Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01Sreedhar Chowdam
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESsuthi
 
ch01(Modified).ppt
ch01(Modified).pptch01(Modified).ppt
ch01(Modified).pptArghyaMallick3
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnologyGulrez Khan
 
Data communications and Networking
Data communications and Networking Data communications and Networking
Data communications and Networking awais qarni
 
Data Communication and Networks
Data Communication and NetworksData Communication and Networks
Data Communication and NetworksChAwais15
 
Computer Network Fundamentals
Computer Network FundamentalsComputer Network Fundamentals
Computer Network FundamentalsN.Jagadish Kumar
 
NETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYNETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYPRINCE KUMAR
 
Fundamentals of data network
Fundamentals of data networkFundamentals of data network
Fundamentals of data networkDr Reeja S R
 
Chapter 1
Chapter 1Chapter 1
Chapter 1SadamoTaga
 
Chapter 2
Chapter 2Chapter 2
Chapter 2rhaymarck
 
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptx
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptxUnit1-INTRODUCTION AND PHYSICAL LAYER.pptx
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptxLAVANYAsrietacin
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsSubas Paudel
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptxbantisworld
 
Networking ppt
Networking ppt Networking ppt
Networking ppt Shovan Mandal
 

Similar to DCCN Unit 1.pdf (20)

Osi models
Osi modelsOsi models
Osi models
 
Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01Computer Networks Lecture Notes 01
Computer Networks Lecture Notes 01
 
Chap1
Chap1Chap1
Chap1
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTES
 
ch01(Modified).ppt
ch01(Modified).pptch01(Modified).ppt
ch01(Modified).ppt
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
Data communications and Networking
Data communications and Networking Data communications and Networking
Data communications and Networking
 
Data Communication and Networks
Data Communication and NetworksData Communication and Networks
Data Communication and Networks
 
Computer Network Fundamentals
Computer Network FundamentalsComputer Network Fundamentals
Computer Network Fundamentals
 
NETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYNETWORKS & TOPOLOGY
NETWORKS & TOPOLOGY
 
Fundamentals of data network
Fundamentals of data networkFundamentals of data network
Fundamentals of data network
 
Unit_I - 1
Unit_I - 1Unit_I - 1
Unit_I - 1
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Ch 1 network
Ch 1  networkCh 1  network
Ch 1 network
 
Networks Basics
Networks BasicsNetworks Basics
Networks Basics
 
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptx
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptxUnit1-INTRODUCTION AND PHYSICAL LAYER.pptx
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptx
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 

More from Sreedhar Chowdam

Design and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesDesign and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesSreedhar Chowdam
 
Design and Analysis of Algorithms (Knapsack Problem)
Design and Analysis of Algorithms (Knapsack Problem)Design and Analysis of Algorithms (Knapsack Problem)
Design and Analysis of Algorithms (Knapsack Problem)Sreedhar Chowdam
 
PPS Notes Unit 5.pdf
PPS Notes Unit 5.pdfPPS Notes Unit 5.pdf
PPS Notes Unit 5.pdfSreedhar Chowdam
 
PPS Arrays Matrix operations
PPS Arrays Matrix operationsPPS Arrays Matrix operations
PPS Arrays Matrix operationsSreedhar Chowdam
 
Programming for Problem Solving
Programming for Problem SolvingProgramming for Problem Solving
Programming for Problem SolvingSreedhar Chowdam
 
Big Data Analytics Part2
Big Data Analytics Part2Big Data Analytics Part2
Big Data Analytics Part2Sreedhar Chowdam
 
Python Programming: Lists, Modules, Exceptions
Python Programming: Lists, Modules, ExceptionsPython Programming: Lists, Modules, Exceptions
Python Programming: Lists, Modules, ExceptionsSreedhar Chowdam
 
Python Programming by Dr. C. Sreedhar.pdf
Python Programming by Dr. C. Sreedhar.pdfPython Programming by Dr. C. Sreedhar.pdf
Python Programming by Dr. C. Sreedhar.pdfSreedhar Chowdam
 
Python Programming Strings
Python Programming StringsPython Programming Strings
Python Programming StringsSreedhar Chowdam
 
C Recursion, Pointers, Dynamic memory management
C Recursion, Pointers, Dynamic memory managementC Recursion, Pointers, Dynamic memory management
C Recursion, Pointers, Dynamic memory managementSreedhar Chowdam
 
C Programming Storage classes, Recursion
C Programming Storage classes, RecursionC Programming Storage classes, Recursion
C Programming Storage classes, RecursionSreedhar Chowdam
 
Programming For Problem Solving Lecture Notes
Programming For Problem Solving Lecture NotesProgramming For Problem Solving Lecture Notes
Programming For Problem Solving Lecture NotesSreedhar Chowdam
 
Data Structures Notes 2021
Data Structures Notes 2021Data Structures Notes 2021
Data Structures Notes 2021Sreedhar Chowdam
 
Dbms university library database
Dbms university library databaseDbms university library database
Dbms university library databaseSreedhar Chowdam
 
Er diagram for library database
Er diagram for library databaseEr diagram for library database
Er diagram for library databaseSreedhar Chowdam
 
DBMS Notes: DDL DML DCL
DBMS Notes: DDL DML DCLDBMS Notes: DDL DML DCL
DBMS Notes: DDL DML DCLSreedhar Chowdam
 

More from Sreedhar Chowdam (20)

Design and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesDesign and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture Notes
 
Design and Analysis of Algorithms (Knapsack Problem)
Design and Analysis of Algorithms (Knapsack Problem)Design and Analysis of Algorithms (Knapsack Problem)
Design and Analysis of Algorithms (Knapsack Problem)
 
PPS Notes Unit 5.pdf
PPS Notes Unit 5.pdfPPS Notes Unit 5.pdf
PPS Notes Unit 5.pdf
 
PPS Arrays Matrix operations
PPS Arrays Matrix operationsPPS Arrays Matrix operations
PPS Arrays Matrix operations
 
Programming for Problem Solving
Programming for Problem SolvingProgramming for Problem Solving
Programming for Problem Solving
 
Big Data Analytics Part2
Big Data Analytics Part2Big Data Analytics Part2
Big Data Analytics Part2
 
Python Programming: Lists, Modules, Exceptions
Python Programming: Lists, Modules, ExceptionsPython Programming: Lists, Modules, Exceptions
Python Programming: Lists, Modules, Exceptions
 
Python Programming by Dr. C. Sreedhar.pdf
Python Programming by Dr. C. Sreedhar.pdfPython Programming by Dr. C. Sreedhar.pdf
Python Programming by Dr. C. Sreedhar.pdf
 
Python Programming Strings
Python Programming StringsPython Programming Strings
Python Programming Strings
 
Python Programming
Python Programming Python Programming
Python Programming
 
Python Programming
Python ProgrammingPython Programming
Python Programming
 
C Recursion, Pointers, Dynamic memory management
C Recursion, Pointers, Dynamic memory managementC Recursion, Pointers, Dynamic memory management
C Recursion, Pointers, Dynamic memory management
 
C Programming Storage classes, Recursion
C Programming Storage classes, RecursionC Programming Storage classes, Recursion
C Programming Storage classes, Recursion
 
Programming For Problem Solving Lecture Notes
Programming For Problem Solving Lecture NotesProgramming For Problem Solving Lecture Notes
Programming For Problem Solving Lecture Notes
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
Data Structures Notes 2021
Data Structures Notes 2021Data Structures Notes 2021
Data Structures Notes 2021
 
Dbms university library database
Dbms university library databaseDbms university library database
Dbms university library database
 
Er diagram for library database
Er diagram for library databaseEr diagram for library database
Er diagram for library database
 
Dbms ER Model
Dbms ER ModelDbms ER Model
Dbms ER Model
 
DBMS Notes: DDL DML DCL
DBMS Notes: DDL DML DCLDBMS Notes: DDL DML DCL
DBMS Notes: DDL DML DCL
 

Recently uploaded

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoÃŖo Esperancinha
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 

DCCN Unit 1.pdf

  • 1. DATA COMMUNICATION AND Course Instructor: Dr. C. Sreedhar AND COMPUTER NETWORKS Some contents are copied from Internet sources Unit - I
  • 2. Unit 1 īąIntroduction: īƒ˜ Data Communication, Components, īƒ˜ Data Representations, Dataflow, īƒ˜ Network Topologies, categories of networks, īƒ˜ Internet, protocols and standards. īƒ˜ Internet, protocols and standards. īąNetwork Models: īƒ˜ Layered tasks, OSI Reference model, layers in OSI model, īƒ˜ TCP/IP Protocol suite, īąAddressing – īąPhysical address, Logical address, port
  • 3. Unit 1 ī‚¨ Data Communications ī‚¤ Definition ī‚¤ Components of DC ī‚¤ Data representation Data flow ī‚¨ Protocols and Standards ī‚¤ Definition Standards ī‚¤ Data flow ī‚¨ Networks ī‚¤ Network criteria ī‚¤ Types of connections ī‚¤ Categories of topology ī‚¤ Network Models ī‚¤ Standards
  • 4. Data Communication: Definition ī‚¨ Data communications are the exchange of data between two data between two devices via some form of transmission medium such as a wire cable.
  • 5. Data Communication ī‚¨ The effectiveness of a data communications system depends on four fundamental characteristics: ī‚¤ Delivery: deliver data to the correct destination ī‚¤ Accuracy: system must deliver the data accurately ī‚¤ Timeliness: system must deliver data in a timely manner ī‚¤ Jitter: refers to the variation in the packet arrival time
  • 6. Data Communication: Components ī‚¨ Five components 1. Sender 2. Message 3. Transmission 3. Transmission medium 4. Protocol 5. Receiver
  • 7. Protocol & its elements ī‚¨ Definition: Set of rules that governs data communications. ī‚¨ Syntax ī‚¤ Structure or format of the data ī‚¤ Indicates how to read the bits - field delineation ī‚¤ Indicates how to read the bits - field delineation ī‚¨ Semantics ī‚¤ Interprets the meaning of the bits ī‚¤ Knows which fields define what action ī‚¨ Timing ī‚¤ When data should be sent and what ī‚¤ Speed at which data should be sent or speed at which it is being received.
  • 8. Data communication components ī‚¨ Sender ī‚¨ Receiver Message ī‚¨ Message ī‚¨ Transmission medium ī‚¨ Protocol
  • 9. Data Representation ī‚¨ Text: ī‚¤ Text is represented as a bit pattern. ī‚¤ Unicode uses 32 bits to represent a symbol or character ī‚¨ Numbers ī‚¤ Numbers are also represented by bit patterns. ī‚¤ Numbers are also represented by bit patterns. ī‚¤ number is directly converted to a binary number ī‚¨ Images ī‚¤ Images are also represented by bit patterns. ī‚¤ image is composed of a matrix of pixels ī‚¤ each pixel is assigned a bit pattern. ī‚¨ Audio and Video:
  • 10. Data Flow ī‚¨ Communication between two devices can be simplex or half-duplex, or full-duplex
  • 11. Networks ī‚¨ A network is a set of devices (nodes) connected by communication links. ī‚¨ Node: ī‚¨ Node: ī‚¤ computer, printer, or any other device capable of sending and/or receiving data. ī‚¨ Link: ī‚¤ can be a cable, air, optical fiber, or any medium which can transport a signal carrying information.
  • 12. Network Criteria ī‚¨ Performance: ī‚¤ Measured: transit time and response time īŽ Transit time: time required for a message to travel from Aīƒ B īŽ Transit time: time required for a message to travel from Aīƒ B īŽ Response time: elapsed time between inquiry and response ī‚¤ Evaluated using two metrics: īŽ throughput and delay (more throughput and less delay). ī‚¨ Reliability: measured by the frequency of failure ī‚¨ Security: Network security issues include protecting data from unauthorized access
  • 13. Network Topology ī‚¨ Physical Topology ī‚¤ The way a network is laid out physically ī‚¤ Two or more links form a topology ī‚¤ Two or more links form a topology ī‚¤ The topology of a network is the geometric representation of the relationship of all the links and linking devices (nodes) to one another.
  • 14. Topology ī‚¨ Physical topology ī‚¤ Is how the wires are run ī‚¤ The way in which a network is laid out physically ī‚¨ Logical topology is how the signal travels. ī‚¤ A device can be wired to implement any logical topology. ī‚¤ A device can be wired to implement any logical topology. ī‚¤ LANs are logical busses or rings, depending on how the hub is wired ī‚¨ 4 basic types: mesh, star, bus, ring ī‚¤ The most common physical topology is the star. ī‚¤ All the wires come back to a central point ī‚¨ May often hybrid
  • 15. Mesh Topology ī‚¨ Every link is dedicated point-to-point link ī‚¨ The term dedicated means that the link carries traffic only between the two carries traffic only between the two devices it connects ī‚¨ To link n devices fully connected mesh has: n ( n - 1) / 2 physical channels (Full-Duplex) ī‚¨ Every Device on the network must have n - 1 ports
  • 16. ī‚¤ Advantages īŽEach connection carry its own data load (no traffic problems) ī‚¤ Disadvantages īŽBig amount of cabling īŽBig number of I/O ports īŽInstallation and Mesh Topology traffic problems) īŽA mesh topology is robust īŽPrivacy or security īŽFault identification and fault isolation īŽInstallation and reconnection are difficult īŽSheer bulk of the wiring can be greater than the available space īŽHardware connect to each I/O could be expensive
  • 17. A star topology each device needs only one link and one I/O port to connect it to any number of others Advantages less expensive than a mesh topology. robust: If one link fails, only that link is robust: If one link fails, only that link is affected Disadvantages If the hub goes down, the whole system goes down. The star topology is used in local-area networks (LANs)
  • 18. bus topology Nodes are connected to the bus cable by drop lines and taps A drop line is a connection running between device and main cable. A tap is a connector A tap is a connector One long cable acts as a backbone to link all the devices in a network Advantages bus uses less cabling than mesh or star topologies Disadvantages difficult reconnection and fault isolation Signal reflection at the taps can cause degradation a fault or break in the bus cable stops all transmission
  • 20. Ring Topology īļEach device has a dedicated point to point connection with only two devices on either side of it. īļSignal is passed along the ring in one direction till it reaches destination īļEach device has a repeater īļWhen a device receives signal to be passed, its repeater regenerates bits and passes along. Advantages Easy to install and reconfigure Fault isolation is simple Disadvantages Unidirectional traffic Break in the ring disables entire network; solved by dual ring
  • 21. A hybrid topology: a star backbone with three bus networks Main Star topology with each branch connecting several stations in a bus topology
  • 22. Networks Categories ī‚¨ Network category is determined by its size, ownership, the distance it cover and its physical architecture
  • 23. LAN: Local Area Network ī‚¨ Privately owned and links the devices in a single office, building or campus ī‚¨ LANs designed to allow resources to be shared between PCs or workstations. The resources may be hardware or software. ī‚¨ In LANs one of the computers has a large capacity drive and becomes a server to other clients. ī‚¨ Software stored on server and used as needed by the whole group. 23 ī‚¨ Software stored on server and used as needed by the whole group. ī‚¨ LAN use only one type of transmission medium. ī‚¨ The most common LAN topologies are bus, ring and star. ī‚¨ LAN speed can be 100Mbps or 1000MBps(1G)
  • 24. MAN: Metropolitan Area Network ī‚¨ Owned by private company or it may be a service provided by public company ( such as local tel.-company) ī‚¨ Extended over an entire city. ī‚¨ May be single network such as a cable television network, or it may be connected number of LANs into a large network so that resources may be shared LAN-TO-LAN. ī‚¨ Examples: 24 ī‚¨ Examples: ī‚¤ Company can use MAN to connect the LANs in all its offices throughout the city. ī‚¤ A part of the telephone line network that can provide DSL line to the customer
  • 25. WAN: Wide Area Networks ī‚¨ Provides long distance transmission of data, voice , image and video information over large areas ( country or whole world) ī‚¨ In contrast to LAN, WAN may utilize public or private communication equipment's or combination 25
  • 26. LAN MAN WAN LAN is a wired network, i.e., all the computers and printers are connected through wires. The connections in MAN are connected through modem or cables/ wires. The network of WAN is connected through broadband services, 3G or 4G internet services, etc. The ownership of LAN is private. Ownership of MAN might be public or private. private or public. The internet speed of LAN is very high, i.e., 1000 Mbps. The sped of MAN is moderate, i.e., 44-155 Mbps. The speed of WAN is relatively less than MAN and LAN, i.e., 150 Mbps. 26 The maintenance cost of LAN is easy. The maintenance cost of MAN is difficult. The maintenance cost of WAN is difficult. The bandwidth of LAN is high. The bandwidth of MAN is less. The bandwidth of WAN is relatively low. Examples: ī‚ˇ College ī‚ˇ School ī‚ˇ University ī‚ˇ Hospital Examples: ī‚ˇ City ī‚ˇ Building Examples: ī‚ˇ Broadband and internet throughout the country or continent.
  • 27. Elements of Protocol ī‚¨ Elements of a protocol: ī‚¤ Syntax ī‚¤ Semantics ī‚¤ Timing ī‚¤ Timing Syntax: structure or format of data
  • 28. Elements of protocol ī‚¤ Semantics: meaning of each section of bits Timing: when data should be sent and how fast they can be sent
  • 29. Standards ī‚¨ Two categories ī‚¤ De facto: not approved by an organized body but adopted ī‚¤ De jure: Legislated by an officially recognized body Standards Creation Committees a) International Standards Organization (ISO): product: quality, safety b) International Telecommunications Union (ITU): comm’ spectrum b) International Telecommunications Union (ITU): comm’ spectrum c) American National Standards Institute (ANSI): standards d) Institute of Electrical and Electronics Engineers (IEEE): promote technology, education, innovation e) Electronic Industries Association (EIA): protection to envronment, health f) Internet Engineering Task Force (IETF): standards for TCP/IP
  • 30. OSI Model ī‚¨ OSI: Open Systems Interconnection ī‚¨ Established in 1947, International Standards Organization (ISO) is a multinational body Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. ī‚¨ An ISO standard that covers all aspects of network communications is the OSI model. It was first introduced in the late 1970s.
  • 31. OSI Model: Layers ī‚¨ Application Layer ī‚¨ Presentation Layer ī‚¨ Session Layer ī‚¨ Transport Layer ī‚¨ Network Layer ī‚¨ Data Link Layer ī‚¨ Physical Layer
  • 32. The interaction between layers in the OSI model
  • 33. 7 Application 6 Presentation 5 Session 4 Transport OSI REFERENCE MODEL 1. Physical Layer 1. Movements of individual bits 2. Physical characteristics of interface, medium 3. Representation of bits 4. Data rate 5. Synchronization of bits 4 Transport 1 Physical 2 Data Link 3 Network 5. Synchronization of bits 6. Line configuration 7. Topology 8. Transmission mode
  • 34. Physical Layer Responsibilities 1. Movements of individual bits 2. Physical characteristics of interface, medium 3. Representation of bits 3. Representation of bits 4. Data rate 5. Synchronization of bits 6. Line configuration 7. Topology 8. Transmission mode
  • 35. Duties of the Physical layer ī‚¨ Responsible for movements of individual bits from one hop (node) to the next ī‚¨ Physical characteristics of interfaces and media ī‚¤ It defines the characteristic of the interface between devices and media. It also define the type of transmission media ī‚¨ Representation of bits ī‚¨ Representation of bits ī‚¤ The bit stream must be encoded into signals. It defines the type of representation ( how 0, 1 are changed to signal). ī‚¨ Data rate ī‚¤ It defines the number of bits sent per second and also the duration of bits ī‚¨ Synchronization of bits ī‚¤ The sender and receiver must be use the same bit rate also the receiver clock must be synchronized
  • 36. Duties of the Physical layer ī‚¨ Line configuration ī‚¤ Physical layer is concerned with the connection of devices to the media ( point-to point or multipoint) ī‚¨ Physical topology How devices connected to make a network ī‚¤ How devices connected to make a network ī‚¤ Devices can connected by using Star, mesh , bus, ring or hybrid topology ī‚¨ Transmission mode ī‚¤ It defines the direction of transmission between two devices (simplex, half-duplex, or full duplex)
  • 37. 7 Application 6 Presentation 5 Session 4 Transport OSI REFERENCE MODEL 2. Data Link Layer a) Frames b) Physical addressing (MAC) c) Flow control d) Error control e) Access control â€ĸError detection and correction methods 4 Transport 1 Physical 2 Data Link 3 Network â€ĸError detection and correction methods â€ĸIEEE LAN standards â€ĸ Bridges â€ĸ Switches
  • 39. Data Link Layer ī‚¨ Flow control
  • 40. DLL: Flow Control : Stop and Wait
  • 41. DLL : Error control
  • 44. DLL: Hop to Hop delivery
  • 45. Data Link Layer Example
  • 46. 7 Application 6 Presentation 5 Session 4 Transport OSI REFERENCE MODEL 3. Network Layer a)Logical Addressing b)Routing packets from source to destination. â€ĸ Internetworking â€ĸ Routing algorithms â€ĸ Internet Protocol (IP) addressing â€ĸ Routers 4 Transport 1 Physical 2 Data Link 3 Network
  • 48.
  • 49. 7 Application 6 Presentation 5 Session 4 Transport OSI REFERENCE MODEL 4.Transport Layer a)Port Address b)Segmentation and Reassembly c)Connection control d)Flow control e)Error control â€ĸ Provides additional Quality of Service. 4 Transport 1 Physical 2 Data Link 3 Network â€ĸ Provides additional Quality of Service. â€ĸTCP, UDP
  • 52.
  • 54. 7 Application 6 Presentation 5 Session 4 Transport OSI REFERENCE MODEL 5.Session Layer a)Allows users on different machines to establish sessions between them. b)dialogue control. c) Token management. d) Synchronization. 4 Transport 1 Physical 2 Data Link 3 Network
  • 55. 7 Application 6 Presentation 5 Session 4 Transport OSI REFERENCE MODEL 6. Presentation Layer a) Concerned with the syntax and semantics of the information (Translation) b) Data compression. c) Data encryption. 4 Transport 1 Physical 2 Data Link 3 Network c) Data encryption.
  • 56. 7 Application 6 Presentation 5 Session 4 Transport OSI REFERENCE MODEL 7. Application Layer a) Provides protocols that are commonly needed. Main topics: â€ĸ File Transfer Protocol (FTP) â€ĸ HyperText Transfer Protocol (HTTP) â€ĸ Simple Mail Transfer Protocol (SMTP) â€ĸ Simple Network Management Protocol (SNMP) 4 Transport 1 Physical 2 Data Link 3 Network â€ĸ Simple Network Management Protocol (SNMP) â€ĸ Network File System (NFS) â€ĸ Telnet
  • 57. OSI Model: Summary Image is copied from Forouzan
  • 58. TCP / IP Protocol Suite ī‚¨ TCP: Transmission Control Protocol ī‚¨ IP : Internet Protocol
  • 59. HTTP Image is copied from Forouzan
  • 60. ARP Address Resolution Protocol (ARP) is a communication protocol used for discovering MAC address, associated with a given IP address. Map a logical Address to a physical Address An ARP request is broadcast; an ARP reply is unicast.
  • 61. RARP Reverse Address Resolution Protocol: Map a Physical Address to a logical Address RARP request packets are broadcast;RARP reply packets are unicast.
  • 62. Image is copied from Forouzan
  • 63. IP Protocol IP Protocol â€ĸ â€ĸIP provides unreliable and connectionless IP provides unreliable and connectionless datagram delivery. datagram delivery. â€ĸ â€ĸIP protocol has no error IP protocol has no error- -reporting or error reporting or error- - correcting mechanism. correcting mechanism. correcting mechanism. correcting mechanism. â€ĸ â€ĸLogical Address in TCP/IP are called IP Address Logical Address in TCP/IP are called IP Address
  • 64. ī‚¨ ICMP: Internet Control Message Protocol ī‚¤ used by network devices (routers etc.,) to send error messages. ī‚¨ IGMP: Internet Group Management Protocol ī‚¤ is a communications protocol used by hosts and adjacent routers on IPv4 networks to establish multicast group memberships ī‚¨ TCP: Transmission Control Protocol ī‚¨ TCP: Transmission Control Protocol ī‚¤ provides Connection oriented service such as reliable, ordered, and error-checked delivery of data. ī‚¨ UDP: User Datagram Protocol ī‚¤ uses a connectionless communication where error checking and correction are not necessary. Used for time-sensitive applications.
  • 65. ī‚¨ SMTP: Simple mail transfer protocol ī‚¤ is an Internet standard for electronic mail (email) transmission ī‚¨ HTTP: Hyper Text Transfer Protocol ī‚¤ is an application protocol and forms foundation for ī‚¤ is an application protocol and forms foundation for data communication using World Wide Web(www) ī‚¨ FTP: File Transfer Protocol ī‚¤ is a standard network protocol used for transfer of computer files between a client and server on a computer network
  • 66. ī‚¨ DNS: Domain Name System ī‚¤ hierarchical decentralized naming system, responsible for assigning domain names and mapping those names to Internet resources (Phonebook of Internet) ī‚¨ SNMP: Simple Network Management Protocol ī‚¤ used for collecting and organizing information about managed devices on IP networks. Monitor and manage network devices over an IP. on IP networks. Monitor and manage network devices over an IP. ī‚¨ RPC: remote procedure call ī‚¤ Computer program can execute a procedure in a different address space. Used to communicate bw processes on different workstations. ī‚¨ POP: Post Office Protocol ī‚¤ used by e-mail clients to retrieve e-mail from a server in an IP network
  • 67. Image is copied from Forouzan
  • 68. Example : physical addresses Data 87 10 1 packet discarded 2 packet discarded 3 packet accepted Data 87 10 4 Image is copied from Forouzan
  • 69. logical addresses Data A P 20 10 Data A P 20 10 Physical addresses changed Data A P 33 99 69 changed Data A P 33 99 Physical addresses changed Data A P 95 66 Data A P 95 66 Image is copied from Forouzan
  • 70. A Sender Receiver P port numbers Data Data Internet a Data j A P H2 a Data j A P a Data j Data a Data j A P H2 a Data j A P a Data j Data Image is copied from Forouzan