Data Communication Unit - 1
Data Communication Unit - 1
UNIT 1
DEFINITION:
Communication is defined as a process in which more than one computer
transfers information, instructions to each other and for sharing resources.
Or in other words, communication is a process or act in which wecan send
or receive data. A network of computers is defined as an interconnected
collection of autonomous computers. Autonomous means nocomputer can
start, stop or control another computer.
Communication Channels
Communication channels are the medium that connects two or more
workstations. Workstations can be connected by either wired media or wireless
media. It is also known as a transmission medium. The transmission medium or
channel is a link that carries messages between two or more devices. We can
group the communication media into two categories:
• Guided media transmission
• Unguided media transmission
• Category 1 or Cat 1 – UTP cables with data rate < 0.1 Mbps, used in
telephone lines
• Category 2 or Cat 2 − UTP cables with a data rate of 2 Mbps, used in
transmission lines
• Category 3 or Cat 3 − UTP cables with a data rate of 10 Mbps, used in
LANs or 10baseT Ethernet
• Category 4 or Cat 4− UTP cables with a data rate of 20 Mbps, used in
token ring networks
• Category 5 or Cat 5 – UTP cables with a data rate of 100 Mbps, used in
LANs or 100baseT Ethernet
• Category 5e or Cat 5e – 1000baseT Ethernet with a data rate of 1000
Mbps
• Category 6 or Cat 6 − UTP cables with a data rate of 200 Mbps, used in
high-speed LANs
• Category 7 or Cat 7 − STP used in super high-speed Gigabit Ethernet.
Types of Twisted Pair Cable :
Computer network components are the major parts which are needed to install the
software. Some important network components are NIC, switch, cable, hub, router,
and modem. Depending on the type of network that we need to install, some network
components can also be removed. For example, the wireless network does not require a
cable.
1. NIC
o NIC stands for network interface card.
o NIC is a hardware component used to connect a computer with another computer onto a
network
o It can support a transfer rate of 100 to 1000 Mb/s.
o The MAC address or physical address is encoded on the network card chip which is
assigned by the IEEE to identify a network card uniquely. The MAC address is stored in the
PROM (Programmable read-only memory).
Wired NIC: The Wired NIC is present inside the motherboard. Cables and connectors are used
with wired NIC to transfer data.
Wireless NIC: The wireless NIC contains the antenna to obtain the connection over the wireless
network. For example, laptop computer contains the wireless NIC.
2. Hub
A Hub is a hardware device that divides the network connection among multiple devices.
When computer requests for some information from a network, it first sends the request
to the Hub through cable. Hub will broadcast this request to the entire network. All the
devices will check whether the request belongs to them or not. If not, the request will be
dropped.
The process used by the Hub consumes more bandwidth and limits the amount of
communication. Nowadays, the use of hub is obsolete, and it is replaced by more
advanced computer network components such as Switches, Routers.
3. Switch
Advantages Of Router:
o Security: The information which is transmitted to the network will traverse the entire
cable, but the only specified device which has been addressed can read the data.
o Reliability: If the server has stopped functioning, the network goes down, but no other
networks are affected that are served by the router.
o Performance: Router enhances the overall performance of the network. Suppose there
are 24 workstations in a network generates a same amount of traffic. This increases the
traffic load on the network. Router splits the single network into two networks of 12
workstations each, reduces the traffic load by half.
o Network range
5. Modem
o A modem is a hardware device that allows the computer to connect to the internet over
the existing telephone line.
o A modem is not integrated with the motherboard rather than it is installed on the PCI slot
found on the motherboard.
o It stands for Modulator/Demodulator. It converts the digital data into an analog signal
over the telephone lines.
Based on the differences in speed and transmission rate, a modem can be classified in the
following categories:
o The main functionality of the physical layer is to transmit the individual bits from
one node to another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
o It specifies the mechanical, electrical and procedural network interface specifications.
o Line Configuration: It defines the way how two or more devices can be connected
physically.
o Data Transmission: It defines the transmission mode whether it is simplex, half-
duplex or full-duplex mode between the two devices on the network.
o Topology: It defines the way how network devices are arranged.
o Signals: It determines the type of the signal used for transmitting the information.
Data Link Layer
o Framing: The data link layer translates the physical's raw bit stream into packets
known as Frames. The Data link layer adds the header and trailer to the frame.
The header which is added to the frame contains the hardware destination and
source address.
o Physical Addressing: The Data link layer adds a header to the frame that contains a
destination address. The frame is transmitted to the destination address mentioned
in the header.
o Flow Control: Flow control is the main functionality of the Data-link layer. It is the
technique through which the constant data rate is maintained on both the sides so
that no data get corrupted. It ensures that the transmitting station such as a
server with higher processing speed does not exceed the receiving station, with
lower processing speed.
o Error Control: Error control is achieved by adding a calculated value CRC (Cyclic
Redundancy Check) that is placed to the Data link layer's trailer which is added to
the message frame before it is sent to the physical layer. If any error seems to occur,
then the receiver sends the acknowledgment for the retransmission of the
corruptedframes.
o Access Control: When two or more devices are connected to the same
communication channel, then the data link layer protocols are used to
determine which device has control over the link at a given time.
Network Layer
o It is a layer 3 that manages device addressing, tracks the location of devices on
the network.
o It determines the best path to move data from source to the destination based on
the network conditions, the priority of service, and other factors.
o The Data link layer is responsible for routing and forwarding the packets.
o Routers are the layer 3 devices, they are specified in this layer and used to provide
the routing services within an internetwork.
o The protocols used to route the network traffic are known as Network layer
protocols. Example of protocols are IP and Ipv6.
Transport Layer
o The Transport layer is a Layer 4 ensures that messages are transmitted in the order
in which they are sent and there is no duplication of data.
o The main responsibility of the transport layer is to transfer the data completely.
o It receives the data from the upper layer and converts them into smaller units
known as segments.
o This layer can be termed as an end-to-end layer as it provides a point-to-
point connection between source and destination to deliver the data
reliably.
Session Layer
o It is a layer 5 in the OSI model.
o The Session layer is used to establish, maintain and synchronizes the
interaction between communicating devices.
o Dialog control: Session layer acts as a dialog controller that creates a dialog between
two processes or we can say that it allows the communication between two
processes which can be either half-duplex or full-duplex.
o Synchronization and recovery: Session layer adds some checkpoints when
transmitting the data in a sequence. If some error occurs in the middle of the
transmission of data, then the transmission will take place again from the
checkpoint. This process is known as synchronization and recovery.
Presentation Layer
o A Presentation layer is mainly concerned with the syntax and semantics of
the information exchanged between the two systems.
o It acts as a data translator for a network.
o This layer is a part of the operating system that converts the data from
one presentation format to another format.
o The Presentation layer is also known as the syntax layer.
o Translation: The processes in two systems exchange the information in the form of
character strings, numbers and so on. Different computers use different encoding
methods, the presentation layer handles the interoperability between the different
encoding methods. It converts the data from sender-dependent format into a
common format and changes the common format into receiver-dependent format
at the receiving end.
o Encryption: Encryption is needed to maintain privacy. Encryption is a process of
converting the sender-transmitted information into another form and sends the
resulting message over the network.
o Compression: Data compression is a process of compressing the data, i.e., it
reduces the number of bits to be transmitted. Data compression is very important
in multimedia such as text, audio, video.
Application Layer
o An application layer serves as a window for users and application processes to
access network service.
o It handles issues such as network transparency, resource allocation, etc.
o An application layer is not an application, but it performs the application
layer functions.
o This layer provides the network services to the end-users.
o File transfer, access, and management (FTAM): An application layer allows a user
to access the files in a remote computer, to retrieve the files from a computer and
to manage the files in a remote computer.
o Mail services: An application layer provides the facility for email forwarding and
storage.
o Directory services: An application provides the distributed database sources
and is used to provide that global information about various objects.
NOTE:
• MAC Address ensure that physical address of the computer is unique.
• IP Address is a logical address of the computer and is used to uniquely locate
computer connected via a network.
• MAC Address is of 6 byte hexadecimal address.
• IP Address is of 4 bytes or of 16 bytes.
Switching
We have switching at the physical layer, at the data link layer, at the
network layer, and even logically at the application layer(message
switching).
A switched network consists of a series of interlinked nodes, called
switches. Switches are devices capable of creating temporary
connections between 2 or more devices linked to the switch. Some of
these nodes are connected to the end systems (computers or telephones)
others are used only for routing.
In order to transfer data using Circuit switching there is a need to establish a circuit(these
circuits can either be permanent or temporary) so that data transfer can take place
smoothly. Given below are three phases that are used in Circuit Switching for actual
communication:
• Setup Phase
• Data Transfer Phase
• Teardown Phase
1.Setup Phase
It is the first phase of the Circuit switching technique and in this, there is an establishment
of the circuit that simply means a dedicated link is established between the sender and
the receiver with the help of several switching centers or nodes.
After the establishment of the circuit, the connection is established which means that
data transfer can take place between sender and receiver.
3.Teardown Phase
On the completion of communication between the sender and receiver the circuit
disconnects. In order to disconnect a signal is sent either by the sender or receiver
Example: Telephone Suppose there are two persons Person A and Person B; they both
want to communicate with each other and located at a distance far from each other.
Person A makes a call to Person B this phase is the setup phase of circuit switching. After
the establishment of the connection and after call pick up by Person B; they both can
communicate with each other. This is the data transfer phase of Circuit switching
Once the communication is complete one of them can cut the call or break the
connection. This is a teardown phase.
Some of the examples of Circuit switched network
As there is a dedicated link between the sender and the receiver. Thus Circuit-Switched
network provides a guarantee of dedicated transmission.
There is a dedicated path between sender and receiver thus there are no chances for the
delay.
3. The Circuit Switching technique is best for long transmission because it facilitates a
dedicated link between sender and receiver.
2. Packet switching
In a packet switched networks there is no resource reservation,
resources are allocated on demand. We have 2 types of packet-
switched networks.
a. Datagram Networks
Routing table
In this type of network, each switch has a routing table which is based on the
destination address. The routing tables are dynamic and are updated periodically.
The destination addresses and the corresponding forwarding output ports are
recorded in the tables.
Destination address
Every packet in a datagram network carries a header that contains, among other
information, the destination address of the packet. This address remain the same
during the entire journey of the packet.
Efficiency
Its better than that of Circuit switched network, resources are allocated only when
there are packets to be transferred.
Delay
Since there are no setup and teardown phase, each packet may experience a wait
at a switch before it is forwarded. The delay is not uniform for the packets of a
message.
b. Virtual Circuits Networks
Virtual – circuit network is a category of packet switching network, where a virtual path
is established between the source and the destination systems for data communication
to occur. This path appears to the user as if it is a dedicated physical path, but actually is
a logical circuit allocated from a managed pool of circuit resources as per traffic
requirements.
TOPOLOGIES(Self Study)