gitanjali cgr
gitanjali cgr
MICRO-PROJECT REPORT
Seal of Institute
ACKNOWLEDGEMENT
Module – I
Module – II
Module – III
Module-IV:
Module-V:
DataCommunication
PART – A
PART – B
ANSIIEEEITU-T
ISO
Standards Organizations for Data Communication:
An association of organizations, governments, manufacturers and users form
the standards
organizations and are responsible for developing, coordinating and
maintaining the standards. The
intent is that all Data Communication equipment manufacturers and users
comply with these
standards. The primary standards organizations for Data Communication are:
Fig. 1 Standards Organisations for Data & Network Communication
organizations. The member body of the ISO from the United States is the
American National
Standards Institute (ANSI).
ANSI is the official standards agency for the United States and is the U.S
voting
representative for the ISO. ANSI is a completely private, non-profit
organization comprised of
equipment manufacturers and users of data processing equipment and
services. ANSI membership is
comprised of people form professional societies, industry associations,
governmental and regulatory
bodies, and consumer goods.
The main objective of a computer network is to be able to transfer the data from sender
to
receiver. This task can be done by breaking it into small sub tasks, each of which are
well defined.
Each subtask will have its own process or processes to do and will take specific inputs
and give
specific outputs to the subtask before or after it. In more technical terms we can call
these sub tasks
as layers.
In general, every task or job can be done by dividing it into sub task or layers. Consider
the
example of sending a letter where the sender is in City A and receiver is in city B
DataCommunication
The lower 4 layers (transport, network, data link and physical - Layers 4, 3, 2,
and 1) are
concerned with the flow of data from end to end through the network. The
upper four layers of the
OSI model (application, presentation and session - Layers 7, 6 and 5) are
orientated more toward
services to the applications. Data is encapsulated with the necessary protocol
information as it moves
down the layers before network transit.
As with any layered architecture, overhead information is added to a PDU in
the form of
headers and trailers. Each layer provides a service to the layer above it in the
protocol specification.
Each layer communicates with the same layer’s software or hardware on
other computers
DataCommunication
Physical Layer (The physical layer is responsible for transmitting individual bits from one node to the next)
The physical layer is the lowest layer of the OSI hierarchy and coordinates the functions
required to transmit a bit stream over a physical medium. It also defines the procedures and functions
that physical devices and interfaces have to perform for transmission occur. The physical layer
specifies the type of transmission medium and the transmission mode (simplex, half duplex or full
duplex) and the physical, electrical, functional and procedural standards for accessing Data
Communication networks.
Transmission media defined by the physical layer include metallic cable, optical fiber cable
or wireless radio-wave propagation. The physical layer also includes the carrier system used to
propagate the data signals between points in the network. The carrier systems are simply
communication systems that carry data through a system using either metallic or optical fiber cables
or wireless arrangements such as microwave, satellites and cellular radio systems.
Data-link Layer (the data link layer is responsible for transmitting frames from one node to the next)
The data link layer transforms the physical layer, a raw transmission facility, to a reliable
link and is responsible for node-to-node delivery.
DataCommunication
It makes the physical layer appear error free to the upper layer (network layer).The data link
layer packages data from the physical layer into groups called blocks, frames or packets. If frames
are to be distributed to different systems on the network, the data link layer adds a header to the
frame to define the physical address of the sender (source address) and/or receiver (destination
address) of the frame. The data-link layer provides flow-control, access-control, and error-control.
Network Layer (is responsible for the delivery of individual packets from the source host to the destination
host)
The network layer provides details that enable data to be routed between devices in an
environment using multiple networks, sub-networks or both. This is responsible for addressing
messages and data so they are sent to the correct destination, and for translating logical addresses and
names (like a machine name FLAME) into physical addresses. This layer is also responsible for
finding a path through the network to the destination computer.
The network layer provides the upper layers of the hierarchy with independence from
the
data transmission and switching technologies used to interconnect systems. Networking
components
that operate at the network layer include routers and their software.
Transport Layer (is responsible for delivery of a message from one process to another)
The transport layer controls and ensures the end-to-end integrity of the data message
propagated through the network between two devices, providing the reliable, transparent
transfer of
data between two endpoints.
Transport layer responsibilities include message routing, segmenting, error recovery and
two
types of basic services to an upper-layer protocol: connection oriented and
connectionless. The
transport layer is the highest layer in the OSI hierarchy in terms of communications and
may provide
data tracking, connection flow control, sequencing of data, error checking, and
application
addressing and identification
DataCommunication
Session Layer (responsible for dialog control and synchronization)
Session layer, sometimes called the dialog controller provides mechanism for controlling the
dialogue between the two end systems. It defines how to start, control and end conversations (called
sessions) between applications.
Session layer protocols provide the logical connection entities at the application layer. These
applications include file transfer protocols and sending email. Session responsibilities include
network log-on and log-off procedures and user authentication. Session layer characteristics include
virtual connections between applications, entities, synchronization of data flow for recovery
purposes, creation of dialogue units and activity units, connection parameter negotiation, and
partitioning services into functional groups.
Presentation Layer (responsible for translation, compression, and encryption)
The presentation layer provides independence to the application processes by addressing any
code or syntax conversion necessary to present the data to the network in a common communications
format. It specifies how end-user applications should format the data.
The presentation layer translated between different data formats and protocols. Presentation
functions include data file formatting, encoding, encryption and decryption of data messages,
dialogue procedures, data Compression algorithms, synchronization, interruption, and termination.
Application Layer (responsible for providing services to the user)
The application layer is the highest layer in the hierarchy and is analogous to the general
manager of the network by providing access to the OSI environment. The applications layer provides
distributed information services and controls the sequence of activities within and application and
also the sequence of events between the computer application and the user of another application
DataCommunication
The application layer communicates directly with the user’s application program. User
application processes require application layer service elements to access the networking
environment. The service elements are of two types: CASEs (common application service elements)
satisfying particular needs of application processes like association control, concurrence and
recovery. The second type is SASE (specific application service elements) which include TCP/IP
stack, FTP, SNMP, Telnet and SMTP.
Data Communication Circuits:
The underlying purpose of a digital communications circuit is to provide a transmission path
between locations and to transfer digital information from one station (node, where computers or
other digital equipment are located) to another using electronic circuits. Data Communication circuits
utilize electronic communications equipment and facilities to interconnect digital computer
equipment. Communication facilities are physical means of interconnecting stations and are provided
to Data Communication users through public telephone networks (PTN), public data networks
(PDN), and a multitude of private Data Communication systems.
The following figure shows a simple two-station Data Communication circuit. The main
components are:
DataCommunication
DataCommunication
Network Models:
Computer networks can be represented with two basic network models: peer-
to-peer
client/server and dedicated client/server. The client/server method specifies
the way in which two
computers can communicate with software over a network.
Peer-to-peer client/server network:
Here, all the computers share their resources, such as hard drives, printers and
so on with all
the other computers on the network. Individual resources like disk drives,
CD-ROM drives, and even
printers are transformed into shared, collective resources that are accessible
from every PC. Unlike
client-server networks, where network information is stored on a centralized
file server PC and made
available to tens, hundreds, or thousands client PCs, the information stored
across peer-to-peer
networks is uniquely decentralized. Because peer-to-peer PCs have their own
hard disk drives that
are accessible by all computers, each PC acts as both a client (information
requestor) and a server
(information provider). The peer-to-peer network is an appropriate choice
when there are fewer than
10 users on the network, security is not an issue and all the users are located
in the same general area.
The advantages of peer-to-peer over client-server NOSs include:
:Each PC can make backup copies of its data to other PCs for security.
:Easiest type of network to build, peer-to-peer is perfect for both home and office use
DataCommunication
DataCommunication
Hybrid topology: This topology (sometimes called mixed topology) is simply combining
two or
more of the traditional topologies to form a larger, more complex topology. Main aim is
being able to
share the advantages of different topologies.
Network Classifications:
One way to categorize the different types of computer network designs is by their scope
or
scale. Common examples of area network types are:
Local Area Network - Wireless Local Area Network
WAN - Wide Area Network - Metropolitan Area Network
SAN – Storage Area Network, System Area Network, Server Area Network, or
sometimes
Small Area Network.
CAN - Campus Area Network, Controller Area Network, or sometimes Cluster Area
Network
PAN - Personal Area Network
DAN - Desk Area Network
DataCommunication
Local area network: A local area network (LAN) is a network that connects computers and
devices in a limited geographical area such as home, school, computer laboratory, office building, or
closely positioned group of buildings. LANs use a network operating system to provide two-way
communications at bit rates in the range of 10 Mbps to 100 Mbps. In addition to operating in a
limited space, LANs are also typically owned, controlled, and managed by a single person or
organization. They also tend to use certain connectivity technologies, primarily Ethernet and Token
Ring.
Advantages of LAN:
Share Resources efficiency
Individual workstation might survive network failure if it doesn’t rely upon others
component evolution independent of system evolution
Support heterogeneous hardware/software
Access to other LANs and WANs
Higher transfer rate with low error rates
Metropolitan area network:
A MAN is optimized for a larger geographical area than a LAN, ranging from several blocks
of buildings to entire cities. Its geographic scope falls between a WAN and LAN. A MAN might be a
single network like the cable television network or it usually interconnects a number of local area
networks (LANs) using a high-capacity backbone technology, such as fiber-optical links, and
provides up-link services to wide area networks and the Internet. MANs typically operate at speeds
of 1.5 Mbps to 10 Mbps and range from five miles to a few hundred miles in length. Examples of
MANs are FDDI (fiber distributed data interface) and ATM (asynchronous transfer mode)
DataCommunication
Wide area network: Wide area networks are the oldest type of Data Communication network that
provide relatively slow-speed, long-distance transmission of data, voice and video information over
relatively large and widely dispersed geographical areas, such as country or entire continent. WANs
interconnect routers in different locations. A WAN differs from a LAN in several important ways.
Most WANs (like the Internet) are not owned by any one organization but rather exist under
collective or distributed ownership and management. WANs tend to use technology like ATM,
Frame Relay and X.25 for connectivity over the longer distances.
Global area network: A GAN provides connections between countries around the entire globe.
Internet is a good example and is essentially a network comprised of other networks that interconnect
virtually every country in the world. GANs operate from 1.5 Mbps to 100 Gbps and cover thousands
of miles.
Campus Area Network: A network spanning multiple LANs but smaller than a MAN, such as on a
university or local business campus.
Storage Area Network: connects servers to data storage devices through a technology like Fibre
Channel.
System Area Network: - Links high-performance computers with high-speed connections in a
cluster configuration. Also known as Cluster Area Network.
Building backbone: - It is a network connection that normally carries traffic between departmental
LANs within a single company. It consists of a switch or router to provide connectivity to other
networks such as campus backbones, enterprise backbones, MANs, WANs etc
Camus backbone: - It is a network connection used to carry traffic to and from LANs located in
various buildings on campus. It normally uses optical fiber cables for the transmission media between
buildings and operates at relatively high transmission rates.
Enterprise networks: - It includes some or all of the above networks and components connected in a
cohesive and manageable fashion.
Alternate Protocol Suites:
The protocols other than OSI that are in wide spread used are TCP?IP and the Cisco three-
layer hierarchical model.
TCP/IP Protocol Suite
The U.S. Department of Defense (DoD) created the TCP/IP reference model because it
wanted a network that could survive any conditions, even a nuclear war. Transmission Control
Protocol/Internet Protocol (TCP/IP) {commonly known as internet suite} model is a set of
communication protocols that allow communication across multiple diverse networks. TCP/IP is a
hierarchical protocol comprised of either three or four layers. The three-layer version of TCP/IP
contains the network, transport and application layers. Four layer version specifies the host to
network layer.
DataCommunication
The designers of TCP/IP felt that the higher level protocols should include
the session and
presentation layer details. They simply created an application layer that
handles high-level
protocols, issues of representation, encoding, and dialog control. The TCP/IP
combines all
application-related issues into one layer, and assures this data is properly
packaged for the next layer.
The TCP/IP transport layer deals with the quality-of-service issues of
reliability, flow
control, and error correction. One of its protocols, the transmission control
protocol (TCP), provides
excellent and flexible ways to create reliable, well-flowing, low-error
network communications. TCP
is a connection-oriented protocol. The other protocol is User Datagram
Protocol (UDP) which is a
connection less protocol.
Common TCP/IP Proto
DataCommunication
The purpose of the Internet layer is to send source packets from any network on the
internetwork and have them arrive at the destination independent of the path and networks they took
to get there. The specific protocol that governs this layer is called the Internet protocol (IP). Best
path determination and packet switching occur at this layer.
The network access layer also called the host-to-network layer is concerned with all of the
issues of physically delivering data packets using frames or cells.
TCP/IP protocols are the standards around which the Internet developed, so the TCP/IP model
gains credibility just because of its protocols. In contrast, typically networks aren't built on the OSI
protocol, even though the OSI model is used as a guide.
Cisco Three Layer Model:
Cisco has defined a hierarchical model known as the hierarchical internetworking model. This
model simplifies the task of building a reliable, scalable, and less expensive hierarchical internetwork
because rather than focusing on packet construction; it focuses on the three functional areas, or
layers, of your network.
Core layer: This layer is considered the backbone of the network and includes the high-end switches
and high-speed cables such as fiber cables. This layer of the network does not route traffic at the
LAN. In addition, no packet manipulation is done by devices in this layer. Rather, this layer is
concerned with speed and ensures reliable delivery of packets.
Distribution layer: This layer includes LAN-based routers and layer 3 switches. This layer ensures
that packets are properly routed between subnets and VLANs in your enterprise. This layer is also
called the Workgroup layer. It also provides policy-based network connectivity, including:
Packet filtering (firewalling): Processes packets and regulates the transmission of packets
based on its source and destination information to create network borders
QoS: The router or layer 3 switches can read packets and prioritize delivery, based on
policies set
Access Layer Aggregation Point: The layer serves the aggregation point for the desktop
layer switches
Control Broadcast and Multicast: The layer serves as the boundary for broadcast and
multicast domains
Application Gateways: The layer allows you to create protocol gateways to and from
different network architectures.
The distribution layer also performs queuing and provides packet manipulation of the
network traffic.
DataCommunication
Access layer: This layer includes hubs and switches. This layer is also called
the desktop layer
because it focuses on connecting client nodes, such as workstations to the
network. This layer ensures
that packets are delivered to end user computers. At the access layer, you can:
Enable MAC address filtering: It is possible to program a switch to allow
only certain to
access the connected LANs.
Create separate collision domains: A switch can create separate collision
domains for each
connected node to improve performance.
Share bandwidth: You can allow the same network connection to handle all
data.
Handle switch bandwidth: You can move data from one network to another to
perform load
balancing.
The benefits of the Cisco hierarchical model includes:
High Performance: You can design high performance networks, where only
certain layers
are susceptible to congestion.
Efficient management & troubleshooting: Allows you to efficiently organize
network
management and isolate causes of network trouble.
Policy creation: You can easily create policies and specify filters and rules.
Scalability: You can grow the network easily by dividing your network into
functional areas.
Behavior prediction: When planning or managing a network, the model
allows you
determine what will happen to the network when new stresses are placed on
it.
DataCommunication
Access layer: This layer includes hubs and switches. This layer is also called
the desktop layer
because it focuses on connecting client nodes, such as workstations to the
network. This layer ensures
that packets are delivered to end user computers. At the access layer, you can:
Enable MAC address filtering: It is possible to program a switch to allow
only certain to
access the connected LANs.
Create separate collision domains: A switch can create separate collision
domains for each
connected node to improve performance.
Share bandwidth: You can allow the same network connection to handle all
data.
Handle switch bandwidth: You can move data from one network to another to
perform load
balancing.
The benefits of the Cisco hierarchical model includes:
High Performance: You can design high performance networks, where only
certain layers
are susceptible to congestion.
Efficient management & troubleshooting: Allows you to efficiently organize
network
management and isolate causes of network trouble.
Policy creation: You can easily create policies and specify filters and rules.
Scalability: You can grow the network easily by dividing your network into
functional areas.
Behavior prediction: When planning or managing a network, the model
allows you
determine what will happen to the network when new stresses are placed on it
Name of Teacher:-Prof.R.V.Patil
Dated Signature:-