Unit_1_DCN (1)
Unit_1_DCN (1)
Networking
Unit – I
Prof. Rupali A. Meshram
Data Communication
• The term telecommunication means
communication at a distance. The word data
refers to information presented in whatever
form is agreed upon by the parties creating
and using the data. Data communications are
the exchange of data between two devices via
some form of transmission medium such as a
wire cable.
Five components of data
communication
Data Representation
• Information comes in different forms-
1. Text
2. Numbers
3. Images
4. Audio
5. Video
Data flow (simplex, half-duplex, and full-
duplex)
NETWORKS
• A network is a set of devices (often referred to
as nodes) connected by communication links.
A node can be a computer, printer, or any
other device capable of sending and/or
receiving data generated by other nodes on the
network.
Network Criteria
• Performance
-throughput
-delay
• Reliability
• Security
Network Criteria
• Performance can be measured in many ways, including transit time and
response time.
1. Transit time is the amount of time required for a message to travel from
one device to another.
2. Response time is the elapsed time between an inquiry and a response.
• Security:
Network security issues include protecting data from
unauthorized access, protecting data from damage and
development, and implementing policies and procedures
for recovery from breaches and data losses.
Physical Structures
(Types of connections)
point-to-point :
• connection provides a dedicated link between two devices.
• The entire capacity of the link is reserved for transmission
between those two devices.
• Most point-to-point connections use an actual length of wire
or cable to connect the two ends, but other options, such as
microwave or satellite links, are also possible
Physical Structures
(Types of connections)
Multipoint:
• A multipoint (also called multidrop) connection is one in which
more than two specific devices share a single link.
• In a multipoint environment, the capacity of the channel is
shared, either spatially or temporally.
• If several devices can use the link simultaneously, it is a spatially
shared connection.
Categories of topology
A fully connected mesh topology (five
devices)
•every device has a dedicated point-to-point link to every other device.
•The term dedicated means that the link carries traffic only between the two devices
it connects.
•we need n (n – 1) / 2 duplex-mode links.
Mesh Advantages
1. The use of dedicated links guarantees that each connection can carry its own
data load, thus eliminating the traffic problems that can occur when links must
be shared by multiple devices.
2. A mesh topology is robust. If one link becomes unusable, it does not incapacitate
the entire system.
3. There is the advantage of privacy or security. When every message travels along
a dedicated line, only the intended recipient sees it. Physical boundaries prevent
other users from gaining access to messages.
4. Point-to-point links make fault identification and fault isolation easy. Traffic can
be routed to avoid links with suspected problems. This facility enables the
network manager to discover the precise location of the fault and aids in finding
its cause and solution.
Mesh Disadvantages
1. Because every device must be connected to
every other device, installation and
reconnection are difficult.
2. The sheer bulk of the wiring can be greater
than the available space (in walls, ceilings, or
floors) can accommodate.
3. The hardware required to connect each link
(I/O ports and cable) can be prohibitively
expensive.
A star topology connecting four
stations
Star Topology:
•each device has a dedicated point-to-point link only to a central controller, usually
called a hub.
•The devices are not directly linked to one another.
•does not allow direct traffic between devices.
•The controller acts as an exchange: If one device wants to send data to another, it
sends the data to the controller, which then relays the data to the other connected
device
Star Advantages
1. A star topology is less expensive than a mesh
topology.
2. easy to install and reconfigure.
3. robustness.
4. easy fault identification and fault isolation.
5. it can be used to monitor link problems and
bypass defective links.
Star Disadvantages
1. Star topology is the dependency of the whole
topology on one single point, the hub. If the
hub goes down, the whole system is dead.
• The original TCP/IP protocol suite was defined as four software layers
built upon the hardware. Today, however, TCP/IP is thought of as a
five-layer model.
Layered Architecture
Layered Architecture
Layers in the TCP/IP Protocol Suite
Layers in the TCP/IP Protocol Suite
Network Architecture
Network Architecture
Network Architecture
Network Architecture
Network Architecture
Physical Layer
• Responsible for carrying individual bits in a frame across the link.
• When the next link to travel is determined by the router, the data-link
layer is responsible for taking the datagram and moving it across the
link.
• The link can be a wired LAN with a link-layer switch, a wireless LAN,
a wired WAN, or a wireless WAN.
• Data-link layer is responsible for moving the packet through the link.
Data-link Layer
• TCP/IP does not define any specific protocol for the
data-link layer.
• The transport layer at the source host gets the message from the
application layer, encapsulates it in a transport layer packet
(called a segment or a user datagram in different protocols) and
sends it, through the logical connection, to the transport layer at
the destination host.
• UDP is a simple protocol that does not provide flow, error, or congestion control.
• The two application layers exchange messages between each other as though there
were a bridge between the two layers.
• However, we should know that the communication is done through all the layers.
• The application layer in the Internet includes many predefined protocols, but a user
can also create a pair of processes to be run at the two hosts.
Application Layer
• The Hypertext Transfer Protocol (HTTP) is a vehicle for accessing the World Wide Web
(WWW).
• The Simple Mail Transfer Protocol (SMTP) is the main protocol used in electronic mail (e-
mail) service.
• The File Transfer Protocol (FTP) is used for transferring files from one host to another.
• The Terminal Network (TELNET) and Secure Shell (SSH) are used for accessing a site
remotely.
• The Domain Name System (DNS) is used by other protocols to find the network-layer address
of a computer.
• The Internet Group Management Protocol (IGMP) is used to collect membership in a group.
Encapsulation And Decapsulation
Encapsulation at the Source Host
1. At the application layer, the data to be exchanged is referred to as a
message. A message normally does not contain any header or trailer.
2. The transport layer takes the message as the payload, the load that the
transport layer should take care of. The transport layer then passes the
packet to the network layer.
3. The network layer takes the transport-layer packet as data or payload and
adds its own header to the payload. The network layer then passes the
packet to the data-link layer.
4. The data-link layer takes the network-layer packet as data or payload and
adds its own header. The frame is passed to the physical layer for
transmission
Decapsulation and Encapsulation at the
Router
• After the set of bits are delivered to the data-link layer, this layer decapsulates
the datagram from the frame and passes it to the network layer.
• The network layer only inspects the source and destination addresses in the
datagram header and consults its forwarding table to find the next hop to
which the datagram is to be delivered.
• The contents of the datagram should not be changed by the network layer in
the router unless there is a need to fragment the datagram if it is too big to
be passed through the next link. The datagram is then passed to the data-link
layer of the next link.
• The data-link layer of the next link encapsulates the datagram in a frame and
passes it to the physical layer for transmission.
Decapsulation at the Destination Host
• At the destination host, each layer only
decapsulates the packet received, removes
the payload, and delivers the payload to the
next-higher layer protocol until the message
reaches the application layer.
• At the transport layer, addresses are called port numbers, and these define the
application-layer programs at the source and destination. Port numbers are local
addresses that distinguish between several programs running at the same time.
• At the network-layer, the addresses are global, with the whole Internet as the
scope. A network-layer address uniquely defines the connection of a device to the
Internet.
• The link-layer addresses, sometimes called MAC addresses, are locally defined
addresses, each of which defines a specific host or router in a network (LAN or
WAN).
Multiplexing and Demultiplexing
• Since the TCP/IP protocol suite uses several protocols at some
layers.
• At the transport layer, either UDP or TCP can accept a message from
several application-layer protocols.
• At the data-link layer, a frame may carry the payload coming from IP or
other protocols such as ARP.
THE OSI MODEL
• An ISO standard that covers all aspects of
network communications is the Open Systems
Interconnection (OSI) model.
• The purpose of the OSI model is to show how to facilitate communication between
different systems without requiring changes to the logic of the underlying hardware and
software.
• The OSI model is not a protocol; it is a model for understanding and designing a network
architecture that is flexible, robust, and interoperable.
• The OSI model was intended to be the basis for the creation of the protocols in the OSI
stack.
• The OSI model is a layered framework for the design of network systems that allows
communication between all types of computer systems. It consists of seven separate but
related layers, each of which defines a part of the process of moving information across a
network
OSI versus TCP/IP
• When we compare the two models, we find that
two layers, session and presentation, are missing
from the TCP/IP protocol suite. These two layers
were not added to the TCP/IP protocol suite after
the publication of the OSI model.
• Second, some layers in the OSI model were never fully defined.
• IBM has also produced a version of twisted-pair cable for its use, called
shielded twisted-pair (STP); STP cable has a metal foil or braided mesh
covering that encases each pair of insulated conductors.
COAXIAL CABLE
• Coaxial cable (or coax) carries signals of higher frequency ranges than
those in twisted pair cable, in part because the two media are
constructed quite differently.
• VCI does not need to be a large number since each switch can use
its own unique set of VCIs.