0% found this document useful (0 votes)
78 views136 pages

Data Communication Fundamentals

The document provides an overview of data communication and computer networks. It discusses the basics of data communication, including the five components of data communication systems: messages, senders, receivers, transmission mediums, and protocols. It also describes the three modes of data transmission: simplex, half-duplex, and full-duplex. Local area networks, metropolitan area networks, and wide area networks are introduced as examples of network types. The document concludes that today's networks often interconnect with each other through internetworking.

Uploaded by

roman tsegaye
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views136 pages

Data Communication Fundamentals

The document provides an overview of data communication and computer networks. It discusses the basics of data communication, including the five components of data communication systems: messages, senders, receivers, transmission mediums, and protocols. It also describes the three modes of data transmission: simplex, half-duplex, and full-duplex. Local area networks, metropolitan area networks, and wide area networks are introduced as examples of network types. The document concludes that today's networks often interconnect with each other through internetworking.

Uploaded by

roman tsegaye
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 136

 

CHAPTER  ONE  
Data Communication
And
Computer Networks

Data Communication Basics  


Communica)on  Basics  

v  Data  communica)ons  are  the  exchange  of  data  between  two  devices  via  
some  form  of  transmission  medium  such  as  a  wire  cable.  

v  It  includes  :  
Ø  Wri:ng  and  talking  

Ø  Nonverbal  communica:on  (such  as  facial  expressions,  body  language  or  
gestures)  

Ø  Visual  communica:on  (the  use  of  images  or  pictures  such  as  pain:ng,  
photography,  video  or  film)  

Ø  Electronic  Communica:on  such  as  telephone  calls,  electronic  mail,  cable  
television,  satellite  broadcasts.  

Sunday,  August  8,  21   2  


Communica)on  Basics  

v  For   data   communica:ons   to   occur,   the   communica:ng   devices   must   be  


part   of   a   communica:on   system   made   up   of   a   combina:on   of   hardware  
(physical  equipment)  and  soMware  (programs).    

Sunday,  August  8,  21   3  


Five  components  of  data  communica)on  

1.  Message:  is  the  informa:on  (data)  to  be  communicated.  Popular    
forms  of  informa:on  include  text,  numbers,  pictures,  audio,  and  
video.    
2.  Sender:   is   the   device   that   sends   the   data   message.   It   can   be   a  
computer,  worksta:on,  telephone  handset,  video  camera,  and  so  
on.    
3.  Receiver:     is   the   device   that   receives   the   message.   It   can   be   a  
computer,  worksta:on,  telephone  handset,  television,  and  so  on.    
 

Sunday,  August  8,  21   4  


Five  components  of  data  communica)on  

3.  Transmission   medium:   is   the   physical   path   by   which   a  


message  travels  from  sender  to  receiver.  Some  examples  of  
transmission  media  include  twisted-­‐pair  wire,  coaxial  cable,  
fiberop:c  cable,  and  radio  waves.    
4.  Protocol:  is  a  set  of  rules  that  govern  data  communica:ons.  
It   represents   an   agreement   between   the   communica:ng  
devices.  Without  a  protocol,  two  devices  may  be  connected  
but   not   communica:ng,   just   as   a   person   speaking   French  
cannot   be   understood   by   a   person   who   speaks   only  
Japanese.    
Sunday,  August  8,  21   5  
Modes  of  data  transmission  

v There   are   3   different   transmission   modes   characterized  


according  to  the  direc:on  of  the  exchanges:  
1.  A  simplex  connec)on  is  a  connec:on  in  which  the  data  flows  
in  only  one  direc)on,  from  the  transmiYer  to  the  receiver.  
–  This   type   of   connec:on   is   useful   if   the   data   do   not   need   to  
flow   in   both   direc:ons   (for   example,   from   your   computer  
to  the  printer  or  from  the  mouse  to  your  computer...).  

Sunday,  August  8,  21   6  


Contd.  
 
2.  A   half-­‐duplex   connec)on   (some:mes   called   an   alterna'ng  
connec'on   or   semi-­‐duplex)   is   a   connec'on   in   which   the   data  
flows  in  one  direc:on  or  the  other,  but  not  both  at  the  same  
:me.    
–  With  this  type  of  connec:on,  each  end  of  the  connec:on  
transmits  in  turn.    
–  This   type   of   connec:on   makes   it   possible   to   have  
bidirec:onal   communica:ons   using   the   full   capacity   of   the  
line.  

Sunday,  August  8,  21   7  


Contd.  
 
–  In   a   half-­‐duplex   transmission,   the   en:re   capacity   of   a  
channel   is   taken   over   by   whichever   of   the   two   devices   is  
transmi\ng  at  the  :me.  
–  Walkie-­‐talkies  and  CB  (ci:zens  band)  radios  are  both  half-­‐
duplex  systems.  
–  The   half-­‐duplex   mode   is   used   in   cases   where   there   is   no  
need   for   communica:on   in   both   direc:ons   at   the   same  
:me;  the  en:re  capacity  of  the  channel  can  be  u:lized  for  
each  direc:on.  

Sunday,  August  8,  21   8  


Contd.  
 
3.  Full-­‐Duplex:   In   full-­‐duplex   mode   (also   called   duplex),   both  
sta:ons  can  transmit  and  receive  simultaneously  
–  The   full-­‐duplex   mode   is   like   a   two-­‐way   street   with   traffic  
flowing  in  both  direc:ons  at  the  same  :me.  
–  In  full-­‐duplex  mode,  signals  going  in  one  direc:on  share  the  
capacity   of   the   link:   with   signals   going   in   the   other  
direc:on.    
–  The  full-­‐duplex  mode  is  used  when  communica:on  in  both  
direc:ons  is  required  all  the  :me.  
–  The   capacity   of   the   channel,   however,   must   be   divided  
between  the  two  direc:ons.  

Sunday,  August  8,  21   9  


Contd.  
–  This   sharing   can   occur   in   two   ways:   Either   the   link   must  
contain   two   physically   separate   transmission   paths,   one   for  
sending  and  the  other  for  receiving;  or  the  capacity  of  the  
channel   is   divided   between   signals   travelling   in   both  
direc:ons.  
–  One  common  example  of  full-­‐duplex  communica:on  is  the  
telephone   network.   When   two   people   are   communica:ng  
by   a   telephone   line,   both   can   talk   and   listen   at   the   same  
:me.  

Sunday,  August  8,  21   10  


Contd.  

Sunday,  August  8,  21   11  


Interconnec)on  of  Networks:  Internetwork  

§  Today,   it   is   very   rare   to   see   a   LAN,   a   MAN,   or   a   WAN  


in  isola:on;  they  are  connected  to  one  another.    
§  When   two   or   more   networks   are   connected,   they  
become  an  internetwork,  or  internet.  

Sunday,  August  8,  21   12    


Network,  internet,  and  Internet  

§  A   network   is   a   group   of   connected   communica:ng   devices   such   as  


computers  and  printers.  
§  An   internet   (note   the   lowercase   leYer   i)   is   two   or   more   networks   that   can  
communicate  with  each  other.    
§  The   most   notable   internet   is   called   the   Internet   (uppercase   leYer   I),   a  
collabora:on   of   more   than   hundreds   of   thousands   of   interconnected  
networks.  
§  Private   individuals   as   well   as   various   organiza:ons   such   as   government  
agencies,   schools,   research   facili:es,   corpora:ons,   and   libraries   in   more  
than  100  countries  use  the  Internet.  

Sunday,  August  8,  21   13    


Sunday,  August  8,  21   14    
Internet    Vs.    Intranet      Vs.    Extranet      

§  Internet:   It   is   a   global   collec'on   of   networks,   both   big   and  


small.  It  is  a  giant  network.  
§  Intranet:    
•  Are   similar   to   World   Wide   Web   (WWW)   where  
centrally  stored  hypertext  documents  can  be  accessed  
using  the  web.    
•  Unlike   the   WWW,   intranets   are   available   only   to   user  
within  the  company  network  system.  Intranet  is  a  very  
common  service  in  large  networked  organiza:ons.  

Sunday,  August  8,  21   15    


Internet    Vs.    Intranet      Vs.    Extranet      

§  Extranet:    
•  Although  similar  to  intranet,  extranet  provides  selected  
users  from  outside  the  organiza:on  to  access  data  from  
the  internal  network.    
•  Extranets   are   commonly   used   by   suppliers   to   provide  
data  to  company  clients.    

Sunday,  August  8,  21   16    


Computer  Network  and  its  Applica)ons  
! At   its   most   elementary   level,   a   computer   network   consists   of  
two  computers  connected  to  each  other  by  a  cable  that  allows  
them  to  share  data.    
! All   computer   networking,   no   maYer   how   sophis:cated,   stems  
from  that  simple  system.  
! Computer  networking  arose  as  an  answer  to  the  need  to  share  
data  in  a  :mely  fashion.    
! Personal   computers   are   powerful   tools   that   can   process   and  
manipulate  large  amounts  of  data  quickly,  but  they  do  not  allow  
users  to  share  that  data  efficiently.    
! Before  networks,  users  needed  either  to  print  out  documents  or  
copy  document  files  to  a  disk  for  others  to  edit  or  use  them.    
Sunday,  August  8,  21   17    
Contd.  
! If  others  made  changes  to  the  document,  there  was  no  
easy  way  to  merge  the  changes.    
! This   was,   and   s:ll   is,   known   as   "working   in   a   stand-­‐alone  
environment."    

! Copying   files   onto   floppy   disks   and   giving   them   to  


others   to   copy   onto   their   computers   was   some:mes  
referred   to   as   the   "sneakernet."   This   early   form   of  
computer  networking  is  one  that  many  of  us  have  used  
and  perhaps  s:ll  use  today  

Sunday,  August  8,  21   18    


Contd.  

§  connec:ng   together   of   computers   and   other  

devices   is   called   a   network,   and   the   concept   of  

connected   computers   sharing   resources   is  

called  networking.  

Sunday,  August  8,  21   19    


Contd.  

§  Two   computers   are   said   to   be   interconnected  


if  they  are  able  to  exchange  informa:on  

§  Components  
Hardware: of  a  compute  networks  
§ Computer Media:
§ Network card § Cable
§ Routers § Wire
§ Modem … § Microwave …

Software: Network Design:


§  Network OS n Logical layout
§  Utilities … n Physical layout …

Sunday,  August  8,  21   20    


Uses  of  Computer  Networks  

Sunday,  August  8,  21   21  


Contd.  
1.  Resource  sharing  
!  the  goal  of  network  is  to  make  all  programs,  equipment,  and  especially  
data  available  to  anyone  on  the  network  without  regard  to  the  physical  
loca:on  of  the  resource  and  the  user.  
!  An  obvious  and  widespread  example  is  having  a  group  of  office  workers  
share  a  common  printer.    
!  None  of  the  individuals  really  needs  a  private  printer,  and  a  high-­‐volume  
networked  printer  is  oMen  cheaper,  faster,  and  easier  to  maintain  than  a  
large  collec:on  of  individual  printers.  
!  Informa)on  sharing  is  more  important  than  physical  resource  sharing  

Sunday,  August  8,  21   22    


Contd.  

2.  Means  of  communica)on    


–  E-­‐mail  
–  Videoconferencing  
–  Cha\ng  
–  E-­‐commerce  
–  Game  
–  ….  
3.  Centralizing  administra)on  and  support  
–  Database  
–  Banks  
–  ….  
Sunday,  August  8,  21   23    
Classifica)on  of  Computer  Networks  
§  Computer networks are classified based on various factors. They include:
–  Administration
–  From an administrator’s point of view, a network can be
private network which belongs a single autonomous system
and cannot be accessed outside its physical or logical domain.
A network can be public, which is accessed by all.
–  Geographical span
–  Connection Links
–  Inter-connectivity (Topology)
–  Architecture

Sunday,  August  8,  21   24    


Network  Types    -­‐    Geographical  Span    
"  Geographically a network can be seen in one of the following categories:
"  It may be spanned across your table, among Bluetooth enabled
devices, Ranging not more than few meters.
"  It may be spanned across a whole building, including intermediate
devices to connect all floors.
"  It may be spanned across a whole city.
"  It may be spanned across multiple cities or provinces.
"  It may be one network covering whole world.
§  Generally there are three broad categories of networks based on its size and
geographical coverage
1.  Local Area Network (LAN)
2.  Metropolitan Area Network (MAN)
3.  Wide Area Network (WAN)

Sunday,  August  8,  21   25    


LAN  
"  A   local   area   network   (LAN)   is   the   basic   building   block   of   any  
computer  network.    
"  A   LAN   can   range   from   simple   (two   computers   connected   by   a  
cable)   to   complex   (hundreds   of   connected   computers   and  
peripherals  throughout  a  major  corpora:on).    
"  The  dis:nguishing  feature  of  a  LAN  is  that  it  is  confined  to  a  limited  
geographic  area.  
"  A  local  area  network  (LAN)  is  usually  privately  owned  and  links  the  
devices  in  a  single  office,  building,  or  campus.    
"  Depending  on  the  needs  of  an  organiza:on  and  the  type  of  
technology  used,  a  LAN  can  be  as  simple  as  two  PCs  and  a  printer  
in  someone's  home  office;  or  it  can  extend  throughout  a  company  
and  include  audio  and  video  peripherals.    
"  Currently,  LAN  size  is  limited  to  a  few  kilometers  

Sunday,  August  8,  21   26    


Contd.  

Sunday,  August  8,  21   27    


Contd.  
#  LANs   are   designed   to   allow   resources   to   be   shared   between   personal  
computers   or   worksta:ons.   The   resources   to   be   shared   can   include  
hardware   (e.g.,   a   printer),   soMware   (e.g.,   an   applica:on   program),   or  
data.  
#  In  addi:on  to  size,  LANs  are  dis:nguished  from  other  types  of  networks  
by  their  transmission  media  and  topology.    
#  In  general,  a  given  LAN  will  use  only  one  type  of  transmission  medium.  
The  most  common  LAN  topologies  are  bus,  ring,  and  star.  
#  Early   LANs   had   data   rates   in   the   4   to   16   megabits   per   second   (Mbps)  
range.  Today,  however,  speeds  are  normally  100  or  1000  Mbps.    
#  Wireless  LANs  are  the  newest  evolu:on  in  LAN  technology.  

Sunday,  August  8,  21   28    


WAN  
§  A   wide   area   network   (WAN)   provides   long-­‐distance  
transmission  of  data,  image,  audio,  and  video  informa:on  
over  large  geographic  areas  that  may  comprise  a  country,  
a  con:nent,  or  even  the  whole  world.  
§  A  WAN  can  be  as  complex  as  the  backbones  that  connect  
the  Internet  or  as  simple  as  a  dial-­‐up  line  that  connects  a  
home  computer  to  the  Internet.  We  normally  refer  to  the  
first  as  a  switched  WAN  and  to  the  second  as  a  point-­‐to-­‐
point  WAN  

Sunday,  August  8,  21   29    


Contd.  
 
§  The   switched   WAN   connects   the   end   systems,   which   usually  

comprise   a   router   (internetworking   connec:ng   device)   that  

connects  to  another  LAN  or  WAN.    

§  The   point-­‐to-­‐point   WAN   is   normally   a   line   leased   from   a   telephone  

or  cable  TV  provider  that  connects  a  home  computer  or  a  small  LAN  

to  an  Internet  service  provider  (lSP).  This  type  of  WAN  is  oMen  used  

to  provide  Internet  access.  

Sunday,  August  8,  21   30    


Sunday,  August  8,  21   31    
MAN  

§  A   metropolitan   area   network   (MAN)   is   a   network   with   a   size   between   a   LAN   and   a  
WAN.  
§  It  normally  covers  the  area  inside  a  town  or  a  city.  
§  It  is  designed  for  customers  who  need  a  high-­‐speed  connec)vity,  normally  to  the  
Internet,  and  have  endpoints  spread  over  a  city  or  part  of  city.    
§  A   good   example   of   a   MAN   is   the   part   of   the   telephone   company   network   that   can  
provide   a   high-­‐speed   DSL   line   to   the   customer   (we   will   discuss   DSL   in   later  
chapters)  .    
§  Another  example  is  the  cable  TV  network  that  originally  was  designed  for  cable  TV,  
but  today  can  also  be  used  for  high-­‐speed  data  connec:on  to  the  Internet.  

Sunday,  August  8,  21   32  


Summary  of  Networks  Types

§  As   a   general   we   can   dis:nguish   the   difference   of  


network  type,  based  on  the  following  key  points  
•  The  geographical  span  they  cover  

•  Type  of  media  they  used  

•  Data  transmission  rate  

•  Type  of  service  they  provide  

•  Cost  

Sunday,  August  8,  21   33  


Network  Type  Based  on  Connec)on  Links  

§  A  network  is  two  or  more  devices  connected  through  links.    
§  A   link   is   a   communica:ons   pathway   that   transfers   data   from   one  
device  to  another.    
§  For  visualiza:on  purposes,  it  is  simplest  to  imagine  any  link  as  a  line  
drawn  between  two  points.    
§  For   communica:on   to   occur,   two   devices   must   be   connected   in  
some  way  to  the  same  link  at  the  same  :me.  
§  There   are   two   possible   types   of   connec:ons:   point-­‐to-­‐point   and  
mul)point.  

Sunday,  August  8,  21   34  


1.  Point-­‐to-­‐Point  

§  A   point-­‐to-­‐point   connec:on   provides   a   dedicated   link   between   two  


devices.    
§  The  en:re  capacity  of  the  link  is  reserved  for  transmission  between  those  
two  devices.    
§  Most  point-­‐to-­‐point  connec:ons  use  an  actual  length  of  wire  or  cable  to  
connect  the  two  ends,  but  other  op:ons,  such  as  microwave  or  satellite  
links,  are  also  possible.  
§  When  you  change  television  channels  by  infrared  remote  control,  you  are  
establishing  a  point-­‐to-­‐point  connec:on  between  the  remote  control  and  
the  television's  control  system.  

Sunday,  August  8,  21   35    


2.  Mul)point  
§  A   mul:point   (also   called   mul:drop)   connec:on   is   one   in   which  
more  than  two  specific  devices  share  a  single  link.  
§  In  a  mul:point  environment,  the  capacity  of  the  channel  is  shared,  
either  spa)ally  or  temporally.    
§  If   several   devices   can   use   the   link   simultaneously,   it   is   a   spa'ally  
shared  connec:on.    
§  If  users  must  take  turns,  it  is  a  'meshared  connec'on.  

Sunday,  August  8,  21   36    


Network  Topology  (Inter  -­‐  Connec)vity)    

§  Components   of   a   network   can   be   connected   to   each   other  


differently  in  some  fashion.    
–  By   connectedness   we   mean   either   logically,   physically,   or  
both  ways.    
–  Every  single  device  can  be  connected  to  every  other  device  
on  network,  making  the  network  mesh.    
–  All     devices     can     be     connected     to     a     single     medium     but    
geographically  disconnected,  created  bus-­‐like  structure.    

Sunday,  August  8,  21   37    


Network  Topology  (Inter  -­‐  Connec)vity)    

–  Each    device  is    connected    to    its    leD    and    right    peers    
only,    crea'ng    linear  structure  
–  All    devices    connected    together    with    a    single    device,    
crea'ng    star-­‐like  structure.    
–  All  devices  connected  arbitrarily  using  all  previous  ways  to  
connect  each  other,  resul'ng  in  a  hybrid  structure.  

Sunday,  August  8,  21   38    


Cont  .  .  .  

§  A Network Topology is the arrangement with which


computer systems or network devices are connected to each
other.
§  The term topology refers to the way in which a network is laid
out physically. (instead Physical  layout,  Design,  Diagram,  Map  
are  also  used)  
§  Topologies may define both physical and logical aspect of the
network.

Sunday,  August  8,  21   39    


Cont  .  .  .  

§  Both logical and physical topologies could be same or


different in a same network.
§  The topology of a network is the geometric representation of
the relationship of all the links and linking devices (usually
called nodes) to one another.
§  There are four basic topologies possible: mesh, star, bus, and
ring

Sunday,  August  8,  21   40    


Cont  .  .  .  

§  The  type  of  topology  you  use  affects  the  type  and  capabili:es.  
In  general  the  choice  of  one  topology  over  another  will  have  
an  impact  on  the:  
•  Type  of  equipment  that  the  network  needs  
•  Capabili:es  of  the  network  
•  Growth  of  the  network  
•  Way  the  network  is  managed  

Sunday,  August  8,  21   41    


Cont  .  .  .  

§  Developing  a  sense  of  how  to  use  the  different  topologies  is  a  
key  to  understanding  the  capabili:es  of  the  different  types  of  
networks.  
§  Before   computers   can   share   resources   or   perform   other  
communica:on  tasks  they  must  be  connected.  Most  networks  
use   cable   to   connect   one   computer   to   another.   However,   it   is  
not   as   simple   as   just   plugging   a   computer   into   a   cable  
connec:ng  to  other  computers

Sunday,  August  8,  21   42    


A.  Bus  Topology  

§  A  bus  topology,  is  mul)point  connec)on.  

§  One  long  cable  acts  as  a  backbone  to  link  all  the  devices  in  a  
network  

§  Nodes  are  connected  to  the  bus  cable  by  drop  lines  and  taps.    

§  A   drop   line   is   a   connec:on   running   between   the   device   and  


the  main  cable.  

Sunday,  August  8,  21   43    


Contd.  
§  A  tap  is  a  connector  that  either  splices  into  the  main  cable  or  
punctures   the   sheathing   of   a   cable   to   create   a   contact   with  
the  metallic  core.    
§  As  a  signal  travels  along  the  backbone,  some  of  its  energy  is  
transformed  into  heat.    
§  Therefore,  it  becomes  weaker  and  weaker  as  it  travels  farther  
and  farther.  
§  For   this   reason   there   is   a   limit   on   the   number   of   taps   a   bus  
can  support  and  on  the  distance  between  those  taps.  
Sunday,  August  8,  21   44    
Advantages  of  Bus  Topology.  
§  Advantages  of  a  bus  topology  include  ease  of  installa:on.    
§  Backbone  cable  can  be  laid  along  the  most  efficient  path,  then  connected  
to  the  nodes  by  drop  lines  of  various  lengths.    
§  In  this  way,  a  bus  uses  less  cabling  than  mesh  or  star  topologies.  
§  In   a   star,   for   example,   four   network   devices   in   the   same   room   require   four  
lengths  of  cable  reaching  all  the  way  to  the  hub.    
§  In  a  bus,  this  redundancy  is  eliminated.  Only  the  backbone  cable  stretches  
through  the  en're  facility.    
§  Each   drop   line   has   to   reach   only   as   far   as   the   nearest   point   on   the  
backbone.  

Sunday,  August  8,  21   45    


Disadvantages  of  Bus  Topology.  
 
1.  Difficult   reconnec:on   and   fault   isola:on.   A   bus   is   usually  
designed  to  be  op:mally  efficient  at  installa:on.  
•   It  can  therefore  be  difficult  to  add  new  devices.    
2.  Signal  reflec:on(bouns)  at  the  taps  can  cause  degrada:on  in  
quality.   This   degrada:on   can   be   controlled   by   limi:ng   the  
number  and  spacing  of  devices  connected  to  a  given  length  of  
cable.    
•  Adding   new   devices   may   therefore   require  
modifica:on  or  replacement  of  the  backbone.  
Sunday,  August  8,  21   46  
Disadvantages  of  Bus  Topology.  
 
§  In   addi:on,   a   fault   or   break   in   the   bus   cable   stops   all  
transmission,  even  between  devices  on  the  same  side  of  the  
problem.    
§  The   damaged   area   reflects   signals   back   in   the   direc:on   of  
origin,  crea:ng  noise  in  both  direc:ons.  
§  Bus   topology   was   one   of   the   first   topologies   used   in   the  
design  of  early  local  area  networks.  Ethernet  LANs  can  use  a  
bus  topology,  but  they  are  less  popular  now.  

Sunday,  August  8,  21   47  


B.    Star  Topology  

§  In   a   star   topology,   each   device   has   a   dedicated   point-­‐to-­‐point   link   only   to  
a  central  controller,  usually  called  a  hub/switch.  
§  The   term   dedicated   means   that   the   link   carries   traffic   only   between   the  
two  devices  it  connects.  
§  The  devices  are  not  directly  linked  to  one  another.    
§  Unlike   a   mesh   topology,   a   star   topology   does   not   allow   direct   traffic  
between  devices.    
§  The   controller   acts   as   an   exchange:   If   one   device   wants   to   send   data   to  
another,  it  sends  the  data  to  the  controller,  which  then  relays  the  data  to  
the  other  connected  device  

Sunday,  August  8,  21   48    


Contd.  
 
§  A  star  topology  is  less  expensive  than  a  mesh  topology.    
§  In  a  star,  each  device  needs  only  one  link  and  one  I/O  port  to  
connect  it  to  any  number  of  others.  
§  This  factor  also  makes  it  easy  to  install  and  reconfigure.    
§  Far   less   cabling   needs   to   be   housed,   and   addi:ons,   moves,  
and   dele:ons   involve   only   one   connec)on:   between   that  
device  and  the  hub.  
§  Other   advantages   include   robustness.   If   one   link   fails,   only  
that   link   is   affected.   All   other   links   remain   ac:ve.   This   factor  
also   lends   itself   to   easy   fault   iden)fica)on   and   fault  
isola)on.   As   long   as   the   hub   is   working,   it   can   be   used   to  
monitor  link  problems  and  bypass  defec:ve  links.  
Sunday,  August  8,  21   49    
Contd.  

A  SIMPLE  STAR  TOPOLOGY    


A  HIERARCHICAL  STAR  TOPOLOGY  
Sunday,  August  8,  21   50    
Contd.  
§  One   big   disadvantage   of   a   star   topology   is   the   dependency   of   the  
whole  topology  on  one  single  point,  the  hub.  
§  If  the  hub  goes  down,  the  whole  system  is  dead.  
§  Although  a  star  requires  far  less  cable  than  a  mesh,  each  node  must  
be  linked  to  a  central  hub.    
§  For   this   reason,   oMen   more   cabling   is   required   in   a   star   than   in  
some  other  topologies  (such  as  ring  or  bus).  
§  The  star  topology  is  used  in  local-­‐area  networks  (LANs).  
§  High-­‐speed  LANs  oMen  use  a  star  topology  with  a  central  hub.  

Sunday,  August  8,  21   51    


C.  Ring  Topology  

§  In   a   ring   topology,   each   device   has   a   dedicated   point-­‐to-­‐point  


connec:on  with  only  the  two  devices  on  either  side  of  it.  
§  A  signal  is  passed  along  the  ring  in  one  direc:on,  from  device  
to  device,  un:l  it  reaches  its  des:na:on.  
§  Each  device  in  the  ring  incorporates  a  repeater.    
§  When  a  device  receives  a  signal  intended  for  another  device,  
its  repeater  regenerates  the  bits  and  passes  them  along  

Sunday,  August  8,  21   52    


Contd.  
 
§  A  ring  is  rela:vely  easy  to  install  and  reconfigure.    
§  Each  device  is  linked  to  only  its  immediate  neighbors  (either  
physically  or  logically).  
§  To  add  or  delete  a  device  requires  changing  only  two  
connec:ons.    

Sunday,  August  8,  21   53    


Contd.  
 
§  The   only   constraints   are   media   and   traffic   considera:ons  
(maximum  ring  length  and  number  of  devices).    
§  In  addi:on,  fault  isola:on  is  simplified.  
§  Generally  in  a  ring,  a  signal  is  circula:ng  at  all  :mes.    
§  In  a  simple  ring,  a  break  in  the  ring  (such  as  a  disabled  sta:on)  
can  disable  the  en:re  network.    
§  This  weakness  can  be  solved  by  using  a  dual  ring  or  a  switch  
capable  of  closing  off  the  break.  
§  Ring   topology   was   prevalent   when   IBM   introduced   its   local-­‐
area  network  Token  Ring.    
§  Today,  the  need  for  higher-­‐speed  LANs  has  made  this  topology  less  popular.  

Sunday,  August  8,  21   54    


D.  Mesh  topology  

§  In   a   mesh   topology,   every   device   has   a   dedicated   point-­‐to-­‐


point  link  to  every  other  device.    
§  To  find  the  number  of  physical  links  in  a  fully  connected  mesh  
network  with  n  nodes,  we  first  consider  that  each  node  must  
be  connected  to  every  other  node.  
§    Node   1   must   be   connected   to   n   -­‐   I   nodes,   node   2   must   be  
connected   to   n   –   1   nodes,   and   finally   node   n   must   be  
connected  to  n  -­‐  1  nodes.  We  need  n(n  -­‐  1)  physical  links.  
 

Sunday,  August  8,  21   55    


D.  Mesh  topology  

§  However,   if   each   physical   link   allows   communica:on   in   both  


direc:ons   (duplex   mode),   we   can   divide   the   number   of   links  
by   2.     In   other   words,   we   can   say   that   in   a   mesh   topology,   we  
need  n(n  -­‐1)  /2  duplex-­‐mode  links.  
§  To   accommodate   that   many   links,   every   device   on   the  
network   must   have   n   –   1   input/output   (I/O)   ports   to   be  
connected  to  the  other  n  -­‐  1  sta'ons.  

Sunday,  August  8,  21   56    


Contd.  
§  A  mesh  offers  several  advantages  over  other  network  topologies  
§  First,  the  use  of  dedicated  links  guarantees  that  each  connec:on  can  carry  
its   own   data   load,   thus   elimina:ng   the   traffic   problems   that   can   occur  
when  links  must  be  shared  by  mul:ple  devices.  
§  Second,  a  mesh  topology  is  robust.  If  one  link  becomes  unusable,  it  does  
not  incapacitate  the  en:re  system.    
§  Third,  there  is  the  advantage  of  privacy  or  security.  When  every  message  
travels   along   a   dedicated   line,   only   the   intended   recipient   sees   it.   Physical  
boundaries  prevent  other  users  from  gaining  access  to  messages.    
§  Finally,   point-­‐to-­‐point   links   make   fault   iden:fica:on   and   fault   isola:on  
easy.    
§  Traffic  can  be  routed  to  avoid  links  with  suspected  problems.  This  facility  
enables  the  network  manager  to  discover  the  precise  loca:on  of  the  fault  
and  aids  in  finding  its  cause  and  solu:on.  
Sunday,  August  8,  21   57    
Contd.  
§  The   main   disadvantages   of   a   mesh   are   related   to   the   amount   of  
cabling  and  the  number  of  I/O  ports  required.    
§  First,   because   every   device   must   be   connected   to   every   other  
device,  installa:on  and  reconnec:on  are  difficult.    
§  Second,   the   sheer   bulk   of   the   wiring   can   be   greater   than   the  
available  space  (in  walls,  ceilings,  or  floors)  can  accommodate.  
§  Finally,  the  hardware  required  to  connect  each  link  (I/O  ports  and  
cable)  can  be  prohibi:vely  expensive.  
§  For   these   reasons   a   mesh   topology   is   usually   implemented   in   a  
limited   fashion,   for   example,   as   a   backbone   connec:ng   the   main  
computers   of   a   hybrid   network   that   can   include   several   other  
topologies.  

Sunday,  August  8,  21   58    


Contd.  
§  One   prac:cal   example   of   a   mesh   topology   is   the   connec:on   of  
telephone   regional   offices   in   which   each   regional   office   needs   to  
be  connected  to  every  other  regional  office  

Mesh  topology  
 
Sunday,  August  8,  21   59  
E.  Hybrid  Topology  
§  A   network   can   be   hybrid.   For   example,   we   can   have   a  
main  star  topology  with  each  branch  connec:ng  several  
sta:ons  in  a  bus  topology  (star-­‐bus  topology)  

Sunday,  August  8,  21   60  


Network  Models  (Architecture)  by  Capability  

•  Computer  networks  can  be  discriminated  into  various  types  such  as  Client-­‐
Server,  peer-­‐to-­‐peer  or  hybrid,  depending  upon  its  architecture.    
ü There    can    be    one  or    more    systems    ac:ng    as    Server.    Other    being    
Client,  requests  the  Server  to  serve  requests.  Server  takes  and  
processes  request  on  behalf  of  Clients.    
ü Two  systems  can  be  connected  Point-­‐to-­‐Point,  or  in  back-­‐to-­‐back  
fashion.  They  both  reside  at  the  same  level  and  called  peers.    
•  There  can  be  hybrid  network  which  involves  network  architecture  of  both  
the  above  types.  
1.  Client/Server Model
2.  Peer-to- Peer Model

Sunday,  August  8,  21   61    


Network  Models  by  Capability  
1.  Client/Server Model
§  Microcomputer users, or clients, share services of a centralized
computer called a server.

Sunday,  August  8,  21   62    


Client-­‐server  model  

Fig.  Two  clients  using  a  single  server  at  a  


:me  
Sunday,  August  8,  21   63    
Client/Server    

Ø  A   dis:nc:on   exists   between   computers   that   make   available   network  


resources  (servers)  and  those  computers  that  use  the  resources  (clients  or  
worksta:ons).  
Pros:  
§  Very  secure  
§  Centralized  servers  easy  to  manage  
§  Physically  centralized  
§  Secure  OS  
§  BeYer  performance  
§  Centralized  backups  
§  Reliability  
§  Simple  job  to  do  plus  built  in  redundancy  
Cons:  
§  Require  professional  administra:on  
§  More  hardware  intensive  
Sunday,  August  8,  21   64    
Network  Models  by  Capability  
2.  Peer-to-Peer Model

§  Computers share equally with one another without having to rely on a

central server.

Sunday,  August  8,  21   65    


Peer-­‐to-­‐Peer  (p2p)  

§  Computers  on  the  network  communicate  with  each  others  as  
equals  and  each  computer  is  responsible  for  making  its  own  
resources  available  to  other  computers  on  the  network.  
Pros:
§  Uses less expensive computer networks
§  Easy to administer
§  No NOS (network operating system) required
§  More built-in redundancy
§  Shared resources – some machine will have what you need

Sunday,  August  8,  21   66    


Peer-­‐to-­‐Peer  (p2p)  

Cons:
§  Individual user performance easily affected
§  Not very secure
§  Tragedy of the commons – no guarantee others will
administer their resources properly (almost guaranteed with
over 10 machines)
§  Hard to back up.

Sunday,  August  8,  21   67    


Client/Server  vs.  Peer-­‐to-­‐Peer:    Advantages  and  
Disadvantages    
Client/Server Model Peer-to-Peer Model
Advantages:   Advantages:  
§  Very  secure  OS.   §  Uses  less  expensive  networks.  
§  BeYer  performance.   §  Easy  to  administer.  
§  Centralized  servers,  easy  to   §  Contain   both   network   opera:ng  
manage.   system  and  applica:on  soMware.  
§  Centralized  backups.   §  Ideal   for   small   business   and   home  
§  High  reliability.   users  (up  to  10  computers).  
Disadvantages:   Disadvantages:  
§  Expensive  administra:on.   §  Individual  user  performance  easily  
§  More  hardware  intensive.   affected.  
§  Not  very  secure.  
§  Hard  to  back  up.  

Sunday,  August  8,  21   68    


Summary  of  Networks  Models

§  We  can  dis:nguish  network  models/architecture  difference  


based  on  the  following  key  points.
» Their  func:ons
» Security  level
» Scalability
» Type  of  opera:ng  system  they  used  
» Backup  process

Sunday,  August  8,  21   69  


Network  Criteria    
§  A  network  must  be  able  to  meet  a  certain  number  
of  criteria.    
§  The  most  important  of  these  are  :-­‐  
–  Performance,  
–  Reliability  
–  Security.  
 

Sunday,  August  8,  21   70  


Network  Criteria    
§  Performance    
–  Can  be  measured  in  many  ways,  including  transmit  time  
and  response  time.    
–  ︎    Transmit  time  is  the  amount  of  time  required  for  a  
message  to  travel  from  one  device  to  another.  
–   Response  time  is  the  elapsed  time  between  an  inquiry  
and  a  response.    
–  ︎Depends  on  a  number  of  factors:    
»   the  number  of  users  
»  the  type  of  transmission  medium  
»  the  capabilities  of  the  connected  hardware  
»   the  ef7iciency  of  the  software.    
Sunday,  August  8,  21   71  
Network  Criteria    
§  Reliability    
–  In  addition  to  accuracy  of  delivery,  network  reliability  is  
measured  by  the  frequency  of  failure,  the  time  it  takes  
a  link  to  recover  from  a  failure.    
§  Security    
–  Network  security  issues  include  :  
•  protecting  data  from  unauthorized  access  
•  protecting  data  from  damage  and  development  
•  implementing  policies  and  procedures  for  recovery  
from  breaches  and  data  losses.    

Sunday,  August  8,  21   72  


Standards

# Most  networks  are  a  combina:on  of  hardware  and  soMware  from  a  


variety  of  vendors.    
# The   ability   to   combine   the   products   manufactured   by   different  
vendors  is  made  possible  by  the  existence  of  industry  standards.  
# Standards   are   guidelines   that   vendors   adhere   /s)ck   on   to  
voluntarily   in   order   to   make   their   products   compa:ble   with  
products  from  other  vendors.    
# In  general  those  standards  address:  
Ø Size.    
Ø Shape.    
Ø Material.    
Ø Func:on.    
Ø Speed.    Etc.  

Sunday,  August  8,  21   73  


Contd.

#  More   specifically,   the   standards   define   physical   and   opera:onal  


characteris:cs  of:  
Ø Opera:ng  systems  (NOS)    
Ø   Communica:on  SoMware.    
#  For   example,   standards   make   it   possible   to   buy   a   NIC   manufactured   by  
one   vendor   for   a   computer   manufactured   by   another   vendor   with  
reasonable  assurance  that  the  card  will:  
Ø  Fit  into  the  computer.    
Ø  Work  with  the  network  cabling.    
Ø  Translate  signals  from  computer  and  send  them  out  onto  network.    
Ø  Receive  data  from  the  network  and  deliver  it  to  the  computer.    
#  When   a   vendor   subscribes   to   a   set   of   standards,   it   means   that   the   vendor  
is  agreeing  to  make  equipment  that  conforms  to  the  specifica:ons  of  the  
standard.  

Sunday,  August  8,  21   74  


Layered  communica)on  model    

# Layers   model   is   a   theore:cal   approach   that   describe   how   data   is  


going  to  be  transmit  over  the  network.    
# There   are   several   layer   models   available,   among   those   following  
two  models  are  the  most  popular:      
# OSI  Reference  model  
# TCP  /  IP  Reference  model  
# A   communica:on   architecture   is   a   strategy   for   connec:ng   host  
computers   and   other   communica:ng   equipment   by   define   all  
necessary  elements  for  data  communica:on  between  devices.  

Sunday,  August  8,  21   75  


Layered Tasks

# We  use  the  concept  of  layers  in  our  daily  life.    
#  As  an  example,  let  us  consider  two  friends  who  communicate  through  postal  
mail.  

#    The   process   of   sending   a   leYer   to   a   friend   would   be   complex   if  


there  were  no  services  available  from  the  post  office.  

Sunday,  August  8,  21   76  


Contd.

#  Layer  architecture  simplifies  the  network  design.  


#  It  is  easy  to  debug  network  applica:ons  in  a  layered  architecture  network.  
#  The  network  management  is  easier  due  to  the  layered  architecture.  
#  Layering   communica:on   func:ons   adds   flexibility,   for   example,   we   do   not  
need  to  modify  the  en:re  host  soMware  to  include  more  communica:on  
devices.  
#  Network  layers  follow  a  set  of  rules,  called  protocol.  
#  The   protocol   defines   the   format   of   the   data   being   exchanged,   and   the  
control  and  :ming  for  the  handshake  between  layers.  

Sunday,  August  8,  21   77  


Open Systems Interconnection (OSI)

# Interna:onal   standard   organiza:on   (ISO)   established   a  


commiYee   in   1977   to   develop   an   architecture   for   computer  
communica:on.  
# Open   Systems   Interconnec:on   (OSI)   reference   model   is   the  
result  of  this  effort.  
# In   1984,   the   Open   Systems   Interconnec:on   (OSI)   reference  
model   was   approved   as   an   interna:onal   standard   for  
communica:ons  architecture.  
# Term    “open”    denotes  the  ability  to  connect  any  two  systems  
which   conform   to   the   reference   model   and   associated  
standards.  
# The   OSI   model   is   now   considered   the   primary   Architectural    
model  for  inter-­‐computer  communica:ons.  
Sunday,  August  8,  21   78  
Contd.

§  It  is  a  set  of  protocols  that  allows  any  two  different  
systems  to  communicate  regardless  of  their  
underlying  architecture.  
§  The  Purpose:  
–   to  show  how  to  facilitate  communica:on  between  
different  systems  without  requiring  changes  to  the  
logic  of  the  underlying  hardware  and  soMware    
§  It  is  not  a  protocol;    
–  it  is  a  model  for  understanding  and  designing  a  
network  architecture  that  is  flexible,  robust,  and  
interoperable.    
Sunday,  August  8,  21   79  
Contd.

# The   OSI   model   describes   how   informa:on   or   data   makes   its  


way  from  an  applica:on  programmes  (such  as  spreadsheets)  
in   computer,   through   a   network   medium   (such   as   wire)   to  
another  applica:on  programme  located  in  another  computer  
or  on  another  network.  

# The  model  also  helps  to  troubleshoot  problems  by  providing  a  


frame   of   reference   that   describes   how   components   are  
supposed  to  func:on  
Sunday,  August  8,  21   80  
Contd.

# The   OSI   reference   model   divides   the   problem   of   moving  


informa:on   between   computers   over   a   network   medium   into  
SEVEN  smaller  and  more  manageable  problems.  
# This   separa:on   into   smaller   more   manageable   func:ons   is  
known  as  layering.  
# The   main   objec:ve   of   dividing   into   seven   layers   include  
crea:ng  a  manageable  layers  by  breaking  down  the  complex  
network   opera:ons   and   allowing   specializa:on   of   research  
and  development  on  each  component  of  the  OSI  layer  
Sunday,  August  8,  21   81  
Contd.

#  In   developing   the   model,   the   designers   dis'lled   the   process   of   transmiPng  


data  to  its  most  fundamental  elements.    

#  They   iden:fied   which   networking   func:ons   had   related   uses   and   collected  
those  func:ons  into  discrete  groups  that  became  the  layers.    

#  Each  layer  defines  a  family  of  func:ons  dis:nct  from  those  of  the  other  layers.    

#  By   defining   and   localizing   func:onality   in   this   fashion,   the   designers   created  


an  architecture  that  is  both  comprehensive  and  flexible.    

#  Most   importantly,   the   OSI   model   allows   complete   interoperability   between  


otherwise  incompa:ble  systems.  

Sunday,  August  8,  21   82  


Contd.

Purpose  of  OSI  model  


# OSI  model  presents  a  structured  set  of  seven  layers  interconnec:ng  
as  a  stack.    
# Each   layer   in   this   model   was   developed   to   maintain   the   ability   of  
connec:ng  the  devices,  computers  and  network  segments.    
# OSI  model  was  created  with  following  purposes:-­‐    
# To   create   a   common   plaRorm   for   soDware   developers   and   hardware  
manufactures  that  encourage  the  crea'on  of  networking  products  that  
can  communicate  with  each  other  over  the  network.  
# To   help   network   administrators   by   dividing   large   data   exchange  
process   in   smaller   segments.   Smaller   segments   are   easier   to  
understand,  manage  and  troubleshoot.  With  layer  approach  they  only  
have  to  troubleshoot  the  devices  which  are  working  in  faulty  layer.  

Sunday,  August  8,  21   83  


Contd.

#  In general, the Benefits of the OSI Reference model is given below


# Big picture of communication over network is understandable through this OSI
model.
# OSI model distinguishes well between the services, interfaces and protocols.
# Protocols of OSI model are very well hidden.
# We see how hardware and software work together.
# Reduces complexity:- Dividing network communication process in smaller
component makes software development, design, and troubleshooting easier.
# Standardizes interfaces:- It describes what functions occur at each layer of the
model that encourages industry standardization.
# Facilitates modular/modification engineering:- It prevents changes in one layer
from affecting other layers.
# Ensures interoperable technology:- It allows different types of network
hardware and software to communicate. And can be used to compare basic
functional relationships on different networks

Sunday,  August  8,  21   84  


Contd.

#  In general, the Benefits of the OSI Reference model is given below


# Accelerates evolution:- Standardization of network components allows
multiple-vendor development.
# Quick troubleshooting: Enable network administrators to troubleshoot
issues more quickly and effectually by looking in layer that is causing
issue rather than finding it entire network.
# Simplifies teaching and learning:- We can understand new technologies
as they are developed.
§  Demerits of OSI reference model:
•  Model was devised before the invention of protocols.
•  Fitting of protocols is tedious task.
•  It is just used as a reference model.

Sunday,  August  8,  21   85  


The Seven Layers
 

Sunday,  August  8,  21   86  


OSI  Model    
•  enables  the  user(human  or  soMware)  to  access  the  
Applica)on  Layer   network.  

•  concerned  with  the  syntax  and  seman:cs  of  the  


Presenta)on  Layer   informa:on  exchanged  between  two  systems.  

•  The  session  layer  is  responsible  for  dialog  control  and  


Session  Layer   synchroniza:on.    

•  responsible  for  process-­‐to-­‐process  delivery  of  the  


Transport  Layer     en:re  message.    

•  responsible  for  the  source-­‐to-­‐des:na:on  delivery  of  a  


Network  Layer     packet,  possibly  across  mul:ple  networks  (links).    

•  the  delivery  of  the  packet  between  two  systems  on  the  
Data  Link  Layer     same  network  (links)  
•  It  deals  with  the  mechanical  and  electrical  
Physical  Layer     specifica:ons  of  the  interface  and  transmission  
medium.  

Sunday,  August  8,  21   87  


OSI  Model    
•  it  provides  user  interfaces  and  support  for  services  such  
Applica)on  Layer   as  email,  Mp,  shared  database  management,  Telenet  

Presenta)on  Layer   •  Transla:on  ,Encryp:on  ,  Compression      

Session  Layer   •  Dialog  control  ,Synchroniza:on    

•  Service-­‐point  addressing  ,Segmenta:on  and  reassembly,  


Transport  Layer     Connec:on  control,  Flow  control  ,Error  control:    

Network  Layer     •  Logical  addressing  ,Rou:ng.    

•  Framing,  Physical  addressing,  Flow  control,  Error  


Data  Link  Layer     control  ,Access  control    
•  Physical  characteris:cs  of  interfaces  and  medium,  
Representa:on  of  bits  ,Data  rate  ,Synchroniza:on  of  
Physical  Layer     bits  ,Line  configura:on  ,Physical  topology,  Transmission  
mode    
Sunday,  August  8,  21   88  
Contd.
#  The   figure   shows  
the   layers   involved  
when   a   message   is  
sent   from   device   A  
to  device  B.    
#  As   th e   mes s age  
travels   from   A   to   B,  
it   may   pass   through  
many   intermediate  
nodes.  
#    These   intermediate  
n o d e s   u s u a l l y  
involve  only  the  first  
three   boYom   layers  
of  the  OSI  model.  

Sunday,  August  8,  21   89  


Contd.

§  Layer   3,   for   example,   uses   the   services   provided   by   layer   2  


and  provides  services  for  layer  4.  Between  machines,  layer  x  

on   one   machine   communicates   with   layer   x   on   another  

machine.    

§  This  communica:on  is  governed  by  an  agreed-­‐upon  series  of  

rules  and  conven:ons  called  protocols.    

§  The  processes  on  each  machine  that  communicate  at  a  given  

layer  are  called  peer-­‐to-­‐peer  processes.    


Sunday,  August  8,  21   90  
Organization  of the Layers
#  The  seven  layers  can  be  thought  of  as  belonging  to  three  subgroups.    

#  Layers   1,   2,   and   3   -­‐   physical,   data   link,   and   network   -­‐   are   the   network   support  
layers;   they   deal   with   the   physical   aspects   of   moving   data   from   one   device   to  
another   (such   as   electrical   specifica:ons,   physical   connec:ons,   physical  
addressing,  and  transport  :ming  and  reliability).    

#  Layers  5,  6,  and  7-­‐  session,  presenta:on,  and  applica:on  -­‐  can  be  thought  of  as  the  
user   support   layers;   they   allow   interoperability   among   unrelated   soMware  
systems.  

#  Layer   4,   the   transport   layer,   links   the   two   subgroups   and   ensures   that   what   the  
lower  layers  have  transmiYed  is  in  a  form  that  the  upper  layers  can  use.  

#  The   upper   OSI   layers   are   almost   always   implemented   in   soMware;   lower   layers   are  
a   combina:on   of   hardware   and   soMware,   except   for   the   physical   layer,   which   is  
mostly  hardware.  
Sunday,  August  8,  21   91  
Contd.
# A  given  layer  within  the  OSI  model  communicates  with  three  other  layers:    
1.  the  layer    directly  above  it,    
2.  the  layer  directly  below  it  and    
3.  it’s  peer  layer  in  other  networked  computer  system.    

Sunday,  August  8,  21   92  


Data  Exchange  Process  

§  In  data  exchange  process,  par:cipa:ng  computers  work  in  


reverse  mode.  Layers  on  receiving  computer  perform  the  
same  task  in  reverse  mode.    
§  The  receiving  device  takes  delivery  of,  handles,  and  translates  
the  data  from  the  sending  device  at  a  par:cular  layer.    
§  For  example  on  sending  computer  presenta:on  layer  
compress  the  data,  same  presenta:on  layer  on  receiving  
computer  decompress  the  data.  

Sunday,  August  8,  21   Page  93  


Contd.
# On  sending  computer    
–  Sending application access the application layer.
–  Application provides data to the presentation layer.
–  Presentation layer format data as per network requirement and forward it's
to session layer.
–  Session layer initiate connection and forward the data to the transport layer.
–  Transport layer broke down the large data file in smaller segments and add a
header with control information, which are bits designated to describe how
to determine whether the data is complete, uncorrupted, in the correct
sequence, and so forth.
–  Segments are forwarded to network layer. Network layer add its header, with
logical address and convert it in packet and forwards packet to data link layer
–  Data link layer attach its header and footer to packet and convert it in frame.
–  Frames are forwarded to the physical layers that convert them in signals.
These signals are loaded in media.
Sunday,  August  8,  21   94  
Contd.
# On  receiving  computer    
–  Physical layer receive signals from media and convert them in frames. Frames
are forwarded to the data link layer.
–  Data link layer check the frame. All tampered frame are dropped here. If
frame is correct, data link layer strip down its header and footer from frame
and hand over packet to network layer.
–  Network layer check the packet with its own implementations. If it's found
everything fine with packet, it strips down its header from packet and hand
over segment to transport layer.
–  Transport layer again do the same job. It verifies the segments with its own
protocol rules. Only the verified segments are processed. Transport layer
remove its header from verified segments and reassemble the segments in
data. Data is handed over the session layer.
–  Session layer keep track of open connection and forwarded the receiving data
to presentation layer.
–  Presentation form the data in such a way that application layer use it.
–  Application layer on receiving computer find the appropriate application from
the computer and open data within particular application.
Sunday,  August  8,  21   95  
Contd.

#  The  figure  shown  in  the  next  slide,  gives  an  overall  view  of  the  OSI  layers,  D7  

means  the  data  unit  at  layer  7,  D6  means  the  data  unit  at  layer  6,  and  so  on.  

The  process  starts  at  layer  7  (the  applica:on  layer),  then  moves  from  layer  to  

layer  in  descending,  sequen:al  order.    

#  At  each  layer,  a  header,  or  possibly  a  trailer,  can  be  added  to  the  data  unit.  

#  Commonly,  the  trailer  is  added  only  at  Data-­‐Link  Layer  (Layer  2).    

#  When   the   formaYed   data   unit   passes   through   the   physical   layer,   it   is   changed  

into  an  electromagne:c  signal  &  transported  along  a  physical  link.  

Sunday,  August  8,  21   96  


Data exchange using the OSI model  

Sunday,  August  8,  21   97  


The  TCP/IP  Reference  Model  

Sunday,  August  8,  21   Page  98  


The  TCP/IP  Reference  Model

#  TCP/IP  means  Transmission  Control  Protocol  and  Internet  Protocol.    


#  TCP/IP   protocol   model   is   another   popular   layer   model   that   describes  
network  standards.    
#  It   was   developed   by   Department   of   Defense's   Project   Research   Agency  
(ARPA,   later   DARPA)   as   a   part   of   a   research   project   of   network  
interconnec:on  to  connect  remote  machines.  
#  The  features  that  stood  out  during  the  research,  which  led  to  making  the  
TCP/IP  reference  model  were:  
–  Support  for  a  flexible  architecture.  Adding  more  machines  to  a  network  
was  easy.  
–  The   network   was   robust,   and   connec'ons   remained   intact   un'l   the  
source  and  des'na'on  machines  were  func'oning.  
§  The  overall  idea  was  to  allow  one  applica:on  on  one  computer  to  talk    (to  
send  data  packets)  another  applica:on  running  on  different  computer.  

Sunday,  August  8,  21   99  


Cont  .  .  .

# This  model  has  same  names  of  layers  as  OSI  reference  model  has.    
# Don't   be   confuse   with   same   name,   layers   at   both   model   have  
different  func:onality  in  each  model.    
# It   is   the   network   model   used   in   the   current   Internet   architecture   as  
well.    
# These   protocols   describe   the   movement   of   data   between   the  
source  and  des:na:on  or  the  internet.    
# These  protocols  offer  simple  naming  and  addressing  schemes.  

Sunday,  August  8,  21   100  


TCP/IP  Model    

Applica)on  layer    

Transport  Layer    

Internet  Layer    

Network  Access  Layer    

Sunday,  August  8,  21   101  


Overview  of  Func)ons  of  TCP/IP  Layers

# Applica)on  layer:  
–  TCP/IP model combine the functionality of application layer, presentation layer and
session layer from OSI model in single application layer.
–  In TCP/IP model application layer do all tasks those are performed by upper layers
in OSI model.
–  Application layer deals with high level protocols, including data presentation,
compression and dialog control.
–  The specifications of this model describe a lot of applications that were at the top of
the protocol stack. Some of them were TELNET, FTP, SMTP, DNS
•  TELNET: allows connecting to a remote machine and run applications on it.
•  FTP(File Transfer Protocol): allows File transfer amongst computer users connected over a network. It
is reliable, simple and efficient.
•  SMTP(Simple Mail Transport Protocol): used to transport electronic mail between a source and
destination, directed via a route.
•  DNS(Domain Name Server) resolves an IP address into a textual address for Hosts connected over a
network.  

Sunday,  August  8,  21   102  


Cont  .  .  .  

§  Transport  layer:  


–  TCP protocol is used for reliable data delivery.
–  Flow control and error correction methods are used for guaranteed data
delivery.
–  It decides if data transmission should be on parallel path or single path.
–  Functions such as multiplexing, segmenting or splitting on the data
–  The applications can read and write to the transport layer.
–  Transport layer breaks the message (data) into small units so that they
are handled more efficiently by the network layer.
–  Transport layer also arrange the packets to be sent, in sequence.  

Sunday,  August  8,  21   103  


Cont  .  .  .  

§  Internet  layer:  


–  Selection of a packet switching network which is based on a connectionless
internetwork layer is called a internet layer provide all the functionality that
network layer provides in OSI model.
–  It is the layer which holds the whole architecture together.
–  It is responsible for finding the correct path for datagram [packet].
–  It helps the packet to travel independently to the destination.
–  Order in which packets are received is different from the way they are sent.
–  IP (Internet Protocol) is used in this layer.
§  Host-­‐to-­‐network  Layer  :  
–  A lowest layer and also called network access layer
–  It deals with LAN and WAN protocols and all the functionality provided by
physical and data link layer in OSI model.
–  Protocol is used to connect to the host, so that the packets can be sent over it.
–  Varies from host to host and network to network.  

Sunday,  August  8,  21   104  


Similari)es  between  OSI  and  TCP  /  IP  
Reference  Models  
§  Both  models  are  based  upon  layered  architecture.  
§  The  layers  in  the  models  are  compared  with  each  other.    

 
 
 
 
 

§  In  both  the  models,  protocols  are  defined  in  a  layer-­‐wise  manner.  
§  In  both  models,  data  is  divided  into  packets  and  each  packet  may  
take  the  individual  route  from  the  source  to  the  des:na:on.  

Sunday,  August  8,  21   105  


Differences  between  OSI  and  TCP  /  IP  
OSI  model     TCP/IP    
§  It  is  a  generic  model  that  is  based   §  It  is  a  protocol-­‐oriented  
upon  functionalities  of  each  layer.     standard.  
§  distinguishes  the  three  concepts,   §  TCP/IP  does  not  have  a  clear  
namely,  services,  interfaces,  and   distinction  between  these  three.  
protocols.     §  TCP/IP  protocols  layout  
Services  are  set  of  operations  and  Interface  
provides  a  way  to  implement  them  
standards  on  which  the  Internet  
was  developed.  So,  TCP/IP  is  a  
§  gives  guidelines  on  how  
more  practical  model.  
communication  needs  to  be  done  
§  the  protocols  were  developed  
§  the  model  was  developed  Girst  
Girst  and  then  the  model  was  
and  then  the  protocols  in  each  
developed.  
layer  were  developed.    
§  TCP/IP  has  four  layers.  
§  The  OSI  has  seven  layers  while  the  

Sunday,  August  8,  21   106  


Physical  Layer

#  The   physical   layer   coordinates   the   func:ons   required   to   carry   a   bit  


stream  over  a  physical  medium.    
#  It   deals   with   the   mechanical   and   electrical   specifica:ons   of   the  
interface  and  transmission  medium.    
#  It  also  defines  the  procedures  and  func:ons  that  physical  devices  and  
interfaces  have  to  perform  for  transmission  to  occur.  

The  physical  layer  is  responsible  for  movements  of  individual  bits  from  one  hop  (node)  to  the  
next.  
Sunday,  August  8,  21   107  
Layer  1:  The  Physical  Layer  :    

# lowest  layer  of  the  OSI  Model.  


–  It  activates,  maintains  and  deactivates  the  physical  
connection.  
–  It  is  responsible  for  transmission  and  reception  of  the  
unstructured  raw  data  
–  Voltages  and  data  rates  needed  for  transmission  is  
deGined  in  the  physical  layer.  
–  It  converts  the  digital/analog  bits  into  electrical  signal  
or  optical  signals.  
–  Data  encoding  is  also  done  in  this  layer.  

Sunday,  August  8,  21   108  


The physical layer is also concerned with the
following:

1.  Physical  characteris:cs  of  interfaces  and  medium.  The  physical  layer  defines  the  
characteris:cs   of   the   interface   between   the   devices   and   the   transmission  
medium.  It  also  defines  the  type  of  transmission  medium.  
2.  Representa:on   of   bits.   The   physical   layer   data   consists   of   a   stream   of   bits  
(sequence   of   0s   or   1s)   with   no   interpreta:on.   To   be   transmiYed,   bits   must   be  
encoded  into  signals  -­‐  electrical  or  op:cal.  The  physical  layer  defines  the  type  of  
encoding  (how  0s  and  1s  are  changed  to  signals).  
3.  Data  rate.  The  transmission  rate  -­‐  the  number  of  bits  sent  each  second  -­‐  is  also  
defined   by   the   physical   layer.   In   other   words,   the   physical   layer   defines   the  
dura:on  of  a  bit,  which  is  how  long  it  lasts.  
4.  Synchroniza:on  of  bits.  The  sender  and  receiver  not  only  must  use  the  same  bit  
rate  but  also  must  be  synchronized  at  the  bit  level.  In  other  words,  the  sender  
and  the  receiver  clocks  must  be  synchronized.  

Sunday,  August  8,  21   109  


Contd.

5.  Line   configura:on.   The   physical   layer   is   concerned   with   the  


connec:on   of   devices   to   the   media   (point   –   to   –   point   or  
mul:point).    

6.  Physical  topology.  The  physical  topology  defines  how  devices  


are  connected  to  make  a  network.  

7.  Transmission   mode.   The   physical   layer   also   defines   the      


direc:on  of  transmission  between  two  devices:  simplex,  half-­‐
duplex,  or  full-­‐duplex.    
Sunday,  August  8,  21   110  
Data  Representa)on    

! The   word   data   refers   to   informa:on   presented   in   whatever  


form   is   agreed   upon   by   the   par:es   crea:ng   and   using   the  
data.  

! Signal:  the  electrical  wave  that  is  used  to  represent  the  data.    

! It  Can  be  analog  or  digital  signal  

Sunday,  August  8,  21   111  


Data  Representa)on  Techniques  

! The   type   of   data   to   be   transmiYed   can   be   in   the   form   of   text,  


audio,  and  video  in  the  form  of  electrical  signal,  radio,  laser,  
or  other  radiated  energy  source.  

! Data  can  be  analog  or  digital  

! The  term  analog  data  refers  to  informa:on  that  is  con:nuous;  

!   digital  data  refers  to  informa:on  that  has  discrete  states.  

! Example:    analog  clock  (with  second,  minute  and  hour  hands)  


and  digital  clock  
Sunday,  August  8,  21   112  
Analog  and  digital  signals  

! An  analog  signal  has  infinitely  many  levels  of  intensity  over  a  
period  of  :me.    
! As   the   wave   moves   from   value   A   to   value   B,   it   passes  
through  and  includes  an  infinite  number  of  values  along  its  
path.    
! A   digital   signal,   on   the   other   hand,   can   have   only   a   limited  
number  of  defined  values.    
! Although   each   value   can   be   any   number,   it   is   oMen   as  
simple  as  1  and  0.  

Sunday,  August  8,  21   113  


Analog  Signals    

!  Are   Con:nuous   wave   that   carries   informa:on   by   altering   the  


characteris:cs  of  waves.    
!  Analogue   means   that   the   original   informa:on   is   retransmiYed  
to  the  receiver/listener  without  any  manipula)on.  
!  Here   the   signal   can   take   on  any  value   (within   the   limits   set   by  
the  recording  equipment  and  the  transmiYer).  
!  It  measures  rather  than  counts  
!  For   instance,   Voice   and   all   sounds   are   analog,   traveling   to  
human  ears  in  the  forms  of  waves.  

Sunday,  August  8,  21   114  


Contd.  

 
 

!  Radio,   telephone   and   recording   equipment   historically   have   been  


analog,   but   they   are   beginning   to   change   –due   to   large   to  
computers  to  the  other  types  of  signals-­‐digitals  

!  The   disadvantage   of   analogue   signals   is   that   any   'noise',  


interference,  added  to  the  signal  at  any  point  cannot  be  removed  
from   the   audio   signal   and   this   degrades   the   audio   quality   of   the  
signal  or  causes  'hiss'.  

Sunday,  August  8,  21   115  


Digital  Signals  

! are   a   discrete   series   of   pulses   -­‐   either   high   or   low   -­‐   on   or   off   -­‐  
some:mes  expressed  as  binary  code  1s  and  0s.  
! It  counts  but  not  measures  
! Discrete  pluses  of  data  transmission  rather  than  con:nues  wave  
! More  prevalent  in  computer  based  devices  
! Flashing   light   and   telegraph   message   are   tradi:onal   examples  
of  on-­‐off  pluses,  although  not  in  binary  code.  

Sunday,  August  8,  21   116  


Contd.  

The  advantage  of  digital  signals  is  that    


1.  they   are   much   less   likely   to   be   degraded   by   interference  
(noise).    
2.  also   it   is   possible   to   send   a   lot   more   informa:on   digitally  
(e.g.   more   television   channels)   than   using   analogue  
technology.  
3.  They  can  be  transmiYed  effec:vely  along  fibre  op:c  cables.  
(on  -­‐  light  signal,  off  -­‐  no  light  signal)  and  these  are  cheaper  
to   manufacture   than   copper   wiring   and   can   cope   with  
mul:ple  signals  without  interference  between  them.  
4.  They   can   be   sent   directly   to   computers   which   use   digital  
systems  themselves.  
Sunday,  August  8,  21   117  
Contd.  

! The  signals  from  a  satellite  are  digital.  They  use  a  system  called  

'packet   switching'   which   is   the   same   as   used   in   computer  

networks   and   for   the   internet.   This   system   is   par:cularly  

effec:ve  for  dealing  with  noise  elimina:on.  

Sunday,  August  8,  21   118  


Contd.  

Which  of  the  following    signals  are  Analog    and  which  are  Digital?    

!  Volume  control  on  a  radio  

!  Traffic  lights  

!  Motor  bike  throYle  

!  Water  tap  

!  Dimmer  switch  

!  Light  switch  

!  In  Music  on  a  CD  

!  Music  on  a  tape  

Sunday,  August  8,  21   119  


Reading  Assignment    

MODULATION  /DATA  ENCODING      

Sunday,  August  8,  21   120  


Modula)on  
§  Modula)on  is  the  process  of  transforming  a  carrier  
signal  so  that  it  can  carry  the  informa:on  of  a  
message  signal.  
§  It  superimposes  the  contents  of  the  message  signal  
over  a  high-­‐frequency  carrier  signal,  which  is  then  
transmiYed  over  communica:on  channels.  
§  Modula:on  can  be  of  two  types  −  
–  Analog  Modula:on  
–  Digital  Modula:on  

Sunday,  August  8,  21   121  


Digital  Data  to  Analog  Signal  Encoding  Techniques  
Ø Modula:on   involves   opera:on   on   one   or   more   of   the  
three   characteris:cs   of   a   carrier   signal:   amplitude,  
frequency,  and  phase.  
Ø  Accordingly,  there  are  three  basic  encoding  or  modula:on  
techniques  for  transforming  digital  data  into  analog  signals  
1.  Amplitude-­‐shiM  keying  (ASK)  
2.  Frequency-­‐shiM  keying  (FSK)  
3.  Phase-­‐shiM  keying  (PSK)  

   
Sunday,  August  8,  21   122  
Sunday,  August  8,  21   123  
Analog  Modula)on  
§  Here,  the  analog  informa:on  signal  is  transformed  to  
the  analog  carrier  signal  so  that  it  can  travel  large  
distances  without  substan:al  loss.  
§  Analog  modula:on  can  be  of  three  types  −  
–  Amplitude  Modula:on  
–  Frequency  Modula:on  
–  Phase  Modula:on  

Sunday,  August  8,  21   124  


Digital  Modula)on  
§  Digital  modula:on  is  the  process  of  conver:ng  a  
digital  bit  stream  into  an  analog  carrier  wave  for  
transmission  via  a  communica:on  channel.  
§  Digital  modula:on  is  broadly  divided  into  two  
categories  −  
     Bandpass  Modula)on  as  in  baseband  transmission:  
–  Here,  the  bits  are  converted  directly  into  signals.  
     Passband  Modula)on  as  in  passband  transmission:  
–  Here,  the  amplitude,  phase  or  frequency  of  the  carrier  
signal  is  regulated  to  transmit  the  bits.  

Sunday,  August  8,  21   125  


Digital  
Modula)on    

Baseband   Passband  
Modula)on   modula)on    

NRZ(Non   NRZI(NRZ   Manchester   ASK(Amplitud FSK(Frequency   PSK(Phase   BPSK(Binary  


return  to  zero)   invert)   Encoding   e  Shic  Keying)   Shic  Keying)   Shic  Keying)   PSK)  

Sunday,  August  8,  21   126  


DIGITAL  TRANSMISSION:  
§  how  to  convert  digital  data  into  digital  signals  ?  
§  It  can  be  done  in  two  ways:  
–   line  coding    
–  block  coding.    
§  For  all  communica:ons,  line  coding  is  necessary  
whereas  block  coding  is  op:onal.    

Sunday,  August  8,  21   127  


Digital-­‐to-­‐Digital  Conversion      
§  line  coding    
–  Uni-­‐polar    
–  Bipolar    
–  Polar  :4  types    
•  Polar  Non  Return  to  Zero  (Polar  NRZ)    
•  Return  to  Zero  (RZ)    
•  Manchester    
•  Differen:al  Manchester    
§  block  coding.  
–  involves  three  steps:    
•  Division  
•  Subs:tu:on  
•  Combina:on.    

Sunday,  August  8,  21   128  


Analog-­‐to-­‐Digital  Conversion    
§  Analog  data  is  a  con:nuous  stream  of  data  in  the  
wave  form  whereas  digital  data  is  discrete.  To  
convert  analog  wave  into  digital  data,  we  use  Pulse  
Code  Modula:on  (PCM).    
§  PCM  is  one  of  the  most  commonly  used  method  to  
convert  analog  data  into  digital  form.  It  involves  
three  steps:    
–  Sampling  
–  Quan:za:on  
–  Encoding.    
Sunday,  August  8,  21   129  
Assignment  #1  

§  Describe  the  following  digital  signal  encoding  formats  (which  format  is  

used  by  Ethernet?)  

1.  Non  return-­‐to-­‐Zero-­‐Level  (NRZ-­‐L)  

2.  Non  return  to  Zero  Inverted  (NRZI)  

3.  Bipolar-­‐AMI  

4.  Pseudoternary  

5.  Manchester  

6.  Differen)al  Manchester  

Sunday,  August  8,  21   130  


Sunday,  August  8,  21   131  
Sunday,  August  8,  21   132  
Serial  transmission  can  be  either  asynchronous  or  
synchronous.    
§  Asynchronous  Serial  Transmission    
–  It  is  named  so  because  there  is  no  importance  of  :ming.  Data-­‐bits  have  
specific  paYern  and  they  help  receiver  recognize  the  start  and  end  data  bits.  
For  example,  a  0  is  prefixed  on  every  data  byte  and  one  or  more  1s  are  added  
at  the  end.    
–  Two  con:nuous  data-­‐frames  (bytes)  may  have  a  gap  between  them.    
§  Synchronous  Serial  Transmission    
–  Timing  in  synchronous  transmission  has  importance  as  there  is  no  mechanism  
followed  to  recognize  start  and  end  data  bits.  There  is  no  paYern  or  prefix/
suffix  method.  Data  bits  are  sent  in  burst  mode  without  maintaining  gap  
between  bytes  (8-­‐  bits).  Single  burst  of  data  bits  may  contain  a  number  of  
bytes.  Therefore,  :ming  becomes  very  important.    
–  It  is  up  to  the  receiver  to  recognize  and  separate  bits  into  bytes.  The  
advantage  of  synchronous  transmission  is  high  speed,  and  it  has  no  overhead  
of  extra  header  and  footer  bits  as  in  asynchronous  transmission.    

Sunday,  August  8,  21   133  


ANALOG  TRANSMISSION    
§  To  send  the  digital  data  over  an  analog  media,  it  needs  
to  be  converted  into  analog  signal.  There  can  be  two  
cases  according  to  data  forma\ng.    
§  Bandpass:  The  filters  are  used  to  filter  and  pass  
frequencies  of  interest.  A  bandpass  is  a  band  of  
frequencies  which  can  pass  the  filter.    
§  Low-­‐pass:  Low-­‐pass  is  a  filter  that  passes  low  
frequencies  signals.    
§  When  digital  data  is  converted  into  a  bandpass  analog  
signal,  it  is  called  digital-­‐to-­‐  analog  conversion.  When  
low-­‐pass  analog  signal  is  converted  into  bandpass  
analog  signal,  it  is  called  analog-­‐to-­‐analog  conversion.    

Sunday,  August  8,  21   134  


Digital-­‐to-­‐Analog  Conversion    
§  When  data  from  one  computer  is  sent  to  another  
via  some  analog  carrier,  it  is  first  converted  into  
analog  signals.  Analog  signals  are  modified  to  
reflect  digital  data.    
§  An  analog  signal  is  characterized  by  its  amplitude,  
frequency,  and  phase.    
§  There  are  three  kinds  of  digital-­‐to-­‐analog  
conversions:    
–  Amplitude  ShiM  Keying    
–  Frequency  ShiM  Keying    
–  Phase  ShiM  Keying    

Sunday,  August  8,  21   135  


Analog-­‐to-­‐Analog  Conversion    
§  Analog  signals  are  modified  to  represent  analog  
data.  This  conversion  is  also  known  as  Analog  
Modula)on.  
§   Analog  modula:on  is  required  when  bandpass  is  
used.    
§  Analog  to  analog  conversion  can  be  done  in  three  
ways:    
–  Amplitude  modula:on    
–  Frequency  modula:on    
–  Phase  modula:on    
Sunday,  August  8,  21   136  

You might also like