1 Unit
1 Unit
Prepared by
Dr. Stanly Felix C
Assistant Professor
Department of Computing (MSc Software Systems)
Coimbatore Institute of Technology, India
Overview of Unit I
✔Introduction
✔Data Communications
✔Networks
✔The Internet
✔OSI model
✔Addressing
2
INTRODUCTION
Data:
– Consists of useful or useless information to convey.
– Forms > Text(alpha numeric and others), Image or picture, Video or motion
picture, Audio.
Communication:
– Whole sum data are to be transmitted or received between the terminals or
devices or gadgets.
– The human beings or the machines are going to make use of it.
Networking:
– Data Communication can be performed between one to one or one to many
or many to many.
– To communicate faster between the terminals, a group or multiple groups
are formed called networking.
3
DATA COMMUNICATIONS
Exchange of data between two devices via some form of transmission medium such as a
wire cable.
The communicating devices must be part of a communication system made up of a
combination of hardware (physical equipment) and software (programs).
The effectiveness of a data communications system depends on four fundamental
characteristics:
1. Delivery: The system must deliver data to the correct destination. Data must be received
by the intended device or user and only by that device or user.
2. Accuracy: The system must deliver the data accurately. Data that have been altered in
transmission and left uncorrected are unusable.
3. Timeliness: The system must deliver data in a timely manner. Data delivered late are
useless. In the case of video and audio, timely delivery means delivering data as they
are produced, in the same order that they are produced, and without significant delay.
This kind of delivery is called real-time transmission.
4. Jitter: Jitter refers to the variation in the packet arrival time. It is the uneven delay in the
delivery of audio or video packets. For example, let us assume that video packets are
sent every 30 ms. If some of the packets arrive with 30-ms delay and others with 40-ms
delay, an uneven quality in the video is the result.
4
DATA COMMUNICATIONS
5
DATA COMMUNICATIONS
Data Representation:
1.TEXT data
•set of bit patterns represent alphanumeric chars is called CODE and the process is called
CODING.
•Ex: Unicode coding system – used 32 bits to represent a symbol or char.
•ASCII – represents 127 chars using 8 bit pattern.
6
DATA COMMUNICATIONS
2. NUMERAL data
•Uses binary 0’s and 1’s to represent numbers in real-time.
•Binary, octal and hexadecimal base conversions utilized.
3. IMAGE data
•image is composed of a matrix of pixels (picture elements)
•Pixels - smallest possible picture element of a captured image, are utilized to represent as
data.
•The size of the pixel depends on the resolution. For example, an image can be divided into
1000 pixels or 10,000 pixels. In the second case, there is a better representation of the image
(better resolution), but more memory is needed to store the image.
•RGB and YCM used.
•Ex: black and white color in a chess board, can be represented using 1 bit pattern. 0 for
black and 1 for white.
•Image to binary conversion is done
7
DATA COMMUNICATIONS
8
DATA COMMUNICATIONS
4. VIDEO data
•recording or broadcasting of a picture or movie.
•produced as a continuous entity (e.g., by a TV camera) or of images, each a discrete entity,
arranged to convey the idea of motion.
•25 to 30 frames / sec and 6 to 7 MHz bandwidth / channel
•“Scanning” is performed on the received signal.
•Video and audio synchronization is essential.
9
DATA COMMUNICATIONS
10
DATA COMMUNICATIONS
5. AUDIO data
•recording or broadcasting of sound or music
•It is continuous, not discrete.
•Audio signal > Sampling > Quantization > Binary value > storage
11
DATA COMMUNICATIONS
12
DATA COMMUNICATIONS
Data Flow
• Communication between two devices can be performed using 3 modes: simplex,
half-duplex, or full-duplex.
13
DATA COMMUNICATIONS
1. Simplex Mode:
• communication is unidirectional, as on a one-way street. Only oneof the two devices on
a link can transmit; the other can only receive.
• Ex: Keyboards and traditional monitors
• uses the entire capacity of the channel to send data in one direction.
Physical structures
Network attributes: Type of Connection 1. Point-to-Point 2. Multipoint
1. Point-to-Point connection:
• Provides a dedicated link between two devices
• Entire capacity of the link is reserved for transmission between those two devices.
• End-points are connected using cables, wires, satellite or microwave links
16
NETWORKS
Physical Topology
•the way in which a network is laid out physically.
•Two or more devices connect to a link; two or more links form a topology.
•Topology: geometric representation of the relationship of all the links and linking devices
(usually called nodes) to one another.
17
NETWORKS
5.MESH TOPOLOGY
18
NETWORKS
ADVANTAGES
Dedicated links guarantees that each connection can carry its own data load, thus
eliminating the traffic problems that can occur when links must be shared by multiple
devices.
Mesh topology is robust. If one link becomes unusable, it does not incapacitate the
entire system.
There is the advantage of privacy or security. When every message travels along a
dedicated line, only the intended recipient sees it.
Point-to-point links make fault identification and fault isolation easy. Traffic can be
routed to avoid links with suspected problems. This facility enables the network
manager to discover the precise location of the fault. 19
NETWORKS
DISADVANTAGES
Installation and reconnection are difficult. because every device must be connected to every
other device.
Needs large amount of cabling and the number of I/O ports.
Hardware required to connect each link (I/O ports and cable) can be prohibitively
expensive.
For these reasons a mesh topology is usually implemented in a limited fashion.
APPLICATIONS
•Practical example of a mesh topology is the connection of telephone regional offices in
which each regional office needs to be connected to every other regional office.
2. STAR TOPOLOGY
20
NETWORKS
• Each device has a dedicated point-to-point link only to a central controller, usually
called a hub.
• The devices are not directly linked to one another. Unlike a mesh topology, a star
topology does not allow direct traffic between devices.
• If one device wants to send data to another, it sends the data to the controller, which then
relays the data to the other connected device.
ADVANTAGES
Less expensive, easy to install and reconfigure. Because, each device needs only one
link and one I/O port to connect it to any number of others.
Far less cabling needs to be housed, and additions, moves, and deletions involve only
one connection: between that device and the hub.
Robustness: If one link fails, only that link is affected. All other links remain active. This
factor also lends itself to easy fault identification and fault isolation. As long as the hub
is working, it can be used to monitor link problems and bypass defective links.
21
NETWORKS
DISADVANTAGES
Dependency of the whole topology on one single point, the hub. If the hub goes down, the
whole system is dead.
More cabling is required in a star than in some other topologies (such as ring or bus).
APPLICATIONS
Used in local-area networks (LANs). High-speed LANs often use a star topology with a
central hub.
3. BUS TOPOLOGY
22
NETWORKS
ADVANTAGES
Easy installation.
Uses less cabling than mesh or star topologies. In a star, for example, four network
devices in the same room require four lengths of cable reaching all the way to the hub.
In a bus, this redundancy is eliminated.
Only the backbone cable stretches through the entire facility. Each drop line has to reach
only as far as the nearest point on the backbone.
23
NETWORKS
DISADVANTAGES
Difficult reconnection and fault isolation. A bus is usually designed to be optimally efficient
at installation. It can therefore be difficult to add new devices.
Signal reflection at the taps can cause degradation in quality. This degradation can be
controlled by limiting the number and spacing of devices connected to a given length of
cable. Adding new devices may therefore require modification or replacement of the
backbone.
A fault or break in the bus cable stops all transmission, even between devices on the same
side of the problem. The damaged area reflects signals back in the direction of origin,
creating noise in both directions.
APPLICATIONS
Ethernet LANs
24
NETWORKS
4. RING TOPOLOGY
•Each device has a dedicated point-to-point connection with only the two devices on either
side of it.
•A signal is passed along the ring in one direction, from device to device, until it reaches its
destination.
•Each device in the ring incorporates a REPEATER. When a device receives a signal
intended for another device, its repeater regenerates the bits and passes them along.
25
NETWORKS
ADVANTAGES
Easy to install and reconfigure. Each device is linked to only its immediate neighbours
(either physically or logically).
To add or delete a device requires changing only two connections.
Fault isolation is simplified. Generally, in a ring a signal is circulating at all times. If one
device does not receive a signal within a specified period, it can issue an alarm. The alarm
alerts the network operator to the problem and its location.
DISADVANTAGES
Unidirectional traffic can be a disadvantage. In a simple ring, a break in the ring (such as a
disabled station) can disable the entire network.
APPLICATIONS
Ring topology was prevalent when IBM introduced its local-area network, Token Ring.
26
NETWORKS
27
NETWORKS
28
NETWORKS
WAN examples:
1.point-to-point WANs and
2.switched WANs
29
NETWORKS
2. Switched WAN
30
NETWORKS
Internetwork
•When two or more networks are connected, they make an internetwork, or internet.
•When a host in the west coast office sends a message to another host in the same office, the
router blocks the message, but the switch directs the message to the destination.
•On the other hand, when a host on the west coast sends a message to a host on the east
coast, router R1 routes the packet to router R2, and the packet reaches the destination.
31
NETWORKS
32
NETWORKS
33
NETWORKS
SWITCHING
•An internet is a switched network in which a switch connects at least two links
together.
•A switch needs to forward data from a network to another network when required.
•TWO types of switched network:
1. circuit-switched and 2. packet-switched networks
34
NETWORKS
35
NETWORKS
36
NETWORKS
THE INTERNET
• An internet is two or more networks that can communicate with each other.
37
NETWORKS
2. Cable Networks
A residence or a small business can be connected to the Internet by using this
service. It provides a higher speed connection, but the speed varies depending on the
number of neighbours that use the same cable.
3. Wireless Networks
A household or a small business can use a combination of wireless and wired
connections to access the Internet.
4. Direct Connection
A large organization or a large corporation can itself become a local ISP and be
connected to the Internet. This can be done if the organization or the corporation
leases a high-speed WAN from a carrier provider and connects itself to a regional ISP.
39
NETWORKS
INTERNET HISTORY
1.ARPANET(Advanced Research Projects Agency Network)
•Each host computer (not necessarily from the same manufacturer) would be attached to
a specialized computer, called an interface message processor (IMP).
•The IMPs, in turn, would be connected to each other. Each IMP had to be able to
communicate with other IMPs as well as with its own attached host.
•Software called the Network Control Protocol (NCP) provided communication between
the hosts.
MATURITY LEVELS
Six levels are there:
1.Proposed Standard
•Specification that is stable, well understood, and of sufficient interest to the Internet
community.
•At this level, the specification is usually tested and implemented by several different
groups.
41
NETWORKS
2. Draft Standard
•A proposed standard is elevated to draft standard status after at least two successful
independent and interoperable implementations.
•Barring difficulties, a draft standard, with modifications if specific problems are
encountered, normally becomes an Internet standard.
3. Internet Standard
•A draft standard reaches Internet standard status after demonstrations of successful
implementation.
4. Historic
•They either have superseded by later specifications or have never passed the necessary
maturity levels to become an Internet standard.
5. Experimental
•Describes the work related to an experimental situation that does not affect the
operation of the Internet.
•Such an RFC should not be implemented in any functional Internet service.
42
NETWORKS
6. Informational
•Contains general, historical, or tutorial information related to the Internet. It is usually
written by someone in a non-Internet organization, such as a vendor.
43
NETWORKS
REQUIREMENT LEVELS
Five levels are there:
1.Required
•An RFC is labelled required if it must be implemented by all Internet systems to
achieve minimum conformance.
•For example, IP and ICMP are required protocols.
2. Recommended
•An RFC labelled recommended is not required for minimum conformance.
•It is recommended because of its usefulness. For example, FTP and TELNET are
recommended protocols.
3. Elective
•An RFC labelled elective is not required and not recommended. However, a system can
use it for its own benefit.
4. Limited Use
•An RFC labelled limited use should be used only in limited situations. Most of the
experimental RFCs fall under this category.
5. Not Recommended
•An RFC labelled not recommended is inappropriate for general use. Normally a
historic RFC may fall under this category.
44
NETWORKS
INTERNET ADMINISTRATION
46
NETWORKS
47
NETWORKS
48
NETWORKS
Modularity
•Means independent layers defined in terms of a black box with inputs and outputs.
Module(layer)
•A layer needs to be able to receive a set of services from the lower layer and to give the
services to the upper layer.
49
NETWORKS
50
NETWORKS
LAYERS:
1.Physical layer
•Responsible for carrying individual bits in a frame across the link.
•The communication between two devices at the physical layer is still a logical
communication because there is another, hidden layer, the transmission media (cable or
wire).
•The transmission medium does not carry bits; it carries electricalor optical signals.
•The bits received in a frame from the data-link layer are transformed and sent through
the transmission media, but we can think that the logical unit between two physical
layers in two devices is a bit.
51
NETWORKS
3. Network layer
•responsible for creating a connection between the source computer and the destination.
•There can be several routers from the source to the destination, the routers in the path
are responsible for choosing the best route for each packet.
•The network layer in the Internet includes the main protocol, Internet Protocol (IP), that
defines the format of the packet, called a datagram at the network layer.
•IP is also responsible for routing a packet from its source to its destination.
•IP is a connectionless protocol that provides no flow control, no error control, and
no congestion control services. This means that if any of theses services is required
for an application, the application should rely only on the transport-layer
protocol.
•The network layer also includes unicast (one-to-one) and multicast (one-to-many)
routing protocols.
52
NETWORKS
4. Transport layer
•The transport layer is responsible for giving services to the application layer: to get a
message from an application program running on the source host and deliver it to
the corresponding application program on the destination host.
5. Application layer
•The logical connection between the two application layers is end to end.
•Two application layers exchange messages between each other as though there were a
bridge between the two layers.
•Communication at the application layer is between two processes (two programs
running at this layer).
•To communicate, a process sends a request to the other process and receives a
response. Process-to-process communication is the duty of the application layer.
•Supported by protocols like HTTP, SMTP, FTP, TELNET, SSH, SNMP, DNS and
IGMP
53
NETWORKS
• The Hypertext Transfer Protocol (HTTP) is a vehicle for accessing the World Wide
Web (WWW).
• The Simple Mail Transfer Protocol (SMTP) is the main protocol used in electronic
mail (e-mail) service.
• The File Transfer Protocol (FTP) is used for transferring files from one host to
another.
• The Terminal Network (TELNET) and Secure Shell (SSH) are used for accessing a
site remotely.
• The Simple Network Management Protocol (SNMP) is used by an administrator to
manage the Internet at global and local levels.
• The Domain Name System (DNS) is used by other protocols to find the
network-layer address of a computer.
• The Internet Group Management Protocol (IGMP) is used to collect membership in
a group.
54
NETWORKS
LAYERED ARCHITECTURE
Ex: Communication through an Internet
55
NETWORKS
56
NETWORKS
57
NETWORKS
58
NETWORKS
59
NETWORKS
60
NETWORKS
61
NETWORKS
62
NETWORKS
ADDRESSING
63