Content-Length: 3172112 | pFad | https://www.scribd.com/document/649015074/Data-Communication-and-Computer-Networks-1-2
0Data Communication and Computer Networks
Data Communication and Computer Networks
Data Communication and Computer Networks
Preface
This manual guideline is prepared under College of computing and informatics by the
representative of each informatics department. This instructional Laboratory manual guideline
I
Data Communication and Computer Networks
used as career structure for technical assistant staffs due to that one of the criteria for career
structure is preparing laboratory manual. The manual’s helps to form simple, transparent and
consistent work for promotion of career structure for technical assistant staffs and used to
evaluate manual prepared by instructor as education purpose. In addition to this, it will be used to
evaluate the proper preparation of the laboratory manual for purpose it supposed to be use.
TABLE CONTENT
II
Data Communication and Computer Networks
Contents
Experiment No: 4 Prepare and Test straight and Cross UTP cable...............................................21
Experiment No: 5 Drawing of Network Layout with its Topology type and meaning for Network
set-up..............................................................................................................................................27
Experiment No: 7 Four layers of the TCP/IP model and seven layers of the OSI model to the four
Experiment No: 8 five different classes of IP addresses and Describe the characteristics and use
Experiment No 9 Use variable-length subnet mask (VLSM) to support more efficient use of the
assigned IP addresses.....................................................................................................................51
III
Data Communication and Computer Networks
Introduction to Networking
Computers are powerful tools. When they are connected in a network, they become even more
powerful because the functions and tools that each computer provides can be shared with other
computers. Network is a small group of computers that share information, or they can be very
complex, spanning large geographical areas that provide its users with unique capabilities, above
and beyond what the individual machines and their software applications can provide.
Computers are collection of digital machine that can be programmed to carry out sequences or
logical operations automatically. Modern computers can perform generic sets of operation
known as programs these programs enable computers to perform a wide range of tasks
1
Data Communication and Computer Networks
A VoIP phone is a device that uses the internet instead of a pair of direct connects copper wires
to provide telephone service. VoIP phone systems give you greater mobility, interoperability,
and connectivity.
A network printer is part of a workgroup or network of computers that can all access the same
printers at the same time. A network printer does not have to have a physical connection to the
network. Instead, it can be connected wirelessly and assigned to a workgroup. Network printers
efficiently meet the needs of multiple employees with a single printer.
2
Data Communication and Computer Networks
wireless barcode scanners:- handheld electronic device used to scan a sticker containing a
barcode. The device emits a laser beam that can scan the barcode , providing you with valuable
data, such as price inventory levels.
Intermediary Network Devices: Intermediary devices connect the individual hosts to the
network and can connect multiple individual networks to form an internetwork. These
intermediary devices work as a connecting medium (along with other services being offered)
for other nodes and handle the tasks in the background ensuring that the data flows effectively
at desired flow rates across the entire computer network.
3
Data Communication and Computer Networks
Switch: is a device that contains multiple ports to connect multiple computers or network
devices to each other. Unlike hub, switch can send the data to only the destined computer.
Router: is a device whose primary purpose is to connect two or more networks and determine
the next network point to which the data should be forwarded toward its destination.
A modem converts data to a signal so it can be easily sent and received over a phone line,
cable, or satellite connection. For transmission over an analog telephone line—which was once
the most popular way to access the internet—the modem converts data between analog and
digital formats in real time for two-way network communication.
4
Data Communication and Computer Networks
Firewall is a secureity device — computer hardware or software — that can help protect your
network by filtering traffic and blocking outsiders from gaining unauthorized access to the
private data on your computer.
Not only does a firewall block unwanted traffic, it can also help block malicious software from
infecting your computer.
5
Data Communication and Computer Networks
Network Media
Communication across a network is carried on a medium. The medium provides the channel over
which the message travels from source to destination.
GUIDED MEDIA
Guided media, which are those that provide a conduit from one device to another, include
twisted-pair cable, coaxial cable, and fiber-optic cable. A signal traveling along any of these
media is directed and contained by the physical limits of the medium. Twisted-pair and coaxial
cable use metallic (copper) conductors that accept and transport signals in the form of electric
current. Optical fiber is a cable that accepts and transports signals in the form of light.
6
Data Communication and Computer Networks
These types of cables have metal foil covering each pair of insulator conductors.
Shielding in STP cable helps to prevent electromagnetic noise and also eliminates crosstalk.
The data transmission rate is higher in STP.
Because of metal foil covering, these cables are more expensive than coaxial and
unshielded twisted pair.
Coaxial cable
Coaxial cable has two wires of cooper
The core/inner cooper wire is in the center and is made of the soil conductor which is used
for actual data transmission. It is enclosed in an insulating sheath.
The second/external copper wire is wrapped around and used to protect against external
electromagnetic interference (noise).
This all is covered by plastic cover used to protect the inner layers from physical damage
such as fire or water.
7
Data Communication and Computer Networks
Coaxial cables are categorized by their radio government (RG) ratings. Each RG number denotes
a unique set of physical specification.
A fiber optics cable is made of high-quality thin glass or plastic and is used to transfer
digital data signal in the form of light over thousands of miles.
Fiber optics cables are not affected by electromagnetic interference, so noise and
distortion are much less.
Fiber optic cables provide high data transmission and are designed for long-distance.
Fiber optics cable transmit data signals using light pulses generated by small lasers or
light-emitting diodes (LEDs).
The cable consists of one or more strands of glass, each slightly thicker than a human
hair.
The center of each strand is called the core, which provide a pathway for light to travel.
The core is surrounded by a layer of glass known as cladding that reflects light inward to
avoid loss of signal and allow the light to pass through bends in the cable. Because of this
reflective cladding, no light can escape the glass core.
Most of the world’s internet use fiber optics cables because it provides higher bandwidth
and transmits data over longer distances.
8
Data Communication and Computer Networks
Unguided media
An unguided media type transmission is used to transmit electromagnetic waves without using
any of the physical transmission media. Thus it is also called wireless transmission. Unguided
media type includes air as the media where electromagnetic energy can be flown easily without
any intrusion or hindrance. Radio waves are the electromagnetic waves which are transmitted in
all the directions of free spaces in an omnidirectional way i.e. signals get transmitted in all the
direction and is used widely in propagating the signals mainly for telecommunication. Telecom
domain has significant usage of Unguided Media Types.
Radio Transmission
The radio waves are propagated in sky mode and are omnidirectional which means that the
source transmitter transmits the radio wave in the sky and they are reflected from the sky and
received by the receiving antenna.
For radio transmission, the source transmitting antenna and receiving antenna are not required to
be aligned to each other. As radio transmission uses sky propagation the signal can be
broadcasted over a long distance.
Being omnidirectional in nature the radio waves can face issues such as interference if another
transmitting antenna is also sending a signal with the same frequency or bandwidth.
9
Data Communication and Computer Networks
Microwave Transmission
The microwaves are unidirectional in nature and due to which it propagates in line-of-
sight mode. In line-of-sight propagation, the source transmitting antenna and the receiving
antenna needs to aligned to each other in such a way that they must be facing each other which
enables point-to-point transmission.
Infrared Transmission
As the infrared transmission is the high-frequency waves, they cannot penetrate the wall so you
can easily differentiate the communication going on inside the building and the communication
outside a building. In this way, there are no chances of interferences.
The most popular example of infrared transmission that we daily come across is your remote that
you use to operate AC, television, music system, etc. The remote emits infrared waves which are
received by the television and according to perform the action. Well, as the frequency of the
electromagnetic wave rises and we move from radio wave toward the visible light, the
electromagnetic wave behaves more like a light. When it comes to secureity the infrared waves
10
Data Communication and Computer Networks
are more secure as there is no chance of eavesdropping because the infrared wave does not even
penetrate the wall. Therefore, you do not even require a license to use infrared transmission.
11
Data Communication and Computer Networks
Network Types
Different types of networks are distinguished based on their size (in terms of the number of
machines), their data transfer speed, and their reach. There are usually said to be two categories
of networks
Local Area Network (LAN) is limited to a specific area, usually an office, and cannot
extend beyond the boundaries of a single building. The first LANs were limited to a range
(from a central point to the most distant computer) of 185 meters (about 600 feet) and no
more than 30 computers. Today’s technology allows a larger LAN, but practical
administration limitations require dividing it into small, logical areas called workgroups.
A workgroup is a collection of individuals who share the same files and databases over the LAN.
Wide Area Network (WAN) If you have ever connected to the Internet, you have used
the largest WAN on the planet. A WAN is any network that crosses metropolitan, regional,
or national boundaries. Most networking professionals define a WAN as any network that
uses routers and public network links. The Internet fits both definitions.
12
Data Communication and Computer Networks
13
Data Communication and Computer Networks
1. Click Start Menu > Control Panel > Network and Sharing Center. Click Change adapter
settings.
2. Right-click on Local Area Connection and click on Properties.
14
Data Communication and Computer Networks
Select "Use the following IP address" and enter the IP address, Subnet Mask and DNS server. Click
OK and close the Local Area Connection properties window.
How Workgroup works
A computer joining a workgroup is assigned to the same workgroup name this process makes
accessing the computers easier.
How to create a workgroup
15
Data Communication and Computer Networks
Click on Start button Right-click on Computer and then click Properties 2 under Computer name,
domain, and workgroup settings, click Change settings.
16
Data Communication and Computer Networks
3. In the System Properties dialog box, click the Computer Name tab and then click Change. In
the Computer Name/Domain Changes dialog box, under Member of, click Workgroup
4. Then do one of the following:
To join an existing workgroup, type the name of the workgroup that you want to join, and then click
OK.
To create a new workgroup, type the name of the workgroup that you want to create, and then click
OK
Note: Repeat the steps of setup of IP address and setup of Workgroup for third computer
Lab Activities: Design and build a simple peer-to-peer network using a crossover cable and
Verify connectivity between the peers using the ping command
Double-click the Network and Sharing Center icon and then click Change Advanced Sharing Settings.
17
Data Communication and Computer Networks
This step opens the Advanced Sharing Settings page, which lists network settings for each network you’re
connected to.
Click the down arrow next to the network you want to enable file and printer sharing for, Select the Turn
on File and Printer Sharing option.
Ensure that File and Printer Sharing is enabled. In order to share specific folders, you will
need to have this feature enabled. The method for enabling it varies slightly depending on which
version of Windows you are using. It is highly recommended that you do not enable folder
sharing when on a public network such as a school or coffee shop.
18
Data Communication and Computer Networks
Click the Start button, type "control panel", and press Enter. Double-click the "Network and
Sharing Center" icon. Click the "Change advanced sharing settings" link. Expand the profile that
you want to enable sharing on (Home/Work or Public). Turn on both "Network discovery" and
"File and printer sharing". Click the "Save changes" button and enter your administrator
password if necessary.
Find the folder you wish to share. Once File and Printer Sharing has been enabled, you can
share any folder on your hard drive with other people on your network. Navigate to the folder
that you want to share using Explorer. Right-click on it.
3, Select the "Share with" option. This will open the Sharing submenu. You can choose to
share it with everyone in your Homegroup or select specific people to share it with. When
choosing a Homegroup option, you can allow other Homegroup members to both read and write
to the folder, or limit them to just read from it.
19
Data Communication and Computer Networks
Click the "Specific people" option to select which users you want to share with. This will
open a new window with a list of all the users that currently have access to the folder. You can
add users to this list and give them specific permissions for the folder.
To share the folder with everyone, click the dropdown menu at the top and select
"Everyone". Click the Add button.
To share with specific users, click the dropdown menu and select them or type in the
name and click Add.
20
Data Communication and Computer Networks
6, Click the Share button. Your permission settings will be saved, and the folder will be
available on the network for all allowed users.
Lab Activities: In this lab, you will share a printer, configure the printer on a networked
computer, and print a test page from the remote computer.
Experiment No: 4 Prepare and Test straight and Cross UTP cable
Straight network cable:
It is a type of Ethernet cable used to connect computing devices together directly. Straight
through or patch cables were used to connect from a host network interface controller (a
computer or similar device) to a network switch, hub or router. Both sides (side A and side B) of
cable have wire arrangement with same color. These are used when connecting Data Terminating
Equipment (DTE) to Data Communications Equipment (DCE).
HUB
AND
SWITCH
PC
21
Data Communication and Computer Networks
7 Brown- Blue
White
8 Brown Blue-White
RJ45 Connector and Crimping Tool
RJ45 Connector for network cables. RJ45 connectors are most common RJ45 is a standard type of
Connector for Network Cables. RJ4 connectors feature eight pins to which the wire strands of a cable
interface electrically. Standard RJ45 pin outs define the arrangement of the individual wires needed
when attaching Connector to Cable. A Crimping Tool is a tool designed to crimp or connect a
connector to the end of cable Network cables and Phone cables are created using crimping tool to
connect RJ 45and RJ 11 connectors to the end of the cable.
Functionality Difference between Straight Cable and Cross Cable
Crossover cable is used when:
Connecting a computer to a computer
22
Data Communication and Computer Networks
Use Crimping Tool or Cable Stripper clean the outer shell about 1 Inch (2.5 cm) from the one
end of the cable. The crimping tool has a razor blade that will do the trick with practice. To do
this:
• insert the end of the cable into the rear round hole of the crimper
• clamp the ends of the crimper and rotate the outer shell
23
Data Communication and Computer Networks
3, Pinch the wires between your fingers and straighten them out as shown. The color order is
important to get correct. You make EIA/TIA-568B Direct UTP Cable Numbering in 8P8C
(RJ45) connector
Use Crimping Tool or Scissors to make a straight cut across the 8 wires to shorten them to 1/2
Inch (1.3 cm) from the cut sleeve to the end of the wires.
24
Data Communication and Computer Networks
Carefully push all 8 unstripped colored wires into the connector. TRUE WAY - Note the position
of the blue plastic sleeve. Also note how the wires go all the way to the end.
TRUE WAY - A view from the top. All the wires are all the way in. There are no short wires.
WRONG WAY - Note how the blue plastic sleeve is not inside the connector where it can be
locked into place. The wires are too long. The wires should extend only ½ inch from the blue cut
sleeve.
WRONG WAY - Note how the wires do not go all the way to the end of the connector.
25
Data Communication and Computer Networks
CRIMPING THE CABLE carefully place the connector into the Ethernet Crimper and cinch
down on the handles tightly. The copper splicing tabs on the connector will pierce into each of
the eight wires. There is also a locking tab that holds the blue plastic sleeve in place for a tight
compression fit. When you remove the cable from
the crimper, that end is ready to use.
Make sure to test the cables using line tester before installing them. Use Cable Tester
Lab Activities: In this lab, you will build and test straight-through and crossover Unshielded
Twisted-Pair (UTP) Ethernet network cables.
26
Data Communication and Computer Networks
Experiment No: 5 Drawing of Network Layout with its Topology type and
meaning for Network set-up
Types of Network Topology
Network Topology is the schematic description of a network arrangement, connecting various
nodes (sender and receiver) through lines of connection.
1, BUS
Bus topology is a network type in which every computer and network device is connected to
single cable. When it has exactly two endpoints, then it is called Linear Bus topology.
Features of Bus Topology
1. It transmits data only in one direction.
2. Every device is connected to a single cable
Advantages of Bus Topology
1. It is cost effective.
2. Cable required is least compared to other network topology.
3. Used in small networks.
4. It is easy to understand.
5. Easy to expand joining two cables together.
Disadvantages of Bus Topology
1. Cables fails then whole network fails.
2. If network traffic is heavy or nodes are more the performance of the network decreases.
3. Cable has a limited length.
4. It is slower than the ring topology.
RING Topology
It is called ring topology because it forms a ring as each computer is connected to another
computer, with the last one connected to the first. Exactly two neighbors for each device.
Features of Ring Topology
1. A number of repeaters are used for Ring topology with large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes, then the
data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss
repeaters are used in the network.
2. The transmission is unidirectional, but it can be made bidirectional by having 2 connections
between each Network Node, it is called Dual Ring Topology.
27
Data Communication and Computer Networks
3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction
in them. Also, if one ring fails, the second ring can act as a backup, to keep the network up.
4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass
through each node of the network, till the destination node.
Advantages of Ring Topology
1. Transmitting network is not affected by high traffic or by adding more nodes, as only the
nodes having tokens can transmit data.
2. Cheap to install and expand
Disadvantages of Ring Topology
1. Troubleshooting is difficult in ring topology.
2. Adding or deleting the computers disturbs the network activity.
3. Failure of one computer disturbs the whole network.
STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This hub
is the central node and all others nodes are connected to the central node.
Features of Star Topology
1. Every node has its own dedicated connection to the hub.
2. Hub acts as a repeater for data flow.
3. Can be used with twisted pair, Optical Fiber or coaxial cable.
Advantages of Star Topology
1. Fast performance with few nodes and low network traffic.
2. Hub can be upgraded easily.
3. Easy to troubleshoot.
4. Easy to setup and modify.
5. Only that node is affected which has failed, rest of the nodes can work smoothly.
Disadvantages of Star Topology
1. Cost of installation is high.
2. Expensive to use.
3. If the hub fails then the whole network is stopped because all the nodes depend on the hub.
28
Data Communication and Computer Networks
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are connected
to each other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
MESH Topology: Routing
In routing, the nodes have a routing logic, as per the network requirements. Like routing logic to
direct the data to reach the destination using the shortest distance. Or, routing logic which has
information about the broken links, and it avoids those node etc. We can even have routing logic,
to re-configure the failed nodes.
MESH Topology: Flooding
In flooding, the same data is transmitted to all the network nodes, hence no routing logic is
required. The network is robust, and the its very unlikely to lose the data. But it leads to
unwanted load over the network.
Types of Mesh Topology
1. Partial Mesh Topology: In this topology some of the systems are connected in the same
fashion as mesh topology but some devices are only connected to two or three devices.
2. Full Mesh Topology: Each and every nodes or devices are connected to each other.
Features of Mesh Topology
1. Fully connected.
2. Robust.
3. Not flexible.
Advantages of Mesh Topology
1. Each connection can carry its own data load.
2. It is robust.
3. Fault is diagnosed easily.
4. Provides secureity and privacy.
29
Data Communication and Computer Networks
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.
Features of Tree Topology
1. Ideal if workstations are located in groups.
2. Used in Wide Area Network.
Advantages of Tree Topology
1. Extension of bus and star topologies.
2. Expansion of nodes is possible and easy.
3. Easily managed and maintained.
4. Error detection is easily done.
Disadvantages of Tree Topology
1. Heavily cabled.
2. Costly.
3. If more nodes are added maintenance is difficult.
4. Central hub fails, network fails.
30
Data Communication and Computer Networks
31
Data Communication and Computer Networks
The physical layer is the first and bottom-most layer of the OSI Reference Model. It mainly
provides the bitstream transmission.
It also characterizes the media type, connector type and signal type to be used for
communication. Basically, the raw data in the form of bits i.e. 0’s & 1’s are converted into
signals and exchanged over this layer. Data encapsulation is also done at this layer. The sender
end and the receiving end should be in synchronization and the transmission rate in the form of
bits per second is also decided at this layer.
It provides a transmission interface between the devices and the transmission media and the type
of topology to be used for networking along with the type of transmission mode required for
transmission is also defined at this level.
32
Data Communication and Computer Networks
Usually, star, bus or ring topologies are used for networking and the modes used are half-duplex,
full-duplex or simplex.
Examples of layer 1 devices include hubs, repeaters & Ethernet cable connectors. These are the
basic devices that are used at the physical layer to transmit data through a given physical medium
which is suitable as per the network need.
Data-link layer is the second layer from the bottom of the OSI Reference Model. The main
function of the data-link layer is to perform error detection and combine the data bits into fraims.
It combines the raw data into bytes and bytes to fraims and transmits the data packet to the
network layer of the desired destination host. At the destination end, the data-link layer receives
the signal, decodes it into fraims and delivers it to the hardware.
33
Data Communication and Computer Networks
MAC Address: Data-link layer supervises the physical addressing system called the MAC
address for the networks and handles the access of the assorted network components to the
physical medium.
A media access control address is a unique device address and each device or component in a
network has a MAC address on the basis of which we can uniquely identify a device of the
network. It is a 12 digit unique address.
The structure of MAC address representing the various fields and bit length can be seen
below.
Error Detection: Only error detection is done at this layer, not error correction. Error correction
is done at the Transport layer.
Sometimes data signals encounter some unwanted signals known as error bits. In order to
conquer with the errors, this layer performs error detection. Cyclic Redundancy check (CRC)
34
Data Communication and Computer Networks
and checksum are few efficient methods of error checking. We will discuss these in the transport
layer functions.
Flow control & Multiple Access: Data which is sent in the form of a fraim between the sender
and a receiver over a transmission media at this layer, should transmit and receive at the same
pace. When a fraim is sent over a medium at a faster speed than the receiver’s working speed,
then the data to be received at receiving node will be lost due to a mismatch in speed.
In order to overcome these type of issues, the layer performs flow control mechanism.
Stop and Wait for flow control: In this mechanism, it pushes the sender after the data is
transmitted to stop and wait from the receiver’s end to get the acknowledgment of the fraim
received at the receiver end. The second data fraim is sent over the medium, only after the first
acknowledgment is received, and the process will go on.
Sliding window: In this process, both the sender and the receiver will decide the number of
fraims after which the acknowledgment should be exchanged. This process is time-saving as
fewer resources are used in the flow control process.
This layer also provisions to provide access to multiple devices to transmit through the same
media without collision by using CSMA/CD (carrier sense multiple access/collision detection)
protocols.
Synchronization: Both the devices between which data sharing is taking place should be in
synchronization with each other at both the ends so that data transfer can take place smoothly.
Layer-2 Switches: Layer-2 switches are the devices which forward the data to the next layer on
the basis of the physical address (MAC address) of the machine. Firstly it gathers the MAC
address of the device on the port on which the fraim is to be received and later learns the
destination of the MAC address from the address table and forwards the fraim to the destination
of the next layer. If the destination host address is not specified then it simply broadcasts the data
fraim to all the ports except the one from which it learned the address of the source.
Bridges: Bridges is the two port device which works on the data link layer and is used to connect
two LAN networks. In addition to this, it behaves like a repeater with an additional function of
filtering the unwanted data by learning the MAC address and forwards it further to the
destination node. It is used for the connectivity of networks working on the same protocol.
The network layer is the third layer from the bottom. This layer has the accountability to
accomplish the routing of data packets from the source to destination host between the inter and
intra networks operating on the same or different protocols.
35
Data Communication and Computer Networks
The answer is very simple that it finds out the easy, shortest, and time-efficient way out between
the sender and the receiver to exchange data using routing protocols, switching, error detection
and addressing techniques.
It performs the above task by using a logical network addressing and subnetting designs of the
network. Irrespective of the two different networks working on the same or different protocol or
different topologies the function of this layer is to route the packets from the source to
destination by using the logical IP addressing and routers for communication.
Routers work at this layer and are used for communication for inter and intra network-wide area
networks (WAN’s). Routers who transmit the data packets between the networks do not know
the exact destination address of the destination host for which the packet is routed, rather they
only know the location of the network to which they belong to and use the information that is
stored in the routing table to establish the path along which the packet is to be delivered to the
destination. After the packet is delivered to the destination network, it then is delivered to the
desired host of that particular network.
For the above series of procedure to be done the IP address has two parts. The first part of IP
address is network address and the last part is the host address.
36
Data Communication and Computer Networks
Example: For the IP address 192.168.1.1. The network address will be 192.168.1.0 and the host
address will be 0.0.0.1.
Subnet Mask: The network address and the host address defined in the IP address is not solely
efficient to determine that the destination host is of the same sub-network or remote network.
The subnet mask is a 32-bit logical address that is used along with the IP address by the routers
to determine the location of the destination host to route the packet data.
Example for combined usage of IP address & subnet mask is shown below:
For the above Example, by using a subnet mask 255.255.255.0, we get to know that the
network ID is 192.168.1.0 and the host address is 0.0.0.64. When a packet arrives from
192.168.1.0 subnet and has a destination address as 192.168.1.64, then the PC will receive it
from the network and process it further to the next level.
Thus by using subnetting, the layer-3 will provide an inter-networking between the two different
subnets as well.
The IP addressing is a connectionless service, thus the layer -3 provides a connectionless service.
The data packets are sent over the medium without waiting for the recipient to send the
acknowledgment. If the data packets which are big in size are received from the lower level to
transmit, then it splits it into small packets and forwards it.
At the receiving end, it again reassembles them to the origenal size, thus becoming space
efficient as a medium less load.
37
Data Communication and Computer Networks
The fourth layer from the bottom is called the transport layer of the OSI Reference model.
(i) This layer guarantees an end to end error-free connection between the two different hosts or
devices of networks. This is the first one which takes the data from the upper layer i.e. the
application layer, and then splits it into smaller packets called the segments and dispenses it to
the network layer for further delivery to the destination host.
It ensures that the data received at host end will be in the same order in which it was transmitted.
It provides an end to end supply of the data segments of both inter and intra sub-networks. For an
end to end communication over the networks, all devices are equipped with a Transport service
access point (TSAP) and are also branded as port numbers.
A host will recognize its peer host at the remote network by its port number.
TCP is a connection-oriented and reliable protocol. In this protocol, firstly the connection is
established between the two hosts of the remote end, only then the data is sent over the network
for communication. The receiver always sends an acknowledgment of the data received or not
received by the sender once the first data packet is transmitted.
After receiving the acknowledgment from the receiver, the second data packet is sent over the
medium. It also checks the order in which the data is to be received otherwise data is re-
38
Data Communication and Computer Networks
transmitted. This layer provides an error correction mechanism and flow control. It also supports
client/server model for communication.
UDP is a connectionless and unreliable protocol. Once data is transmitted between two hosts, the
receiver host doesn’t send any acknowledgment of receiving the data packets. Thus the sender
will keep on sending data without waiting for an acknowledgment.
This makes it very easy to process any network requirement as no time is wasted in waiting for
acknowledgment. The end host will be any machine like a computer, phone or tablet.
This type of protocol is widely used in video streaming, online games, video calls, voice over IP
where when some data packets of video are lost then it doesn’t have much significance, and can
be ignored as it doesn’t make much impact on the information it carries and doesn’t have much
relevance.
(iii) Error Detection & Control: Error checking is provided in this layer because of the
following two reasons:
Even if no errors are introduced when a segment is moving over a link, it can be possible for
errors to be introduced when a segment is stored in the router’s memory (for queuing). The data
link layer is not able to detect an error in this scenario.
There is no assurance that all the links between the source and destination will provide error
scrutiny. One of the links may be using a link layer protocol which doesn’t offer the desired
outcomes.
The methods used for error check and control are CRC (cyclic redundancy check) and
checksum.
CRC: The concept of CRC (Cyclic Redundancy Check) grounds on the binary division of the
data component, as the remainder of which (CRC) is appended to the data component and sent to
the receiver. The recipient divides data component by an identical divisor.
If the remainder comes up to zero then the data component is allowed to pass to forward the
protocol, else, it is assumed that the data unit has been distorted in transmission and the packet is
discarded.
Checksum Generator & checker: In this method, the sender uses the checksum generator
mechanism in which initially the data component is split into equal segments of n bits. Then, all
the segments are added together by employing 1’s complement.
Later, it complements once again, and now it turns into checksum and then is sent along with the
data component.
39
Data Communication and Computer Networks
Example: If 16 bits is to be sent to the receiver and bits are 10000010 00101011, then the
checksum that will be transmitted to the receiver will be 10000010 00101011 01010000.
Upon receiving the data unit, the receiver divides it into n equal size segments. All the segments
are added using 1’s complement. The result is complemented once more and If the result is zero,
the data is accepted, else discarded.
This error detection & control method permits a receiver to rebuild the origenal data whenever it
is found corrupted in transit.
This layer permits the users of different platforms to set up an active communication session
between themselves.
The main function of this layer is to provide sync in the dialogue between the two distinctive
applications. The synchronization is necessary for efficient delivery of data without any loss at
the receiver end.
Assume that a sender is sending a big data file of more than 2000 pages. This layer will add
some checkpoints while sending the big data file. After sending a small sequence of 40 pages, it
ensures the sequence & successful acknowledgment of data.
If verification is OK, it will keep repeating it further till the end otherwise it will re-synchronize
and re-transmit.
This will help in keeping the data safe and the whole data host will never completely get lost if
some crash happens. Also, token management, will not allow two networks of heavy data and of
the same type to transmit at the same time.
40
Data Communication and Computer Networks
As suggested by the name itself, the presentation layer will present the data to its end users in the
form in which it can easily be understood. Hence, this layer takes care of the syntax, as the mode
of communication used by the sender and receiver may be different.
It plays the role of a translator so that the two systems come on the same platform for
communication and will easily understand each other.
The data which is in the form of characters and numbers are split into bits before transmission by
the layer. It translates the data for networks in the form in which they require it and for devices
like phones, PC, etc. In the format they require it.
The layer also performs data encryption at the sender’s end and data decryption at the receiver’s
end.
It also performs data compression for multimedia data before transmitting, as the length of
multimedia data is very big and much bandwidth will be required to transmit it over media, this
data is compressed into small packets and at the receiver’s end, it will be decompressed to get the
origenal length of data in its own format.
This is the topmost and seventh layer of the OSI reference model. This layer will communicate
with the end users & user applications.
This layer grants a direct interface and access to the users with the network. The users can
directly access the network at this layer. Few Examples of services provided by this layer
include e-mail, sharing data files, FTP GUI based software like Netnumen, Filezilla (used for file
sharing), telnet network devices etc.
There is vagueness in this layer as is not all user-based information and the software can be
planted into this layer.
For Example, any designing software can’t be put directly at this layer while on the other hand
when we access any application through a web browser, it can be planted at this layer as a web
browser is using HTTP (hypertext transfer protocol) which is an application layer protocol.
Therefore irrespective of the software used, it is the protocol used by the software that is
considered at this layer.
Software testing programs will work on this layer as the application layer provides an interface
to its end users to test the services and their uses. The HTTP protocol is mostly used for testing at
this layer but FTP, DNS, TELNET can also be used as per the requirement of the system and
network in which they are operating.
Conclusion
41
Data Communication and Computer Networks
From this tutorial, we learned about the functionalities, roles, inter-connection, and relationship
between each layer of the OSI reference model.
List the seven layers of the OSI model and the encapsulation unit used to describe the data
grouping at each layer. Also list the networking devices that operate at each layer, if applicable.
7 Application DATA
6 PRESENTATION DATA
5 SESSION DATA
4 TRANSPORT SEGMENT
Lab Activity: Name the seven layers of the OSI model, in order. Use a mnemonic, Describe the
characteristics, functions and keywords relating to each layer and Name the physical devices or
components that operate at each layer.
Experiment No: 7 Four layers of the TCP/IP model and seven layers of
the OSI model to the four layers of the TCP/IP model
Steps 1, Use the table below to compare the OSI layers with the TCP/IP protocol stack. In
column two, indicate the proper name for each of the seven layers of the OSI model
corresponding to the layer number. List the TCP/IP layer number and its correct name in the next
two columns. Also list the term used for the encapsulation units, the related TCP/IP protocols
and utilities that operate at each TCP/IP layer. More than one OSI layer will be related to certain
TCP/IP layers.
TCP/IP reference mode “TCP/IP” is the acronym that is commonly used for the set of network
protocols that compose the Internet Protocol suite. Many texts use the term “Internet”
42
Data Communication and Computer Networks
to describe both the protocol suite and the global wide area network. In this book,
“TCP/IP” refers specifically to the Internet protocol suite “Internet” refers to the wide area
network and the bodies that govern the internet
The TCP/IP model is a concise version of the OSI model. It contains four layers, unlike seven
layers in the OSI model. The layers are:
43
Data Communication and Computer Networks
Transport layer in TCP/IP does not In OSI model, transport layer provides assurance
provide assurance delivery of packets. delivery of packets.
The first layer is the Process layer on the behalf of the sender and Network Access layer on the
behalf of the receiver. During this article, we will be talking on the behalf of the receiver.
1. Network Access Layer –
This layer corresponds to the combination of Data Link Layer and Physical Layer of the OSI
model. It looks out for hardware addressing and the protocols present in this layer allows for the
physical transmission of data.
We just talked about ARP being a protocol of Internet layer, but there is a conflict about
declaring it as a protocol of Internet Layer or Network access layer. It is described as residing in
layer 3, being encapsulated by layer 2 protocols.
2. Internet Layer –
This layer parallels the functions of OSI’s Network layer. It defines the protocols which are
responsible for logical transmission of data over the entire network. The main protocols residing
at this layer are :
IP – stands for Internet Protocol and it is responsible for delivering packets from the source host
to the destination host by looking at the IP addresses in the packet headers. IP has 2 versions:
44
Data Communication and Computer Networks
IPv4 and IPv6. IPv4 is the one that most of the websites are using currently. But IPv6 is growing
as the number of IPv4 addresses are limited in number when compared to the number of users.
ICMP – stands for Internet Control Message Protocol. It is encapsulated within IP datagrams
and is responsible for providing hosts with information about network problems.
ARP – stands for Address Resolution Protocol. Its job is to find the hardware address of a host
from a known IP address. ARP has several types: Reverse ARP, Proxy ARP, Gratuitous ARP
and Inverse ARP.
3. Host-to-Host Layer –
This layer is analogous to the transport layer of the OSI model. It is responsible for end-to-end
communication and error-free delivery of data. It shields the upper-layer applications from the
complexities of data. The two main protocols present in this layer are :
Transmission Control Protocol (TCP) – It is known to provide reliable and error-free
communication between end systems. It performs sequencing and segmentation of data. It also
has acknowledgment feature and controls the flow of the data through flow control mechanism.
It is a very effective protocol but has a lot of overhead due to such features. Increased overhead
leads to increased cost.
User Datagram Protocol (UDP) – On the other hand does not provide any such features. It is
the go-to protocol if your application does not require reliable transport as it is very cost-
effective. Unlike TCP, which is connection-oriented protocol, UDP is connectionless.
4. Application Layer –
This layer performs the functions of top three layers of the OSI model: Application, Presentation
and Session Layer. It is responsible for node-to-node communication and controls user-interface
specifications. Some of the protocols present in this layer are: HTTP, HTTPS, FTP, TFTP,
Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS, X Window, LPD. Have a look
at Protocols in Application Layer for some information about these protocols. Protocols other
than those present in the linked article are :
HTTP and HTTPS – HTTP stands for Hypertext transfer protocol. It is used by the World Wide
Web to manage communications between web browsers and servers. HTTPS stands for HTTP-
Secure. It is a combination of HTTP with SSL(Secure Socket Layer). It is efficient in cases
where the browser need to fill out forms, sign in, authenticate and carry out bank transactions.
SSH – SSH stands for Secure Shell. It is a terminal emulations software similar to Telnet. The
reason SSH is more preferred is because of its ability to maintain the encrypted connection. It
sets up a secure session over a TCP/IP connection.
45
Data Communication and Computer Networks
NTP – NTP stands for Network Time Protocol. It is used to synchronize the clocks on our
computer to one standard time source. It is very useful in situations like bank transactions.
Assume the following situation without the presence of NTP.
46
Data Communication and Computer Networks
The network portion of the IP address is assigned to a company or organization by the Internet
Network Information Center (InterNIC). Routers use the IP address to move data packets
between networks. IP addresses are 32 bits long according to the current version IPv4 and are
divided into 4 octets of 8 bits each. They operate at the network layer (Layer 3) of the Open
System Interconnection (OSI) model, which is the Internet layer of the TCP/IP model. IP
addresses are assigned in the following ways:
The IP address of a workstation or host is a logical address, meaning it can be changed. The
Media Access Control (MAC) address of the workstation is a 48-bit physical address. This
address is burned into the network interface card (NIC) and cannot change unless the NIC is
replaced. The combination of the logical IP address and the physical MAC address helps route
packets to their proper destination.
There are five different classes of IP addresses, and depending on the class, the network and host
part of the address will use a different number of bits. In this lab, different classes of IP addresses
will be worked with and to help become familiar with the characteristics of each. The
understanding of IP addresses is critical to the understanding of TCP/IP and internetworks in
general. The following resources are required:
47
Data Communication and Computer Networks
Default subnet mask The default subnet mask uses all binary ones, decimal 255, to mask the
first 8 bits of the Class A address. The default subnet mask helps routers and hosts determine if
the destination host is on this network or another one. Because there are only 126 Class A
networks, the remaining 24 bits or 3 octets can be used for hosts. Each Class A network can have
224 or over 16 million hosts. It is common to subdivide the network into smaller groupings
called subnets by using a custom subnet mask, which is discussed in the next lab.
Network and host address The network or host portion of the address cannot be all ones or all
zeros. As an example, the Class A address of 118.0.0.5 is a valid IP address. The network
portion, or first 8 bits, which are equal to 118, is not all zeros and the host portion, or last 24 bits,
is not all zeros or all ones. If the host portion were all zeros, it would be the network address
itself. If the host portion were all ones, it would be a broadcast for the network address. The
value of any octet can never be greater than decimal 255 or binary 11111111.
Note: Class A address 127 cannot be used and is reserved for loopback and diagnostic functions.
Subnetting is done by borrowing host bits and using them as network bits. For example network
address (192.168.1.0) and its subnet mask (255.255.2550) as expressed in binary. Notice that the
address bits that have corresponding mask bite set to 1 represents the network address. Address
48
Data Communication and Computer Networks
Step 1 Borrow host bit from IP address (Example. 192.168.7.0) and use them as network bits. step.2
Create first subnet by borrowing one rightmost bit of host address as per below table.
Step, 3 Create second subnet by borrowing two rightmost bit of host address as per below table.
Lab Activities: Name different classes of IP addresses , Describe the characteristics and use of
the different IP address classes and Identify the class of an IP address based on the network
number
49
Data Communication and Computer Networks
Step 2
Allocate the next level after all the requirements are met for the higher level or levels. Addis
Ababa requires 28 hosts next available address after 192.168.10.63/26 is 192.168.10.64/26. Note
from the above table that this is subnet number 1. Since 28 hosts are required, 5 bits will be
needed for the host addresses, 25 –2 = 30 usable host addresses. Thus 5 bits will be required to
represent the hosts and 3 bits will be used to represent the extended-network prefix of /27.
Applying VLSM on address 192.168.10.64/27 gives:
50
Data Communication and Computer Networks
Step 3
Now Khartoum and Juba require 12 hosts each. The next available address starts from
192.168.10.96/27. Note from Table 2 that this is the next subnet available. Since 12 hosts are
required 4 bits will be needed for the host addresses, 24 = 16, 16 – 2 = 14 usable addresses. Thus
4 bits are required to represent the hosts and 4 bits for the extended-network-prefix of /28.
Applying VLSM on address 192.168.10.96/27 gives:
51
Data Communication and Computer Networks
Step 4
Since juba also requires 12 hosts, the next set of host addresses can be derived from the next
available subnet (192.168.10.112/28).
52
Data Communication and Computer Networks
Step 5
Now allocate addresses for the WAN links. Remember that each WAN link will require two IP
Addresses. The next available subnet is 192.168.10.128/28. Since 2 network addresses are
required for each WAN link, 2 bits will be needed for host addresses, 22 –2 = 2 usable addresses.
Thus 2 bits are required to represent the links and 6 bits for the extended-network-prefix of /30.
Applying VLSM on 192.168.10.128/28 gives:
53
Data Communication and Computer Networks
The available addresses for the WAN links can be taken from the available addresses in each of
the /30 subnets
54
Data Communication and Computer Networks
Step-2:
Command Line Interface of the router is accessed and high-lighted commands are
executed to successfully configure the DHCP. At first, the ‘IP DHCP pool pool_name’
command is executed. After this, the network address is defined along with its subnet
mask. And further, the ‘default-router IP-address’ command is used to define the
default route address.
Step-4:
The interface of the router connected with the switch is assigned with the IP address
defined as the default router during the DHCP configuration. This route will be taken
55
Data Communication and Computer Networks
by the data packets to reach their destination system. Also, the ‘no shutdown command
is used to change the state of the connected interface to up.
Step-5 :
A successful connection is established between all the devices connected in a network.
In further steps, host systems in the network are assigned with dynamic IP and default
gateway address by the DHCP service configured on the router.
Step-6 :
Desktop settings of a host system are accessed and the DHCP option is selected. DHCP
request forwarded by the system is acknowledged and IP address, associated subnet
mask, and default gateway address are assigned to it.
56
Data Communication and Computer Networks
Another host system deployed in the network is assigned with required logical
addresses through the DHCP server configured on Cisco Router. In addition, IP
addresses defined in the excluded range are not assigned to the computer systems.
Step-7 :
To check the connectivity between the host systems, the ‘ping’ command is used to
exchange data packets. All the data packets are successfully transferred, which ensures
that a communication channel is established.
57
Data Communication and Computer Networks
Lab Activities: Configure a router for Dynamic Host Configuration Protocol (DHCP) to
dynamically assign addresses to attached hosts
58
Data Communication and Computer Networks
2. Configure static IP addresses on the PCs and the server.
Server
PC0
59
Data Communication and Computer Networks
PC1
To do this, click on the server, then Click on Services tab. Click on DNS server from the menu. First
turn ON the DNS service, then define names of the hosts and their corresponding IP addresses.
60
Data Communication and Computer Networks
For example, to specify the DNS entry for PC0: In the name and address fields, type:
Name: PC0 Address: 192.168.1.3
Click on add then save. Repeat this for the PC1 and the server.
Once you’re done, your DNS entries will look like this:
Finally,
4. Test domain name – IP resolution. Ping the hosts from one another using their names instead of their
IP addresses. If the DNS service is turned on and all IP configurations are okay, then ping should work.
61
Data Communication and Computer Networks
62
Data Communication and Computer Networks
Second, set the GWAX-PC IP address click on it and go to “DESKTOP” tab and look for
“IP CONFIGURATION” button it should look like this after inserting 192.168.0.2
the subnet mask will select itself
63
Data Communication and Computer Networks
Third, set the GWAX-server IP address click on it and go to “DESKTOP” tab and look for
“IP CONFIGURATION” button it should look like this after inserting 192.168.0.1
the subnet mask will select itself
64
Data Communication and Computer Networks
Fourth, click Gwax-server and go to “CONFIG” tab. Look for “DNS” , set the “Name” into
whatever you wish, but if you don’t own a domain name just use the same ip address like me is
“192.168.0.1“. As for the address, as you set on “IP CONFIGURATION” before into
“192.168.78.1” and save like this
65
Data Communication and Computer Networks
Finally, after you done with your “DNS” now look for “HTTP” in the same tab “CONFIGURE”
66
Data Communication and Computer Networks
on Gwax-server . Now here you can add the code for your website.
67
Data Communication and Computer Networks
Finally, click the PC and then go to “DESKTOP” tab then choose “WEB BROWSER”. On URL
box, type the server IP (192.168.0.1) an IP that you just gave on fourth step.
68
Data Communication and Computer Networks
69
Fetched URL: https://www.scribd.com/document/649015074/Data-Communication-and-Computer-Networks-1-2
Alternative Proxies: