0% found this document useful (0 votes)
8 views

CN Module 1 Final

Computer network course notes

Uploaded by

Anandakrishnan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

CN Module 1 Final

Computer network course notes

Uploaded by

Anandakrishnan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 59

DATA

COMMUNICATION
Third Semester
Course Outline
Module 1. Module 2. Module 3.
Concepts of Data Signaling, Transmission and Transmission Media & Switched
Communication Multiplexing Networks

Module 4.
Network Models & Application
Layer Protocols
First Lesson
We will cover these skills:
• Understand the concepts of Data Communication
• Understand the concept of Networks
• Data Transmission Modes
4
Data
Communication
Data Communication is the
transfer of data or
information from some
source to receiver(s) through
any transmission medium
based on a set of rules
called the protocol.
Components of
data
communication
1.Message: information to be
communicated
2.Sender: The device that sends
the data message
3.Receiver: The device that
receives the message
4.Transmission medium:
Physical path by which a message
travels from sender to receiver
5.Protocol: Rules that govern
data communication
Data Communication

Effectiveness of Data Communication depends on the following fundamental characteristics:

1. Delivery: The system must deliver data to the correct destination.


2. Accuracy: The system must deliver data accurately. Data that have been altered in
transmission and left uncorrected are unusable.
3. Timeliness: The system must deliver data in a timely manner. Data delivered late are
useless.
4. Jitter: It refers to the variation in packet arrival time. It is the uneven delay of audio or video
packets.

8
Data Representation
1.Text
◦ Represented as bit pattern. Unicode-32 bits, ASCII
2.Numbers
◦ Bit pattern, not ASCII
3.Images
◦ Bit Patterns, Each image composed of matrix of pixels.
◦ A pixel is a dot. Each pixel assigned a bit pattern
4.Audio
◦ As continuous signal
5.Video
◦ A continuous entity, or a combination of images each a discrete quantity, arrange to
convey the idea of motion
Data Flow
Methods
Communication between two
devices can be
1.Simplex
2.Half Duplex
3.Full Duplex
1. Simplex

1. Communication is
unidirectional.
2. One of the two devices
on a link can transmit;
the other can only
receive.
3. Message cannot be
send back to the sender.
Ex: Radio broadcasting, keyboards and
traditional Monitors
Half Duplex
1. Each station can both transmit
and receive, but not at the same
time.
2. When one device is sending,
the other can only receive, and
vice versa.
3. The entire capacity of the
channel can be utilized in each
direction.
Example : walkie-talkie
Full Duplex
1.Both stations can receive and
transmit concurrently.
2. Signals in both directions
share the total channel
capacity.
Example : Telephone
communication
Networks
◦ Network is a set of devices ◦ Distributed Processing
(nodes) connected by ◦ A task divided into multiple
communication links computers
◦ A node can be computer,
printer, or any other device
capable of sending and
receiving data
Network Criteria
Performance
1. Transit time: Time required for a message to travel from one device to another.
2. Response time: Elapsed time between an inquiry and a response..
3. Throughput: The rate of successful message delivery through a channel.
4. Delay. It specifies how long it takes for a bit of data to travel across the network from one node or
endpoint to another.
◦ Note: A good network must have more throughput and less delay.
Reliability - Measured by
1. the frequency of failure,
2. the time taken to recover from a failure
Security
1. Protecting data from unauthorized access or damage
2. Recovery from breaches and data losses.
Network Attributes
◦ Type of Connection
◦ A network is two or more devices connected through links.
◦ A link is communication pathway that transfers data from one device to
another
◦ Devices connected to links are of two different types:
◦ Point-to-point
◦ Multipoint
◦ Physical Topology
◦ The way in which network laid physically
Type of Connection
1. Point-to-Point
• Provides a dedicated link between
two devices.
• Entire channel capacity can be
utilized.
• Eg: TV infrared remote control.
2. Multipoint
• More than two devices share a
single link.
•Channel sharing can be spatial or
temporal.
•If several devices can use the link
simultaneously then it is spatially
shared.
•If devices take turns then
temporal/timeshared.
Physical Topology
Physical topology refers to the
way in which a network is laid
out physically.
The geometric representation
of the relationship of all the
links and linking devices (usually
called nodes) to one another.
Physical Topologies
◦ 1. Bus Topology
◦ 2. Ring Topology
◦ 3. Star Topology
◦ 4. Mesh Topology
◦ 5.Hybrid Topology
Bus Topology

◦ Multipoint
◦ One long cable acts as a backbone to link all the devices in a network
◦ Nodes are connected to the bus cable by drop lines and taps.
◦ A drop line is a connection running between the device and the main cable.
◦ As a signal travels along the backbone, some of its energy is transformed into heat.
◦ Therefore, it becomes weaker and weaker as it travels farther and farther.
◦ For this reason there is a limit on the number of taps a bus can support and on the distance between those taps.
Bus Topology
Advantages Disadvantages

1. Ease of installation. 1. Difficult for reconnection and fault isolation.


2. Less cabling among other topologies. 2. Signal reflection at the taps can cause
degradation in quality.
3. Adding new devices may require modification
or replacement of the backbone.
4. A fault or break in the bus stops all
transmission.
Ring
In a ring topology, each device has
a dedicated point-to-point
connection with only the two
devices on either side of it.
A signal is passed along the ring in
one direction, from device to
device, until it reaches its
destination. Each device in the ring
incorporates a repeater.
When a device receives a signal
intended for another device, its
repeater regenerates the bits and
passes them along
Ring Topology
Advantages Disadvantages

1. Easy to install and reconfigure. 1. Unidirectional traffic


2. Easy fault identification 2. In a simple ring, a break in the ring (such as
3. The system alerts if the transmission token is a disabled station) can disable the entire
not received within a specified period. network.
◦ This weakness can be solved by using a dual
ring or a switch capable of closing off the
break.
Star
◦ Dedicated point to point to a central controller
called hub
◦ The star topology does not allow direct traffic
between devices.
◦ Controller acts as an exchange: If one device
wants to send data to another, it sends the data
to the controller, which then relays the data to
the other connected device
Star Topology
Advantages Disadvantages
1. Easy to install and reconfigure. 1. Dependency to the single central point.
2. Robustness: Only failed link isolates 2. More cabling and IO ports than bus.
3. Easy Fault identification and fault isolation.
5. Central monitoring through hub
Mesh Topology
 Dedicated point to point link
to other devices
 Number of physical links
in fully connected mesh
network is n(n-1) for
simplex and n(n-1)/2 for
duplex mode links
 Inorder to accumulate the
links each device needs n-1
I/O ports(Input/Output)
Mesh Topology
Advantages Disadvantages
Eliminates traffic problems High Cost
Robustness Large amount of cable and IO ports required
Privacy & Security Installation and reconnection are difficult
Easy fault identification and rectification Bulky Wiring
Hybrid Topology
Combination of topologies
Example: A main star topology
with each branch connecting
several stations in a bus topology
Network Types
◦ LAN
◦ Local Area Network
◦ MAN
◦ Metropolitan Area Network
◦ WAN
◦ Wide Area Network
LAN – Local Area Network
◦ It is usually privately owned, links the devices (PCs, printer, audio and video peripherals
etc.) for resource sharing in a single office, building, or campus.
◦ The size of LAN is limited to a few kilometers.
◦ The resources include hardware (e.g., a printer), software(e.g., an application program), or
data.
◦ LAN’s can be either wired or wireless. Twisted pair, coax or fibre optic cable can be used
in wired LAN’s.
◦ Every LAN uses a protocol (a set of rules that governs how packets are configured and
transmitted).
◦ The most common LAN topologies are bus, ring, and star.
◦ Speeds are normally 100 or 1000 Mbps.
WAN
◦ A Wide Area Network (WAN) provides long-distance
transmission of information over large geographic areas
that may comprise a country, a continent, or even the
whole world.
◦ Internet and dial-up lines that connects a home
computer to the Internet are examples of WAN.
Different types of WANs
WANs are two types
1. Switched WAN
◦ Used to connect multiple end nodes through a common WAN
network.
◦ The end systems, usually comprise a router that connects to
another LAN or WAN.
◦ Example: Asynchronous Transfer Mode (ATM) network
2. Point-to-point WAN
◦ Consists of two end nodes connected by a leased line.
◦ It is normally a line leased from a service provider that connects a
home computer or a small LAN to an Internet service provider
(lSP).
◦ This type of WAN is often used to provide Internet access.
MAN
◦ A metropolitan area network (MAN) is a network with a size between a LAN and a WAN.
◦ It normally covers the area inside a town or a city.
◦ It is designed for customers who need a high-speed connectivity, normally to the Internet, and have
endpoints spread over a city or part of city.
◦ Examples
◦ 1. The part of the telephone company network that can provide a high-speed DSL line to the customer.
◦ 2. The cable TV network that originally was designed for cable TV, but today can also be used for high speed
data connection to the Internet.
Transmission Modes
The transmission of binary data across a link can be done using parallel or serial mode
1. Parallel Mode
◦ Multiple data are send in one clock tick
2. Serial Mode
◦ One bit is send in each clock tick
◦ For serial mode there are three sub classes
◦ Asynchronous
◦ Synchronous
◦ Isochronous
Data Transmission Modes
1. Parallel Transmission
◦ Computers produce and consume data in group of bits
◦ By grouping we can send n bits at a time which is called parallel transmission
◦ Use n wires to send n bits at a time
Parallel Transmission
Advantages Disadvantages

◦ Speed ◦ Cost
◦ It can increase the transfer speed ◦ It requires n communication lines to transmit
by the factor of n. the data stream.
◦ Used in short distance ◦ Not feasible for high distance communication.
communication
2. Serial Transmission
◦ One bit follows another
◦ Only one communication channel required
Serial Transmission
Advantages Disadvantages

1. Single channel, reduces the cost. 1. Need of parallel to serial converters at


2. Used in long distance communication the interface
Serial Transmission

◦ It occurs in one of three ways


1) Asynchronous Transmission
2) Synchronous Transmission
3) Isochronous Transmission
Asynchronous Transmission
 The information is transmitted based on agreed patterns.

 As long as those patterns are followed, the receiving device can retrieve the information without regard to
the rhythm in which it is sent.

 Patterns are based on grouping the bit stream into bytes (8 bits) as a unit and adding special bits..

Start bit : An extra bit (usually a 0) is added to the beginning of each byte, to alert the receiver to the arrival
of a new group.

 Stop bits: To let the receiver know that the byte is finished, 1 or more additional bits (usually 1s) are
appended to the end of the byte.

 Each byte is increased in size to at least 10 bits, of which 8 bits are information and 2 or more bits are
signals to the receiver.
Asynchronous Transmission
Advantages Disadvantages

◦ 1) Cheap and effective ◦ Burden of additional bits


◦ 2) Suitable for low-speed communication
Synchronous Transmission

 The bit stream is combined into longer "frames," which may contain multiple bytes.

 Bits are send one after the other without any gaps. The receiver separates the bytes.

 Synchronous means ‘at the same time’, used for data transfer between same devices.

 Synchronization between the sender and receiver is necessary to identify the start and end.
Synchronous Transmission
◦ Frame structure in synchronous transmission
Synchronous Transmission

 Starts with one or more bytes of data that have a unique bit pattern, or flag (preamble),

Preamble tells the receiver a block of data will follow.

The preamble is followed by various control fields, a variable-length data field, more control
fields, and finally a postamble.

The control information within the frame will include a length field, which specifies the amount
of data to be read.

Postamble identifies the end of the data frame.


Data Transmission Modes

C. Isochronous Transmission
 Used where uneven delays between frames are not acceptable.
 The isochronous transmission guarantees that the data arrive at a fixed rate at
destination.

49
Internetwork
◦ Interconnection of Networks:
◦ Internetwork ---- Interconnection of two or
more networks are called internetwork, or
internet.
Protocols

A protocol is a set of
rules that govern data
communications
Protocol and
• what is communicated, Standards
A protocol defines • how it is communicated, and
• when it is communicated

• syntax,
The key elements of • semantics
a protocol are
• timing
Protocol

2. Semantics.
1. Syntax. Defines 3. Timing. Refers
Defines the
the structure or to two
meaning of each
format of the data. characteristics:
section of bits.

How a particular What action is to


When data should How fast they can
pattern to be be taken based on
be sent ? be sent. ?
interpreted ? that interpretation?
Internetwork (Internet)
◦ Interconnection of Networks:
◦ Internetwork ---- Interconnection of two or
more networks are called internetwork, or
internet.
Intranet
◦ An intranet is a private network contained within an enterprise that is used to securely share company
information and computing resources among employees, , usually to the exclusion of access by outsiders.

◦ Intranets encourage communication within an organization.

◦ They let employees easily access important information, links, applications, forms and databases of company
records.

◦ Ex: Internal Computer Networks of Indian Railway, BSNL, Wipro etc.


Extranet
◦ An intranet that can be partially accessed by authorized outside users, enabling businesses to exchange
information over the internet in a secure way is called extranet.

◦ Extranet is a controlled private network of an intranet that allows access to partners, vendors and suppliers or
an authorized set of customers – normally to a subset of the information accessible from an organization's
intranet.

◦ Ex: VPN Connections over internet to the organizations internal network.


Client Server Architecture

◦ A server is the one who provides requested services.


◦ Clients are the ones who request services.
◦ Client server architecture is a computing model in which the server hosts, delivers, and manages most of the
resources and services requested by the client.
◦ Usually servers are configured in more powerful machines than clients as multiple clients request and receive
service from a centralized server .
Peer to Peer (P2P)
◦ Peer-to-peer architecture (P2P architecture) is a commonly used computer networking architecture in which each
workstation, or node, has the same capabilities and responsibilities.
◦ In a peer-to-peer network, the peers directly interact with one another without the requirement of a central server
as in client server architecture.
Working

1. When one peer requests for some file, this request is sent to all its neighboring nodes.
2. If those neighboring nodes don’t have the required file, they pass on the query to their neighbors and so on. This
is called query flooding.
3. When the peer with the requested file is found (query hit), the query flooding stops and it sends back the file
name and file size to the client, thus following the reverse path.
4. Finally, if there are multiple query hits, the client selects from one of these peers.
THANK YOU!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy