Sie sind auf Seite 1von 14

Course Objectives

Chapter One ‰ Upon completion of this Course students should be


able to:
o List major technologies in data communication

Introduction to Data o Explain the operation and application areas of data


transmission
Communication o Appreciate standards that have been defined for
connecting a computer to data circuit terminating
and o Explain the operation and application areas of
some of the alternative methods that can be
employed to detect transmission errors
OSI Model o Explain the various data communication networks
available
o Handle communication equipment

Chapter 1: Content Review Questions


ƒWhat is networking?
ƒnetworking is the practice of linking two or more computing devices
Introduction to Data Communication and OSI Model together for the purpose of sharing data. Networks are built with a
ƒData Communications. mix of computer hardware and computer software.
ƒComponents ƒWhat is data communication?
ƒDirection of Data Flow. ƒconcerns the transmission of digital messages convey to devices external to the
ƒNetworks. message source
ƒNetwork Criteria ƒWhat are components involved in data communication?
ƒType of Connection. •Sender, receiver, Message, Medium and protocol
ƒTopology ƒName directions of data flow?
•Simplex, half duplex and full duplex
ƒCategories of Networks.
ƒThe Open Systems Interconnection (OSI) Model ƒWhat is network topology?
ƒarrangement or mapping of the elements (links, nodes, etc.) of a network,
ƒPeer-to-Peer Processes especially the physical (real) and logical (virtual) interconnections between nodes
ƒFunctions of Layers

Data Communication
Overview of Data Communications & Networking

‰ Definition
‰ Data – information presented in whatever form

‰ the process of exchanging data by using a

communication device (hardware and software)

‰ The Effectiveness of Data Communication:-


‰ Delivery – data reach to the correct destination

‰ Accuracy – data received is the correct data

‰ Timeliness – data transmitted without delay (real-

time transmission)

1
Data Communication 5 Components of Data Communication

‰Components
‰Data
D Representation
R i 5 3

‰Direction of Data Flow


4
1 2
Five components of data communication

5 Components of Data Communication (cont.) Data Representation

1 and 2 [Sender and Receiver] or [Source and Destination] ‰Text [represent as bit pattern – sequence of bits( 0s or 1s)]
All communications originate at a source and travel to a ‰ ASCII – by ANSI (7 bits)
destination.
‰ Extended ASCII (8 bits – extra 0 at left)
3 [Message / Data Packets] ‰ Unicode (16 bits)
Information that travels on a network is referred to as a data, ‰ ISO (32 bits)
packet, or data packet. ‰Numberss
4 [Media / Medium] ‰Images – composed of a matrix of pixels
Telephone wires (UTP), Category 5 UTP (used for 10BaseT (picture elements) – small dots
Ethernet), Coaxial cables, Optical fibers (thin glass fibers
that carry light) ‰ Size of pixel depends on resolution
‰Audio - sound
5 [Protocol]
‰Video – continuous images
Set of rules that makes communication both possible and
more efficient

Direction of Data Flow Simplex

(Sender)

(Receiver)
‰Simplex
‰Half-Duplex
‰Full-Duplex
The receiver can ONLY receive,
but cannot send

2
Half-Duplex Full-Duplex

Both can send AND receive Both can send AND receive
BUT SIMULTANEOUSLY
not at the same time • sharing bandwidth between signal traveling in both direction
Bandwidth?
i.e:- walkie-talkie i.e:- telephone network

Networks Distributed Processing

‰Definition – a task is divided among


‰Distributed Processing multiple computers, each will have their
‰Network Criteria own system processing, and at the end
result
lt will
ill be
b delivered/compile
d li d/ il to
t each
h
‰Physical Structures other, so that is where we need a
NETWORK.
‰Categories of Networks
‰One workstation is a subset to another
workstation.

Network Criteria Physical Structures


‰Performance
ƒ i.e:- transmit time, response time
ƒ Evaluated by metrics: throughput and delay
‰Reliability
ƒ i.e:- frequency of failure, time to recover failure and
Type of Connection
network robustness in catastrophe (devastation)
ƒ Point-to-Point
‰Security
S it
ƒ Examples: ƒ Multipoint
ƒ protect data from unauthorized access (hackers)
ƒ Protect data from damage and development
ƒ Implement policies and procedure for data recovery

3
Point-to-point Multipoint
(Multidrop)

Dedicated link between TWO devices More than 2 devices SHARE a SINGLE link
∴ Capacity of the channel is SHARED spatially/temporally

Physical Topology Fully Connected Mesh Topology


Definition – the way in which a network is laid out physically

Categories of Topology

Every device has a dedicated point-to-point link to every other device

Advantage:- Disadvantage:-
ƒCarry its own data load ƒLink must be shared by
ƒRobust multiple device

ƒPrivacy and security ƒNo. of I/O ports

Star Topology Bus Topology

Point-to-point to a central controller Signals go through the cable become weaker and weaker

Advantage:- Explanation:
Disadvantage:- ƒ One long cable as a backbone to link all devices
ƒEasy to install, reconfigure and troubleshoot
ƒFailure of hub cripples ƒNodes connected to the bus cable by drop lines and taps
ƒRobustness attached stations ƒDrop line connected between devices and main cable
ƒMore suited for larger networks ƒMore cable required ƒTaps is connector splices into the main cable to create contact with metallic core
ƒEasy to expand network
ƒCabling types can be mixed

4
Bus Topology (cont.) Ring Topology
Advantage:-
ƒEase of installation
ƒCheapest topology to implement
ƒFailure of one station does not affect others
ƒLess expensive due to less footage of cabling and no network hubs
ƒGood for smaller networks not requiring higher speeds

Disadvantage:-
ƒDifficult reconnection and fault isolation
ƒNot meant to be used as a stand-alone solution in a large building
ƒLimited in size and speed
ƒDifficult to troubleshoot Passing token to take turn
ƒDifficult to administer/troubleshoot Dual ring - for line backup
ƒA cable break can disable the entire network; no redundancy
ƒMaintenance costs may be higher in the long run
ƒPerformance degrades as additional computers are added

Ring Topology (cont.)


Advantage:-
Hybrid Topology
ƒ Ease to install and reconfigure
‰ A combination of any two or more network
ƒ Can create much larger network using Token Ring topology to form complete network
ƒ Growth of system has minimal impact on performance ‰ Physical topology
ƒ All stations have equal access ‰ refers to the layout of cables, computers and other
peripherals
Disadvantage:- ‰ d
describes
b the h layout off the
h network,
k just like
k a map shows
h
the layout of various roads
•Moves, adds and changes of devices can affect the network
•Network adapter cards and Multi Access Unit (MAU)'s are much more
‰ Logical Topology
expensive than Ethernet cards and hubs ‰ the method used to pass the information between the
computers
•Much slower than an Ethernet network under normal load
‰ describes how the data is sent across the network
•Failure of one computer may impact others
‰ E.g.: how the cars are able to travel (the direction and
•Complex speed) at every road on the map.

Categories of Network Local Area Network

The categories of network depends on


its:-
ƒSize It is privately owned
ƒOwnership
ƒDistance cover i.e:- single office, building, campus
ƒPhysical architecture

5
Local Area Network (cont.) Metropolitan Area Network

To extend over an entire city

i.e:- telecommunication company (telco)

Wide Area Network Network Configuration

Internet Internet History


‰ 1960s ~ Advanced Research Projects Agency (ARPA) ~ interested to find a
‰ Definition: way how to connect to others PC so
‰ combination 2 or more network ~known as ‰ enable for data sharing and exchanging data.
Internetwork ‰ Reducing cost
‰ eliminating duplication of effort
‰ is a collection of many separate networks. ‰ 1967 ~ proposed ARPANET
‰ A global network connecting millions of computers.
p ‰ 1969 ~ ARPANET is become reality
More than 100 countries are linked into exchanges of ‰ ARPANET was currently using the Network Control Protocol (NCP) to transfer data among hosts
data, news and opinions ‰ 1972 ~ The first e-mail program was created by Ray Tomlinson of BBN.
‰ Is a worldwide system of computer networks – several ‰ 1973 ~ proposed protocol Transmission control protocol (TCP)
networks which users can communicate each other if ‰ Encapsulation
they have permission to get information from any other ‰ Datagram
computer (and sometimes talk directly to users at other ‰ The function of gateway

computers). ‰ Then, split protocol to


‰ TCP ~ responsible for higher level function : segmentation, reassembly and error detection
‰ Internetworking Protocol (IP)~ handle datagram routing

6
How Internet today?
Internet today
‰Today, the Internet is a public, cooperative, and
self-sustaining facility accessible to hundreds of
millions of people worldwide.
‰Physically, the Internet uses a portion of the total
resources of the currently existing public
telecommunication networks.
‰Technically, to distinguish the Internet
‰ use of a set of protocols called TCP/IP (for
Transmission Control Protocol/Internet Protocol)
‰ Two recent adaptations of Internet technology, the
intranet and the extranet, also make use of the
TCP/IP protocol.

How to connect to Internet? Protocol and Standard


‰Internet Service Provider (ISP)
‰ Protocol
‰ International Service Provider ‰ = rule
‰ National Service Provider ‰ enable two entities to communicate in sending and receiving
‰ Backbone network maintained by specialized company message using a protocol (agreed)
‰ E.g: Jaring, TMnet, Celcom.net, Maxis Net, iDiGi Internet ‰ Set of rule that govern data communication
Service, Time.Net ‰ Define what
what, how and when to communicated
‰ 3 key elements:
‰ Regional Service Provider ~ smaller ISPs that ‰ Syntax ~ refers to the structure of format of the data
connected to one or more national ISPs ‰ Semantics ~ refers to meaning of each section of bits
‰ Local Internet Service Provider ‰ Timing ~ refers to 2 characteristic
‰ When data should be send
‰ E.g: ISP in a company and can be connected to regional and ‰ How fast data can be sent
national ISP ‰ e.g:
‰ sender produce: 100Mbps; overload
‰ receiver can process:1Mbps

Protocol and Standard Standard Organization


‰ International Organization for Standardization (ISO)
Multinational body ~ committees from various company
‰ Standard ‰

‰ Developing cooperation in the realms of scientific, technological and


‰ Agreed-upon rule economic activity
‰ Why? ‰ International Telecommunication Union-Telecommunication
‰ Guideline for manufacturer to create and maintain any Standard Sector (ITU-T)
equipment to ensure the connectivity needed in market and ‰ Define national standard for telecommunication
international communication ‰ American National Standards Institute (ANSI)
‰ G
Guaranteeing
t i national
ti l and
d iinternational
t ti l iinteroperability
t bilit off data
d t ‰ P i t and
Private d nott affiliated
ffili t d with
ith U.S
U S federal
f d l governmentt
and telecommunication technology and process ‰ Institute of Electrical and Electronics Engineers (IEEE)
‰ Two categories ‰ Largest professional engineering society
‰ De facto ~ standard not approved by an organized body but ‰ Aims to advance theory, creativity, and product quality in electrical
has adopted as standard through widespread used engineering, electronics, radio related to engineering
‰ Established by manufacturer that seek to define the functionality of
‰ Oversees development and adoption of international standards for
new product computing and communication
‰ De jure ~ standard that has been legislated by an officially ‰ Electronic Industries Associated (EIA)
recognized body ‰ Activities include public awareness education and standards development.
‰ Contribution in defining physical connection interfaces and electronic
signaling specification for data communication.

7
Layered Tasks

‰Sender, Receiver, and Carrier

TCP/IP Model ‰Hierarchy


ƒ task done “in order”
‰Services
And ƒ layer use services of the layer immediately below
it
ƒ Sender – the higher layer uses services of the
OSI Model middle layer. The middle layer uses services of the
lower layer and the lower layer uses services of the
carrier.

Sending a letter Internet Model (Internet Layers)


‰Peer-to-Peer Processes
ƒInterfaces between Layers – defines what
information and services a layer must provide for the layer
above it.
ƒOrganization of the Layers

‰Functions of Layers

‰Summary of Layers

Internet Layers Peer-to-Peer Processes

ƒAt the physical layer, the communication is direct


ƒThe processes on each machine that communicate at a given layer
ƒInterfaces – enable passing data and network information down through layers at the sender and
receiver
ƒEach interfaces defines information and services must provide by a layer for a layer above it

8
An exchange using the Internet model Data exchange using the Internet model (cont..)

Organization of the Layers Function of Layers

‰Divided to three subgroups:-


ƒ Layer 1 (Physical) Network Support Layers Application
Layer 2 (Data Link)
Transport
-deals with the physical aspects
ƒ of moving data from one device
to another
ƒ Layer 3 (Network)
Transport Layer Network
Data Link
-links the two subgroups,
ƒ Layer 4 (Transport) -ensures what the lower layers have
transmitted is in a form that the upper

Physical
layers can use

ƒ Layer 5 (Application) User Support Layer


-allows interoperability among
unrelated software systems

Physical Layer Physical Layer Major Duties:-


‰Physical characteristics of interfaces and media
ƒ Defines characteristics of the interface between the
devices and the transmission media
ƒ Defines type of transmission medium
‰Representation of bits
ƒ Defines the type of representation (how bits changed to
signals)
i l)
‰Data rate
ƒThe physical layer is responsible for ƒ Defines transmission rate (no. of bits sent each second)-
duration of a bit
transmitting individual bits from one node to
‰Synchronization of bits
the next.
ƒ Synchronized the bit level (receiver clock)
ƒDefines the cable or the physical medium

9
Data Link Layer Data Link Layer Major Duties:-
‰ Framing
ƒ Divides the stream of bits received from the network layer into
manageable data units
‰ Physical addressing
ƒ Adds a header to the frame to define the sender and/or receiver of
the frame
‰ Flow control
ƒ To prevent overwhelming the receiver
ƒThe data link layer is responsible for transmitting frames from the node to the next. ‰ Error control (through trailer)
ƒDefines the format of data on the network
ƒ To detect and retransmit damaged or lost frames
ƒ To prevent duplication of frames
ƒInclude data frame, checksum, source and destination address and data. ‰ Access control
ƒHandles the physical and logical connections to the packet’s destination using a ƒ To determine which device has control, over the link at any given
network interface time

Node-to-Node Delivery Example 1

In Figure 2.8 a node with physical address 10 sends a frame to a


node with physical address 87. The two nodes are connected by a
link. At the data link level this frame contains physical addresses in
the header. These are the only addresses needed. The rest of the
header contains other information needed at this level. The trailer
usually contains extra bits needed for error detection
ƒIllustrates hop-to-hop (node-to-node) delivery by the data link layer

Network Layer Network Layer Major Duties:-

‰Logical addressing
ƒ To distinguish the source and destination systems
‰Routing
ƒ When independent networks or links are connected to
create and internetwork / large network, the
connecting devices (routing/switches) route/switch
the packets to their final destination
The network layer is responsible for the delivery of
packets from the original source to the
final destination.

10
Source-to-Destination Delivery Example 2
In Figure 2.11 we want to send
data from a node with network
address A and physical address 10,
located on one LAN, to a node
with a network address P and
physical address 95, located on
another LAN. Because the two
devices are located on different
networks,, we cannot use physical
p y
addresses only; the physical
addresses only have local
jurisdiction (control). What we
need here are universal addresses
that can pass through the LAN
boundaries. The network (logical)
addresses have this characteristic.

Transport Layer Transport Layer Major Duties:-

‰ Port addressing
ƒ Gets the entire message to the correct process on that computer
‰ Segmentation and reassembly
ƒ Enable the transport layer to reassemble the message correctly upon
arrival at the destination
ƒ To identify and replace packets that were lost in the transmission
‰ Connection control
ƒ Connectionless
• User Datagram protocol
• No end-to-end reliability check
ƒThe transport layer is responsible for delivery of a message from • E.g.: DNS update, and SMS
one process to another. ƒ connection-oriented
• Transmission Control protocol (TCP)
ƒProvides end-to-end connection between two devices during • Guarantees that is receives as it was sent
• E.g.: Telnet, FTP, SSH and Telephone conservation (real world)
communication by performing sequencing, acknowledgement,
checksums, and flow control

Transport Layer Major Duties(cont.) Reliable process-to-process delivery of a message

‰Flow control
ƒ End-to-end flow control
‰Error control
ƒ End-to-end
End to end error control
ƒ Ensure the entire message arrives at the
receiving transport layer without error
(damage,lost,duplicate) - retransmission
ƒData delivery not only between both computer but also from
specific process on one computer to a specific process on the other.

11
Example 3 Application Layer

The application layer is responsible for


providing services to the user.

Application Layer Major Duties:- Summary of Duties


‰Mail services
ƒ Basis for email forwarding and storage
‰File transfer and access
ƒ Allows user to access files in a remote host (changes/read
data)
ƒ Retrieve file from remote computer for use in the local
computer
t
ƒ Manage or control files in a remote computer locally
‰Remote log-in
ƒ User can log into a remote computer and access the
resources of that computer
‰Accessing the World Wide Web (WWW)
ƒ For internet usage

OSI Layer

‰Application
OSI Model ‰Presentation
‰Session
Review Session
S ‰Transport
‰Network
‰Data Link
‰Physical

12
Why a Layered Model? Layers with Function

7 Layers of the OSI Reference Model The Application (Upper) Layers


• Application
‰ The Application (Upper) Layers
User interface
Layer 7: Application
Examples – Telnet, HTTP
Layer 6: Presentation
• Presentation
Layer 5: Session
How data is presented
‰ The Data Flow (Lower) Layers
Special processing, such as encryption
Layer 4: Transport
Examples – ASCII, EMCDIC, JPEG
Layer 3: Network
• Session
Layer 2: Data Link
Keeping different applications’ data separate
Layer 1: Physical
Examples – Operating system/application access
scheduling

The Data Flow (Lower) Layers The OSI Models


• Transport
Reliable or unreliable delivery ‰ Application – think of browsers
Error correction before transmit
Examples: TCP, UDP, SPX
‰ Presentation – think of common data format
• Network ‰ Session – think of dialogs and conversations
Provide logical addressing which routers use for path determination
Examples: IP, IPX
‰ Transport – think of flow control and reliability
• Data
D Link
Li k ‰ Network – think of path selection, routing, and
Combines bits into bytes and bytes into frames
logical addressing
Access to media using MAC address
Error detection not correction ‰ Data Link – think of frames and media access
Examples: 802.3/802.2, HDLN control
• Physical ‰ Physical – think of signals and media
Moves bits between devices
Specifies voltage, wire speed, and pin-out cables
Examples: EIA/TIA-232, V.35

13
Encapsulation Names for Data at Each Layer

The lower layers


use encapsulation
to put the protocol
data unit (PDU)
from the upper
layer into its data
field and to add
headers and
trailers that the
layer can use to
perform its
function.

De-encapsulation Comparison: OSI Model & TCP/IP Model

• When the data link layer receives the frame, it does


the following:
It reads the physical address and other control
information provided by the directly connected peer
data link layer.
It strips
st i s the
th control
t l information
i f ti from
f the
th frame,
f
thereby creating a datagram.
It passes the datagram up to the next layer,
following the instructions that appeared in the control
portion of the frame.
Note:
Datagram - a self-contained, independent entity of data carrying sufficient information to be
routed from the source to the destination computer without reliance on earlier exchanges between
this source and destination computer and the transporting network

Question?

Do you understand?
If not, better do revision.

14

Das könnte Ihnen auch gefallen