Data Communication - Prelims telephone, handset Receiver – receives the message; Data Communication – exchange of data computer, workstation, telephone between two devices via some form of handset, TV communications Transmission Medium – physical - Communicating path by which a message travels devices must be part from sender to receiver; twister pair of a communication wire, coaxial, fiber optic, radiowaves system made up of a Data flow – communication between two combination of devices can be simplex, half duplex or full hardware and duplex software Simplex – unidirectional; 1 can receive, 1 Fundamental Characteristics: can transmit Delivery – The system must deliver data to Half duplex – both can transmit and receive the correct destination but not same time Accuracy – data accurately Full duplex – both can receive and transmit - data that have altered in simultaneously transmission and left uncorrected are unusable. Networks – interconnection of a set of devices capable of communication Timeliness – data delivered late are useless - A device can be a host (end - Timely delivery means system) such as large delivering data as they are computer, desktop, laptop, produced workstation, cellphone, Jitter – variation in the packet arrival time security system - Connecting device: router, It is the uneven delay in the delivery connects network to other of audio/video packets networks Switch: connects devices together Components of data communication: 3 factors of network: Message – information to be communicated ; texts, numbers, 1. Performance – speed of transmit or pictures, audios, videos receive of data - Can be measured in many Example: telephone regional offices in ways including transit time which every offices needs to be connected and response time to every other offices Transmit time: time for message to Advantages: travel 1. The use of dedicated links guarantees Response time: elapsed time that each connection can carry its own data between an inquiry and response load, thus eliminating the traffic problems that can occur when links must be shared Performance depends on: by multiple devices. - Number of users 2. A mesh topology is robust. If one link - Type of transmission medium becomes unusable, it does not incapacitate - Capabilities of the connected the entire system hardware - Efficiency of the software 3. There is the advantage of privacy or 2. Reliability – measured by the security. When every message travels along frequency of failure, time it takes a a dedicated line, only the intended recipient link to recover from failure; strength sees it. Physical boundaries prevent other 3. Security – protecting data from users from gaining access to messages. unauthorized access, damage and 4. Point-to-point links make fault development, implementing policies identification and fault isolation easy. and procedures for recovery from Traffic can be routed to avoid links with breaches and losses suspected problems. This facility enables Network Topology - way in which a the network manager to discover the network is laid out physically; two or more precise location of the fault and aids in devices connect a link, 2 or more links form finding its cause and solution. a topology Disadvantages: - Topology is geometric 1. Disadvantage of a mesh are related to representation of the the amount of cabling because every device relationship of all the links and must be connected to every other device. linking devices ( called nodes) to 1 another 2. Installation and reconnection are difficult. 4 basic topologies: 3. The sheer bulk of the wiring can be 1. Mesh – every device has a dedicated greater than the available space (in walls, point to point link to every other ceilings, or floors) can accommodate. device - The link carries traffic only 4. The hardware required to connect each between the 2 devices it link (I/O ports and cable) can be connects prohibitively expensive. 2. Star topology - each device has a star requires far less cable than a mesh, dedicated point-to-point link only to a each node must be linked to a central hub. central controller, usually called a hub. For this reason, often more cabling is required in a star than in some other - The devices are not directly topologies (such as ring or bus). linked to one another. Unlike a mesh topology, a star 3. Bus Topology - A bus topology is topology does not allow direct multipoint. traffic between devices. - One long cable acts as a backbone - The controller acts as an to link all the devices in a network. Nodes exchange: If one device wants are connected to the bus cable by drop lines to send data to another, it and taps. sends the data to the controller, which then relays - A drop line is a connection running the data to the other between the device and the main cable. A connected device . tap is a connector that either splices into the main cable or punctures the sheathing Advantages: of a cable to create a contact with the 1. A star topology is less expensive than a metallic core. mesh topology. In a star, each device needs - As a signal travels along the only one link and one I/O port to connect it backbone, some of its energy is to any number of others. transformed into heat. Therefore, it 2. Easy to install and reconfigure. becomes weaker and weaker as it travels farther and farther. 3. Far less cabling needs to be housed, and additions, moves, and deletions involve only - For this reason there is a limit on one connection: between that device and the number of taps a bus can support and the hub. on the distance between those taps. 4. Other advantage include robustness. If Advantages: one link fails, only that link is affected. All Advantages of a bus topology other links remain active. This factor also include ease of installation. Backbone cable lends itself to easy fault identification and can be laid along the most efficient path, fault isolation. If the hub is working, it can then connected to the nodes by drop lines be used to monitor link problems and of various lengths. In this way, a bus uses bypass defective links. less cabling than mesh or star topologies. In Disadvantages: a star, for example, four network devices in the same room require four lengths of cable One big disadvantage of a star topology is reaching all the way to the hub. In a bus, the dependency of the whole topology on this redundancy is eliminated. Only the one single point, the hub. If the hub goes backbone cable stretches through the down, the whole system is dead. Although a entire facility. Each drop line has to reach Advantages: only as far as the nearest point on the A ring is relatively easy to install and backbone. reconfigure. Each device is linked to only its Disadvantages: immediate neighbors (either physically or logically). To add or delete a device requires Disadvantages include difficult reconnection changing only two connections. The only and fault isolation. A bus is usually designed constraints are media and traffic to be optimally efficient at installation. It considerations (maximum ring length and can therefore be difficult to add new number of devices). In addition, fault devices. Signal reflection at the taps can isolation is simplified. Generally in a ring, a cause degradation in quality. This signal is circulating at all times. If one device degradation can be controlled by limiting does not receive a signal within a specified the number and spacing of devices period, it can issue an alarm. The alarm connected to a given length of cable. alerts the network operator to the problem Adding new devices may therefore require and its location. modification or replacement of the backbone. In addition, a fault or break in Disadvantages: the bus cable stops all transmission, even Unidirectional traffic can be a disadvantage. between devices on the same side of the In a simple ring, a break in the ring (such as problem. The damaged area reflects signals a disabled station) can disable the entire back in the direction of origin, creating network. This weakness can be solved by noise in both directions. using a dual ring or a switch capable of 4. Ring Topology - each device has a closing off the break. Ring topology was dedicated point-to-point connection prevalent when IBM introduced its local- with only the two devices on either area network Token Ring. Today, the need side of it. for higher-speed LANs has made this - A signal is passed along the topology less popular ring in one direction, from Hybrid Topology – network topology that device to device, until it uses 2 or more differing network topologies reaches its destination. - Each device in the ring Criteria: incorporates a repeater. Performance When a device receives a signal intended for another - Throughput; High ; Bandwidth device, its repeater - Delay ; Low ; Latency: Time regenerates the bits and between sending and passes them along receiving Information 3 factors of Bandwidth: and receiver and all intermediate devices need to 1. Telecommunication - range of follow to be able to frequency communicate effectively. 2. Computing – communication - When communication is capacity simple, we may need only one 3. Transmission Rate - simple protocol. - When the communication is complex, in which case we Reliability need a protocol at each layer, - Identical sent and received or PROTOCOL LAYERING. data Network Types - Size Single Layer Protocol - Geographical coverage - Ownership (factors) - Communication is so simple that it can be occur on only LAN ( Local Area Network) one layer. - Privately owned and connects Complex Protocol some hosts in a single office, building or campus - Different set of layers - Encryption / decryption WAN ( Wide Area Network) technique - Interconnection of devices Bidirectional Communication : each layer capable of communication has 2 opposite function - Telecommunications network that extends over a large Modularity geographical area - Means independent layers - P2P WAN / Switched WAN - A layer module can be defined Network Models – layering on how data is as a black box with inputs and transmitted outputs without concern about how inputs are changed - Develop hardware and to outputs. software to provide functions of each layer separately Principles of Protocol Layering: 1. Protocol Layering 1st Principle: - In data communication and networking, a protocol defines - It dictates that if we wat the rules that both the sender bidirectional communication, we need to make each layer - Another way of thinking of the so that it can perform two logical connections is to think opposite tasks, one in each about the data unit created direction. from each layer. In the top 3 layers, the data unit(packets) 2nd Principle: should not be changed by any - We need to follow in protocol router/layer. layering is that the two Physical Layer – responsible for carrying objects under each layer at individual bit in a frame across the link. both sites should be identical Data Link Layer – responsible for taking the TCP / IP SUITE datagram and moving it across the link - A protocol suite ( a set of Network layer – creating connection protocols organized in between the source computer and the different layers) used in the destination computer. internet today. - A hierarchical protocol made - The network layer in the up of interactive modules, Internet include the main each of which provides a protocol, Internet Protocol specific functionality. The (IP) that defines the format of term hierarchical means that the packet called a data gram each upper level protocol is at the network layer. supported by the services Transport Layer – giving services to the provided by one or more application layer to get a message from an lower level protocols. application program running on the source - The original TCP/IP protocol host and deliver it to the corresponding suite as defined as four application on the destination host. software layers built upon the hardware. 2 Packets: - Today, however, TCP/IP is Segments TCP thought of as a five layer model. User datagram UDP ( User data protocol) Layers in the TCP/IP Protocol Suite TCP AND UDP DIRECTION: - Duty of the application, TCP – bidirectional transport and network layers UDP – Unidirectional is end to end. The duty of the data link and physical layers is hop to hop which is a hop is a host/router. Application layer - The network layer takes the transport layer packet as data - Exchanging messages or payload and adds it own between each other as header to the payload. The through there where bridge. result is the network layer HTTP ( Hypertext Transfer Protocol) – packet called a datagram. internet - The network layer the passes the packet to the data link SMTP ( Single Mail Transfer Protocol) – layer. mail Encapsulation and Decapsulation FTP (File Transfer Protocol) – file from one at the Router host to another - The data link layer of the next TELNET&SSH (Terminal Network & Source link encapsulates the shell) – site remotely datagram in a frame and SNMP ( Simple Network Management passes it to the physical layer Protocol) – admin to manage internet for transmission. - The network layer only DNS ( Domain Name System) – network inspects the source and layer destination addresses in the IGMP ( Internet Group Management datagram header and consults Protocol) its forwarding table to find the next hop to which the – Collect membership in a group datagram is to be delivered. Encapsulation and Decapsulation - The contents of the datagram should not be changed by the - One of the important network layer in the router concepts in protocol layering unless there is a need to in the Internet is fragment the datagram. If it is encapsulation/decapsulation too big to be passed through Encapsulation at the Source Host the next link. The datagram is then passed o the datalink - At the application layer, the layer of the next link. data to be exchanged is referred to as a message. Decapsulation at the Destination - A message normally does not Host contain any header or trailer, - At the destination host, each but if it does, we refer to the layer only decapsulates the whole as the message. The packet received, removes the message is passed to the payload and delivers the transport layer. payload to the next higher layer protocol until the from several next higher layer message reaches the protocols (One at a time) application layer. - Demultiplexing means that a - It is necessary to say that protocol can decapsulate and decapsulation in the host deliver a packet to several involves error checking. next higher layer protocols Addressing OSI ( Open System Interconnection) - It is worth mentioning - A set of protocols that allows another concept related to any two different systems to protocol layering in the communicate regardless of internet, addressing. their underlying architecture. - There is a relationship - The purpose of the OSI between the layer, the Models is to show how to address used in that layer and facilitate communication the packet name at that layer. between different systems without requiring changes to Packet Names Layers Addresses the logic of the underlying Message Application Names hardware and software. Layer - The OSI Models is not a Segment/ Transport Port protocol: it is a model for User Diagram Layer Numbers understanding and designing a Datagram Network Logical network architecture that is Layer Addresses flexible, robust and Frame Data Link Link Layer interoperable. Layer Addresses - The OSI model was intended Bits Physical Layer to be the basis for the creation of the protocols in the OSI stack. OSI VS TCP/IP Multiplexing and Demultiplexing - When we compare the two - Since TCP/IP protocol suite models, we find that two uses several protocols at layers, session and some layers, we can say that presentation are missing from we have multiplexing at the the TCP/IP protocol suite. source and demultiplexing at - These two layers were not the destination added to the TCP/IP Protocol - Multiplexing in this case suite after the publication of means that a protocol at a the OSI Model. layer can encapsulate a packet - The application layer in the sending computer bits from one device to suite is usually considered to another along the network. be the combination of three layers in the OSI model. - 1st: TCP/IP has more than one transport layer protocol. - 2nd: application layer is not only one piece of software. Application Layer – Enables the user to interact with the application or network whenever the user elects to read messages. Presentation Layer – translates or formats data for the application layer based on the semantix or syntax that the application accepts.
Session layer – set ups, coordinates and
terminates conversations between applications. - Its services include authentication and reconnection after an interruption. Transport Layer – it is responsible for transferring data across a network and provides error checking mechanisms and data flow controls. Network Layer – primary functions is to move data into and through other networks. Data Link Layer – the protocol layer in a program that handles the moving of data into and out of a physical link in a network. Physical Layer – Transport data using electrical, mechanical, or procedural interfaces. The layer is responsible for