Sie sind auf Seite 1von 9

 Sender – device that sends the data

message; computer, workstation,


Data Communication - Prelims telephone, handset
 Receiver – receives the message;
Data Communication – exchange of data
computer, workstation, telephone
between two devices via some form of
handset, TV
communications
 Transmission Medium – physical
- Communicating path by which a message travels
devices must be part from sender to receiver; twister pair
of a communication wire, coaxial, fiber optic, radiowaves
system made up of a
Data flow – communication between two
combination of
devices can be simplex, half duplex or full
hardware and
duplex
software
Simplex – unidirectional; 1 can receive, 1
Fundamental Characteristics:
can transmit
Delivery – The system must deliver data to
Half duplex – both can transmit and receive
the correct destination
but not same time
Accuracy – data accurately
Full duplex – both can receive and transmit
- data that have altered in
simultaneously
transmission and left uncorrected are
unusable. Networks – interconnection of a set of
devices capable of communication
Timeliness – data delivered late are useless
- A device can be a host (end
- Timely delivery means
system) such as large
delivering data as they are
computer, desktop, laptop,
produced
workstation, cellphone,
Jitter – variation in the packet arrival time security system
- Connecting device: router,
It is the uneven delay in the delivery
connects network to other
of audio/video packets
networks
Switch: connects devices
together
Components of data communication:
3 factors of network:
 Message – information to be
communicated ; texts, numbers, 1. Performance – speed of transmit or
pictures, audios, videos receive of data
- Can be measured in many Example: telephone regional offices in
ways including transit time which every offices needs to be connected
and response time to every other offices
Transmit time: time for message to Advantages:
travel
1. The use of dedicated links guarantees
Response time: elapsed time that each connection can carry its own data
between an inquiry and response load, thus eliminating the traffic problems
that can occur when links must be shared
Performance depends on:
by multiple devices.
- Number of users
2. A mesh topology is robust. If one link
- Type of transmission medium
becomes unusable, it does not incapacitate
- Capabilities of the connected
the entire system
hardware
- Efficiency of the software 3. There is the advantage of privacy or
2. Reliability – measured by the security. When every message travels along
frequency of failure, time it takes a a dedicated line, only the intended recipient
link to recover from failure; strength sees it. Physical boundaries prevent other
3. Security – protecting data from users from gaining access to messages.
unauthorized access, damage and
4. Point-to-point links make fault
development, implementing policies
identification and fault isolation easy.
and procedures for recovery from
Traffic can be routed to avoid links with
breaches and losses
suspected problems. This facility enables
Network Topology - way in which a the network manager to discover the
network is laid out physically; two or more precise location of the fault and aids in
devices connect a link, 2 or more links form finding its cause and solution.
a topology
Disadvantages:
- Topology is geometric
1. Disadvantage of a mesh are related to
representation of the
the amount of cabling because every device
relationship of all the links and
must be connected to every other device.
linking devices ( called nodes)
to 1 another 2. Installation and reconnection are
difficult.
4 basic topologies:
3. The sheer bulk of the wiring can be
1. Mesh – every device has a dedicated
greater than the available space (in walls,
point to point link to every other
ceilings, or floors) can accommodate.
device
- The link carries traffic only 4. The hardware required to connect each
between the 2 devices it link (I/O ports and cable) can be
connects prohibitively expensive.
2. Star topology - each device has a star requires far less cable than a mesh,
dedicated point-to-point link only to a each node must be linked to a central hub.
central controller, usually called a hub. For this reason, often more cabling is
required in a star than in some other
- The devices are not directly
topologies (such as ring or bus).
linked to one another. Unlike
a mesh topology, a star 3. Bus Topology - A bus topology is
topology does not allow direct multipoint.
traffic between devices.
- One long cable acts as a backbone
- The controller acts as an
to link all the devices in a network. Nodes
exchange: If one device wants
are connected to the bus cable by drop lines
to send data to another, it
and taps.
sends the data to the
controller, which then relays - A drop line is a connection running
the data to the other between the device and the main cable. A
connected device . tap is a connector that either splices into
the main cable or punctures the sheathing
Advantages:
of a cable to create a contact with the
1. A star topology is less expensive than a metallic core.
mesh topology. In a star, each device needs
- As a signal travels along the
only one link and one I/O port to connect it
backbone, some of its energy is
to any number of others.
transformed into heat. Therefore, it
2. Easy to install and reconfigure. becomes weaker and weaker as it travels
farther and farther.
3. Far less cabling needs to be housed, and
additions, moves, and deletions involve only - For this reason there is a limit on
one connection: between that device and the number of taps a bus can support and
the hub. on the distance between those taps.
4. Other advantage include robustness. If Advantages:
one link fails, only that link is affected. All
Advantages of a bus topology
other links remain active. This factor also
include ease of installation. Backbone cable
lends itself to easy fault identification and
can be laid along the most efficient path,
fault isolation. If the hub is working, it can
then connected to the nodes by drop lines
be used to monitor link problems and
of various lengths. In this way, a bus uses
bypass defective links.
less cabling than mesh or star topologies. In
Disadvantages: a star, for example, four network devices in
the same room require four lengths of cable
One big disadvantage of a star topology is
reaching all the way to the hub. In a bus,
the dependency of the whole topology on
this redundancy is eliminated. Only the
one single point, the hub. If the hub goes
backbone cable stretches through the
down, the whole system is dead. Although a
entire facility. Each drop line has to reach Advantages:
only as far as the nearest point on the
A ring is relatively easy to install and
backbone.
reconfigure. Each device is linked to only its
Disadvantages: immediate neighbors (either physically or
logically). To add or delete a device requires
Disadvantages include difficult reconnection
changing only two connections. The only
and fault isolation. A bus is usually designed
constraints are media and traffic
to be optimally efficient at installation. It
considerations (maximum ring length and
can therefore be difficult to add new
number of devices). In addition, fault
devices. Signal reflection at the taps can
isolation is simplified. Generally in a ring, a
cause degradation in quality. This
signal is circulating at all times. If one device
degradation can be controlled by limiting
does not receive a signal within a specified
the number and spacing of devices
period, it can issue an alarm. The alarm
connected to a given length of cable.
alerts the network operator to the problem
Adding new devices may therefore require
and its location.
modification or replacement of the
backbone. In addition, a fault or break in Disadvantages:
the bus cable stops all transmission, even
Unidirectional traffic can be a disadvantage.
between devices on the same side of the
In a simple ring, a break in the ring (such as
problem. The damaged area reflects signals
a disabled station) can disable the entire
back in the direction of origin, creating
network. This weakness can be solved by
noise in both directions.
using a dual ring or a switch capable of
4. Ring Topology - each device has a closing off the break. Ring topology was
dedicated point-to-point connection prevalent when IBM introduced its local-
with only the two devices on either area network Token Ring. Today, the need
side of it. for higher-speed LANs has made this
- A signal is passed along the topology less popular
ring in one direction, from
Hybrid Topology – network topology that
device to device, until it
uses 2 or more differing network topologies
reaches its destination.
- Each device in the ring Criteria:
incorporates a repeater.
Performance
When a device receives a
signal intended for another - Throughput; High ; Bandwidth
device, its repeater - Delay ; Low ; Latency: Time
regenerates the bits and between sending and
passes them along receiving Information
3 factors of Bandwidth: and receiver and all
intermediate devices need to
1. Telecommunication - range of
follow to be able to
frequency
communicate effectively.
2. Computing – communication
- When communication is
capacity
simple, we may need only one
3. Transmission Rate -
simple protocol.
- When the communication is
complex, in which case we
Reliability
need a protocol at each layer,
- Identical sent and received or PROTOCOL LAYERING.
data
Network Types
- Size
Single Layer Protocol
- Geographical coverage
- Ownership (factors) - Communication is so simple
that it can be occur on only
LAN ( Local Area Network)
one layer.
- Privately owned and connects
Complex Protocol
some hosts in a single office,
building or campus - Different set of layers
- Encryption / decryption
WAN ( Wide Area Network)
technique
- Interconnection of devices
Bidirectional Communication : each layer
capable of communication
has 2 opposite function
- Telecommunications network
that extends over a large Modularity
geographical area
- Means independent layers
- P2P WAN / Switched WAN
- A layer module can be defined
Network Models – layering on how data is as a black box with inputs and
transmitted outputs without concern
about how inputs are changed
-
Develop hardware and
to outputs.
software to provide functions
of each layer separately Principles of Protocol Layering:
1. Protocol Layering
1st Principle:
- In data communication and
networking, a protocol defines - It dictates that if we wat
the rules that both the sender bidirectional communication,
we need to make each layer - Another way of thinking of the
so that it can perform two logical connections is to think
opposite tasks, one in each about the data unit created
direction. from each layer. In the top 3
layers, the data unit(packets)
2nd Principle:
should not be changed by any
- We need to follow in protocol router/layer.
layering is that the two
Physical Layer – responsible for carrying
objects under each layer at
individual bit in a frame across the link.
both sites should be identical
Data Link Layer – responsible for taking the
TCP / IP SUITE
datagram and moving it across the link
- A protocol suite ( a set of
Network layer – creating connection
protocols organized in
between the source computer and the
different layers) used in the
destination computer.
internet today.
- A hierarchical protocol made - The network layer in the
up of interactive modules, Internet include the main
each of which provides a protocol, Internet Protocol
specific functionality. The (IP) that defines the format of
term hierarchical means that the packet called a data gram
each upper level protocol is at the network layer.
supported by the services
Transport Layer – giving services to the
provided by one or more
application layer to get a message from an
lower level protocols.
application program running on the source
- The original TCP/IP protocol
host and deliver it to the corresponding
suite as defined as four
application on the destination host.
software layers built upon the
hardware. 2 Packets:
- Today, however, TCP/IP is
Segments TCP
thought of as a five layer
model. User datagram UDP ( User data
protocol)
Layers in the TCP/IP Protocol
Suite TCP AND UDP DIRECTION:
- Duty of the application, TCP – bidirectional
transport and network layers
UDP – Unidirectional
is end to end. The duty of the
data link and physical layers is
hop to hop which is a hop is a
host/router.
Application layer - The network layer takes the
transport layer packet as data
- Exchanging messages
or payload and adds it own
between each other as
header to the payload. The
through there where bridge.
result is the network layer
HTTP ( Hypertext Transfer Protocol) – packet called a datagram.
internet - The network layer the passes
the packet to the data link
SMTP ( Single Mail Transfer Protocol) –
layer.
mail
Encapsulation and Decapsulation
FTP (File Transfer Protocol) – file from one
at the Router
host to another
- The data link layer of the next
TELNET&SSH (Terminal Network & Source
link encapsulates the
shell) – site remotely
datagram in a frame and
SNMP ( Simple Network Management passes it to the physical layer
Protocol) – admin to manage internet for transmission.
- The network layer only
DNS ( Domain Name System) – network
inspects the source and
layer
destination addresses in the
IGMP ( Internet Group Management datagram header and consults
Protocol) its forwarding table to find the
next hop to which the
– Collect membership in a group
datagram is to be delivered.
Encapsulation and Decapsulation - The contents of the datagram
should not be changed by the
- One of the important
network layer in the router
concepts in protocol layering
unless there is a need to
in the Internet is
fragment the datagram. If it is
encapsulation/decapsulation
too big to be passed through
Encapsulation at the Source Host the next link. The datagram is
then passed o the datalink
- At the application layer, the
layer of the next link.
data to be exchanged is
referred to as a message. Decapsulation at the Destination
- A message normally does not Host
contain any header or trailer,
- At the destination host, each
but if it does, we refer to the
layer only decapsulates the
whole as the message. The
packet received, removes the
message is passed to the
payload and delivers the
transport layer.
payload to the next higher
layer protocol until the from several next higher layer
message reaches the protocols (One at a time)
application layer. - Demultiplexing means that a
- It is necessary to say that protocol can decapsulate and
decapsulation in the host deliver a packet to several
involves error checking. next higher layer protocols
Addressing OSI ( Open System Interconnection)
- It is worth mentioning - A set of protocols that allows
another concept related to any two different systems to
protocol layering in the communicate regardless of
internet, addressing. their underlying architecture.
- There is a relationship - The purpose of the OSI
between the layer, the Models is to show how to
address used in that layer and facilitate communication
the packet name at that layer. between different systems
without requiring changes to
Packet Names Layers Addresses
the logic of the underlying
Message Application Names hardware and software.
Layer - The OSI Models is not a
Segment/ Transport Port protocol: it is a model for
User Diagram Layer Numbers understanding and designing a
Datagram Network Logical network architecture that is
Layer Addresses
flexible, robust and
Frame Data Link Link Layer
interoperable.
Layer Addresses
- The OSI model was intended
Bits Physical
Layer to be the basis for the
creation of the protocols in
the OSI stack.
OSI VS TCP/IP
Multiplexing and Demultiplexing
- When we compare the two
- Since TCP/IP protocol suite
models, we find that two
uses several protocols at
layers, session and
some layers, we can say that
presentation are missing from
we have multiplexing at the
the TCP/IP protocol suite.
source and demultiplexing at
- These two layers were not
the destination
added to the TCP/IP Protocol
- Multiplexing in this case
suite after the publication of
means that a protocol at a
the OSI Model.
layer can encapsulate a packet
- The application layer in the sending computer bits from one device to
suite is usually considered to another along the network.
be the combination of three
layers in the OSI model.
- 1st: TCP/IP has more than one
transport layer protocol.
- 2nd: application layer is not
only one piece of software.
Application Layer – Enables the user to
interact with the application or network
whenever the user elects to read messages.
Presentation Layer – translates or formats
data for the application layer based on the
semantix or syntax that the application
accepts.

Session layer – set ups, coordinates and


terminates conversations between
applications.
- Its services include
authentication and
reconnection after an
interruption.
Transport Layer – it is responsible for
transferring data across a network and
provides error checking mechanisms and
data flow controls.
Network Layer – primary functions is to
move data into and through other
networks.
Data Link Layer – the protocol layer in a
program that handles the moving of data
into and out of a physical link in a network.
Physical Layer – Transport data using
electrical, mechanical, or procedural
interfaces. The layer is responsible for

Das könnte Ihnen auch gefallen