Beruflich Dokumente
Kultur Dokumente
Communication
MBA Semester II CAM
Faculty of Management Studies
MSU
Networks
• Radio, TV, Railway, Highways, Mobile Telephone
• Computer Networks – WWW, Airlines, Railways, Financial transactions,
Stock/Share-BSE, NSE, nifty, DOW
• An interaction of widely dispersed computers via a public
telecommunication system is known as a computer network – the
communications media, devices and software needed to connect 2 or
more computer systems and/or devices; used to share hardware,
programs and databases across the organization; fosters teamwork,
innovative ideas and new business strategies
• Data Communication – A specialized subset of telecommunications that
refers to the electronic collection, processing and distribution of data –
typically between computer system hardware devices. Efficient data
communication must be: accurate, timely and cost effective. Data
communication allows users to transmit and receive data and information.
This information is used to solve problems and to make informed choices.
When we communicate, we are sharing information. This sharing can
be local or remote.
Telecommunication –telephony, telegraphy and television, means
communication at a distance (tele is Greek for ‘far’)
Data refers to facts, concepts and instructions presented in whatever
form is agreed upon by the parties creating and using the data.
Data communication is the exchange of data(in the form of 0s and 1s)
between two devices via some form of transmission medium (such
as a wire cable). DC is considered local if the communicating devices
are in the same building or a similarly restricted geographical area,
and is considered remote if the devices are farther apart.
For DC to occur, the communicating devices must be part of a
communication system made up of a combination of hardware and
software. The effectiveness of a DC system depends on 3
fundamental characteristics: Delivery, Accuracy, Timeliness
Components
• Message
• Sender
• Receiver
• Medium
• Protocol
Networks A network is a set of devices (often referred to as nodes) connected
by media links. A node can be a computer, printer or any other device
capable of sending and/or receiving data generated by other nodes on the
network. The links connecting the devices are called communication
channels.
Networks use distributed processing, in which a task is divided among
multiple computers. Instead of a single large machine being responsible
for all aspects of a process, each separate computer (usually a PC or
workstation) handles a subset.
Network Topology
Network topology vs. Network fabric
A network topology is the physical or logical structure of a network. The term network
fabric describes the way each topology creates a particular type of criss-cross pattern of
connections. Common topologies and their fabrics include:
Full mesh networks - all nodes are connected to each other and can exchange data.
Partial mesh networks - some nodes are connected to each other in a full mesh scheme, but
others are only connected to one or two other nodes in the network.
Star network - all network nodes are connected to a common central computer.
Bus - network devices are attached directly to a transmission line. All signals pass through all
devices, but each device has a unique identity and recognizes signals intended for it.
Data Transmission Modes
Item Simplex Half Duplex Full Duplex
Direction of Communication in Both ways but Communication in
transmission of one direction only transmission of both directions
message communication is simultaneously
only in one
direction at a time
Confirmation of the Not possible Possible but slow Possible
communicated
message
Number of wires Two Two Four
required
Cost of Cheapest Average Costliest
transmission
Example of user TV and Radio Transmission of Telephonic
transmission and data from hard disk communications
broadcasting to memory in a PC
Efficiency Low Medium High
Network Goals
• Resource sharing and the goal is to make all programs, data and
equipment available to anyone on the network without regard to
the physical location of the resource and the user. Load sharing
(ending tyranny of geography) is another aspect of resource
sharing.
• High Reliability By having alternative sources of supply, all files
could be replicated on 2 or 3 machines, so if one of them is
unavailable, the other copies can be used. Multiple CPUs – for
military, banking, air traffic control, the ability to continue operating
in the face of hardware problems is of great importance
• Saving money Small computers have a much better
price/performance ratio than large ones File Server machine
• Communication Medium among widely spread people
Application of Networks
• Access to remote programs
• Access to remote databases
• Value added communication facilities
Networks provide
• Shared access to information
• Permit the movement of data
Advantages
• Security/Encapsulation Bank ATM
• Distributed Databases www
• Faster problem solving
• Security through redundancy Space Shuttle – 3
computers run the same program so that if one
has a hardware error, the other 2 can override it
• Collaborative Processing Both multiple computers
and multiple users may interact on a task
Applications
• Sales and Marketing
• Financial Services
• Manufacturing
• Electronic Messaging
• Directory Services
• Information Services
• Electronic Data Interchange
• Teleconferencing
• Cellular telephone
• Cable television
Telecommunication Concepts
• The message (data and information) is communicated via the signal. The
transmission medium “carries” the signal.
• Relay signals between computer systems and transmission media Analog
signal e.g., electricity current Digital signal- A signal represented by bits
Modem devices that translate data from analog to digital and vice versa
• Media A collective name for materials (magnetic tape, paper, disk etc)
used to transmit data
• Communication media the material used to transmit data and includes
cables, fibre optic cables, radio waves and satellite links
• Communication Devices the parts of the computer that facilitate
communication by using the media Modem, local area network cards,
network hubs and wireless cards
• Interface a device that allows other wise incompatible items to be
connected. It is sometimes an external device with its own power supply
that is plugged into the computer e.g., modems, network cards and
wireless cards
Modems
They use the already existing telephone network to facilitate computer
communication. Telephone lines were designed to communicate
the human voice, so they transmit data using sound waves or
analog data. Before computer signals can be sent via telephone
lines they must be converted from digital to an analog format. This
process is called modulation. When the signal reaches the receiving
computer it is converted back from analog to digital form, a process
called demodulation.
Modems are usually used to connect a computer to the Internet and
to send and receive faxes via the computer.
Modems constantly check whether the information was received
properly or not.
The information is broken down and sent in groups called Packets.
Each packet is checked for errors and is re-sent if there is an error.
Digital Phone Lines
• There is no need to use a modem when using a digital
telephone line such as an ISDN (Integrated Services
Digital Network) line to connect a computer (or a LAN)
to the Internet because the signal is already a digital
one which a computer can process.
• A larger volume of data is transmitted more quickly
• ISDN line is used for voice, video, image and data
transmission simultaneously, using existing common
carrier lines
• Users can receive telephone calls, transmit faxes and
surf the Internet at the same time using the same line
Types of Computer Networks
Networks are often categorized by the wired or wireless
transmission medium they support, as well as the scope of
their domains. For example, local area networks (LANs)
interconnect endpoints in a single domain. In
contrast, wide area networks interconnect multiple LANs.
Networks may also be divided into subnetworks, also called
subnets.
Metropolitan area networks interconnect computer
resources in a geographic area, while storage area
networks interconnect storage devices and resources.
Other types of computer networks include personal area
networks (PANs), wireless local area networks (WLANs),
campus area networks (CANs), virtual private networks
(VPNs) and passive optical networks (PONs).
Local Area Networks
Privately owned networks and link the devices in a single office,
building or campus. Depending on the needs of an organization and
the types of technology used, a LAN can be as simple as 2 PCs and a
printer in someone’s home office or it can extend throughout a
company and include sound, and video peripherals. Currently, LAN
size is limited to a few kilometers. LANs are designed to allow
resources to be shared between PCs or workstations. The resources
to be shared can include hardware, software or data.
Common example: a LAN found in many business environments, links
a work group of task-related computers, for ex: Engineering
workstations or Accounting PCs. One of the computers may be
given a large capacity disk drive and become a server to the other
clients. Software can be stored on the central server and used as
needed by the whole group
In addition to size, LANs are distinguished from other types of
networks by their transmission media and topology. In
general, a given LAN will use only one type of transmission
media. The most common LAN topologies are Structured:
bus, ring, star, hierarchical, hybrid Unstructured: Mobile
Adhoc Network (MANET)
A network card is a small circuit inside the computer. It allows
the computer to communicate with others on the network.
A cable is plugged into the card and each computer than
has access to any shared programs, devices and files on
other computers or server. Each network card has a unique
address to make sure the correct data is delivered to it.
Some use cables or are wireless. The cables used may be
twisted pair, coaxial or fibre optic
Metropolitan Area Network
MAN is designed to extend over an entire city. It may be a
single network such as a cable television network, or it
may be a means of connecting a number of LANs into a
larger network so that resources may be shared LAN-
to-LAN or device-to device. Ex: a company can use a
MAN to connect the LANs in all of its offices
throughout the city.
A MAN may be wholly owned and operated by a private
company or it may be a service provided by a public
company, such as a local telephone company. Many
telephone companies provide a popular MAN service
called Switched Multi-Megabit Data Service(SMDS).
Wide Area Network
WAN provides long distance transmission of data,
voice, image and video information over large
geographical areas that may comprise a country,
a continent or even the whole world.
In contrast to LANs (which depend on their own
hardware for transmission) WANs may utilize
public, leased or private communication devices,
usually in combinations, and can therefore span
an unlimited number of miles.
A WAN owned and used by a single company is
referred to as an Enterprise network
LAN, MAN, WAN
Characteristic LAN MAN WAN
Full form Local Area Network Metropolitan Area Wide Area Network
Network
Location of Computers are Computers re Computers are
computers located within the located in the city distributed all over
same building and connected the country or
using modem or continent.
telephone lines Connection is made
via satellite
communication link
or via Internet
Example An office whose A bank whose Connection of
different branches are various branches of
departments are spread in a city are a MNC linked using
located in the same connected using microwave satellite
building and public telephone communication
connected via bus exchange and the system or Internet
topology using systems are connection. Each
Wireless Networks
• Both LANs and WANs may be created using
wireless technology
• There are no wires
• Uses infrared or microwave radio signals to
transmit and receive data- Wireless networks
are used where cables are inconvenient
• More expensive than cable linked networks
• More readily used nowadays as costs decline
Cellular Networks
• Cell phones are used regularly to communicate while travelling or away
from home/office
• Cell phones offer facilities for browsing the Internet and sending and
receiving mails
How the Cellular Network works?
• It is created when the transmitters are placed in a checkerboard pattern
throughout a service area
• The geographical area that is served by a transmitter is called a CELL.
Unique frequencies are assigned to each cell.
• Each cell phone transmits and receives a signal. When you place a call, the
cell in which the caller is located detects the signal from your cell phone
• The cell then assigns a specific frequency to that call and the call is
transmitted to the receiving unit
• A computer system monitors the strength of the signal
from the cell phone
• As you move away from the transmitter, the signal weakens
• If the signal falls to a preset level, the computer recognizes
that you have left the cell and scans the surrounding cells
to determine the new area into which you have moved
• The transmitter in the new cell takes over the call and a
new frequency is assigned to your phone
• This happens so quickly that you do not detect the transfer.
If you move too far away from any network transmitter, the
connection breaks
Internet
• The world’s largest network, worldwide collection of networks that
link together millions of computers by means of modems,
telephone lines and other communication devices and media
• It can be accessed either through a file server or through an
Internet Service Provider(ISP) or online service
• A file server is a computer that is permanently connected to the
Internet, used by large organizations
• An ISP is an organization that supplies connections to the Internet
for a fee
• An online service not only provides access to the Internet but also
provides other services such as financial information,
entertainment, hardware and software guides, news and weather
and direct messaging
• Fees for online service are usually higher than for an ISP
• The Internet enables users to send and receive mail electronically
• Email is so quick that traditional mail has become ‘snail’ mail
• Direct Messaging enables users to meet and communicate with
persons all around the world using either typed or voice messages
• The Internet enables employees with PCs to connect to the
organization’s mainframe or super computer without travelling to
those locations. Has made ecommerce possible
• Discussion boards allow participants to type messages about a
given topic. Responses are usually linked to each other to allow the
reader to easily follow the discussion
Intranet and Extranet
• Intranet-Private network of computers with an organization
that provides functions similar to the public Internet
• These functions include: email and newsgroups
• They do not allow access via the Internet and has security
features to prevent unauthorized access
• Extranet An internal company network that has a
connection to the public Internet and allows users to gain
access via the Internet. It provides access to people in the
organization who are working away from the office
• Web Page A file that is saved on the computer on the
Internet
• Web site A collection of web pages
ISO OSI Open Systems Interconnection
Reference model because it deals with connecting
open systems – that is, systems that are open for
communication with other systems. Note that the
OSI model itself is not a network architecture
because it does not specify the exact services and
protocols to be used in each layer. It just tells
what each layer should do.
People Do Not like To See Purple Animals
Please Do Not Throw Sausage Pizza Away
All People Seem To Need Data Processing
OSI Reference Model
The OSI reference model conceptually organizes the process of
communication between computers in terms of seven layers called
Protocol Stacks. The seven layers of the OSI model provides a way
for you to understand how communication across various protocols
take place.
Layer 1 – Physical Layer
The physical layer defines the actual set of wires, plugs and electronic
signals that connect the sending and receiving devices to the
network. The RS-422 interface is a common standard in this layer.
However, RS-232 interface is a common standard for PCs.
The physical layer makes a physical circuit with electrical, optical or
radio signals. Passive hubs, simple active hubs, terminators,
couplers, cables, connectors, repeaters, multiplexers, transmitters,
receivers and trans-receivers are devices associated with the
physical layer.
Layer 2 – Data Link Layer
The data link layer is responsible for gaining access to the network and
transmitting the physical block of data from one device to another.
It includes the error checking necessary to ensure an accurate
transmission. This layer uses the communication protocol that is
most commonly referenced and often implies the specifications for
Layer 1 as well.
Layer 3 – Network Layer
The network layer makes routing decisions and forwards packets for
devices that are farther away than a single link. A link connects two
network devices and is implemented by the data link layer. Two
devices connected by a link communicate directly with each other
and not through a third device.
In larger networks there may be intermediate systems between any two end
systems, and the network layer makes it possible for the transport layer
and layers above it to send packets without being concerned about
whether the end system is immediately adjacent or several hops away.
The network layer translates logical network addresses into physical
machine addresses. This layer also determines the QoS (namely, priority of
the message) and the route a message will take if there are several ways a
message can get to its destination. The network layer also may break large
packets into smaller chunks if the packet is larger than the largest data
frame the data link layer will accept. The network reassembles the chunks
into packets at the receiving end.
The NL performs several important functions that enable data to arrive at its
destination. The protocols at this layer may choose a specific route
through an internetwork to avoid the excess traffic caused by sending data
over networks and segments that do not need access to it.
Layer 4 – Transport Layer
It breaks large message from the session layer into packets to be sent
to the destination computer and reassembles packets into
messages to be presented to the session layer. The transport layer
typically sends an acknowledgement to the originator for messages
received.
Layer 5 – Session Layer
It establishes and terminates the session, queues of the incoming
messages and is responsible for recovering from an abnormally
terminated session. This layer allows applications on separate
computers to share a connection called a session. This layer
provides services such as name lookup and security to allow two
programs to find each other and establish the communication link.
It also provides for data synchronization and check points so that in the event
of a network failure, only the data sent after the point of failure need to
be re-sent. It also controls the dialog between two processes determining
whom they can transmit and from whom can they receive at what point
during the communication. It also provides for dialog between application
programs.
Layer 6 – Presentation Layer
The presentation layer translates data between the formats the network
requires and the format the computer expects. The PL does protocol
conversion, data translation, compression and encryption, character set
conversion and the interpretation of graphic commands. A network
redirector is what makes the files on a file server visible to the client
computer.
The network redirector also makes remote printers act as though they are
attached to the local computer. The network redirector operates at
presentation layer.
The presentation layer adapts information to the local environment.
Layer 7 – Application Layer
The top most layer of the OSI model, provides services that
directly support user applications such as database access,
email and file transfers. It also allows applications to
communicate with applications on other computers as
though they were on the same computer. When a
programmer writes an application program that uses
network services, this is the layer the application program
will access.
Electronic mail and Query languages are examples of this
layer.
This layer provides for the connection of application programs
on separate machines.
OSI model
Layer Name of unit
exchanged
7 Application Application Application APDU
Protocol
6 Presentation Presentation PresentationPPDU
Protocol
5 Session Session Session SPDU
Protocol
4 Transport Transport Transport TPDU
Protocol
3 Network Network Network Packet
Host A Host B
OSI services
File, Print, Message, 7 Application Layer
Database and application Type of comm.
Services email, file transfer,
client/server
Data Translation 6 Presentation Layer
Encryption, Data
conversion
Dialog control 5 Session Layer
Start/stop session,
maintains order
End-to-end connection 4 Transport Layer
Ensures delivery of entire file or
message
Routing 3 Network Layer
Routes data to different
LANs and WANs based on network address
Framing 2 Data Link Layer MAC, LLC
Transmits packets from node to node
based on station address
Sending 1s/0s across 1 Physical Layer
The wire electrical signal and cabl ing
Functions performed by different
layers in the OSI model
Layer No. Layer Name Description
7 Application Interfaces user apps with network
functionality, controls how apps access the network, and
generate error messages. Protocols at this level include
HTTP, FTP, SMTP and NFS
6 Presentation Translates data to be transmitted by apps
into a format suitable for transport over the network.
Redirector software, such as the workstation service for
Microsoft Windows NT, is located at this level. Network
shells are also defined at this level
5 Session Defines how connections can be established,
maintained and terminated. Also performs name
resolution functions
OSI
4 Transport Sequences packets so that they can be reassembled at
the destination in the proper order. Generates acknowledgements
and retransmits packets. Assembles packets after they are
received.
3 Network Defines logical host addresses such as IP addresses,
creates packet headers and routes packets across an internetwork
using routers and layer 3 switches. Strips the headers from the
packets at the receiving end
2 Data Link Specifies how data bits are grouped into frames, and
specifies frame formats. Responsible for error correction, flow
control, hardware addressing (such as MAC addresses) and how
devices such as hubs, bridges, repeaters and layer 2 switches
operate. The project 802 specifications divide this layer into 2 sub
layers, the logical link control(LLC) layer and the media access
control (MAC) layer
OSI
1 Physical Defines network transmission media, signaling methods, bit
synchronization, architecture (such as Ethernet or Token ring)and cabling
topologies. Defines how NICs interact with the media(cabling).
You can think of each layer as being logically connected to the same layer on a
different computer on the network. For example, the application layer
on one machine communicates with the application layer on another
machine. But this communication is logical only; physical communication
occurs when packets of data are sent down from the application layer of
the transmitting computer, encapsulated with header information by
each lower layer and then put on the wire at the physical layer of the
transmitting computer. After travelling along the wire, the packets are
picked up by the physical layer of the receiving computer, passed up the
7 layers while each layer strips off its associated header information and
then passes to the application layer of the receiving computer, where
the receiving application can process the data.
Media Access
A network is a set of devices (nodes) connected by media links. A node
can be a computer, printer or any other device capable of sending
and/or receiving data generated by other nodes on the network.
The links connecting the devices are called communication
channels. The media defines the speed at which data can travel
through a connection (the data rate). Today’s networks are moving
to faster and faster transmission media.
Transmission media can be divided into two broad categories: guided
and unguided.
Guided media, provide a conduit from one device to another, include
twisted pair cable, coaxial cable and fiber optic cable. Twisted pair
and coaxial cable use metallic (copper) conductors that accept and
transport signals in the form of electrical current. Optical fiber is a
glass or plastic cable that accepts and transports signals in the form
of light.
Unguided media, or wireless communication, transport
electromagnetic waves without using a physical conductor. Instead,
signals are broadcast through air (or, in a few cases, water), and
thus are available to anyone who has a device capable of receiving
them.
A media access method refers to the manner a computer gains and
controls access to the network’s physical medium (defines how the
network places data on the cable and how it takes it off). Common
media access methods include:
• CSMA/CD Carrier-Sense Multiple Access with Collision Detection
• CSMA/CA Carrier-Sense Multiple Access with Collision Avoidance
• Token Passing
• Demand Priority
One of the primary concerns with media access is to prevent packets
from colliding. A collision occurs when two or more computers
transmit signals at the same time.
“Carrier Sense” means that each station on the network continually
listens to (test) the cable for the pretense of a signal prior to
transmitting. “Multiple Access” means that there are many
computers attempting to transmit and compete for the opportunity
to send data. “Collision Detection” means that when a collision is
detected, the station will stop transmitting and wait a random
length of time before transmitting. CSMA/CD works best in an
environment where relatively fewer, longer data frames are
transmitted. They are used on Ethernet networks.
CSMA/CA Instead of detecting and reacting to collisions, CSMA/CA
tries to avoid them by having each computer signal its intention to
transmit before actually transmitting. CSMA/CA is slower then
CSMA/CD and is used on Apple networks.
Token Ring Collisions are eliminated under token passing
because only a computer that possesses a free token (a
small data frame) is allowed to transmit. Used on Token
ring and ArcNet network. It works best in an
environment where relatively a large number of short
data frames are being transmitted.
Demand Priority A new Ethernet media access method.
Used with 100 Mbps Ethernet. It requires a smart hub.
Station must require permission from hub before they
can transmit. Stations can transmit and receive at the
same time. Transmission can be prioritized
Network Layer Problems
Network addressing issues and routing issues are the most
common problems that occur in the network layer. By
verifying all the routing protocols and IP addressing
schemes used, tracking down the network issue can be
easy. A few possible causes for network issues are damaged
networking devices, incorrect device configuration,
network bandwidth and authentication issues. “Ping” is a
handy and effective troubleshooting command to locate
network issues in this layer. A successful ping past the
default gateway means that the Internet is working
properly. “Trace”, “netstat”, “route”, and “netguard”
commands are a few other troubleshooting commands that
can be used in the network layer
TCP/IP
The protocols used on the Internet are called TCP/IP. It has two parts:
1. TCP deals with exchange of sequential data
2. IP handles packet forwarding and is used on the Internet