Data Comm and Networking 1
Data Comm and Networking 1
MODULE 1
OBJECTIVES
Provides a general idea of what we will see in the rest of the book. Four major Concepts are
discussed: Data Communications, Networking, protocol and Standards, and Networking Models.
INTRODUCTION
Data communications and networking are changing the way we do business and the way we live. Business
decisions have to be made ever more quickly, and the decision makers require immediate access to accurate
information. Why wait a week for that report from Germany to arrive by mail when it could appear almost
instantaneously through computer networks? Businesses today rely on computer networks and
internetworks. But before we ask how quickly we can get hooked up, we need to know how networks
operate, what types of technologies are available, and which design best fills which set of needs.
The development of the personal computer brought about tremendous changes for business, industry,
science, and education. A similar revolution is occurring in data communications and networking.
Technological advances are making it possible for communications links to carry more and faster signals.
As a result, services are evolving to allow use of this expanded capacity. For example, established telephone
services such as conference calling, call waiting, voice mail, and caller ID have been extended.
Research in data communications and networking has resulted in new technologies. One goal is to be able
to exchange data such as text, audio, and video from all points in the world. We want to access the Internet
to download and upload information quickly and accurately and at any time.
This chapter addresses four issues: data communications, networks, the Internet, and protocols and
standards. First we give a broad definition of data communications. Then we define networks as a highway
on which data can travel. The Internet is discussed as a good example of an internetwork (i.e., a network of
networks). Finally, we discuss different types of protocols, the difference between protocols and standards,
and the organizations that set those standards.
At the end the module, the students are expected to introduce the concepts of Multimedia System:
In order to benefit profoundly from this module, please be guided by all the key points presented below.
1. This module contains two (2) lessons. Each lesson is explained substantively.
Read the explanations thoroughly so that you could understand the lesson fully.
2. Please use Microsoft Word Long Size for the answer and convert to PDF.
3. Feel free to chat, call, text or send an email message to me if you have questions, reaction,
reflections about the content or activities in the module.
LESSON 1
Data communications incorporate several techniques and technologies to enable any form of electronic
communication. It’s a very broad way to refer to all of this networked technology on any platform or in any
digital environment.
Some common types of data communications technologies include telecommunications, computer
networking and radio/satellite communication. Data communication usually requires the existence of a
transportation or communication medium between the nodes wanting to communicate with each other, such
as copper wire, fiber optic cables, or wireless signals.
For example, a common example of data communications is a computer connected to the Internet via a Wi-
Fi connection, which uses a wireless medium to send and receive data from one or more remote servers.
Some devices/technologies used in data communications are known as data communication equipment
(DCE) and data terminal equipment (DTE). DCE is used at the sending node, and DTE is used at the
receiving node.
Another way to talk about different types of data communications is to refer to the functionality that is
available for a sender and a receiver to use. In terms of communications function, you have simplex
communications, which are only one-way data communications, and you have half-duplex and full-duplex
data communications models, as well as serial data communications.
With half-duplex communications, information can go both ways, but not at the same time. Full-duplex
models accommodate simultaneous two-way communication of data.
That last form, serial data communications, is widely understood in networking. It means that the data is
packaged into units, and then sent serially to the receiver by the sender. This typically takes the form of
creating data packets with their headers and other bits of information, and then sending them consecutively
to the destination, typically through platforms using the seven-layer OSI model that demonstrates the
natures of different paths between nodes.
Data communication also relies on various types of protocols, depending on the environment in which the
messages sent. Internet protocols like FTP, HTTP and HTTPS were developed in order to optimize data
communications over the Internet.
One other useful way to think about data communications is by analyzing the architecture through which it
occurs.
For the Internet, the traditional model has been client/server architecture.
A client/server architecture consists of stations that are ‘clients’ or consumers, and stations that are ‘servers’
or producers. The client makes the request of the server, and the server returns a result.
Although this has been the dominant model, there are now emerging peer-to-peer architectures that do not
assign traditional roles of client and server to each node in the data communications network.
Increasingly, new systems will contemplate situations where devices either have less defined roles, or other
advances to make network activity more versatile.
Data communications refers to the transmission of this digital data between two or more computers and a
computer network or data network is a telecommunications network that allows computers to exchange
data. The physical connection between networked computing devices is established using either cable
media or wireless media. The best-known computer network is the Internet.
This tutorial should teach you basics of Data Communication and Computer Network (DCN) and will also
take you through various advance concepts related to Data Communication and Computer Network.
Dial-up access is cheap but slow. A modem (internal or external) connects to the Internet after the
computer dials a phone number. This analog signal is converted to digital via the modem and sent
over a land-line serviced by a public telephone network. Telephone lines are variable in quality
and the connection can be poor at times. The lines regularly experience interference and this
affects the speed, anywhere from 28K to 56K. Since a computer or other device shares the same
line as the telephone, they can’t be active at the same time.
• DSL. DSL stands for Digital Subscriber Line. It is an internet connection that is always
“on”. This uses 2 lines so your phone is not tied up when your computer is
connected. There is also no need to dial a phone number to connect. DSL uses a router to
transport data and the range of connection speed, depending on the service offered, is
between 128K to 8 Mbps.
• Cable. Cable provides an internet connection through a cable modem and operates over
cable TV lines. There are different speeds depending on if you are uploading data
transmissions or downloading. Since the coax cable provides a much greater bandwidth
over dial-up or DSL telephone lines, you can get faster access. Cable speeds range from
512K to 20 Mbps.
• Wireless. Wireless, or Wi-Fi, as the name suggests, does not use telephone lines or cables
to connect to the internet. Instead, it uses radio frequency. Wireless is also an always on
connection and it can be accessed from just about anywhere. Wireless networks are
growing in coverage areas by the minute so when I mean access from just about anywhere,
I really mean it. Speeds will vary, and the range is between 5 Mbps to 20 Mbps.
• Satellite. Satellite accesses the internet via a satellite in Earth’s orbit. The enormous
distance that a signal travels from earth to satellite and back again, provides a delayed
connection compared to cable and DSL. Satellite connection speeds are around 512K to
2.0 Mbps.
• Cellular. Cellular technology provides wireless Internet access through cell phones. The
speeds vary depending on the provider, but the most common are 3G and 4G speeds. A
3G is a term that describes a 3rd generation cellular network obtaining mobile speeds of
around 2.0 Mbps. 4G is the fourth generation of cellular wireless standards. The goal of
4G is to achieve peak mobile speeds of 100 Mbps but the reality is about 21 Mbps currently.
BUS Topology
Bus topology is a network type in which every computer and network device is connected to single
cable. When it has exactly two endpoints, then it is called Linear Bus topology.
1. It is cost effective.
2. Cable required is least compared to other network topology.
3. Used in small networks.
4. It is easy to understand.
5. Easy to expand joining two cables together.
RING Topology
It is called ring topology because it forms a ring as each computer is connected to another
computer, with the last one connected to the first. Exactly two neighbours for each device.
1. A number of repeaters are used for Ring topology with large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes, then
the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data
loss repeaters are used in the network.
2. The transmission is unidirectional, but it can be made bidirectional by having 2 connections
between each Network Node, it is called Dual Ring Topology.
3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite
direction in them. Also, if one ring fails, the second ring can act as a backup, to keep the
network up.
4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass
through each node of the network, till the destination node.
1. Transmitting network is not affected by high traffic or by adding more nodes, as only the
nodes having tokens can transmit data.
2. Cheap to install and expand
STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This hub
is the central node and all others nodes are connected to the central node.
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are connected to
each other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
1. Partial Mesh Topology : In this topology some of the systems are connected in the same
fashion as mesh topology but some devices are only connected to two or three devices.
2. Full Mesh Topology : Each and every nodes or devices are connected to each other.
1. Fully connected.
2. Robust.
3. Not flexible.
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.
1. Heavily cabled.
2. Costly.
3. If more nodes are added maintenance is difficult.
4. Central hub fails, network fails.
HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies. For example
if in an office in one department ring topology is used and in another star topology is used,
connecting these topologies will result in Hybrid Topology (ring topology and star topology).
1. Complex in design.
2. Costly.
Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and
safely transfer data.
The Internet is the most basic example of a WAN, connecting all computers together around the
world. Because of a WAN’s vast reach, it is typically owned and maintained by multiple
administrators or the public.
Hash functions
A cryptographic hash function does not use keys for its basic operation. This function creates a
small digest or “hash value” from often large amounts of data through a one-way process. Hash
functions are generally used to create the building blocks that are used in key management and
provide security services such as:
Symmetric-key algorithms
The key is considered symmetric because it is used for both encrypting and decrypting. These keys
are usually known by one or more authorized entities. Symmetric key algorithms are used for:
• Providing data confidentiality by using the same key for encrypting and decrypting data.
• Providing Message Authentication Codes (MACs) for source and integrity authentication
services. The key is used to create the MAC and then to validate it.
• Establishing keys during key-establishment processes
• Generating deterministic random numbers
Asymmetric-key algorithms
Also referred to as public-key algorithms, asymmetric-key algorithms use paired keys (a public
and a private key) in performing their function. The public key is known to all, but the private key
is controlled solely by the owner of that key pair. The private key cannot be mathematically
calculated through the use of the public key even though they are cryptographically related.
Asymmetric algorithms are used for:
❖ Physical layer
o The main functionality of the physical layer is to transmit the individual bits from one node
to another node.
❖ Data-Link Layer
• Physical Addressing: The Data link layer adds a header to the frame that contains a
destination address. The frame is transmitted to the destination address mentioned in the
header.
• Flow Control: Flow control is the main functionality of the Data-link layer. It is the
technique through which the constant data rate is maintained on both the sides so that no
data get corrupted. It ensures that the transmitting station such as a server with higher
processing speed does not exceed the receiving station, with lower processing speed.
• Error Control: Error control is achieved by adding a calculated value CRC (Cyclic
Redundancy Check) that is placed to the Data link layer's trailer which is added to the
message frame before it is sent to the physical layer. If any error seems to occurr, then the
receiver sends the acknowledgment for the retransmission of the corrupted frames.
• Access Control: When two or more devices are connected to the same communication
channel, then the data link layer protocols are used to determine which device has control
over the link at a given time.
❖ Network Layer
o It is a layer 3 that manages device addressing, tracks the location of devices on the network.
o It determines the best path to move data from source to the destination based on the network
conditions, the priority of service, and other factors.
o The Data link layer is responsible for routing and forwarding the packets.
o Routers are the layer 3 devices, they are specified in this layer and used to provide the
routing services within an internetwork.
o The protocols used to route the network traffic are known as Network layer protocols.
Examples of protocols are IP and Ipv6.
❖ Transport Layer
o The Transport layer is a Layer 4 ensures that messages are transmitted in the order in which
they are sent and there is no duplication of data.
o The main responsibility of the transport layer is to transfer the data completely.
o It receives the data from the upper layer and converts them into smaller units known as
segments.
o This layer can be termed as an end-to-end layer as it provides a point-to-point connection
between source and destination to deliver the data reliably.
o It is an unreliable transport protocol as in this case receiver does not send any
acknowledgment when the packet is received, the sender does not wait for any
acknowledgment. Therefore, this makes a protocol unreliable.
❖ Session Layer
❖ Presentation Layer
o A Presentation layer is mainly concerned with the syntax and semantics of the information
exchanged between the two systems.
o It acts as a data translator for a network.
o This layer is a part of the operating system that converts the data from one presentation
format to another format.
o The Presentation layer is also known as the syntax layer.
❖ Application Layer
o An application layer serves as a window for users and application processes to access
network service.
o It handles issues such as network transparency, resource allocation, etc.
o An application layer is not an application, but it performs the application layer functions.
o This layer provides the network services to the end-users.
In a P2P network, the "peers" are computer systems which are connected to each other via
the Internet. Files can be shared directly between systems on the network without the need of a
central server. In other words, each computer on a P2P network becomes a file server as well as a
client.
The only requirements for a computer to join a peer-to-peer network are an Internet
connection and P2P software. Common P2P software programs include Kazaa, Limewire,
BearShare, Morpheus, and Acquisition. These programs connect to a P2P network, such as
"Gnutella," which allows the computer to access thousands of other systems on the network.
Once connected to the network, P2P software allows you to search for files on other people's
computers. Meanwhile, other users on the network can search for files on your computer, but
typically only within a single folder that you have designated to share. While P2P networking
makes file sharing easy and convenient, is also has led to a lot of software piracy and illegal music
downloads. Therefore, it is best to be on the safe side and only download software and music from
legitimate websites.
1. Message:
This is most useful asset of a data communication system. The message simply refers
to data or piece of information which is to be communicated. A message could be in
any form, it may be in form of a text file, an audio file, a video file, etc.
2. Sender:
To transfer message from source to destination, someone must be there who will play
role of a source. Sender plays part of a source in data communication system. It is
simple a device that sends data message. The device could be in form of a computer,
mobile, telephone, laptop, video camera, or a workstation, etc.
3. Receiver:
It is destination where finally message sent by source has arrived. It is a device that
receives message. Same as sender, receiver can also be in form of a computer,
telephone mobile, workstation, etc.
4. Transmission-Medium:
In entire process of data communication, there must be something which could act as
a bridge between sender and receiver, Transmission medium plays that part. It is
physical path by which data or message travels from sender to receiver. Transmission
medium could be guided (with wires) or unguided (without wires), for example,
twisted pair cable, fiber optic cable, radio waves, microwaves, etc.
To govern data communications, various sets of rules had been already designed by the designers
of the communication systems, which represent a kind of agreement between communicating
devices. These are defined as protocol. In simple terms, the protocol is a set of rules that govern
data communication. If two different devices are connected but there is no protocol among them,
there would not be any kind of communication between those two devices. Thus the protocol is
necessary for data communication to take place.
A typical example of a data communication system is sending an e-mail. The user which send
email act as sender, message is data which user wants to send, receiver is one whom user wants
to send message, there are many protocols involved in this entire process, one of them is Simple
Mail Transfer Protocol (SMTP), both sender and receiver must have an internet connection
which uses a wireless medium to send and receive email.
Assignment # 2 :
1. What are the layers in OSI Reference Models ?Understand and Describe each layer Briefly.
Physical Layer:
The lowest layer of the OSI Model is concerned with electrically or optically transmitting raw
unstructured data bits across the network from the physical layer of the sending device to the
physical layer of the receiving device. It can include specifications such as voltages, pin layout,
cabling, and radio frequencies. At the physical layer, one might find “physical” resources such as
network hubs, cabling, repeaters, network adapters or modems.
The data link layer encompasses two sub-layers of its own. The first, media access control (MAC),
provides flow control and multiplexing for device transmissions over a network. The second, the
logical link control (LLC), provides flow and error control over the physical medium as well as
identifies line protocols.
Network Layer:
The network layer is responsible for receiving frames from the data link layer, and delivering them
to their intended destinations among based on the addresses contained inside the frame. The
network layer finds the destination by using logical addresses, such as IP (internet protocol). At
this layer, routers are a crucial component used to quite literally route information where it needs
to go between networks.
Transport Layer:
The transport layer manages the delivery and error checking of data packets. It regulates the size,
sequencing, and ultimately the transfer of data between systems and hosts. One of the most
common examples of the transport layer is TCP or the Transmission Control Protocol.
Session Layer:
The session layer controls the conversations between different computers. A session or connection
between machines is set up, managed, and termined at layer 5. Session layer services also include
authentication and reconnections.
Presentation Layer:
The presentation layer formats or translates data for the application layer based on the syntax or
semantics that the application accepts. Because of this, it at times also called the syntax layer. This
layer can also handle the encryption and decryption required by the application layer.
Application Layer:
At this layer, both the end user and the application layer interact directly with the software
application. This layer sees network services provided to end-user applications such as a web
browser or Office 365. The application layer identifies communication partners, resource
availability, and synchronizes communication.