36
Communix Institute of Information Technology Page No 1 Data Communication 1. Understanding the basic hardware and software components required for the networking environment. What is data communication? 1.2 Recent history Since the early days of modern computing there has been a steadily increasing need for more sophisticated data transfer services. In the 1950s, the early computers were simple machines with ’Single-task’ operating systems. They typically had a single console, and data was entered either by cards, or on paper tape. In the 1960s, demand for large scale data entry grew, and the ’on-line’ batch system was developed. The operating systems were better, and allowed many terminals to be connected to the same computer. These terminals typically would allow deferred data entry - that is the files would not be updated until a ’batch’ of data was ready. The data entry was often done during the day, the processing of the data at night. In the 1970s, on-line integrated systems were developed. These allowed terminals to access the files, as well as update them. Database technology allowed immediate display of the effect of completed transactions. Integrated systems generated multiple transactions from single entries. Since the 1980s we have moved to distributed databases and processing. In the 80s and 90s we see large machines - even the workstations have significant computing power. There are many more options for interconnecting the machines. Created by Ihsan Ullah Contact# 0333-9165181

Data Communication Syllabus

Embed Size (px)

Citation preview

Page 1: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 1

Data Communication

1. Understanding the basic hardware and software components required for the networking environment.

What is data communication?1.2 Recent historySince the early days of modern computing there has been a steadily increasing need for more sophisticated data transfer services.In the 1950s, the early computers were simple machines with ’Single-task’ operating systems.They typically had a single console, and data was entered either by cards, or on paper tape.In the 1960s, demand for large scale data entry grew, and the ’on-line’ batch system was developed. The operating systems were better, and allowed many terminals to be connected to the same computer. These terminals typically would allow deferred data entry - that is the files would not be updated until a ’batch’ of data was ready. The data entry was often done during the day, the processing of the data at night.

In the 1970s, on-line integrated systems were developed. These allowed terminals to access the files, as well as update them. Database technology allowed immediate display of the effect of completed transactions. Integrated systems generated multiple transactions from single entries.

Since the 1980s we have moved to distributed databases and processing. In the 80s and 90s we see large machines - even the workstations have significant computing power.There are many more options for interconnecting the machines.

Definition:

So we can conclude that data communication is the study of transferring data or communicating data through modern devices from one point to the other.

Definition 2:

It is the exchange of data between two parties.

Definition 3:

The exchange of information between two or more than two parties is called data communication these parties can be computers humans, connecters etc.

Data communication = Data + communication

Created by Ihsan Ullah Contact# 0333-9165181

Page 2: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 2

Data and its typesData are raw facts and figures which are meaningless and not understandable.

A. Digital Dataa. Text

Text data type may contain A-Z letters 0-9 Numbers and other special characters.

b. SoundIt entails audible beats.

c. GraphicsIt contains all types of visual Data.

B. Analogue DataThe type of data which contains continuous waves of physical changes in environment

Hardware Used in Networking Environment

1. NICThe Network Interface Card (NIC) provide the physical connection between the network and the computer workstationThe function of a NIC is to connect a host device to the network medium. A NIC is a printed circuit board that fits into the expansion slot on the motherboard or peripheral device of a computer. The NIC is also referred to as a network adapter. On laptop or notebook computers a NIC is the size of a credit card.NICs are considered Layer 2 devices because each NIC carries a unique code called a MAC address. This address is used to control data communication for the host on the network. More will be learned about the MAC address later. As the name implies, the network interface card controls host access to the medium.

2. HUBHubs are actually multiport repeaters. In many cases, the difference between the two devices is the number of ports that each provides. While a typical repeater has just two ports, a hub generally has from four to twenty-four ports. Hubs are most commonly used in Ethernet 10BASE-T or 100BASE-T networks, although there are other network architectures that use them as well. Using a hub changes the network topology from a linear bus, where each device plugs directly into the wire, to a star. With hubs, data arriving over the cables to a hub port is electrically repeated on all the other ports connected to the same network segment, except for the port on which the data was sent.

Created by Ihsan Ullah Contact# 0333-9165181

Page 3: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 3

3. SwitchA switch is sometimes described as a multiport bridge. While a typical bridge may have just two ports linking two network segments, the switch can have multiple ports depending on how many network segments are to be linked. Like bridges, switches learn certain information about the data packets that are received from various computers on the network. Switches use this information to build forwarding tables to determine the destination of data being sent by one computer to another computer on the network

Software used in Networking Environment

1. O.S (Win NT)2. Router OS

Created by Ihsan Ullah Contact# 0333-9165181

Page 4: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 4

2. Evaluate the networking systems with regard to different types of network topologies.

What is Network Topology?

Network topology defines the structure of the network. They physical layout of a network is called topology. The physical topology, which is the actual layout of the wire or media, and the logical topology, which defines how the media is accessed by the hosts for sending data.

Bus TopologyBus - single backbone segment (length of cable) that all the hosts connect to directly.

Advantages of Bus Topology:Use of cable is economical Media is inexpensive and easy to work with System is simple and reliable. Bus is easy to extendDisadvantages of Bus Topology:Network can slow down in heavy traffic Problems are difficult to isolate Cable break can affect many users

Created by Ihsan Ullah Contact# 0333-9165181

Page 5: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 5

Star Topology Star - connects all cables to a central point of concentration

Advantages of Star Topology:Modifying system and adding new computers is easy. Centralized monitoring and management are possible.Failure of one computer does not affect the rest of the network.Disadvantages of Star Topology:If the centralized point fails, the network fails.

Ring Topology Ring - connects one host to the next and the last host to the first.

Advantages of Ring Topology:System provides equal access for all computers Performance is even despite many users.Disadvantages of Ring Topology:Failure of one computer can impact the rest of the network. Problems are hard to isolate.

Created by Ihsan Ullah Contact# 0333-9165181

Page 6: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 6

Mesh Topology Mesh - used when there can be absolutely no break in communications, each host has its own connections to all other hosts.

Advantages of Mesh Topology:System provides increased redundancy and reliability as well as ease of troubleshooting.

3. Networking models

Some useful terms• Server – Computers that Provide shared resources to network user• Clients – Computers that access shared network resources Provide by a server• Media – The wires that make the physical connections.• Shared data – Files provided to clients by servers across the network.• Resources – Any Service or device, such as files, printers, or other items ,made

available for use by members of the network .

By role of computer we have two types of networks/ network models.

Peer to Peer ModelBy using LAN and WAN technologies, many computers are interconnected to provide services to their users. To accomplish this, networked computers take on different roles or functions in relation to each other. Some types of applications require computers to function as equal partners. Other types of applications distribute their work so that one computer functions to serve a number of others in an unequal relationship. In either case, two computers typically communicate with each other by using request/response protocols. One computer issues a request for a service, and a second computer receives

Created by Ihsan Ullah Contact# 0333-9165181

Page 7: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 7

and responds to that request. The requestor takes on the role of a client, and the responder takes on the role of a server In a peer-to-peer network, networked computers act as equal partners, or peers. As peers, each computer can take on the client function or the server function. At one time, computer A may make a request for a file from computer B, which responds by serving the file to computer A. Computer A functions as client, while B functions as the server. At a later time, computers A and B can reverse rolesIn a peer-to-peer network, individual users control their own resources. The users may decide to share certain files with other users. The users may also require passwords before allowing others to access their resources. Since individual users make these decisions, there is no central point of control or administration in the network. In addition, individual users must back up their own systems to be able to recover from data loss in case of failures. When a computer acts as a server, the user of that machine may experience reduced performance as the machine serves the requests made by other systems.

Client Server ModelIn a Clients Server Networks one or more computers act as servers and provide the resources to the network .the other computers are clients and use the resources provided by the server.In a client/server arrangement, network services are located on a dedicated computer called a server. The server responds to the requests of clients. The server is a central computer that is continuously available to respond to requests from clients for file, print, application, and other services. Most network operating systems adopt the form of a client/server relationship. Typically, desktop computers function as clients and one or more computers with additional processing power, memory, and specialized software function as servers.

Created by Ihsan Ullah Contact# 0333-9165181

Page 8: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 8

Peer-to-Peer Networks Clients Server Networks

Good for 10 or fewer computers. Limited only by server and network hardwareSecurity established by the user of Extensive and consistent resource and userEach computer. Security. Individual users responsible for their centrally located for network control, requiresOwn administration, no full-time at least one knowledgeable administratorAdministration necessary.

Created by Ihsan Ullah Contact# 0333-9165181

Page 9: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 9

4. DIFFERENT TYPES OF CABLES AND THEIR USES IN NETWORKING.

NETWORK CABLING

Cable is the medium through which information usually moves from one network device to another. There are several types of cable which are commonly used with LANs. In some cases, a network will utilize only one type of cable, other networks will use a variety of cable types. The type of cable chosen for a network is related to the network's topology, protocol, and size. Understanding the characteristics of different types of cable and how they relate to other aspects of a network is necessary for the development of a successful network

There are three primary types of cables used in networkingA. Twisted Pair CableThere are two types of twisted pair cable.

Unshielded Twisted Pair (UTP) CableTwisted pair cabling comes in two varieties: shielded and unshielded. Unshielded twisted pair (UTP) is the most popular and is generally the best option for school networksThe quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices. The tighter the twisting, the higher the supported transmission rate and the greater the cost per foot. The EIA/TIA (Electronic Industry Association/Telecommunication Industry Association) has established standards of UTP and rated five categories of wire.

Shielded Twisted Pair Cable (STP)

A disadvantage of UTP is that it may be susceptible to radio and electrical frequency interference. Shielded twisted pair (STP) is suitable for environments with electrical interference; however, the extra shielding can make the cables quite bulky. Shielded twisted pair is often used on networks using Token Ring topology

Created by Ihsan Ullah Contact# 0333-9165181

Page 10: Data Communication Syllabus

Twisted-Pair (UTP and STP)

Speed and throughput: 10/100 Mbps Relative cost: Least costlyMedia and connector size: SmallMaximum cable length: 100 m

RJ-45Connector

Color-CodedPlastic Insulation

Twisted-Pair

Outer Jacket

STP only: Shielded Insulation

to Reduce EMI

Communix Institute of Information TechnologyPage No 10

Created by Ihsan Ullah Contact# 0333-9165181

Page 11: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 11

B. Coaxial CableCoaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between the center conductor and a braided metal shield (See fig. 3). The metal shield helps to block any outside interference from fluorescent lights, motors, and other computersAlthough coaxial cabling is difficult to install, it is highly resistant to signal interference. In addition, it can support greater cable lengths between network devices than twisted pair cable

Created by Ihsan Ullah Contact# 0333-9165181

Coaxial Cable

Speed and throughput: 10/100 Mbps Relative cost: More than UTP, but still lowMedia and connector size: MediumMaximum cable length: 200/500 m

OuterJacketBraided Copper Shielding

Plastic Insulation

Copper Conductor

BNC Connector

Page 12: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 12

C. Fiber Optic CableFiber optic cabling consists of a center glass core surrounded by several layers of protective materials. It transmits light rather than electronic signals eliminating the problem of electrical interference. This makes it ideal for certain environments that contain a large amount of electrical interference. It has also made it the standard for connecting networks between buildings, due to its immunity to the effects of moisture and lighting. Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair. It also has the capability to carry information at vastly greater speeds. This capacity broadens communication possibilities to include services such as video conferencing and interactive services. The cost of fiber optic cabling is comparable to copper cabling; however, it is more difficult to install and modify. 10BaseF refers to the specifications for fiber optic cable carrying Ethernet signals.

Created by Ihsan Ullah Contact# 0333-9165181

Fiber-Optic Cable

Outer JacketKevlar ReinforcingMaterial

PlasticShield Glass Fiber

and Cladding

MultimodeConnector

Speed and throughput: 100+ Mbps Average cost per node: Most expensiveMedia and connector size: SmallMaximum cable length: Up to 2 km

Page 13: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 13

5. Using special Hardware Modem and Routers?

Modem

History

Digital modems developed from the need to transmit data for North American air defense during the 1950s. Modems were used to communicate data over the public switched telephone network or PSTN. Analog telephone circuits can only transmit signals that are within the frequency range of voice communication. A modem sends and receives data between two computers.

In 1962, the first commercial modem was manufactured - the Bell 103 by AT&T. The Bell 103 was also the first modem with full-duplex transmission, frequency-shift keying or FSK, and had a speed of 300 bits per second or 300 bauds. The 56K modem was invented by Dr. Brent Townshend in 1996.

What a modem is?

Short for modulator-demodulator. A modem is a device that enables a computer to transmit data over a telephone or cable line. Computer information is stored digitally, whereas information transmitted over telephone lines is transmitted in the form of analog waves. A modem converts between these two forms.

Fortunately, there is one standard interface for connecting external modems to computers called RS-232. Consequently, any external modem can be attached to any computer that has an RS-232 port, which almost all personal computers have. There are also modems that come as an expansion board that you can insert into a vacant expansion slot. These are sometimes called onboard or internal modems.

Common Terms

Bps (Bits per Second): How fast the modem can transmit and receive data. At slow rates, modems are measured in terms of baud rates. The slowest rate is 300 baud (about

Created by Ihsan Ullah Contact# 0333-9165181

Page 14: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 14

25 cps). At higher speeds, modems are measured in terms of bits per second (bps). The fastest modems run at 57,600 bps, although they can achieve even higher data transfer rates by compressing the data. Obviously, the faster the transmission rate, the faster you can send and receive data. Note, however, that you cannot receive data any faster than it is being sent. If, for example, the device sending data to your computer is sending it at 2,400 bps, you must receive it at 2,400 bps. It does not always pay, therefore, to have a very fast modem. In addition, some telephone lines are unable to transmit data reliably at very high rates.

Types of Modem

Voice/data: Many modems support a switch to change between voice and data modes. In data mode, the modem acts like a regular modem. In voice mode, the modem acts like a regular telephone. Modems that support a voice/data switch have a built-in loudspeaker and microphone for voice communication. Auto-answer: An auto-answer modem enables your computer to receive calls in your absence. This is only necessary if you are offering some type of computer service that people can call in to use. Data compression: Some modems perform data compression, which enables them to send data at faster rates. However, the modem at the receiving end must be able to decompress the data using the same compression technique. Flash memory : Some modems come with flash memory rather than conventional ROM, which means that the communications protocols can be easily updated if necessary. Fax capability : Most modern modems are fax modem, which means that they can send and receive faxes.

Created by Ihsan Ullah Contact# 0333-9165181

PCI Modem Which Can be Connected to internal circuitry of Mother board (also know Expansion Slot Modems).

These modems are connectable by RJ-45 Connectors which connects a PC to a Telephone Line.

Page 15: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 15

6. What are protocols, their uses and different types of Protocols?

Protocols Introduction:

Protocols are rules and procedures for communicating. The term "protocol" is used in a variety of contexts. For example, diplomats from one country adhere to rules of protocol designed to help them interact smoothly with diplomats from other countries. Rules of protocol apply in the same way in the computer environment. When several computers are networked, the rules and technical procedures governing their communication and interaction are called protocols.

An agreed-upon format for transmitting data between two devices. The protocol determines the following:

the type of error checking to be used data compression method, if any how the sending device will indicate that it has finished sending a message how the receiving device will indicate that it has received a message

How Do Protocols Work

The entire technical operation by which data is transmitted over the network has to be broken down into discrete, systematic steps. At each step, certain actions take place that cannot take place at any other step. Each step includes its own rules and procedures, or protocol.

The protocol steps must be carried out in a consistent order that is the same on every computer in the network. In the sending computer, these steps must be executed from the top down. In the receiving computer, these steps must be carried out from the bottom up.

The Sending Computer

Protocols at the sending computer:

1. Break the data into smaller sections, called packets, that the protocol can handle. 2. Add addressing information to the packets so that the destination computer on the

network can determine that the data belongs to it. 3. Prepare the data for transmission through the NIC and out onto the network cable.

Created by Ihsan Ullah Contact# 0333-9165181

Page 16: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 16

The Receiving Computer

Protocols at the receiving computer carry out the same series of steps in reverse order. They:

1. Take the data packets off the cable. 2. Bring the data packets into the computer through the NIC. 3. Strip the data packets of all the transmitting information that was added by the

sending computer. 4. Copy the data from the packets to a buffer for reassembly. 5. Pass the reassembled data to the application in a usable form.

Both sending and receiving computers need to perform each step in the same way so that the data will have the same structure when it is received as it did when it was sent.

For example, two different protocols might each break data into packets and add on various sequencing, timing, and error-checking information, but each will do it differently. Therefore, a computer using one of these protocols will not be able to communicate successfully with a computer that is using the other protocol.

Popular Network Protocols

Protocol Description

IP The TCP/IP protocol for packet-forwarding routing.

IPX NetWare's protocol for packet forwarding and routing.

NWLink The Microsoft implementation of the IPX/SPX protocol.

NetBEUI A transport protocol that provides data-transport services for NetBIOS sessions and applications.

DDP (Datagram Delivery Protocol)

An AppleTalk data-transport protocol.

TCP/IP

Transmission Control Protocol/Internet Protocol (TCP/IP) is an industry-standard suite of protocols that provide communications in a heterogeneous (made up of dissimilar elements) environment. In addition, TCP/IP provides a routable, enterprise networking protocol and access to the Internet and its resources. Because of its popularity, TCP/IP has become the de facto standard for what's known as internetworking, the intercommunication in a network that's composed of smaller networks. This lesson examines the TCP/IP protocol and its relationship to the OSI reference model.

Created by Ihsan Ullah Contact# 0333-9165181

Page 17: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 17

Introduction to TCP/IP

TCP/IP has become the standard protocol used for interoperability among many different types of computers. This interoperability is a primary advantage of TCP/IP. Most networks support TCP/IP as a protocol. TCP/IP also supports routing and is commonly used as an internetworking protocol.

Internet Protocol (IP)

Internet Protocol (IP) is a packet-switched protocol that performs addressing and route selection. As a packet is transmitted, this protocol appends a header to the packet so that it can be routed through the network using dynamic routing tables. IP is a connectionless protocol and sends packets without expecting the receiving host to acknowledge receipt. In addition, IP is responsible for packet assembly and disassembly as required by the physical and data-link layers of the OSI reference model. Each IP packet is made up of a source and a destination address, protocol identifier, checksum (a calculated value), and a TTL (which stands for "time to live"). The TTL tells each router on the network between the source and the destination how long the packet has to remain on the network. It works like a countdown counter or clock. As the packet passes through the router, the router deducts the larger of one unit (one second) or the time that the packet was queued for delivery. For example, if a packet has a TTL of 128, it can stay on the network for 128 seconds or 128 hops (each stop, or router, along the way), or any combination of the two. The purpose of the TTL is to prevent lost or damaged data packets (such as missing e-mail messages) from endlessly wandering the network. When the TTL counts down to zero, the packet is eliminated from the network.

Other protocols written specifically for the TCP/IP suite include:

SMTP (Simple Mail Transfer Protocol) E-mail.

Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; the messages can then be retrieved with an e-mail client using either POP or IMAP. In addition, SMTP is generally used to send messages from a mail client to a mail server. This is why you need to specify both the POP or IMAP server and the SMTP server when you configure your e-mail application.

FTP (File Transfer Protocol)

Created by Ihsan Ullah Contact# 0333-9165181

Page 18: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 18

the protocol for exchanging files over the Internet. FTP works in the same way as HTTP for transferring Web pages from a server to a user's browser and SMTP for transferring electronic mail across the Internet in that, like these technologies, FTP uses the Internet's TCP/IP protocols to enable data transfer.

FTP is most commonly used to download a file from a server using the Internet or to upload a file to a server (e.g., uploading a Web page file to a server).

Designed to be routable, robust, and functionally efficient, TCP/IP was developed by the United States Department of Defense as a set of wide area network (WAN) protocols. Its purpose was to maintain communication links between sites in the event of nuclear war. The responsibility for TCP/IP development now resides with the Internet community as a whole. TCP/IP requires significant knowledge and experience on the user's part to install and configure. Using TCP/IP offers several advantages; it:

Is an industry standard As an industry standard, it is an open protocol. This means it is not controlled by a single company, and is less subject to compatibility issues. It is the de facto protocol of the Internet.

Contains a set of utilities for connecting dissimilar operating systems Connectivity from one computer to another does not depend on the network operating system used on either computer.

Uses scalable, cross-platform client-server architecture TCP/IP can expand (or shrink) to meet future needs and circumstances. It uses sockets to make the computer operating systems transparent to one another.

NetBEUI

NetBEUI is the acronym for NetBIOS Extended User Interface. Originally, NetBIOS and NetBEUI were tightly tied together and considered one protocol. However, several network manufacturers separated out NetBIOS, the session-layer protocol, so that it could be used with other routable transport protocols. NetBIOS (network basic input/output system) is an IBM session-layer LAN interface that acts as an application interface to the network. NetBIOS provides the tools for a program to establish a session with another program over the network and, because so many application programs support it, it is very popular.

NetBEUI is a small, fast, and efficient transport-layer protocol that is supplied with all Microsoft network products. It has been available since the mid-1980s and was supplied with the first networking product from Microsoft: MS-NET.

Advantages of NetBEUI include its small stack size (important for computers running MS-DOS), its speed of data transfer on the network medium, and its compatibility with all Microsoft-based networks.

Created by Ihsan Ullah Contact# 0333-9165181

Page 19: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 19

The major disadvantage of NetBEUI is that it does not support routing. It is also limited to Microsoft-based networks. NetBEUI is a good and economical solution for a small peer-to-peer network where all workstations use Microsoft operating systems

What is OSI Model and functions of layers?

Introduction to OSI Model

• The early development of networks was disorganized in many ways. The early 1980s saw tremendous increases in the number and size of networks. As companies realized the advantages of using networking technology, networks were added or expanded almost as rapidly as new network technologies were introduced.

• By the mid-1980s, these companies began to experience problems from the rapid expansion. Just as people who do not speak the same language have difficulty communicating with each other, it was difficult for networks that used different specifications and implementations to exchange information. The same problem occurred with the companies that developed private or proprietary networking technologies. Proprietary means that one or a small group of companies controls all usage of the technology. Networking technologies strictly following proprietary rules could not communicate with technologies that followed different proprietary rules

• The Open System Interconnection (OSI) reference model released in 1984 was the descriptive network model that the ISO created. It provided vendors with a set of standards that ensured greater compatibility and interoperability among various network technologies produced by companies around the world.

Dividing the network into seven layers provides the following advantages: • It breaks network communication into smaller, more manageable parts. • It standardizes network

components to allow multiple vendor development and support.

• It allows different types of network hardware and software to communicate with each other.

• It prevents changes in one layer from affecting other layers.

• It divides network communication into smaller parts to make learning it easier to understand

Created by Ihsan Ullah Contact# 0333-9165181

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

Page 20: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 20

OSI Model Reference

• Layer 7: Application• Layer 6: Presentation• Layer 5: Session• Layer 4: Transport• Layer 3: Network• Layer 2: Data link• Layer 1: Physical

Created by Ihsan Ullah Contact# 0333-9165181

7 Application

6 Presentation

5 Session

4 Transport

3 Network

2 Data Link

1 Physical

Host layers: Provide accurate data delivery between computers

Media layers: ControlPhysical delivery of messages over the network

Page 21: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 21

Functions of Layers:

Layer 7, the topmost layer of the OSI reference model, is the application layer. This layer relates to the services that directly support user applications, such as software for file transfers, database access, and e-mail. In other words, it serves as a window through which application processes can access network services. A message to be sent across the network enters the OSI reference model at this point and exits the OSI reference model's application layer on the receiving computer. Application-layer protocols can be programs in themselves, such as File Transfer Protocol (FTP), or they can be used by other programs, such as Simple Mail Transfer Protocol (SMTP), used by most e-mail programs, to redirect data to the network. The lower layers support the tasks that are performed at the application layer. These tasks include general network access, flow control, and error recovery.

Layer 6, the presentation layer, defines the format used to exchange data among networked computers. Think of it as the network's translator. When computers from dissimilar systems—such as IBM, Apple, and Sun—need to communicate, a certain amount of translation and byte reordering must be done. Within the sending computer, the presentation layer translates data from the format sent down from the application layer into a commonly recognized, intermediary format. At the receiving computer, this layer translates the intermediary format into a format that can be useful to that computer's application layer. The presentation layer is responsible for converting protocols, translating the data, encrypting the data, changing or converting the character set, and expanding graphics commands. The presentation layer also manages data compression to reduce the number of bits that need to be transmitted. The redirector, which redirects input/output (I/O) operations to resources on a server, operates at this layer.

Created by Ihsan Ullah Contact# 0333-9165181

Application Layer

Presentation layer

Page 22: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 22

Layer 5, the session layer, allows two applications on different computers to open, use, and close a connection called a session. (A session is a highly structured dialog between two workstations.) The session layer is responsible for managing this dialog. It performs name-recognition and other functions, such as security, that are needed to allow two applications to communicate over the network.

The session layer synchronizes user tasks by placing checkpoints in the data stream. The checkpoints break the data into smaller groups for error detection. This way, if the network fails, only the data after the last checkpoint has to be retransmitted. This layer also implements dialog control between communicating processes, such as regulating which side transmits, when, and for how long.

Layer 4, the transport layer, provides an additional connection level beneath the session layer. The transport layer ensures that packets are delivered error free, in sequence, and without losses or duplications. At the sending computer, this layer repackages messages, dividing long messages into several packets and collecting small packets together in one package. This process ensures that packets are transmitted efficiently over the network. At the receiving computer, the transport layer opens the packets, reassembles the original messages, and, typically, sends an acknowledgment that the message was received. If a duplicate packet arrives, this layer will recognize the duplicate and discard it.

The transport layer provides flow control and error handling, and participates in solving problems concerned with the transmission and reception of packets. Transmission Control Protocol (TCP) and Sequenced Packet Exchange (SPX) are examples of transport-layer protocols.

Layer 3, the network layer, is responsible for addressing messages and translating logical addresses and names into physical addresses. This layer also determines the route from the source to the destination computer. It determines which path the data should take based on network conditions, priority of service, and other factors. It also manages traffic problems on the network, such as switching and routing of packets and controlling the congestion of data.

Created by Ihsan Ullah Contact# 0333-9165181

Session layer

Transport layer

Network layer

Page 23: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 23

If the network adapter on the router cannot transmit a data chunk as large as the source computer sends, the network layer on the router compensates by breaking the data into smaller units. At the destination end, the network layer reassembles the data. Internet Protocol (IP) and Internetwork Packet Exchange (IPX) are examples of network-layer protocols.

Layer 2, the data-link layer, sends data frames from the network layer to the physical layer. It controls the electrical impulses that enter and leave the network cable. On the receiving end, the data-link layer packages raw bits from the physical layer into data frames. (A data frame is an organized, logical structure in which data can be placed.

The electrical representation of the data (bit patterns, encoding methods, and tokens) is known to this layer only.

Sender ID represents the address of the computer that is sending the information; the destination ID represents the address of the computer to which the information is being sent. The control information is used for frame type, routing, and segmentation information. The data is the information itself. The cyclical redundancy check (CRC) provides error correction and verification information to ensure that the data frame is received correctly.

The data-link layer is responsible for providing error-free transfer of these frames from one computer to another through the physical layer. This allows the network layer to anticipate virtually error-free transmission over the network connection.

Usually, when the data-link layer sends a frame, it waits for an acknowledgment from the recipient. The recipient data-link layer detects any problems with the frame that might have occurred during transmission. Frames that were damaged during transmission or were not acknowledged are then re-sent.

Layer 1, the bottom layer of the OSI reference model, is the physical layer. This layer transmits the unstructured, raw bit stream over a physical medium (such as the network cable). The physical layer is totally hardware-oriented and deals with all aspects of establishing and maintaining a physical link between communicating computers. The

Created by Ihsan Ullah Contact# 0333-9165181

Data link

Physical layer

Page 24: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 24

physical layer also carries the signals that transmit data generated by each of the higher layers.

This layer defines how the cable is attached to the NIC. For example, it defines how many pins the connector has and the function of each. It also defines which transmission technique will be used to send data over the network cable.

This layer provides data encoding and bit synchronization. The physical layer is responsible for transmitting bits (zeros and ones) from one computer to another, ensuring that when a transmitting host sends a 1 bit, it is received as a 1 bit, not a 0 bit. Because different types of media physically transmit bits (light or electrical signals) differently, the physical layer also defines the duration of each impulse and how each bit is translated into the appropriate electrical or optical impulse for the network cable.

This layer is often referred to as the "hardware layer." Although the rest of the layers can be implemented as firmware (chip-level functions on the NIC), rather than actual software, the other layers are software in relation to this first layer.

All People Seem To Need Data Processing

7. Different types of internetworking hardware and why are they used.

4. Router

Router is the first device that you will work with that is at the OSI network layer, or otherwise known as layer 3.Routers make decisions based on groups of network addresses (classes) as opposed to individual layer 2 MAC addresses.Because of their ability to route packets based on layer 3 information, routers have become the backbone of the internet, running the IP protocol.Routers have all the capabilities listed above. Routers can regenerate signals, concentrate multiple connections, convert data transmission formats, and manage data transfers. They can also connect to a WAN, which allows them to connect LANs that are separated by great distances. None of the other devices can provide this type connection.

Created by Ihsan Ullah Contact# 0333-9165181

Page 25: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 25

5. Bridge

There are times when it is necessary to break up a large LAN into smaller, more easily managed segments. This decreases the amount of traffic on a single LAN and can extend the geographical area past what a single LAN can support. The devices that are used to connect network segments together include bridges, switches, routers, and gateways. Switches and bridges operate at the Data Link layer of the OSI model. The function of the bridge is to make intelligent decisions about whether or not to pass signals on to the next segment of a network. When a bridge receives a frame on the network, the destination MAC address is looked up in the bridge table to determine whether to filter, flood, or copy the frame onto another segment

Created by Ihsan Ullah Contact# 0333-9165181

Bridge

Segment 1 Segment 2

123123

124124

125125

126126

127127

128128

Corporate Intranet

Hub

Hub

Page 26: Data Communication Syllabus

Communix Institute of Information TechnologyPage No 26

Repeater

The purpose of a repeater is regenerate and retimes network signals at the bit level to allow them to travel a longer distance on the media.A repeater receives a signal, regenerates it, and passes it on. It can regenerate and retime network signals at the bit level to allow them to travel a longer distance on the media. The Four Repeater Rule for 10-Mbps Ethernet should be used as a standard when extending LAN segments. This rule states that no more than four repeaters can be used between hosts on a LAN. This rule is used to limit latency added to frame travel by each repeater. Too much latency on the LAN increases the number of late collisions and makes the LAN less efficient.

8. Communication over Wide Area Network.

9. Wide Area Network Connectivity.

Created by Ihsan Ullah Contact# 0333-9165181