Professional Documents
Culture Documents
Chap-1 CN
Chap-1 CN
y Table of Contents 1
CN (Sem VT I EGE / GTU)
Chapter 1 : Introduction to Data Communication & 1.8.1 Service Provided by the Networ!( for
Networking 1·1 to 1-36
Companies ........................................... 1-11
Syllabus : Data cornmunlcation, Use of networks, ·1.8.2 Services Provided by the Network
Internet protocols and standards, Laye1ing of models, OSI
to People ............................................ 1-12
model. TCP/ IP Internet model.
1.9 Social Issues , ..................................................... 1-12
1.1 Introduction to Data ............................................... 1-2 1.10 Network Hardware .............................................. 1-12
1.1.1 Type of Data ........................................... 1-2
1.10.1 Network Classification Based·on
1.2 Introduction to Data Communication ..................... 1-2 Transmission Technolog / ................... 1-12
1.2.1 Definition of Data Communication .......... 1-2 1.11 Network Scale .................................................... 1-13
1.2.2 Characteristics of Data Communicati_on 1.12 Network Classification by their Geography ........ 1-13
System . .................................................. 1-2
1.12.1 Local Area Networks (LAN) .................. 1-14
1.3 Components of Data Communication System ...... 1-3
1.12.2 Metropolitan Area Network (MAN) ....... 1-15
1.4 Protocols and Standards ........................ ;............. 1-3
1.12.3 Wide Area Network (WAN) ................... 1-15
1.4.1 Protocols ...................... ........................... 1-3 1.12.4 lnternetworks :....................................... 1-16
1.4.2 . Standards .............................. ................. 1-4 1.12.5 Comparisor:i of LAN, WAN and MAN .... 1-16
1.5 Networks ............................................................... 1-4 1.13 Network Classification by their
1.5.1 Introduction to Computer Networks ........ 1-4 Component Role ............,................................... 1-16
1.5.2 Need and Applications of 1.14 Peer-to-Peer Networks ..... .................................. 1-17
Computer Network .................................. 1-5 1.14.1 When to use Peer to Peer Networks? .. 1-17
1.5.3 Components of a Computer Network ..... 1-5 1.14.2 Features of Peer to Peer Networks ...... 1-17
1.6 Network Topology Types ....................................... 1-5 1.15 Client/ Server Network
1.6.1 Bus Topology .......................................... 1-6 (Server Based Network) ..................... ................ 1-17
1.6.4 Mesh Topology ....................................... 1-8 1.16 Factors Influencing the Choice of Network ......... 1-18
1.17 Connection Oriented and
1.6.5 Tree Topology ........................................ 1-9
Connectionless Services .................. .................. 1-19
1.6.6 Logical Topology .....- ..................... .......... 1-9.
1.18 Layered Tasks .................................................... 1-19
1.6.7 Hybrid Topology .................................... :1-9
1.19 . Network Software .... ........................................... 1-20
1.6.8 Comparison of Ring and
1.19.1 Protoco~ Hierarchies
Star Topologies .................................. .. 1-10
(Layered Architecture) .......................... 1-20
1.6.9 Comparison of Bus and
1.19.2 Reasons for having Layered
Star Topologies .................................... 1-10
Protocols and its Benefits ..................... 1-20
1. 7 Types of Communication .................................... 1-10
1.19.3 Disadvantages of Layered
1.7.1 Simplex Systems .................................. 1-10
Architecture .......................................... 1-21
1.7.2 Half Duplex Systems ............................ 1-11 1.19 .4 How does Data
Transfer take Place? ... 1-~1
1.7.3 Full Duplex Sys.terns ............................. 1-11 k A h·t t 1 21
1.21 .2 Servi ce Provi der and Servic e User ..... .. 1-22 Chap ter 2 : Physical Layer ...............
2 -1 to 2~
1 .21 . 3 Servi ce Acces s Points (SAPs ) .... ... ....... 1-22 r-- -- :
--
Trans
--
missio
--
n
--
media
--
(Twis ted
--Coa)(i~
pait,
Sylla bus 1
1.21.4 Interf ace Data Unit (IOU) ... .... .. ..... .... .... 1-22 cable , Fiber optic cabJe ), W ireless medium as
Phys· a
ICal
Servi ce Data Unit (SOU) ..... .. ........ ... .. .. . 1-23 layer (Elect romag netic s pectru m, ISM band, Ught wave
1.21 .5
Cable
transm ission ) , Circuit switching, DSL techn ology,
1.21 .6 Proto col Data .Unit (POU) ........... ........ .. 1-23
mode m.
Relationsh ip of Servi ces to Proto cols ..... ............
1-23
1.22
Trans missio n Media ......... ... .... ....... .......................
2-2
Servi ce ....... .. .......... ........... ..... .... .......... 1-23 2.1
1. 22.1
2 .1.1 Class ification of Trans missio n Media ..... 2-2
1.22.2 Proto col ....... .... .......... :...... .. ............ ...... 1-23
Criteria for the Selec tion of Trans mission Media ..
2-2
. 1-23 2.2
1.23 Refer ence Mode ls .. ........... ...... ........ ... ....... ..... ....
1-23 2.2.1 Types of W ired Media ......... ................... 2-2
1.24 OS I Mode l .. ....... ....... ..... ...... ...... .......... ..... ........ ...
Twisted Pair Cable s .................. ....... .................. ..
2-2
Layer ed Ar~hi tectur e ... ..... ... .. .. ..... .. ...... 1-24 2.3
1.24.1
2.3 .1 UTP (Unsh ielded Twisted Pair) ...... .... .... 2-3
1.24.2 A More Detai led OSI Mode l ... ...... ... ...... 1-24
2.3.2 STP (Shiel ded Twiste d Pa ir) ....... ........ .. . 2-3
1.24.3 Peer to Peer Proce sses ..... ..... ...... ...... .. 1-25
2.3.3 Comp arison of Twiste d Pair Cables ....... 2-4
1.24.4 Organ izatio n of the Layer s .. ...... ........ ... 1-25
2.4 Co-axial Cables ..... ..... ..... .:..... ..................... .........
2-4
1.24.5 Funct ions of Differ ent Layer s ... ... ...... ... . 1-26
Optical Fiber Cable s ..... ..... ... ...... ."...... ...... ........ .....
2-5
2.5
1.24.6 Excha nge of Inform ation using the OSI
Mode l ... .... :·......... .. .... .................... .... .... . 1-27 2 .5.1 Characteristics of Optical
Fiber Cable s .. ...... ....... ... .... ...... ... ..... ....... 2-6
1.24.7 Merit s of OSI Refer ence Mode l ...... ...... 1-28
2.5.2 Advan tages of Optical Fibers .............. ... 2-6
1.24.8 Deme rits of OSI Mode l .. ....... ... .... ........ . 1-28
1-29 2 .5.3 Disad vanta ges of Optical Fiber .............. 2-6
1.25 The TCP/ IP Refer ence Mode l .. ..... .... ............ ......
2 .5.4 Applic ations ..... ...... .. .......... .. ... ..... ......... .. 2-6
1.25. 1 Introd uction to TCP/ IP ....... ........ ..... ...... 1-29
2 .5.5 Comp arison of Wired Media ............... .... 2-7
1.25.2 Overv iew of TCP/ IP Archi tectur e .......... 1-29
Wirele ss Media .............. ..... ..... ... ...... ... ......... .... ....
2-7
2.6
f25 .3 Desc riptio n of TCP/ IP Mo~e l ... ........ ..... 1-30
EM Spect rum for Wirele ss Media ... .... ... .. .. ...........
2-7
2 .7
1.25. 4 Comp arison of OSI and
2 .7.1 Comm unica tion Bands ..... ....... .. ....... .. .. .. 2-7
TCP/ IP Mode ls ...... .... ... ... .. ....... .. .......... 1-31
2.7.2 The ISM Band ·········· .... ........... ... .. ...... ... . 2-8
1.25.5 Deme rits of TCP/ IP Mode l .... ... .......... ... 1-32
2 .7.3 Infrar ed Signa ls ....... ....... .... ............ ........ 2-8
1.25.6 Hybri d (Inter net) Refer ence Mode l ....... 1-32
2. 7.4 Visibl e Light ... .. .... .. .... ... .. .... ..... .... .. ....... .. 2-8
Addressing .... .. ..... ·: ... ......... .. .. ....... ... ... .. ... ..... .. ....
1-32
1.26
. · s M e d.1a .. .... ......... ..· .... .. .. ..... ••••·.. · 2-8
Types o f W 1re1es
MAC Addre ss (Phys ical Addre ss) .. ..... .. 1-33 2 .8
1.26.1 8
2.8.1 Radio Wave Trans missio n Syste ms ....... 2-
1.26.2 Logical Addre sses (IP Addre sses) .. ...... 1-33 2 9
· · n S ys te m .. . •••.. -- · •
Micro wave T ransm1ss1o
2.8.2
-
1 .26.3 PortA ddres s ······ ··· ········· ·· ···· ··· ···· ···· ··· · 1-34 2 10
2 ,8 .3 Use of Infrar ed Light as Mediu m •· ····•· " -
1 .26.4 Specific Addre sses .... : ..... ... ..... .... ... .... .. 1-34
"'A~ TechKn111ledgi
Jenil Thakkar
V Pubfic J lf o os
C
Chapter
Introduction to Data
Communication & Networking
Syllabus
Data communication, Use of networks, Internet protocols and standards, Layering of models, OSI model,
TCP/IP Internet model. ·
1.1 Introduction to Data 1.15 Client I Server Network (Server Based Network)
1.2 Introduction to Data Communication 1.16 Factors Influencing the Choice of Network
1.3 Components of Data Communication System 1.17 Connection Oriented and Connectionless Services
Jenil Thakkar
• CN (Sem. VI/ ECE / GTU)
V' 1-2 Introduction to Data Communication & Netw
~~......~~~~~~~~~====="""".... """"====================~ ~o~rlking
~
1.1 Introduction to Data : The transfer of data takes place over a corn
. Puter
Data is defined as information which is stored in the network. A network provides path over which the d
. dd .
can traveI to t h e d esrre .
estrnatron. ata
digital form. A single data unit is called as datum.
Data communication is the process of exchanging the 1.2.1 Definition of Data Communication :
digit~I information between two points.
addresses, program data or data base information. Before exchanging information, creaters and t he users
At the source or destination the data is in digital form of data should agree upon how the information should
but during the transmission, it may be in the form of be presented.
analog or digital signals.
An information that is presented in such a form is called
A data communication network can be simply consisting as data.
of two computers connected to each other a public
Data communication can be defined as t he exchange -
telecommunication network.
of data between a source and destination over some
[iiJ kind of transmission medium, such as a co-axial cable,
(wired communication) or air (wireless communication).
Computer 1 Computer 2 1.2.2 Characteristics of Data Communication
(G-1425) Fig. 1.1.1 : A simplest possible data
communication network
System: GTU: May 19
3. Timeliness : 4. Receiver :
The time delay is unacceptable for the audio and video It Is the device which receives the message and
data as it introduces errors in the reproduced sound or reproduces It.
picture.
A receiver can be In the form of a workstation,
So the DCS should deliver the data without any time telephone handset, a TV receiver, etc.
delay.
5. Protocol :
Such a data delivery is called as real-time transmission
of data. Protocol is defined as the set of rules agreed by the
sender and receiver.
1.3 Components of Data
Communication System : There can be different protocols defined for different
functions. Protocols govern t he exchange of data in true
Block diagram :
sense.
If we specifically consider the communication between A set of such rules is known as a "protocol" of the data
two computers then the data communication system is communication system.
as shown in Fig. 1.3.1.
- · Many different protocols are used in the modern data
It has the following five components. communication system.
1. Message 2. Sender The interconnection of one station to many stations is
3. Medium 4. Receiver and called as networking.
5. Protocol A network is any interconnection of two or more
Message
stations that wish to communicate.
~
~ 1.4 Protocols and Standards :
Medium
Protocol and standards are the two freq uently used
Receiver words in data communication.
(L-2) Fig. 1.3.l : Five components of a data communication
Let us define them first and then explain them .
system
1. Message: 1.4.1 Protocols : idi'IMBIU
Message is nothing but information or data which is to
be sent from sender to the receiver.
telephone, work station etc which sends the message -;- There are certain rules that must be followed to ensure
over the medium. proper communication.
The examples of transmission medium are coaxial cable, A protocol is defined as the set of rules agreed upon by
twisted pair' wire, fiber optic cable, radio waves (used in the sending and receiving computer systems, to
terrestrical or satellite communication) etc. facilitate a proper communication between them.
Jenil Thakkar V
Y
TethKnowledge
PuUll ca t lo n s
• C N (Sem . VI / ECE / GTU) Introduction to Data Communication & Networking .Id
-.,
1R•T1dlb~
"Y" 10
Publlcat "
1f CN (Sem . VI/ ECE / GTU) 1-5 Introduction to Data Communication & Networking
In a computer network we need to make use of Q. 2 Explain variOU!,, network topologies with their
hardware and softwar e. advantages and disadvantages . (May 16, 7 Marks)
The hardware consist s of connecting cables, Q, 3 Defin e topology. Describe any two types of network
connectors, networ k connecting devices and topolog y (May 18, 4 Marks)
the
software consist s of protocols, prog rams etc. Q. 4 Write note on network topology,
This enables the systematic exchange of information (Dec. 19, 4 Marks)
between the compu ters connec ted in the network.
It is possible to connect th e compu ter in many differen t
There are various ways of interconnecting the ways in a network.
compu ters.
The way of co nnecting the compu ters is called as the
1.5.2 Need and Applications of Computer topolog y.
Network: So depend ing on the manner of connecting the
The computer networks are needed because of the computers we can have different network topolog ies.
following points :
Definition :
1. For shari ng the resources such as printers am ong
Topology is defined as the logical arrangement of the
all the users.
nodes (computers).
2. For sharing of expensive softwares and database.
The word physical network topology is used to explain
3. To facilitate communication from one computer t o
the manner in which a networ k is physically connected.
the other.
4. To have exchange of data and information Devices or no~es in a networ k get con nected to each
amongst the users, via the network. other via communication links and all these links are
5. For sharing of information over the geographically related to each other in one way or the other.
wide areas. The geometric representation of such a relationship of
6. For connecting the computers between various links, and nodes is known as the t opolog y of that
buildings of an organization.
network.
7. For educational purposes.
Types :
1.5.3 Components of a Computer Network: The five basic network topologies are as shown in
Fig. 1.6.1.
Following are some of the importa nt components of a
computer network :
The bus topology is a network topology in which nodes phase add and if they are out of phase cancel.
are directly connected to the common linear or Thus additio n and cancellation of wave results in a
branched half duplex link called as bus. standing wave.
The bus topology is usually_used when a network under The standing waves ca n disto rt.th e no rmal signals wh·ct
consideration is small, simple or temporary as shown in are travelling along t he ca ble.
Fig. 1.6.2.
Node 1 This can be avoided by t erminating the bus on bo'"
Node 2 Node 3 Node 4
Jenil Thakkar
• Ttdlb~
• P ubl 1Cat 1 Dn
•
" CN (Sem. VI / ECE / GTU) 1-7 Introduction to Data Communication & Networking
Transmission media for bus LANs :
Tile messages flow oround the ring in one direction.
We can use the followin g t1 ansrnission media for the Therr is no termination becrJuse there is no end to the
bus LANs : r111g.
1. Twisted pair. 1 oken p~sslng :
2. Baseband co•axial cable Some ring networks do token pa:.sing. A short me:.sage
3. Broadband co· axial cable 4. Optical fi bre called a token is passed around the ring until a
comput er wis hes to send information to another
1.6.2 Ring Topology : computer.
advantages and dis~dvantages. (May 16, 7 Marks) computer or t he t oken returns to its origin.
Q. 3 Define topology. Describe any two types of network The • receiving computer returns a message t o the
topology. (May 18, 4 Marks)
originator indicating that the message has been
Definition : received.
A ring topology is a network topology in which each The sending computer then creates another token and
node connects exactly to two other nodes, to form · a places it on the network, allowing another station to
single closed pathway for signal through each node. capture the token and begin t ransmitting.
Data travels from node to node with each node having The token circulates until a station is ready to send and
an access to every packet. capture the token. Faster networks circulate several
tokens at once.
In a ring topology, each computer is connected to the
next computer, with the last one connected to the first Some ring networks have two cou nter-rotating rings
as shown in Fig. 1.6.3. that help them recover from network faults.
NodeO
Active or passive ?
~~-:
~ ~~
Ring . topology is an active topology, because each
station hcis to recreate the packet.
.! ~ Problems faced in the ring topology :
""".• ,. . . . pr
~2
1. If any link breaks or if any repeater fails then the
entire network will be disabled .
. ,- ~ 2. To install a new repeater for supporting a new
(G-16) Fig. 1.6.3 : Ring topology two nearby, topologically adjacent repeaters.
Rings are used in high-performance networks where 3. It is necessary to take preventive measures to deal
large bandwidth is necessary e.g. time sensitive features with the time jitter.
such as video and audio. 4. Due to the closed nature of the ring topology it is
necessary to remove the circulating packets.
Every computer is connected to the next computer in
the ring and each retransmits what it receives from· the These problems except for the last one can be rectified
previous computer hence the ring is an active network. by refinements of the ring topology.
-~
If the network requires electrical power sources then it 1
2
active otherwise passive.
When is star topology suitable ?
.•,
to every other device with a point to point dedicated
It will resend the message only to the destination
link as shown in Fig. 1.6.5.
computer in a switched star network. NodeO
Jenil Thakkar
1-9 Introduction to Data Communication & Networking
-
" CN (Sem. VI / EGE / GTU)
The term dedicated means that the link carries data only
between two devices connected on it.
Control hub
A
The mesh topology is also called as complete orheadend
Hub
topology.
The mesh topology does not have the traffic congestion
problem, because dedicated lines are being used to
• '
connect the nodes.
These links are not being shared.
So the ·special protocol called Media Access Control
(MAC) protocol is not required to be used.
This topology has an advantage of data security due to (G-22) Fig. 1.6.6 : Tree topology
the use of dedicated links. It is robust. The central hub in the tree is an active hub which
lf one link fails, the rest of the network can continue to contains repeater.
function. The fault diagnosis and isolation of fault also The repeater amplify the signal and increase the
The only disadvantages of this topology are the cable The secondary hubs may be active or passive. A passive
length, the cost of the cable and the associated hub provides a simple physical connection between the
attached devices.
complexity.
In this topology, there can be only one connection
A fully connected mesh network therefore has n(n-1)/2
between any two nodes. Therefore it is also called as a
physical cables to connect n devices. To accommodate
parent-child topology.
that many links every device on the network must have
Note : The advantages a.rid disadvantages of a tree
n-1 input/output ports.
topology are generally the same as those of a star.
So too many cables are required to be used for the
mesh topology. 1.6.6 Logical Topology :
Using this formula for a network of 1000 nodes, we will Logical topology describes the manner in which the
require 1000 (1000 - 1)/2 = 499500 cables or links. So stations are logically connected to each other for the
this topology is suitable only for small networks. · purpose of data unit exchange.
Sr.
Bus Star
No.
STA R 1. Uses a cable as bus or Uses a central hub ~
8 backbone to connect all connect the nodes
nodes. each other.
5. No computer has a Failure of the central The communicati on from CPU to monitor or keyboa rd
monopoly over the hub causes the whole to CPU is unidirectional.
network. network failure.
1_7_2 Half Duplex Systems : These computers may be within the same building,
campus, city or different cities.
Definition :
Cventhough the computers are located in different
A half duplex communication is defi ned as t he locatlons, the organist.1tions want to keep track of
bidirectional communication which does not ta ke place inventories, monitor productivity, do the ordering and
simultaneously. billing etc.
These systems are bi-directional, i.e. they can transmit The computer networks are useful to the organisations
as well as receive but not simultaneously. in the following ways :
The computer networks are playing an important role in to peer) in which all the PCs are networked together
and each one can have the access to the other for
providing services to large organisations as well as to
communicating or sharing purpose.
the individual common man.
The organisation, if it wants security for its operation it
1.8.1 Service Provided by the Network for can go in for the domain model in which there is a
Companies : ldiiiMiN@ server and clients.
University Questions All the clients can communicate and access data
Q,f through th~ server.
4. Communication medium :
Many organisations have a large number of computers A computer network provides a powerful
communication medium among widely separated
in operation.
employees.
Newsp aper is on-line and is personalised, digital library 1.10.1 Netwo rk Class ificati on Based on
consis ting of books, magazines, scientific journal s etc. Trans missi on Techn ology :
World wide web which contain s informa tion about the
The transmission techno logy can be categorised broadly
arts, busine ss, cookin g, govern ment, health, history,
into two types_:
hobbie s, recrea tion, science, sports etc.
1. Broadcast networks and
2. Perso n to person comm unicat ion :
2. Point-t o-point networks.
Person to person commu nicatio n includes :
1. Broadcast networks :
Electro nic-ma il (e-mai l)
In a broadcast networks all the machines on the
R~al time e-mail i.e. video confere ncing allows remote
networ k use or share commu nicatio n channel that is
users to commu nicate with no delay by seeing and
shared or used by all the machines on the network.
hearin g each other.
Short messages called packets sent by any machin e are
Video- con f erenci.ng ,·s being used for remote school,
. received by all the others(Fig. 1.10.l(a)).
getting me d',ca 1 opinio n from distant specialists etc.
· p s in which one person posts a Broadcast systems generally use a special code in th e
World wide newgr ou
address fie ld for addressing a packet to all th e
messa ge an d a II other subscr ibers to the newsgr oup can
co ncerne d compu ters.
read it or give their feedba cks.
Inte ra ctive entert ainme nt : This mode of operati on is call ed broadc asting.
3.
· ment include s : Some broadc ast systems also suppor t transmission to
Int eractiv e enterta in
o nly a grou p of few machin~s known as multicasting.
l . M u lti person rea I- f 1me simula tion games.
Jenil Thakkar Tl# Ted11Cno11ldrs
~ Poblfca tlO
" CN (Sem. VI/ ECE / GTU) 1-13 Introduction to Data Communication & Networking
..,.a When a packet is received, a machine checks the geographical area~ (such as WAN) use point·to•point
address field. tran!> mission.
If the packet is addressed to it then the packet is
1.11 Notwork Scalo :
proce ssed , otherwise the packet is ignored.
Broadcasting is used primarily in the local area This is iln ullernative criterion fo r clc1:;si f1ration of
a
networks. networks.
-Datal f1•
· •)
systems.
\r-Paoket---l
~
Header
a Table 1.11.1 : Network classification according to scale
Interprocessor
distance
Processors are
located in
Exampl'=! of
network
•
0.1 m Same circuit Data flow
board machine
1m Same system Multicomputer
(G-2394) Fig. 1.10.l(a) : Broadcast network
10 m Same room LAN
2. Point-to-point networks :
100 m Same building LAN
In point to point · networks there exist . of many
1 km Same campus LAN
connections between individual pairs of machines.
10 km Same city MAN
To go from the source to the destination a packet on
100 km Same state WAN
this types of network may have to go through
1,000 km Same continent WAN
intermediate computers before. they reach the desired
10, 000km Same planet Internet
computer.
As a general rul e small networks which are localized in a Beyond the multicomputers are the tru e networks, in
geographical sense tend to use broadcasting (e.g. LAN) which the computers communicate by exchanging
whereas networks located in wide geographical areas messages over long cables.
use point to point transmission (e.g. WAN). Such networks are divided into following categories :
In point to point networks (Fig. 1.10.l(b)) packets can 1. Local area networks
take multiple roots to reach the same destination. 2. Metropolitan networks and
Hence routing algorithms play an important role in the 3. Wide area networks.
point to point networks.
Internetwork :
~ ~
Geography:
University Questions.
GTU: May 12, May 16
.
PAN
....
LAN
r Networks l
.--
MAN
.. • (a) Bus topology (b) Ring topology
(G-32)fig. 1.12.2 : LAN topologies
(Personal WAN CAN
(Local (Metropolitan
Area (Wide (Campus
Area Area Depending on the needs of an organisation and the
Network) . Network) Area Area
Neh'Vork) Network) Network) type of technology used, a I.AN can be as simple as a
(G-l4 00)Fig. l.12.1 : Network categories few computers and a printer at home or it can contain
many computers in a company and include voice, sound
1.12.1 Local Area Networks (LAN) : and video peripherals.
GTL): May 12, May 14, May 16 LANs are widely used to allow resources to be shared
University Questions between personal computers or workstations. The
Q.1 List the classification of network in detail according resources to be shared can be hardware like a printer or
to the area covered. Also explain each softwares or data.
classification of network in detail.
In a LAN one of the computer can become a server
(May 12, May 16, 7 Marks)
serving all the remaining computers called clients.
Q. 2 Exp1ain the terms: LAN, MAN, WAN, Internet.
Software can be stored on the server and it can be used
(May 14, 4 Marks)
by the remaining clients.
Definition :
LAN 's are also distinguished from MAN's and WAN's
The Local Area Network (I.AN) is a network which is based on the transmission media they use and
designed to operate over a small physical area such as topology.
an office, factory or a group of buildings. In general a given LAN will use only one type of
LANs are very widely used in a variety of applications. transmission medium.
LANs are easy to design and troubleshoot. The most common networking topologies used are bus,
The personal computers and workstations in the offices ring and star.
are interconnected via I.AN. The data rates for LAN can now range from 10 Mbps to
The exchange of information and sharing of resources 16 Gbps.
becomes easy because of I.AN. Important characteristics / Features of LAN :
In LAN all the machines are connected to a single cable. 1. Very high degree of interconnection between th e
computers.
Different types of topologies such as Bus, Ring, Star,
2· High rate of data transmission.
Tree etc. are used for LANs.
LAN uses a layered architecture and they are capable of 3. Physical connection of computers in a LAN is easy.
operating at hundreds of Mbits/sec. 4. Every computer in the LAN can communicate with
every other computer.
A Local Area Network (I.AN) is usually a privately owned
and links the devices in a single office, building or S. The ' medium used for data transmission is
inexpensive.
campus of upto a few kilometres as shown in Fig. 1.12.2.
Jenil Thakkar
" CN (Sem. VI / ECE I GTU) 1-15 Introduction to Data Communication & Networking
LAN topologies : 1.12.3 Wide Area Network (WAN) :
Network topology is defined as the pattern in which the GTU : Ma 12 Ma 14 Ma 16
network elements are connected to each other. Unlvorslt Questions
Different network topologies are : Bus, Ring, Star etc. Q. 1 List the classlficatlon of network In detail according
to the area covered Also eYplain each
various topologies are possible for the broadcast LANs classification of network In detail
such as Bus topology or Ring topology. (May 12, May 16, 7 Marks)
Q. 2 Explain the terms . LAN, MAN, WAN , Internet
1.12.2 Metropolitan Area Network (MAN): May 14, 4 Marks)
Fig. 1.12.5.
4. Commun ication Coaxial cable PSTN or satellite links Coaxial cables, PSTN, optical fiber
medium cables, wireless.
': ..
5. Data rates (speed) High Low Moderate
• :t!'
Each station can transmit and
6. Mode of
commun ication receive
Each station cannot
transmit
Each station can transmit or receive
.%
~·
7. Principle Operates on the principle of Switching Both
broadcas ting
1.13 Netwo rk Classi ficatio n by their The relationsh ip between each PC or device on 1111
Comp onent Role : network with the others in terms of control will bl
dependen t on the choice of network type.
orks are classified into two types :
The loca I area n etw . · ed frl
For these two types, the special software 1s requir
tw O rks 2 Client server networks.
1_ Peer to peer ne · • controllin g the flow of informatio n between t h ~
Definition of client : 11 1
"- utcrs typically are more Pow~
A I' · Server comp . . f . lhi
c •ent Is a con1pute1 running a program that requests l rs or are opt1m1sed to unction as •
client compu e 5e~'er:
services from a server.
No user can access the resources of the servers lJ %1
The individual workstations in a network are clients. has been au thenticated (permitted) by the servf'r 0 ~''
Definition of server :
so.
Operating system :
1
j
A server is simply a computer that makes the network
resources available and provides service to other We can use any common operating system 5,J,,h ~ j
computers when they request for it. Windows 7 for a client. J
Local Area Networking (LAN) is based on the client- But t he server ·,s loaded with a special operating 51•' -1es ,
I
The software run at the client computer is called!
client program.
g~
This software configures that particular computer to ac
as a client.
Jenil Thakkar
. . CN (Sem. VI/ ECE / GTU) 1-19 Introduction to Data Communication & Networking
1. Establish a connection.
Higher layers
2. At the receiver :
layer. AISC) expfiln OSI rnodel.
'(May 18, 7 Marks) Tasks of lower layers : The box is delivered to the
courier company office in the destination city.
Layer 3 r·--P.~!?~.<?~~~-- ► 1 Layer 31 The process of establishing a link between two devices
to commun icate and share information is complicated.
Layer2/3
interface ! Layer 2 !' ........ Virtual
communication
Layer 2 r·.~:~~~~~-- ► 1 Layer 2 I Actual
There are many functions w hich are t o be t aken into
consideration to allow an effective commun ication to
Layer 1/2
interface ! Layer 1 t communication
take place.
Layer 1 f-···P.~~~-'?~~~--• I Layer 1 I To organize all these functions in an organ ized way the
The rules and conventions used in this communication 3. The number of layers, names of the layers, and the
tasks assigned to them may change from network
are collectively known as the layer "n" protocol.
to network. But for all the networks, always the
Basically a protocol is an agreement between the two
lower layer offers some services to its upper layer.
Jenil Thakkar
· · mach·rnes about how th e
communicating
~•• TechKno111ledP
.,-,,, Pulll l t atfons
" CN (Sem. VI/ ECE / GTU) 1-21 Introduction to Data Communication & Networking
Layer 5
Message
M
The example of so
ttware entity is a process and that of
.
·ty is an intellige nt I/0 chip.
hardwar e en t 1
a '
Layer4 layer but on differen t machines a
Entities in the same re
H4 = Layer 4 header called as peer entities .
r---L-.--,
Layers . Provid er and Servic e User ·
1.21.2 Servic e ·
•• r n implem ent services for the laye
The ent1t1es at 1aye th r
H3 = Layer 3 header
(n + 1) which is above the n layer.
. h provides service is called as service
So layer n w h IC •
Layer 1 (Physica l H 2 = Layer 2 header . d r (n + 1) which takes this service ,s
provider an Iaye
transmiss ion) T 2 = Layer 2 trailer
called as service user.
Machine - 1
Message + Header + Trailer
(Source machine) 1.21.3 Servic e Acces s Points (SAPs ) :
(G-51) Fig. 1.20.l : Informa tion flow for virtual . to underst and the definitio n of SAPs.
Refer F19. 1 .211
•
commu nication betwee n layers S
The long form of SAP is service access point They are
The control informa tion placed in headers is used at the
available at the interface of n and n + 1 layer as shown
destina tion machin e (machin e 2) to convey the message
in Fig. 1;::.2:,::1~.1:.:.·_ _ _ _ _ _ _ _
to layer 5 as shown in Fig. 1.20.2. 1
IOU
M Layers
~1
Layer ICI sou
(n + 1)
H = Header s H4 Layer4
SAP SAP SAP
T= Trailers Interface ....
H3 H4 M1 H3 M2 Layer3
Layern
sou
M2 T2 Layer 2
Header n - POU
(G-56) Fig. 1.21.1 : Relation between layers at an interfac e
Layer1
Machlne -2 Services are available at SAPs. That means the layer n
(Destina tion
machine )
=~========:=J · Physical medium SAPs are those places at the interfac e where layer
(n + 1) can access the services being offered.
(G-S2) Fig. 1.20.2
Each SAP has a unique address for its identification.
1.21 Interf aces and Servi ces :
1.21.4 Interfa ce Data Unit (IDU) :
The basic function of each layer in the layered structur e
For successful exchang e of informa tion between two
is to provide service to the layer above it.
layers, a set of rules about the interfac e should be
Now we will discuss exactly what service does it provide. present.
But before that, let us define some ·mporta
,
nt terms.
As shown in Fig. 1.21.2, the layer (n + 1) entity passes an
1.21.1 Entitie s and Peer Entitie s : IDU (interfac e data unit) to the layer n entity through
the SAP.
.
An entity is defined as the active I ment in each layer.
ee
An IOU consists of two parts namely SOU (service data
An entity can be either a softwar e entity or a hardwar e
unit) and IO (interfac e control informa tion).
- -~e :nt: ity~ ---- ---- ---- ---- ---- ---- ---- ---- ---- -,(w'CI
Jenil Thakkar
re;i ;;~-
. . TedtKne..141'
V PubllL,. t 10 " '
CN (Sem. VI/ ECE / GTU) 1-23 Introduction to Data Communication & Networking
IOU= ICI sou 13ut It does not say anything about how these
operations would be implemented.
They also provide sequence numbers and counts. The purpose of each layer is to offer certain services to
Host -1 Host - 2
the higher layers.
Layer n ....... ,_,, ... , ... _..............-...._........... Layer n Layer n on one machine (source) will communicate with
entity entity
1 sou 1 layer n on another machine (destination).
'--.,---'
n-PDU
The rules and conventions used in this communication
are collectively known as the layer n protocol.
(G-SB)Fig. 1.21.3 : Layer n entities exchange n-PDUs in their
layer n protocol Basically a protocol is an agreement between the two
communicating machines about how the
1.22 Relationship of Services to communication link should be established, maintained
Protocols: and released.
Jenil Thakkar
• CN (Sem. VI / ECE / GTU) 1-25 Introduction to Data Communication & Networking
Name of
unit
exchanyed I towever between two machines A and B of Fig. 1.24.2
Applloabon prol<>Col
P!~l3 ! layer x on mdchlne A will communicate with layer x on
•• . • ......... ....... ...... .. ♦ ApphC11llt>11 Ai'DU mJchim• U.
Peer to peer protoool
All the applications need not use all the seven layers
n-ansport protocol
• ••••• .. •••• • ••••• • •• •• •• • •• u ••••• • •••••••• • •• • •••••
shown in Fig. 1.24.1.
Peer to peer protocol
Network layer host router protocol The lower three layers are enough for most of the
l~
'--"""1'"'.....i .... ·· Nemw+·•-·-~ Nemo~ r -· . . ______. . applications.
1 Physical
Host A
· 1 Physical 14•-~--···
______.......,.;;,i
Rou18t
Phys' - - - - Bit
the layers which are immediately above or below it.
An interface defines the operations and services offered In order to get an idea of interlayer communication, let
There is an interface between each pair of adjacent We want the data to get transferred from layer-3 of
machine-A to layer 3 of machine-B.
layers as shown in Fig. 1.24.2.
But the data does not get transferred directly from layer
Peer:
3 of one machine to layer 3 of the other machine.
The active elements present in each layer are known as
The data and control information is passed on from the
entities. The entities can be hardware entities or
topmost layer to the lower layers until the lowest layer
software entities,
(layer 1) is reached. Below layer 1 lies the physical
The entities comprising the corresponding layers on medium such as coaxial cable, through which the actual
different machines are called as peers. communication takes place.
The communication actually takes place between the This is shown in Fig. 1.24.2. This is called as the actual
The dotted lines in Fig. 1.24.2 show the virtual 1.24.4 Organization of the Layers :
communication and physical communication is shown
The seven layers in the OSI model can be considered to
by solid lines.
belong to three subgroups as follows :
Within a single machine, each layer uses the services of
1. Subgroup 1 : Physical, data link and network-
the layer just below it.
network support layers. (layers 1, 2 and 3)
It does not decide the medium or modulation. It breaks the data groups into smaller units so that they
The examples of the physical layer protocols are RS-232 are handled more efficiently by the network layer.
or RS-449 standards. Layer 5 : The session layer :
Layer 2 : Data link layer :
This layer manages and synchronizes conversations
Functions of the data link layer are synchronization and between two different applications.
error control for the information which is to be This is the level at which the user will establish system to
transmitted over the physical link. system connection.
To enable the error detection, it adds error detection It controls logging on and off, user identification, billing
bits to the data which is to be transmitted. and session management.
The encoded data is then passed to the physical layer. In the transmission of data from one system to the
These error detection bits are used by the data link layer other, at session layer streams of data are marked and
on the other side to detect and correct the errors. resynchronized properly so that the ends of messages
At this level the outgoing messages are assembled into are not cut prematurely and data loss is avoided.
frames, and the system waits for the acknowledgements Layer 6 : Th.e presentation layer :
to be received after every frame transmitted.
The presentation layer makes it sure that the
Correct operation of the data link layer ensures reliable information is delivered in such a form that the
transmission of each message. receiving system will understand and use it.
Examples of data link layer protocols are HDLC, SDLC The form and syntax (language) of the two
and X.25 protocols. communicating systems can be diff~rent Example, one
Layer 3 : The network layer : system is using the ASCII code for file transfer and the
other one uses IBM's EBCDIC.
The functions of network layer are as follows :
Under such conditions the presentation layer provides
To route the signals through various channels to the
the "translation" from ASCII to EBCDIC and vice versa.
other end.
To act as the network controller by deciding which route Layer 7 : ·Application layer :
Layer 4 : Transport layer : The functions such as LOGIN, or password checking are
As the name suggests this layer provides the transport also performed by the application layer.
services. Let us now go into the details of each and every layer.
It does the functions such as multiplexing, splitting or At the physical layer, communication is direct i.e.
Actual data
transmissio
,-~-----
( ) ) ...,,,,,,,
~ Presentation MIME, XOR, TLS , SSL
Layer
Transmission m d' Aclual received
e 1um data
Application NNTP = Usenet, SIP = VOiP, SSI, DNS
(G-61} Fig. 1 . 24. 3 .. A n exchange using the OSI model
Layer FTP, Gopher, HTTP, NFS, NTP = TIME
The information add e d bY each layer is in the form of SMPP, SMTP = email, DHCP, SNMP
headers or trailers. Telnet '
Headers are added to the message at the layers 6, 5, 4, 1-24. 7 Merits of OSI Reference Model :
3, and 2. A trailer is added at layer _
2
1. It distinguishes very clearly between t he services,
At layer 1 the entire package is converted to a form that
interfaces and protocols.
can be transferred to the receiving machine.
2. The protocols in OSI model are better hidden. So
At the receiving machine, the message is unwrapped
they can be easily replaced by new protocols as the
layer by layer with each process receiving and removing
technology changes.
the data meant for it.
3. OSI n:iodel is truly a general model.
The upper OSI layers are always implemented in
4. This model supports connection oriented as well as
software (4, 5, 6 and 7) and lower layers are a connectionless services.
combination of hardware and software (2, 3) except for
the physical layer which is mostly hardware.
1.24.8 Demerits of OSI Model:
layers 1, 2 and 3 (i.e. physical , data link and network) GTU: May 12, Dec. 15, Dec. 16, Dec. 19
University Questions
are the network support layers.
Q. 1 Draw and explain the OS¾ reference mode1 for
They deal with the physical aspects of moving data from
network. Also gives Its application and critiques.
one device to another such as electrical specifications,
(May 12, Dec. 16, 7 Marks)
physical connections, physical addressing and transport
Q. 2 Explain the OSI reference model with the diagram.
timing and reliability. Also enlist its critique in various applications.
Layer 4, the transport layer ensures end to end reliable (Dec. 15, 7 Marki)
application) they allow interoperability among unrelated 1. Sessions and presentation layers are not of much use.
software systems.
------------ ------------ ------------ ------------
~~ TechKn•••-'ti
Jenil Thakkar 'ir Publl c atlOOS
~ CN (Sem. VI/ ECE / GTU) 1-29 Introduction to Data Communication & Networking
2. This model was devised before the protocols were
5mce the development of the APPANET, TCP/IP
invented. So in real life there is a problem of fitting
together has eme, ged as the controlling body.
protocol into a model.
It is being used in computers of not only in the U.S. but
1.25 The TCP/IP Reference Model : all over the world for all thE> typf's and sizes of
computers.
GTU : May 12, Oe_c. 13
University Questions It has become the language of the Internet.
a. 1 Draw and explain the TCP/JP model used for the TCP/IP are two protocols: Transmission control protocol
networks. Also explain the critlques of TCP/IP and Internet protoco l.
model (May 121 7 Marks)
These two protocols describe the movement of data
a. 2 Draw the TCP-IP and OSl reference rQodeL
Describe the two ways· in which they are the same between the host computers on Internet.
and describe the two ways they are different with The protocol however is a suite of many other protocols
each other. (Dec. 13, 7 Marks) which provide for reliable communications across the
TCP/IP is the short form of two important protocols Internet and the web.
namely Transmission Control Protocol/Internet Protocol. In the TCP/IP protocol suite, there are various layers,
A protocol suite is defined as the set of protocols with each layer being responsible for different facets of
organized in different layers. communication.
The TCP/IP protocol suite is used in Internet today. The Internet Protocol (IP) and Transmission Control
TCP/IP is a hierarchical protocol suite means that each Protocol (TCP) are together known as TCP/IP protocol.
upper layer protocol receives support and services from TCP/IP offers a simple naming and addressing scheme
either one or more lower level protocols. whereby different resources on Internet can be easily
located.
In the original TCP/IP protocol suite, there were four
layers built upon the hardware. Information on Internet is carried in "packets". The IP
protocol i_s used to put a message into a "packet".
But today's TCP/IP protocol suite uses a five layer model
as shown in Fig. 1.25.1. Each packet has the address of the sender and the
recipient's address. These addresses are known as the IP
Application layer Layers
addresses.
Transport layer- I Layer4 Using the TCP protocol, a single large message is
divided into a sequence of packets and each is put into
Network layer I Layer3 an IP packet.
~•.....,=-=C~N~(~S~e~m~V~I~/!;;E~C~E~/~G~T~
U~>._....,.__,_,,,,.......,....,_ _1 9.
~ 30 -.--="""...!l~n!!.tr~od::;u;c;t;;;;lo~n~t~o~D:a-ta::C~o:m:m
:u~ni~c~at~io~n~&~Networ\i,
It is a set of prot ocol s that allow com
munic.ition across As shown in Fig. 1.25.2, the TCP/IP mod
mult iple diverse netw o, k. el has only f~
l.iye, s
ARPA origi nally created TCP/IP
to connect millt.iry Internet layer :
n~tw orks toge ther , but later on this
proto col was also This layer is called as the inter net layer
give n t 0 and it holds
gove rnm ent agencies and universitie
cost . s free of whole architecture toge t her. ~
Jenil Thakkar
-.J~
V CN (Sem. VI / ECE / GTU) 1-31 Introduction to Data Communication & Networking
UDP is also preferred over TCP in those applications in Q. 4 Compare TCP/I P and OSI reference models
which prompt delivery is more important than accurate
-~----------- ----(May
........
17, 7 Marks)
delivery. It is used in transmitting speech or video.
Similarities between OSI and TCP/IP Models :
Application layer :
Following are some of the similarities between OSI and
TCP/IP model does not have session or presentation TCP/JP models :
layers, because they are of little importance in most
1. In both the models the functions of layers is
applications.
approximately same.
The layer on t op of trans port layer is called as 2. Both models use the concept of la;ered
application layer. architecture.
The protocols related to t his layer are all high level 3. The transport layers and the layers below it provide
protocols such as virtual terminal (TELNED, file t ransfer transport services independent of networks.
(FTP) and electronic mail (SMTP) as shown in Fig. 1 25.3. 4. In both the models, the layers above transport
Application layer Telnet. FTP. SMIP. DNS. HTTP layer are application oriented.
NNTP
Transport Refer to Fig. 1.25.4 and Table 1.25.1 for the comparison
TCP UDP
Internet IP of the two reference models.
(network) OSI Model TCP/IP Model
>
Presentation TCP/IP does not
(G-2706) Fig. 1.25.3 .... have these layers
Session from OSI model
Many other protocols have been added to t hese, over Transport Transport
the years such as Domain Name Service (DNS), NNTP · Network Internet
and HTTP etc. Data link Host of network
This is the lowest layer in TCP/IP reference model. (G-73) Fig. 1.25.4: Relationship between OSI and
The host has t o connect to the network using some TCP/IP models
protocol, so that it can send the IP packets over it. Table 1.25.1: Difference between OSI and TCP/IP model
Questions
Separate session layer. No session layer,
J·....University
-
characteristics are
~- ~ Compare OSI reference model and TCP/IP _model.
provided by transport
l Describe the functions of data link layer, network layer.
layer and transport layer of OSI reference model. Separate presentation layer. No presentation layer,
(May 13, 7 Marks) characteristics are
Draw the TCP-IP and OSI reference model, provided by application
Describe the two ways in which they are the same layer.
and describe the two ways they are different with Network layer provides both Network layer provides
~ other. (Dec. 13, 7 Marks) connectionless and connection only connection less
oriented services. services.
:Explain how TCP/ IP and OSI reference model are
-different with each other. (May 16, 7 Marks)
concepts of service, interface and protocol. There is no need of addresses at the physical layer
2. This model is not at all general and it cannot because communic ation at the physical layer takes place
describe any protocol stack other than TCP/IP. in bits which cannot have an address.
3. The host-to-n etwork layer is not a layer at all in the Fig. 1.26.1 shows the addressing at each layer;
normal sense. It is simply an interface.
Packet name L~yers Address
4. The TCP/IP model does not even mention the Message I Names
physical and data link layers. A proper model
should include both as separate layers.
Segment/User datagram Transport I Port numbers
Datagram Network
II Logical addresses
1.25.6 Hybrid (Interne t) Reference Model : Frame Data link I Link layer addresses
But the OSI protocols have not become popular. Fig. 1.26.1 also shows the relationsh ip between various
layers, the addresses used in each layer and the name of
On the other hand the TCP/IP model is practically non
the packet at each layer.
existing but the TCP/IP protocols are used widely.
When the computers wish to communic ate with one
So sometime s a modified OSI model with primary
another, they need to know the _address of each other.
concentra tion on TCP/IP is used which is called as the
Each computer has its own address.
hybrid model.
The addresses can be of different types such as physical
The hybrid model is shown in Fig. 1.25.5. It is also called
addresses or logical address.
as the Internet model.
---- ---- ---- ----Jenil
----Thakkar
---- ---- ---- ---- ---- ---- - ..... TtdaKnolllledl•
"Y" 05
11uail ta t1°
1-33 Introduction to Data Communication & Networking
" CN (Sem. VI/ ECE / GTU)
In an internet employing the TCP/IP protocols, four Refer Fig. 1.26.2 which explains the concept of physical
puters. addressing.
I Of addresses are used by the com
!eves
1. Physical address
f!j 16 Tt_:_32 R52~ 38
GTU : May 13, Dec, ·14 The sender computer with a physical address of 15
How does the actual data transfer take pl ace Q . 30 Stat~ the advantages and disadvantages of star
a. a
between two machines. topology.
Write a note on : Vi rtual communication between Q . 31 Write a short note on Mesh topology.
a. 9
layers. Q. 32 State advantages and disadvantages of mesh
Differentiate between physical address and logical topology.
a. 10
address. Q . 33 Write a short note on tree topology.
Write a note on connection oriented and
Q. 11 a. 34 Compare Ring and Bus.
connectionless services.
a. 35 Compare Star and Ring .
Q.
12 What is relationship between services and
Q. 36 Explain the TCP / IP reference model.
protocols ?
Q . 37 Compare the OSI and TCP / IP reference models.
a. 13 Draw the OSI reference model and explain the
a. 14 Compare different types of network topologies. Q. 1 Explain the architecture of peer-to-peer networks.
a. 15 State the difference between broadcast and point to Explain how it can fall victim to criminal offence as in
Q. 19 Define : Interfaces and services. These computers can simply be the home computers.
Q. 20 Name the different network topology types. No dedicated infra-structure is req uired for a P2P
network.
Q. 21 Explain the basic concepts of bus topology with the
help of suitable diagram. But there is a drawback of P2P network. Because there is
no dedicated infrastructure.
Q. 22 State the important characteristics of bus topology.
Anybody in this network can copy or send any
Q. 23 Name the transmission media used for bus LANs.
information to the other computer in the P2P network
Q. 24 State advantages and disadvantages of bus
and this could include copyrighted contents as well. This
topology.
would be a crime.
Q. 25 Write a note on : Ring topology.
Napster was a music swapping service. It held a central
Q. 26 What are the problems faced by the ri ng topology? database of millions of copyrighted songs.
a. 27 State the advantages and disadvantages of ring Millions of Napster members used the P2P network to
topology. copy and circu late these copyrighted songs among
Q. 28 Write a short note on star topology. them. It was a crime.
Q. 29 What is the difference between single level star So court fi nally shut down Napster.
topology and two level star topology ? Thus a P2P network ca n fall vistim to a criminal offence.
,:r.,
Jenil Thakkar V
TtthKnowledgi
Publi c ation s
•
• CN ~Sem. v1 I ECE I GTU) 1-36 Introduction to Data Communication & Networking
Q. 2 \Nhich Jayer I layers performs following functions ? Ans.:
1. Adding trailer bits 1. Adding trailer bits : . Data link layer
.
2. Error and flow control 2. Error and flow control : Data link layer
3. 'Encrypting files 3. Encrypting files : Presentation layer
4. P roviding IP address 4. Providing IP address : Network layer
{May 18, 4 Marks)
Jenil Thakkar
□□□