Professional Documents
Culture Documents
UNIT 1 cn by adarsh
UNIT 1 cn by adarsh
UNIT 1 cn by adarsh
NETWORKING FUNDAMETALS
OR
Data
It is defined as the collection of various facts and details, which includes any symbols,
description of any item, events, entity gathering, figures, observations, etc. It is also
present in the form of a set of a number of variables. Data processing is a common
method to refine the raw data to settle proper information. The data is categorised into
two types,
1. Primary data: The primary data is further categorised into two groups, namely,
qualitative data and quantitative data
Secondary data: The secondary data is further categorised as internal data and
external data.
Information-
Information is a collection of data that gives everyone an advantage size its help in
decision –making for the individual involved on them.
Data Communication-
OR
“communication is the process or act in which we can send or receive data”
5. Set of rules (Protocol): When someone sends the data (The sender), it should be
understandable to the receiver also otherwise it is meaningless. For example, Sonali
sends a message to Chetan. If Sonali writes in Hindi and Chetan cannot understand
Hindi, it is a meaningless conversation.
Data is can be anything which represents the specific result or any number, text, image,
audio, video etc. For example, If you will take an example of human being then data for
a human being such that name, personal id, country, profession, bank account details
etc. are the important data. Data can be divide into three categories such that data can
be personal, public and private.
Audio –
Audio signal is a representation of sound or music. Audio differs from all i.e. from
text, number and images. Audio is a series of binary numbers for digital signals. It is
continuous but not discrete.
Audio File Formats –
MP3, M4A audio file type, FLAC, WAV, WMA, AAC, etc.
Categories of a Networks
A computer network is a group of computers linked to each other that enables the
computer to communicate with another computer and share their resources, data,
and applications.
o A Wide Area Network is a network that extends over a large geographical area
such as states or countries.
o A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cable or satellite links.
o A Wide Area Network is widely used in the field of Business, government, and
education.
o Get updated files: Software companies work on the live server. Therefore, the
programmers get the updated files within seconds.
o High bandwidth: If we use the leased lines for our company then this gives the
high bandwidth. The high bandwidth increases the data transfer rate which in
turn increases the productivity of our company.
Disadvantages of Wide Area Network:
o Security issue: A WAN network has more security issues as compared to LAN
and MAN network as all the technologies are combined together that creates the
security problem.
o Needs Firewall & antivirus software: The data is transferred on the internet
which can be changed or hacked by the hackers, so the firewall needs to be
used. Some people can inject the virus in our system so antivirus is needed to
protect from such a virus.
o High Setup cost: An installation cost of the WAN network is high as it involves
the purchasing of routers, switches.
o Personal Area Network is used for connecting the computer devices of personal
use is known as Personal Area Network.
o Thomas Zimmerman was the first research scientist to bring the idea of the
Personal Area Network.
o Government agencies use MAN to connect to the citizens and private industries.
o The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN,
OC-3, ADSL, etc.
o It has a higher range than Local Area Network(LAN).
Protocol-
Protocols are the set of rules that govern data communication. Protocols can be
defined as a communication standard followed by both the parties (Sender and
Receiver) in a computer network to communicate with each other.
Syntax: Syntax basically represents the format of the data means in which order
data is presented. It also indicates how to read the data. It simply means the way
to represent data.
Timing: Timing simply means when the data is to be sent and how fast the data
can be sent. For Example, if the Sender sends the data at 100 MBPS and the
receiver receives it at 1 MBPS, then the data gets overflowed at the receiver end.
Functions of Protocol-
1. Message Encoding
2. Message Formatting and Encapsulation
3. Message Size
4. Message Timing
5. Message Delivery Options
Message Encoding: A source message from the sender is encoded into signals
or waves then transmitted through a medium wired/wireless then received and
decoded and the message is passed to the destination. Encoding is the process
of transforming a set of Unicode characters into a sequence of bytes.
3. Message Size: Here long messages must break into small pieces to travel across a
network or The process of breaking up a long message into individual pieces before
being sent over the network. For example, In mobile phones, SMS limits message size
to 160 normal alphabet characters. For non-alphabet characters, It needs 16 bits of data
to represent them limiting the size to 70 characters only.
OSI stands for Open Systems Interconnection, where open stands to say non-
proprietary. It is a 7-layer architecture with each layer having specific functionality to
perform. All these 7 layers work collaboratively to transmit the data from one person to
another across the globe. The OSI reference model was developed by ISO –
‘International Organization for Standardization‘, in the year 1984.
The OSI model consists of seven abstraction layers arranged in a top-down order:
1. Physical Layer
2. Data Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Physical Layer-
The lowest layer of the OSI reference model is the physical layer. It is responsible for
the actual physical connection between the devices. The physical layer contains
information in the form of bits. It is responsible for transmitting individual bits from one
node to the next. When receiving data, this layer will get the signal received and
convert it into 0s and 1s and send them to the Data Link layer, which will put the frame
back together.
Bit synchronization: The physical layer provides the synchronization of the bits by
providing a clock. This clock controls both sender and receiver thus providing
synchronization at the bit level.
Bit rate control: The Physical layer also defines the transmission rate i.e. the
number of bits sent per second.
Physical topologies: Physical layer specifies how the different, devices/nodes are
arranged in a network i.e. bus, star, or mesh topology.
Transmission mode: Physical layer also defines how the data flows between the
two connected devices. The various transmission modes possible are Simplex,
half-duplex and full-duplex.
Framing: Framing is a function of the data link layer. It provides a way for a
sender to transmit a set of bits that are meaningful to the receiver. This can be
accomplished by attaching special bit patterns to the beginning and end of the
frame
Physical addressing: After creating frames, the Data link layer adds physical
addresses (MAC addresses) of the sender and/or receiver in the header of
each frame.
Error control: The data link layer provides the mechanism of error control in
which it detects and retransmits damaged or lost frames.
Flow Control: The data rate must be constant on both sides else the data may
get corrupted thus, flow control coordinates the amount of data that can be sent
before receiving an acknowledgment.
The transport layer provides services to the application layer and takes services
from the network layer. The data in the transport layer is referred to
as Segments. It is responsible for the end-to-end delivery of the complete
message. The transport layer also provides the acknowledgment of the
successful data transmission and re-transmits the data if an error is found.
At the sender’s side: The transport layer receives the formatted data from the upper
layers, performs Segmentation, and also implements Flow and error control to
ensure proper data transmission. It also adds Source and Destination port numbers in
its header and forwards the segmented data to the Network Layer.
Segmentation and Reassembly: This layer accepts the message from the
(session) layer, and breaks the message into smaller units. Each of the
segments produced has a header associated with it. The transport layer at the
destination station reassembles the message.
Service Point Addressing: To deliver the message to the correct process, the
transport layer header includes a type of address called service point address
or port address. Thus by specifying this address, the transport layer makes sure
that the message is delivered to the correct process.
The presentation layer is also called the Translation layer. The data from the
application layer is extracted here and manipulated as per the required format
to transmit over the network.
Encryption/ Decryption: Data encryption translates the data into another form
or code. The encrypted data is known as the ciphertext and the decrypted data
is known as plain text. A key value is used for encrypting as well as decrypting
data.
At the very top of the OSI Reference Model stack of layers, we find the
Application layer which is implemented by the network applications. These
applications produce the data to be transferred over the network. This layer
also serves as a window for the application services to access the network and
for displaying the received information to the user.
TCP/IP model
Application layer.
Transport layer.
Internet layer.
Network Access layer.
APPLICATION LAYER
. Application Layer
This layer is analogous to the transport layer of the OSI model. It is responsible
for end-to-end communication and error-free delivery of data. It shields the
upper-layer applications from the complexities of data. The three main protocols
present in this layer are:
HTTP and HTTPS: HTTP stands for Hypertext transfer protocol. It is used by
the World Wide Web to manage communications between web browsers and
servers. HTTPS stands for HTTP-Secure. It is a combination of HTTP with
SSL(Secure Socket Layer). It is efficient in cases where the browser needs to
fill out forms, sign in, authenticate, and carry out bank transactions .
Transport layer-
Internet layer-
This layer parallels the functions of OSI’s Network layer. It defines the protocols
which are responsible for the logical transmission of data over the entire network
HTTP and HTTPS: HTTP stands for Hypertext transfer protocol. It is used by
the World Wide Web to manage communications between web browsers and
servers. HTTPS stands for HTTP-Secure. It is a combination of HTTP with
SSL(Secure Socket Layer). It is efficient in cases where the browser needs to
fill out forms, sign in, authenticate, and carry out bank transactions.
SSH: SSH stands for Secure Shell. It is a terminal emulations software similar
to Telnet. The reason SSH is preferred is because of its ability to maintain the
encrypted connection. It sets up a secure session over a TCP/IP connection