Data communication part1

202
DATCOMM Introduction to Data and Computer Networks Engr. Melvin K. Cabatuan, MsE De La Salle University January 2013 Objectives - Identify the scope and significance of Data Computer Networking in today’s world Notes Notes

Transcript of Data communication part1

Page 1: Data communication part1

DATCOMMIntroduction to Data

and Computer Networks

Engr. Melvin K. Cabatuan, MsE

De La Salle University

January 2013

Objectives

- Identify the scope and significance of DataComputer Networking in today’s world

- Define and illustrate Data Communicationsand Data Network.

- Describe the Network Components and itsArchitecture.

- Illustrate and explain the Internet.- Explain the various Network CommunicationModels

Notes

Notes

Page 2: Data communication part1

Objectives

- Identify the scope and significance of DataComputer Networking in today’s world

- Define and illustrate Data Communicationsand Data Network.

- Describe the Network Components and itsArchitecture.

- Illustrate and explain the Internet.- Explain the various Network CommunicationModels

Objectives

- Identify the scope and significance of DataComputer Networking in today’s world

- Define and illustrate Data Communicationsand Data Network.

- Describe the Network Components and itsArchitecture.

- Illustrate and explain the Internet.- Explain the various Network CommunicationModels

Notes

Notes

Page 3: Data communication part1

Objectives

- Identify the scope and significance of DataComputer Networking in today’s world

- Define and illustrate Data Communicationsand Data Network.

- Describe the Network Components and itsArchitecture.

- Illustrate and explain the Internet.

- Explain the various Network CommunicationModels

Objectives

- Identify the scope and significance of DataComputer Networking in today’s world

- Define and illustrate Data Communicationsand Data Network.

- Describe the Network Components and itsArchitecture.

- Illustrate and explain the Internet.- Explain the various Network CommunicationModels

Notes

Notes

Page 4: Data communication part1

Why Study Networks?- Networks support and improve our lives byproviding instantaneous local or globalcommunications.

Why Study Networks?- Networks improve teaching and learningthrough sharing and collaboration.

Notes

Notes

Page 5: Data communication part1

Why Study Networks?

- Networks change the way we work.

Why Study Networks?- Networks supports the way we play.

Notes

Notes

Page 6: Data communication part1

Data Communications

- are the transfer of data from one device toanother via some form of transmission medium.

Data Communications- are the transfer of data from one device toanother via some form of transmission medium.

Notes

Notes

Page 7: Data communication part1

Data Communications

- The five components that make up a datacommunications system are the message,sender, receiver, medium, and protocol.

Possible Quiz QuestionA set of rules that govern data communications. Itrepresents an agreement between thecommunicating devices. Without it, two devicesmay be connected but not communicating.

A. MessageB. SenderC. ReceiverD. MediumE. Protocol

Notes

Notes

Page 8: Data communication part1

Possible Quiz QuestionA set of rules that govern data communications. Itrepresents an agreement between thecommunicating devices. Without it, two devicesmay be connected but not communicating.

A. MessageB. SenderC. ReceiverD. MediumE. Protocol X

Possible Quiz Question

It is a fundamental characteristics of a datacommunication system which refers to thevariation in the packet arrival time.

A. JitterB. AccuracyC. TimelinessD. DeliveryE. All of the above

Notes

Notes

Page 9: Data communication part1

Possible Quiz Question

It is a fundamental characteristics of a datacommunication system which refers to thevariation in the packet arrival time.

A. Jitter X

B. AccuracyC. TimelinessD. DeliveryE. All of the above

�Remember- Delivery.The system must deliver data to the correctdestination.

- Accuracy.The system must deliver the data accurately.

- Timeliness.The system must deliver data in a timelymanner.

- Jitter.Jitter refers to the variation in the packetarrival time.

Notes

Notes

Page 10: Data communication part1

�Remember- Delivery.The system must deliver data to the correctdestination.

- Accuracy.The system must deliver the data accurately.

- Timeliness.The system must deliver data in a timelymanner.

- Jitter.Jitter refers to the variation in the packetarrival time.

�Remember- Delivery.The system must deliver data to the correctdestination.

- Accuracy.The system must deliver the data accurately.

- Timeliness.The system must deliver data in a timelymanner.

- Jitter.Jitter refers to the variation in the packetarrival time.

Notes

Notes

Page 11: Data communication part1

�Remember- Delivery.The system must deliver data to the correctdestination.

- Accuracy.The system must deliver the data accurately.

- Timeliness.The system must deliver data in a timelymanner.

- Jitter.Jitter refers to the variation in the packetarrival time.

What is a Network?Notes

Notes

Page 12: Data communication part1

What is a Network?- A set of communication devices (nodes)connected by media links capable of carryingdifferent types of communications.

�Remember

- DevicesThese are used to communicate with oneanother.

- MediumThis is how the devices are connected together.

- MessagesInformation that travels over the medium.

- Rules / ProtocolGoverns how messages flow across network.

Notes

Notes

Page 13: Data communication part1

�Remember

- DevicesThese are used to communicate with oneanother.

- MediumThis is how the devices are connected together.

- MessagesInformation that travels over the medium.

- Rules / ProtocolGoverns how messages flow across network.

�Remember

- DevicesThese are used to communicate with oneanother.

- MediumThis is how the devices are connected together.

- MessagesInformation that travels over the medium.

- Rules / ProtocolGoverns how messages flow across network.

Notes

Notes

Page 14: Data communication part1

�Remember

- DevicesThese are used to communicate with oneanother.

- MediumThis is how the devices are connected together.

- MessagesInformation that travels over the medium.

- Rules / ProtocolGoverns how messages flow across network.

Computer NetworkNotes

Notes

Page 15: Data communication part1

Computer Network- A network of "computers".

Why Network Computers?

- To increase productivity by linking computersand computer networks allowing users to shareresources and data. Ex.

- Data and applications- Resources, i.e. I/O devices like cameras &printers

- Network Storage- Backup devices

Notes

Notes

Page 16: Data communication part1

Why Network Computers?

- To increase productivity by linking computersand computer networks allowing users to shareresources and data. Ex.

- Data and applications- Resources, i.e. I/O devices like cameras &printers

- Network Storage- Backup devices

Why Network Computers?

- To increase productivity by linking computersand computer networks allowing users to shareresources and data. Ex.

- Data and applications

- Resources, i.e. I/O devices like cameras &printers

- Network Storage- Backup devices

Notes

Notes

Page 17: Data communication part1

Why Network Computers?

- To increase productivity by linking computersand computer networks allowing users to shareresources and data. Ex.

- Data and applications- Resources, i.e. I/O devices like cameras &printers

- Network Storage- Backup devices

Why Network Computers?

- To increase productivity by linking computersand computer networks allowing users to shareresources and data. Ex.

- Data and applications- Resources, i.e. I/O devices like cameras &printers

- Network Storage

- Backup devices

Notes

Notes

Page 18: Data communication part1

Why Network Computers?

- To increase productivity by linking computersand computer networks allowing users to shareresources and data. Ex.

- Data and applications- Resources, i.e. I/O devices like cameras &printers

- Network Storage- Backup devices

Why Network Computers?- Reduced Cost and Easier Installation ofSoftware.

- Ex. Network installation

Notes

Notes

Page 19: Data communication part1

Why Network Computers?

- Improved Security

- Improved Communications- More Workplace Flexibility- Reduced Cost of Peripherals- Centralized Administration

Why Network Computers?

- Improved Security- Improved Communications

- More Workplace Flexibility- Reduced Cost of Peripherals- Centralized Administration

Notes

Notes

Page 20: Data communication part1

Why Network Computers?

- Improved Security- Improved Communications- More Workplace Flexibility

- Reduced Cost of Peripherals- Centralized Administration

Why Network Computers?

- Improved Security- Improved Communications- More Workplace Flexibility- Reduced Cost of Peripherals

- Centralized Administration

Notes

Notes

Page 21: Data communication part1

Why Network Computers?

- Improved Security- Improved Communications- More Workplace Flexibility- Reduced Cost of Peripherals- Centralized Administration

Network Requirements?

- At least two computers

- A resource that needs to be shared- A transmission medium- A communications agreement

Notes

Notes

Page 22: Data communication part1

Network Requirements?

- At least two computers- A resource that needs to be shared

- A transmission medium- A communications agreement

Network Requirements?

- At least two computers- A resource that needs to be shared- A transmission medium

- A communications agreement

Notes

Notes

Page 23: Data communication part1

Network Requirements?

- At least two computers- A resource that needs to be shared- A transmission medium- A communications agreement

Network CategoryBy type of MEDIA

- Wired and Wireless

Notes

Notes

Page 24: Data communication part1

Network Media- this is the channel over which a message travels

Network CategoryBy COVERAGE

Notes

Notes

Page 25: Data communication part1

Local Area NetworkLAN

- Can be as small as two computers.- Laboratory w/ networked computers.- A network within a building or severalbuildings.

- Speed at 10, 100, or 1000 Mbps

Local Area NetworkLAN

- Can be as small as two computers.

- Laboratory w/ networked computers.- A network within a building or severalbuildings.

- Speed at 10, 100, or 1000 Mbps

Notes

Notes

Page 26: Data communication part1

Local Area NetworkLAN

- Can be as small as two computers.- Laboratory w/ networked computers.

- A network within a building or severalbuildings.

- Speed at 10, 100, or 1000 Mbps

Local Area NetworkLAN

- Can be as small as two computers.- Laboratory w/ networked computers.- A network within a building or severalbuildings.

- Speed at 10, 100, or 1000 Mbps

Notes

Notes

Page 27: Data communication part1

Local Area NetworkLAN

- Can be as small as two computers.- Laboratory w/ networked computers.- A network within a building or severalbuildings.

- Speed at 10, 100, or 1000 Mbps

Metropolitan Area NetworkMAN

- covers the area inside a town or a city.- Ex. Cable TV network

Notes

Notes

Page 28: Data communication part1

Metropolitan Area NetworkMAN

- covers the area inside a town or a city.

- Ex. Cable TV network

Metropolitan Area NetworkMAN

- covers the area inside a town or a city.- Ex. Cable TV network

Notes

Notes

Page 29: Data communication part1

Wide Area NetworkWAN

- provides long-distance transmission of data,image, audio, and video information over largegeographic areas that may comprise a country,a continent, or even the whole world.

Wide Area NetworkWAN

- provides long-distance transmission of data,image, audio, and video information over largegeographic areas that may comprise a country,a continent, or even the whole world.

Notes

Notes

Page 30: Data communication part1

Interconnection of Networks:Internetwork

- Today, it is very rare to see a LAN, a MAN inisolation; they are connected to one another.

- When two or more networks are connected,they become an internetwork, or internet.

Interconnection of Networks:Internetwork

- Today, it is very rare to see a LAN, a MAN inisolation; they are connected to one another.

- When two or more networks are connected,they become an internetwork, or internet.

Notes

Notes

Page 31: Data communication part1

Interconnection of Networks:Internetwork

- Today, it is very rare to see a LAN, a MAN inisolation; they are connected to one another.

- When two or more networks are connected,they become an internetwork, or internet.

Example

- Assume that an organization has two offices,one in Manila and the other in Cebu. Theestablished office on Manila has a bus topologyLAN; the newly opened office on Cebu has astar topology LAN. The president of thecompany lives somewhere in the middle andneeds to have control over the company fromher home in Boracay.

Notes

Notes

Page 32: Data communication part1

Example- To create a backbone WAN for connectingthese three entities (two LANs and thepresident’s computer), a switched WAN(operated by a service provider such as atelecom company) has been leased. To connectthe LANs to this switched WAN, however,three point-to-point WANs are required. Thesepoint-to-point WANs can be a high-speed DSLline offered by a telephone company or a cablemodern line offered by a cable TV provider.

IllustrationFour WANs + two LANs

Notes

Notes

Page 33: Data communication part1

Virtual Private NetworkVPN

- It enables a host computer to send and receivedata across shared or public networks as if itwere a private network with all thefunctionality

Virtual Private NetworkVPN

- It enables a host computer to send and receivedata across shared or public networks as if itwere a private network with all thefunctionality

Notes

Notes

Page 34: Data communication part1

Other Networks- Campus Area Network, Corporate AreaNetwork (CAN)essentially a local area network.

- Personal Area Network (PAN)A network, typically of devices centered aroundthe user

- Wireless PAN (WPAN)a typical implementation of a PAN

- Sensor NetworksA specialized network of devices typically usedfor monitoring

Other Networks- Campus Area Network, Corporate AreaNetwork (CAN)essentially a local area network.

- Personal Area Network (PAN)A network, typically of devices centered aroundthe user

- Wireless PAN (WPAN)a typical implementation of a PAN

- Sensor NetworksA specialized network of devices typically usedfor monitoring

Notes

Notes

Page 35: Data communication part1

Other Networks- Campus Area Network, Corporate AreaNetwork (CAN)essentially a local area network.

- Personal Area Network (PAN)A network, typically of devices centered aroundthe user

- Wireless PAN (WPAN)a typical implementation of a PAN

- Sensor NetworksA specialized network of devices typically usedfor monitoring

Other Networks- Campus Area Network, Corporate AreaNetwork (CAN)essentially a local area network.

- Personal Area Network (PAN)A network, typically of devices centered aroundthe user

- Wireless PAN (WPAN)a typical implementation of a PAN

- Sensor NetworksA specialized network of devices typically usedfor monitoring

Notes

Notes

Page 36: Data communication part1

Network Topology

Network TopologyFour Basic Topologies

Notes

Notes

Page 37: Data communication part1

Mesh Topology- Every device has a dedicated point-to-pointlink to every other device.

Possible Quiz Question

- How many duplex-mode links do we have on amesh network with n nodes?

Notes

Notes

Page 38: Data communication part1

Mesh TopologyAdvantages

- Dedicated links guarantees that eachconnection can carry its own data load, thuseliminating the traffic problems.

- A mesh topology is robust.- The advantage of privacy or security.- Point-to-point links make fault identificationand fault isolation easy.

Mesh TopologyAdvantages

- Dedicated links guarantees that eachconnection can carry its own data load, thuseliminating the traffic problems.

- A mesh topology is robust.

- The advantage of privacy or security.- Point-to-point links make fault identificationand fault isolation easy.

Notes

Notes

Page 39: Data communication part1

Mesh TopologyAdvantages

- Dedicated links guarantees that eachconnection can carry its own data load, thuseliminating the traffic problems.

- A mesh topology is robust.- The advantage of privacy or security.

- Point-to-point links make fault identificationand fault isolation easy.

Mesh TopologyAdvantages

- Dedicated links guarantees that eachconnection can carry its own data load, thuseliminating the traffic problems.

- A mesh topology is robust.- The advantage of privacy or security.- Point-to-point links make fault identificationand fault isolation easy.

Notes

Notes

Page 40: Data communication part1

Mesh TopologyDisadvantages

- Installation and reconnection are difficultbecause every device must be connected toevery other device.

- Bulk of the wiring can be greater than theavailable space (in walls, ceilings, or floors) canaccommodate.

- Hardware required to connect each link (I/Oports and cable) can be prohibitively expensive.

Mesh TopologyDisadvantages

- Installation and reconnection are difficultbecause every device must be connected toevery other device.

- Bulk of the wiring can be greater than theavailable space (in walls, ceilings, or floors) canaccommodate.

- Hardware required to connect each link (I/Oports and cable) can be prohibitively expensive.

Notes

Notes

Page 41: Data communication part1

Mesh TopologyDisadvantages

- Installation and reconnection are difficultbecause every device must be connected toevery other device.

- Bulk of the wiring can be greater than theavailable space (in walls, ceilings, or floors) canaccommodate.

- Hardware required to connect each link (I/Oports and cable) can be prohibitively expensive.

Star Topology

- Each device has a dedicated point-to-point linkonly to a central controller, usually called ahub.

Notes

Notes

Page 42: Data communication part1

Star TopologyAdvantages

- Less expensive than a mesh topology.

- Easy to install and reconfigure.- Easy fault identification and fault isolation.- Relatively robust because if one link fails, onlythat link is affected.

Star TopologyAdvantages

- Less expensive than a mesh topology.- Easy to install and reconfigure.

- Easy fault identification and fault isolation.- Relatively robust because if one link fails, onlythat link is affected.

Notes

Notes

Page 43: Data communication part1

Star TopologyAdvantages

- Less expensive than a mesh topology.- Easy to install and reconfigure.- Easy fault identification and fault isolation.

- Relatively robust because if one link fails, onlythat link is affected.

Star TopologyAdvantages

- Less expensive than a mesh topology.- Easy to install and reconfigure.- Easy fault identification and fault isolation.- Relatively robust because if one link fails, onlythat link is affected.

Notes

Notes

Page 44: Data communication part1

Star TopologyDisadvantages

- Dependency of the whole topology on onesingle point, the hub. If the hub goes down, thewhole system is dead.

- Often more cabling is required in a star than insome other topologies (such as ring or bus).

Star TopologyDisadvantages

- Dependency of the whole topology on onesingle point, the hub. If the hub goes down, thewhole system is dead.

- Often more cabling is required in a star than insome other topologies (such as ring or bus).

Notes

Notes

Page 45: Data communication part1

Bus Topology

- One long cable acts as a backbone to link allthe devices in a network.

- Drop line is a connection running between thedevice and the main cable.

Bus TopologyAdvantages

- Ease of installation.

- Uses less cabling than mesh or star topologies,hence less expensive.

Notes

Notes

Page 46: Data communication part1

Bus TopologyAdvantages

- Ease of installation.- Uses less cabling than mesh or star topologies,hence less expensive.

Bus TopologyDisadvantages

- Difficult reconnection and fault isolation.

- Difficult to add new devices.- Signal reflection at the taps can causedegradation in quality.

- A fault or break in the bus cable stops alltransmission.

Notes

Notes

Page 47: Data communication part1

Bus TopologyDisadvantages

- Difficult reconnection and fault isolation.- Difficult to add new devices.

- Signal reflection at the taps can causedegradation in quality.

- A fault or break in the bus cable stops alltransmission.

Bus TopologyDisadvantages

- Difficult reconnection and fault isolation.- Difficult to add new devices.- Signal reflection at the taps can causedegradation in quality.

- A fault or break in the bus cable stops alltransmission.

Notes

Notes

Page 48: Data communication part1

Bus TopologyDisadvantages

- Difficult reconnection and fault isolation.- Difficult to add new devices.- Signal reflection at the taps can causedegradation in quality.

- A fault or break in the bus cable stops alltransmission.

Ring Topology- Each device has a dedicated point-to-pointconnection with only the two devices on eitherside of it.

- When a device receives a signal intended foranother device, its repeater regenerates the bitsand passes them along.

Notes

Notes

Page 49: Data communication part1

Ring TopologyAdvantages

- Easy to install and reconfigure.

- Fault isolation is simplified. Generally in a ring,a signal is circulating at all times. If one devicedoes not receive a signal within a specifiedperiod, it can issue an alarm.

Ring TopologyAdvantages

- Easy to install and reconfigure.- Fault isolation is simplified. Generally in a ring,a signal is circulating at all times. If one devicedoes not receive a signal within a specifiedperiod, it can issue an alarm.

Notes

Notes

Page 50: Data communication part1

Ring TopologyDisadvantages

- Unidirectional traffic can be a disadvantage. Ina simple ring, a break in the ring (such as adisabled station) can disable the entirenetwork.

- Today, the need for higher-speed LANs hasmade this topology less popular.

Ring TopologyDisadvantages

- Unidirectional traffic can be a disadvantage. Ina simple ring, a break in the ring (such as adisabled station) can disable the entirenetwork.

- Today, the need for higher-speed LANs hasmade this topology less popular.

Notes

Notes

Page 51: Data communication part1

Network ArchitectureAccording to Security Relationships

- Peer-to-peer Network (P2P).

- Client-server Network.

Network ArchitectureAccording to Security Relationships

- Peer-to-peer Network (P2P).- Client-server Network.

Notes

Notes

Page 52: Data communication part1

Peer-to-peer Network (P2P)Workgroup

- shared data is distributed on each computers.

Peer-to-peer Network (P2P)Workgroup

Notes

Notes

Page 53: Data communication part1

Peer-to-peer Network (P2P)Pros and Cons

- Advantages◦ Low cost◦ Easy to set up◦ No server required

- Disadvantages◦ No centralized control of security◦ Administrative burden of maintainingaccounts on all computers ◦ Not scalable

Peer-to-peer Network (P2P)Pros and Cons

- Advantages◦ Low cost◦ Easy to set up◦ No server required

- Disadvantages◦ No centralized control of security◦ Administrative burden of maintainingaccounts on all computers ◦ Not scalable

Notes

Notes

Page 54: Data communication part1

Client-server Network

- shared data is centralized on a device called afile server.

Client-server NetworkNotes

Notes

Page 55: Data communication part1

Client-server NetworkPros and Cons

- Advantages◦ Centralized administration◦ Single sign-on◦ Reduced broadcast traffic◦ Scalability

- Disadvantages◦ Higher cost◦ More challenging technically◦ Single point of failure with a single file server

Client-server NetworkPros and Cons

- Advantages◦ Centralized administration◦ Single sign-on◦ Reduced broadcast traffic◦ Scalability

- Disadvantages◦ Higher cost◦ More challenging technically◦ Single point of failure with a single file server

Notes

Notes

Page 56: Data communication part1

Network Transmission Modes

- Unicast (One-to-one).a single source host is sending information to asingle destination host

- Broadcast (One-to-many).a single host is sending information to all otherhosts on the network

- Multicast (One-to-some).a single host is sending a transmission to some,but not all hosts

Network Transmission Modes

- Unicast (One-to-one).a single source host is sending information to asingle destination host

- Broadcast (One-to-many).a single host is sending information to all otherhosts on the network

- Multicast (One-to-some).a single host is sending a transmission to some,but not all hosts

Notes

Notes

Page 57: Data communication part1

Network Transmission Modes

- Unicast (One-to-one).a single source host is sending information to asingle destination host

- Broadcast (One-to-many).a single host is sending information to all otherhosts on the network

- Multicast (One-to-some).a single host is sending a transmission to some,but not all hosts

Transmission ModesIllustration

Notes

Notes

Page 58: Data communication part1

Network Representations

Heirarchical TopologyCisco hierarchical model

- Core layer ==> backbone- Distribution layer ==> routing- Access layer ==> switching

Notes

Notes

Page 59: Data communication part1

Heirarchical TopologyCisco hierarchical model

- Core layer ==> backbone

- Distribution layer ==> routing- Access layer ==> switching

Heirarchical TopologyCisco hierarchical model

- Core layer ==> backbone- Distribution layer ==> routing

- Access layer ==> switching

Notes

Notes

Page 60: Data communication part1

Heirarchical TopologyCisco hierarchical model

- Core layer ==> backbone- Distribution layer ==> routing- Access layer ==> switching

Cisco hierarchical modelCore layer (Backbone)

- Literally the core of the network.- Switch large amounts of traffic both reliablyand quickly.

- If there is a failure in the core, every single usercan be affected.

Notes

Notes

Page 61: Data communication part1

Cisco hierarchical modelCore layer (Backbone)

- Literally the core of the network.

- Switch large amounts of traffic both reliablyand quickly.

- If there is a failure in the core, every single usercan be affected.

Cisco hierarchical modelCore layer (Backbone)

- Literally the core of the network.- Switch large amounts of traffic both reliablyand quickly.

- If there is a failure in the core, every single usercan be affected.

Notes

Notes

Page 62: Data communication part1

Cisco hierarchical modelCore layer (Backbone)

- Literally the core of the network.- Switch large amounts of traffic both reliablyand quickly.

- If there is a failure in the core, every single usercan be affected.

Cisco hierarchical modelDistribution layer (Routing)

- sometimes referred to as the workgroup layer.- provides routing, filtering, and WAN accessand to determine how packets can access thecore, if needed.

- Place to implement security and policies for thenetwork including address translation andfirewalls.

Notes

Notes

Page 63: Data communication part1

Cisco hierarchical modelDistribution layer (Routing)

- sometimes referred to as the workgroup layer.

- provides routing, filtering, and WAN accessand to determine how packets can access thecore, if needed.

- Place to implement security and policies for thenetwork including address translation andfirewalls.

Cisco hierarchical modelDistribution layer (Routing)

- sometimes referred to as the workgroup layer.- provides routing, filtering, and WAN accessand to determine how packets can access thecore, if needed.

- Place to implement security and policies for thenetwork including address translation andfirewalls.

Notes

Notes

Page 64: Data communication part1

Cisco hierarchical modelDistribution layer (Routing)

- sometimes referred to as the workgroup layer.- provides routing, filtering, and WAN accessand to determine how packets can access thecore, if needed.

- Place to implement security and policies for thenetwork including address translation andfirewalls.

Cisco hierarchical modelAccess layer (Switching)

- sometimes referred to as the desktop layer.- controls user and workgroup access tointernetwork resources.

- segmentation

Notes

Notes

Page 65: Data communication part1

Cisco hierarchical modelAccess layer (Switching)

- sometimes referred to as the desktop layer.

- controls user and workgroup access tointernetwork resources.

- segmentation

Cisco hierarchical modelAccess layer (Switching)

- sometimes referred to as the desktop layer.- controls user and workgroup access tointernetwork resources.

- segmentation

Notes

Notes

Page 66: Data communication part1

Cisco hierarchical modelAccess layer (Switching)

- sometimes referred to as the desktop layer.- controls user and workgroup access tointernetwork resources.

- segmentation

Structure of the Internet

- Hierarchical- Common standards- Common protocols

Notes

Notes

Page 67: Data communication part1

Structure of the Internet- Hierarchical

- Common standards- Common protocols

Structure of the Internet- Hierarchical- Common standards

- Common protocols

Notes

Notes

Page 68: Data communication part1

Structure of the Internet- Hierarchical- Common standards- Common protocols

Access NetworksConnects end hosts to the network core

RESIDENTIAL ACCESS:

- Dial-up modem via Public Switched TelephoneNetwork

- DSL- Cable Broadband- Wireless Broadband (Wimax, etc.)- FTTH

ACCESS WITHIN ENTERPRISE LAN’s:

- Ethernet/IEEE 802.3 and Wifi

Notes

Notes

Page 69: Data communication part1

Access NetworksConnects end hosts to the network core

RESIDENTIAL ACCESS:

- Dial-up modem via Public Switched TelephoneNetwork

- DSL- Cable Broadband- Wireless Broadband (Wimax, etc.)- FTTH

ACCESS WITHIN ENTERPRISE LAN’s:

- Ethernet/IEEE 802.3 and Wifi

Access NetworksConnects end hosts to the network core

RESIDENTIAL ACCESS:

- Dial-up modem via Public Switched TelephoneNetwork

- DSL

- Cable Broadband- Wireless Broadband (Wimax, etc.)- FTTH

ACCESS WITHIN ENTERPRISE LAN’s:

- Ethernet/IEEE 802.3 and Wifi

Notes

Notes

Page 70: Data communication part1

Access NetworksConnects end hosts to the network core

RESIDENTIAL ACCESS:

- Dial-up modem via Public Switched TelephoneNetwork

- DSL- Cable Broadband

- Wireless Broadband (Wimax, etc.)- FTTH

ACCESS WITHIN ENTERPRISE LAN’s:

- Ethernet/IEEE 802.3 and Wifi

Access NetworksConnects end hosts to the network core

RESIDENTIAL ACCESS:

- Dial-up modem via Public Switched TelephoneNetwork

- DSL- Cable Broadband- Wireless Broadband (Wimax, etc.)

- FTTHACCESS WITHIN ENTERPRISE LAN’s:

- Ethernet/IEEE 802.3 and Wifi

Notes

Notes

Page 71: Data communication part1

Access NetworksConnects end hosts to the network core

RESIDENTIAL ACCESS:

- Dial-up modem via Public Switched TelephoneNetwork

- DSL- Cable Broadband- Wireless Broadband (Wimax, etc.)- FTTH

ACCESS WITHIN ENTERPRISE LAN’s:

- Ethernet/IEEE 802.3 and Wifi

Access NetworksConnects end hosts to the network core

RESIDENTIAL ACCESS:

- Dial-up modem via Public Switched TelephoneNetwork

- DSL- Cable Broadband- Wireless Broadband (Wimax, etc.)- FTTH

ACCESS WITHIN ENTERPRISE LAN’s:

- Ethernet/IEEE 802.3 and Wifi

Notes

Notes

Page 72: Data communication part1

WAN Technologies

- Links the components of the Internetwork core.- Includes:X.25Frame RelayISDN, BISDNATMSONET/SDH

WAN Technologies

- Links the components of the Internetwork core.

- Includes:X.25Frame RelayISDN, BISDNATMSONET/SDH

Notes

Notes

Page 73: Data communication part1

WAN Technologies

- Links the components of the Internetwork core.- Includes:X.25Frame RelayISDN, BISDNATMSONET/SDH

Packet SwitchingThe Internet and other computer networks usepacket switching

- A persistent path for signals/data (circuit) isnot necessary for duration of communications.

- Data is broken down into chunks (packets) andeach piece is sent through the network.

- Each packet may take various paths throughthe network.

- Packets may arrive out of sequence.

Notes

Notes

Page 74: Data communication part1

Packet SwitchingThe Internet and other computer networks usepacket switching

- A persistent path for signals/data (circuit) isnot necessary for duration of communications.

- Data is broken down into chunks (packets) andeach piece is sent through the network.

- Each packet may take various paths throughthe network.

- Packets may arrive out of sequence.

Packet SwitchingThe Internet and other computer networks usepacket switching

- A persistent path for signals/data (circuit) isnot necessary for duration of communications.

- Data is broken down into chunks (packets) andeach piece is sent through the network.

- Each packet may take various paths throughthe network.

- Packets may arrive out of sequence.

Notes

Notes

Page 75: Data communication part1

Packet SwitchingThe Internet and other computer networks usepacket switching

- A persistent path for signals/data (circuit) isnot necessary for duration of communications.

- Data is broken down into chunks (packets) andeach piece is sent through the network.

- Each packet may take various paths throughthe network.

- Packets may arrive out of sequence.

Packet SwitchingThe Internet and other computer networks usepacket switching

- A persistent path for signals/data (circuit) isnot necessary for duration of communications.

- Data is broken down into chunks (packets) andeach piece is sent through the network.

- Each packet may take various paths throughthe network.

- Packets may arrive out of sequence.

Notes

Notes

Page 76: Data communication part1

Packet Switching

�Remember- X.25 (64-kbps)A virtual-circuit switching network withextensive flow and error control.

- Frame Relay (1.544 - 44.376 Mbps)uses variable-length packets, called frames;strips out most of the overhead involved witherror control.

- Asynchronous transfer mode (ATM)uses fixed-length packets, called cells.(10s, 100s of Mbps, and Gbps range)

Notes

Notes

Page 77: Data communication part1

�Remember- X.25 (64-kbps)A virtual-circuit switching network withextensive flow and error control.

- Frame Relay (1.544 - 44.376 Mbps)uses variable-length packets, called frames;strips out most of the overhead involved witherror control.

- Asynchronous transfer mode (ATM)uses fixed-length packets, called cells.(10s, 100s of Mbps, and Gbps range)

�Remember- X.25 (64-kbps)A virtual-circuit switching network withextensive flow and error control.

- Frame Relay (1.544 - 44.376 Mbps)uses variable-length packets, called frames;strips out most of the overhead involved witherror control.

- Asynchronous transfer mode (ATM)uses fixed-length packets, called cells.(10s, 100s of Mbps, and Gbps range)

Notes

Notes

Page 78: Data communication part1

Quality of ServiceQoS

- treat different traffic flows differently.

Quality of ServiceQoS

- treat different traffic flows differently.

Notes

Notes

Page 79: Data communication part1

Quality of ServiceQoS

- ensure quality of service for applications that require it.

Quality of ServiceQoS

- ensure quality of service for applications that require it.

Notes

Notes

Page 80: Data communication part1

Quality of ServiceQoS

- appropriate QoS strategy for a given type of traffic.

Quality of ServiceQoS

- appropriate QoS strategy for a given type of traffic.

Notes

Notes

Page 81: Data communication part1

ProtocolsRules

- shared conventions for communicatinginformation.

- defines WHAT is communicated, HOW it iscommunicated, and WHEN it is communicated.

- Protocols specifySyntax: Data format, and Signal levelsSemantics: Meaning of each bit section; Flowcontrol, Error handlingTiming: Speed match, and Sequencing

ProtocolsRules

- shared conventions for communicatinginformation.

- defines WHAT is communicated, HOW it iscommunicated, and WHEN it is communicated.

- Protocols specifySyntax: Data format, and Signal levelsSemantics: Meaning of each bit section; Flowcontrol, Error handlingTiming: Speed match, and Sequencing

Notes

Notes

Page 82: Data communication part1

ProtocolsRules

- shared conventions for communicatinginformation.

- defines WHAT is communicated, HOW it iscommunicated, and WHEN it is communicated.

- Protocols specifySyntax: Data format, and Signal levelsSemantics: Meaning of each bit section; Flowcontrol, Error handlingTiming: Speed match, and Sequencing

ProtocolsRules

- shared conventions for communicatinginformation.

- defines WHAT is communicated, HOW it iscommunicated, and WHEN it is communicated.

- Protocols specifySyntax: Data format, and Signal levelsSemantics: Meaning of each bit section; Flowcontrol, Error handlingTiming: Speed match, and Sequencing

Notes

Notes

Page 83: Data communication part1

ProtocolsIllustration

Protocol Architecture

- specifies how a protocol is organized andimplemented.

- layered structure of hardware and software thatsupports the exchange of data between systemsand supports distributed applications, such asemail and file transfer.

- at each layer of a protocol architecture, one ormore common protocols are implemented incommunicating systems.

Notes

Notes

Page 84: Data communication part1

Protocol Architecture

- specifies how a protocol is organized andimplemented.

- layered structure of hardware and software thatsupports the exchange of data between systemsand supports distributed applications, such asemail and file transfer.

- at each layer of a protocol architecture, one ormore common protocols are implemented incommunicating systems.

Protocol Architecture

- specifies how a protocol is organized andimplemented.

- layered structure of hardware and software thatsupports the exchange of data between systemsand supports distributed applications, such asemail and file transfer.

- at each layer of a protocol architecture, one ormore common protocols are implemented incommunicating systems.

Notes

Notes

Page 85: Data communication part1

Protocol Architecture

- specifies how a protocol is organized andimplemented.

- layered structure of hardware and software thatsupports the exchange of data between systemsand supports distributed applications, such asemail and file transfer.

- at each layer of a protocol architecture, one ormore common protocols are implemented incommunicating systems.

Protocol Architecture- Two approaches1. Monolithic (single module)2. Modular (layered)

- Advantages of Modular Approach1. Breaks complex tasks into subtasks.2. Changes in one layer do not affect otherlayers.

Notes

Notes

Page 86: Data communication part1

Protocol Architecture- Two approaches1. Monolithic (single module)2. Modular (layered)

- Advantages of Modular Approach1. Breaks complex tasks into subtasks.2. Changes in one layer do not affect otherlayers.

Layered ModelIllustration

Notes

Notes

Page 87: Data communication part1

Layered Protocol Architecture

- Each layers acts as a module.

- Communication occurs1. between different modules on the samesystem2. between similar modules on different systems

Layered Protocol Architecture

- Each layers acts as a module.- Communication occurs1. between different modules on the samesystem2. between similar modules on different systems

Notes

Notes

Page 88: Data communication part1

Layered ArchitectureExample

- Open Systems Interconnection model (OSI).

OSI Reference Model

- layered framework developed by InternationalOrganization for Standardization (ISO) for thedesign of network systems that allowscommunication between all types of computersystems.

- consists of seven separate but related layers,each of which defines a part of the process ofmoving information across a network.

- not a protocol; it is a reference model.

Notes

Notes

Page 89: Data communication part1

OSI Reference Model

- layered framework developed by InternationalOrganization for Standardization (ISO) for thedesign of network systems that allowscommunication between all types of computersystems.

- consists of seven separate but related layers,each of which defines a part of the process ofmoving information across a network.

- not a protocol; it is a reference model.

OSI Reference Model

- layered framework developed by InternationalOrganization for Standardization (ISO) for thedesign of network systems that allowscommunication between all types of computersystems.

- consists of seven separate but related layers,each of which defines a part of the process ofmoving information across a network.

- not a protocol; it is a reference model.

Notes

Notes

Page 90: Data communication part1

OSI Reference Model

OSI Reference ModelHost-to-host link

Notes

Notes

Page 91: Data communication part1

OSI Model Layers

- Layers 1, 2, and 3 - physical, data link, andnetwork - are the network support layers

- they deal with the physical aspects of movingdata from one device to another (such aselectrical specifications, physical connections,physical addressing, and transport timing andreliability)

OSI Model Layers

- Layers 1, 2, and 3 - physical, data link, andnetwork - are the network support layers

- they deal with the physical aspects of movingdata from one device to another (such aselectrical specifications, physical connections,physical addressing, and transport timing andreliability)

Notes

Notes

Page 92: Data communication part1

OSI Model Layers

- Layers 5, 6, and 7 - session, presentation, andapplication - can be thought of as the usersupport layers;they allow interoperability among unrelatedsoftware systems.

- Layer 4, the transport layer, links the twosubgroups and ensures that what the lowerlayers have transmitted is in a form that theupper layers can use.

OSI Model Layers

- Layers 5, 6, and 7 - session, presentation, andapplication - can be thought of as the usersupport layers;they allow interoperability among unrelatedsoftware systems.

- Layer 4, the transport layer, links the twosubgroups and ensures that what the lowerlayers have transmitted is in a form that theupper layers can use.

Notes

Notes

Page 93: Data communication part1

Physical Layer (PHY)

- is responsible for movements of individual bitsfrom one hop (node) to the next.

Physical Layer (PHY)

- coordinates the functions required to carry abit stream over a physical medium.

- deals with the mechanical and electricalspecifications of the interface and transmissionmedium.

- defines the procedures and functions thatphysical devices and interfaces have to performfor transmission to occur

Notes

Notes

Page 94: Data communication part1

Physical Layer (PHY)

- coordinates the functions required to carry abit stream over a physical medium.

- deals with the mechanical and electricalspecifications of the interface and transmissionmedium.

- defines the procedures and functions thatphysical devices and interfaces have to performfor transmission to occur

Physical Layer (PHY)

- coordinates the functions required to carry abit stream over a physical medium.

- deals with the mechanical and electricalspecifications of the interface and transmissionmedium.

- defines the procedures and functions thatphysical devices and interfaces have to performfor transmission to occur

Notes

Notes

Page 95: Data communication part1

Physical Layer Concerns

- Physical characteristics of interfaces andmedium.

- Representation of bits.- Data rate.- Synchronization of bits.- Physical topology.- Line configuration.- Transmission mode.

Physical Layer Concerns

- Physical characteristics of interfaces andmedium.

- Representation of bits.

- Data rate.- Synchronization of bits.- Physical topology.- Line configuration.- Transmission mode.

Notes

Notes

Page 96: Data communication part1

Physical Layer Concerns

- Physical characteristics of interfaces andmedium.

- Representation of bits.- Data rate.

- Synchronization of bits.- Physical topology.- Line configuration.- Transmission mode.

Physical Layer Concerns

- Physical characteristics of interfaces andmedium.

- Representation of bits.- Data rate.- Synchronization of bits.

- Physical topology.- Line configuration.- Transmission mode.

Notes

Notes

Page 97: Data communication part1

Physical Layer Concerns

- Physical characteristics of interfaces andmedium.

- Representation of bits.- Data rate.- Synchronization of bits.- Physical topology.

- Line configuration.- Transmission mode.

Physical Layer Concerns

- Physical characteristics of interfaces andmedium.

- Representation of bits.- Data rate.- Synchronization of bits.- Physical topology.- Line configuration.

- Transmission mode.

Notes

Notes

Page 98: Data communication part1

Physical Layer Concerns

- Physical characteristics of interfaces andmedium.

- Representation of bits.- Data rate.- Synchronization of bits.- Physical topology.- Line configuration.- Transmission mode.

�RememberLine Configurationconnection of devices to the media.

- Point-to-point configurationtwo devices are connected through a dedicatedlink.

- Multipoint configurationa link is shared among several devices

Notes

Notes

Page 99: Data communication part1

�RememberLine Configurationconnection of devices to the media.

- Point-to-point configurationtwo devices are connected through a dedicatedlink.

- Multipoint configurationa link is shared among several devices

�RememberTransmission modedirection of transmission between two devices.

- Simplex modeonly one device can send; the other can onlyreceive.

- Half-duplex modetwo devices can send and receive, but not atthe same time.

- Full-duplex modetwo devices can send and receive at the sametime.

Notes

Notes

Page 100: Data communication part1

�RememberTransmission modedirection of transmission between two devices.

- Simplex modeonly one device can send; the other can onlyreceive.

- Half-duplex modetwo devices can send and receive, but not atthe same time.

- Full-duplex modetwo devices can send and receive at the sametime.

�RememberTransmission modedirection of transmission between two devices.

- Simplex modeonly one device can send; the other can onlyreceive.

- Half-duplex modetwo devices can send and receive, but not atthe same time.

- Full-duplex modetwo devices can send and receive at the sametime.

Notes

Notes

Page 101: Data communication part1

Transmission modeData flow(simplex, half-duplex, and full-duplex)

Data Link Layer (DLL)or simply Link Layer

- is responsible for moving frames from one hop(node) to the next.

Notes

Notes

Page 102: Data communication part1

Data Link Layer (DLL)

- transforms the physical layer, a rawtransmission facility, to a reliable link.

- makes the physical layer appear error-free tothe upper layer (network layer).

Data Link Layer (DLL)

- transforms the physical layer, a rawtransmission facility, to a reliable link.

- makes the physical layer appear error-free tothe upper layer (network layer).

Notes

Notes

Page 103: Data communication part1

Data Link Layer Concerns- Framingdivides the stream of bits received from thenetwork layer into manageable data unitscalled frames

- Physical addressingadds a header to the frame to define the senderand/or receiver of the frame. If the frame isintended for a system outside the sender’snetwork, the receiver address is the address ofthe device that connects the network to thenext one.

Data Link Layer Concerns- Framingdivides the stream of bits received from thenetwork layer into manageable data unitscalled frames

- Physical addressingadds a header to the frame to define the senderand/or receiver of the frame. If the frame isintended for a system outside the sender’snetwork, the receiver address is the address ofthe device that connects the network to thenext one.

Notes

Notes

Page 104: Data communication part1

Data Link Layer (DLL)Hop-to-hop delivery

- communication at the data link layer occursbetween two adjacent nodes

Data Link Layer Concerns- Flow controlimposes a flow control mechanism to avoidoverwhelming the receiver.

- Error controlAdds reliability to the physical layer by addingmechanisms to detect and retransmit damagedor lost frames.

- Access controlin multipoint configuration, link layer protocolsare necessary to determine which device hascontrol over the link at any given time.

Notes

Notes

Page 105: Data communication part1

Data Link Layer Concerns- Flow controlimposes a flow control mechanism to avoidoverwhelming the receiver.

- Error controlAdds reliability to the physical layer by addingmechanisms to detect and retransmit damagedor lost frames.

- Access controlin multipoint configuration, link layer protocolsare necessary to determine which device hascontrol over the link at any given time.

Data Link Layer Concerns- Flow controlimposes a flow control mechanism to avoidoverwhelming the receiver.

- Error controlAdds reliability to the physical layer by addingmechanisms to detect and retransmit damagedor lost frames.

- Access controlin multipoint configuration, link layer protocolsare necessary to determine which device hascontrol over the link at any given time.

Notes

Notes

Page 106: Data communication part1

Data Link Layer Example

- Ethernet (802.3) and Media Access Control(MAC) address applied to the network adaptorby the manufacturer during production.

Network Layer

- is responsible for the delivery of individual packetsfrom the source host to the destination host.

Notes

Notes

Page 107: Data communication part1

Network Layer

- ensures that each packet gets from its point oforigin to its final destination.

- If two systems are connected to the same link,there is usually no need for a network layer.

- If the two systems are attached to differentnetworks with connecting devices between thenetworks, there is often a need for the networklayer to accomplish source-to-destinationdelivery.

Network Layer

- ensures that each packet gets from its point oforigin to its final destination.

- If two systems are connected to the same link,there is usually no need for a network layer.

- If the two systems are attached to differentnetworks with connecting devices between thenetworks, there is often a need for the networklayer to accomplish source-to-destinationdelivery.

Notes

Notes

Page 108: Data communication part1

Network Layer

- ensures that each packet gets from its point oforigin to its final destination.

- If two systems are connected to the same link,there is usually no need for a network layer.

- If the two systems are attached to differentnetworks with connecting devices between thenetworks, there is often a need for the networklayer to accomplish source-to-destinationdelivery.

Network Layer Concerns

- Logical addressingif a packet passes the network boundary, weneed another addressing system to helpdistinguish the source and destination systems.

- Routingprovides mechanism to route or set the path ofthe packets to their final destination

Notes

Notes

Page 109: Data communication part1

Network Layer Concerns

- Logical addressingif a packet passes the network boundary, weneed another addressing system to helpdistinguish the source and destination systems.

- Routingprovides mechanism to route or set the path ofthe packets to their final destination

Network LayerNotes

Notes

Page 110: Data communication part1

Transport Layer- is responsible for process-to-process delivery ofthe entire message.

- a process is an application program running ona host.

Transport Layer- is responsible for process-to-process delivery ofthe entire message.

- a process is an application program running ona host.

Notes

Notes

Page 111: Data communication part1

Transport Layer

- ensures that the whole message arrives intactand in order.

�Understand- The network layer gets each packet to thecorrect computer; the transport layer gets theentire message to the correct process on thatcomputer.

- Network layer does not recognize anyrelationship between the packets it delivers andtreats each one independently.

- The transport layer, however, ensures that thewhole message arrives intact and in order,overseeing both error control and flow control.

Notes

Notes

Page 112: Data communication part1

�Understand- The network layer gets each packet to thecorrect computer; the transport layer gets theentire message to the correct process on thatcomputer.

- Network layer does not recognize anyrelationship between the packets it delivers andtreats each one independently.

- The transport layer, however, ensures that thewhole message arrives intact and in order,overseeing both error control and flow control.

�Understand- The network layer gets each packet to thecorrect computer; the transport layer gets theentire message to the correct process on thatcomputer.

- Network layer does not recognize anyrelationship between the packets it delivers andtreats each one independently.

- The transport layer, however, ensures that thewhole message arrives intact and in order,overseeing both error control and flow control.

Notes

Notes

Page 113: Data communication part1

Transport Layer Concerns

- Service-point addressingaddress for delivery from a specific process(running program) on one computer to aspecific process (running program) on theother.

- Segmentation and reassemblymessage is divided into transmittable segments,with each segment containing a sequencenumbers enabling the transport layer toreassemble the message correctly.

Transport Layer Concerns

- Service-point addressingaddress for delivery from a specific process(running program) on one computer to aspecific process (running program) on theother.

- Segmentation and reassemblymessage is divided into transmittable segments,with each segment containing a sequencenumbers enabling the transport layer toreassemble the message correctly.

Notes

Notes

Page 114: Data communication part1

Transport Layer Concerns

- Connection controleither connectionless or connection-oriented.

- End-to-end Flow control- Process-to-process Error control- Transport layer protocol and the port number

Transport Layer Concerns

- Connection controleither connectionless or connection-oriented.

- End-to-end Flow control

- Process-to-process Error control- Transport layer protocol and the port number

Notes

Notes

Page 115: Data communication part1

Transport Layer Concerns

- Connection controleither connectionless or connection-oriented.

- End-to-end Flow control- Process-to-process Error control

- Transport layer protocol and the port number

Transport Layer Concerns

- Connection controleither connectionless or connection-oriented.

- End-to-end Flow control- Process-to-process Error control- Transport layer protocol and the port number

Notes

Notes

Page 116: Data communication part1

Session Layer- is responsible for dialog control andsynchronization.

- establishes, maintains, & synchronizes theinteraction among communicating systems.

Session Layer- is responsible for dialog control andsynchronization.

- establishes, maintains, & synchronizes theinteraction among communicating systems.

Notes

Notes

Page 117: Data communication part1

Session Layer Concerns

- Dialog controlallows two systems to enter into a dialogallows the communication between twoprocesses to take place in either half-duplex orfull-duplex mode.

- Synchronizationallows a process to add checkpoints, orsynchronization points, to a stream of data.

Session Layer Concerns

- Dialog controlallows two systems to enter into a dialogallows the communication between twoprocesses to take place in either half-duplex orfull-duplex mode.

- Synchronizationallows a process to add checkpoints, orsynchronization points, to a stream of data.

Notes

Notes

Page 118: Data communication part1

Presentation Layer

- is responsible for translation, compression, andencryption.

- concerned with the syntax and semantics of theinformation exchanged between two systems.

Presentation Layer

- is responsible for translation, compression, andencryption.

- concerned with the syntax and semantics of theinformation exchanged between two systems.

Notes

Notes

Page 119: Data communication part1

Presentation Layer Concerns

- Translationresponsible for interoperability betweendifferent encoding methods

- Encryptionthe sender transforms the original informationto another form and sends the resultingmessage.

- Compressionreduce the number of bits.

Presentation Layer Concerns

- Translationresponsible for interoperability betweendifferent encoding methods

- Encryptionthe sender transforms the original informationto another form and sends the resultingmessage.

- Compressionreduce the number of bits.

Notes

Notes

Page 120: Data communication part1

Presentation Layer Concerns

- Translationresponsible for interoperability betweendifferent encoding methods

- Encryptionthe sender transforms the original informationto another form and sends the resultingmessage.

- Compressionreduce the number of bits.

Presentation Layer Examples

- JPEG- Joint Photographic Experts Group

- MPEG- The Moving Picture Experts Group’sstandard

- MIDI- Musical Instrument Digital Interface- TIFF- Tagged Image File Format

Notes

Notes

Page 121: Data communication part1

Presentation Layer Examples

- JPEG- Joint Photographic Experts Group- MPEG- The Moving Picture Experts Group’sstandard

- MIDI- Musical Instrument Digital Interface- TIFF- Tagged Image File Format

Presentation Layer Examples

- JPEG- Joint Photographic Experts Group- MPEG- The Moving Picture Experts Group’sstandard

- MIDI- Musical Instrument Digital Interface

- TIFF- Tagged Image File Format

Notes

Notes

Page 122: Data communication part1

Presentation Layer Examples

- JPEG- Joint Photographic Experts Group- MPEG- The Moving Picture Experts Group’sstandard

- MIDI- Musical Instrument Digital Interface- TIFF- Tagged Image File Format

Application Layer- is responsible for providing services to the user.

- enables the user, whether human or software,to access the network.

Notes

Notes

Page 123: Data communication part1

Application Layer- is responsible for providing services to the user.- enables the user, whether human or software,to access the network.

Application LayerThe Interface Between Human and Data Networks

Notes

Notes

Page 124: Data communication part1

Application LayerThe Interface Between Human and Data Networks

Application Layer Concerns

- Network virtual terminala software version of a physical terminal, and itallows a user to log on to a remote host.

- File transfer, access, and managementallows a user to access files in a remote host,and to manage or control files

- Mail services- Directory services

Notes

Notes

Page 125: Data communication part1

Application Layer Concerns

- Network virtual terminala software version of a physical terminal, and itallows a user to log on to a remote host.

- File transfer, access, and managementallows a user to access files in a remote host,and to manage or control files

- Mail services- Directory services

Application Layer Concerns

- Network virtual terminala software version of a physical terminal, and itallows a user to log on to a remote host.

- File transfer, access, and managementallows a user to access files in a remote host,and to manage or control files

- Mail services

- Directory services

Notes

Notes

Page 126: Data communication part1

Application Layer Concerns

- Network virtual terminala software version of a physical terminal, and itallows a user to log on to a remote host.

- File transfer, access, and managementallows a user to access files in a remote host,and to manage or control files

- Mail services- Directory services

Application LayerNotes

Notes

Page 127: Data communication part1

Application Layer Examples

- World Wide Web (WWW)

- E-mail gateways- Internet navigation utilities- Financial transaction services- Domain Name System (DNS) queries- File Transfer Protocol (FTP) transfers- Simple Mail Transfer Protocol (SMTP) emailtransfers

Application Layer Examples

- World Wide Web (WWW)- E-mail gateways

- Internet navigation utilities- Financial transaction services- Domain Name System (DNS) queries- File Transfer Protocol (FTP) transfers- Simple Mail Transfer Protocol (SMTP) emailtransfers

Notes

Notes

Page 128: Data communication part1

Application Layer Examples

- World Wide Web (WWW)- E-mail gateways- Internet navigation utilities

- Financial transaction services- Domain Name System (DNS) queries- File Transfer Protocol (FTP) transfers- Simple Mail Transfer Protocol (SMTP) emailtransfers

Application Layer Examples

- World Wide Web (WWW)- E-mail gateways- Internet navigation utilities- Financial transaction services

- Domain Name System (DNS) queries- File Transfer Protocol (FTP) transfers- Simple Mail Transfer Protocol (SMTP) emailtransfers

Notes

Notes

Page 129: Data communication part1

Application Layer Examples

- World Wide Web (WWW)- E-mail gateways- Internet navigation utilities- Financial transaction services- Domain Name System (DNS) queries

- File Transfer Protocol (FTP) transfers- Simple Mail Transfer Protocol (SMTP) emailtransfers

Application Layer Examples

- World Wide Web (WWW)- E-mail gateways- Internet navigation utilities- Financial transaction services- Domain Name System (DNS) queries- File Transfer Protocol (FTP) transfers

- Simple Mail Transfer Protocol (SMTP) emailtransfers

Notes

Notes

Page 130: Data communication part1

Application Layer Examples

- World Wide Web (WWW)- E-mail gateways- Internet navigation utilities- Financial transaction services- Domain Name System (DNS) queries- File Transfer Protocol (FTP) transfers- Simple Mail Transfer Protocol (SMTP) emailtransfers

OSI Reference ModelData exchange and Encapsulation

Notes

Notes

Page 131: Data communication part1

Data Encapsulation

- To communicate and exchange information,each layer uses Protocol Data Units (PDUs).These hold the control information attached tothe data at each layer of the model.

- The data portion at levelN – 1 carries the whole PDU (data and headerand maybe trailer) from level N.

- For level N – 1, the whole PDU coming fromlevel N is treated as one integral unit.

Data Encapsulation

- To communicate and exchange information,each layer uses Protocol Data Units (PDUs).These hold the control information attached tothe data at each layer of the model.

- The data portion at levelN – 1 carries the whole PDU (data and headerand maybe trailer) from level N.

- For level N – 1, the whole PDU coming fromlevel N is treated as one integral unit.

Notes

Notes

Page 132: Data communication part1

Data Encapsulation

- To communicate and exchange information,each layer uses Protocol Data Units (PDUs).These hold the control information attached tothe data at each layer of the model.

- The data portion at levelN – 1 carries the whole PDU (data and headerand maybe trailer) from level N.

- For level N – 1, the whole PDU coming fromlevel N is treated as one integral unit.

Data EncapsulationNotes

Notes

Page 133: Data communication part1

Data EncapsulationPDU and layer Addressing

Data Segmentation- Segment the data stream into small boundedsize blocks or PDUs.

- the network may accept data blocks only up toa certain size (53 octets for atm, 1526 octetsfor Ethernet)

- Advantages◦ Efficient error control with PDU size ◦ Fewerbits retransmitted in the event of failure ◦Better access to shared transmission facilities,with shorter delay ◦ Smaller buffers at receiverstations

Notes

Notes

Page 134: Data communication part1

Data Segmentation- Segment the data stream into small boundedsize blocks or PDUs.

- the network may accept data blocks only up toa certain size (53 octets for atm, 1526 octetsfor Ethernet)

- Advantages◦ Efficient error control with PDU size ◦ Fewerbits retransmitted in the event of failure ◦Better access to shared transmission facilities,with shorter delay ◦ Smaller buffers at receiverstations

Data Segmentation- Segment the data stream into small boundedsize blocks or PDUs.

- the network may accept data blocks only up toa certain size (53 octets for atm, 1526 octetsfor Ethernet)

- Advantages◦ Efficient error control with PDU size ◦ Fewerbits retransmitted in the event of failure ◦Better access to shared transmission facilities,with shorter delay ◦ Smaller buffers at receiverstations

Notes

Notes

Page 135: Data communication part1

Data Segmentation

- Disadvantages◦ Larger overhead with smaller PDU size◦ More interrupts as PDUs announce theirarrival◦ More time spent to process many smallerPDUs◦ Reassembly is an issue to be addressed

OSI Example

Imagine that you are on DLSU website and youhave clicked a link on the page. By doing so youhave just made a request of the web server to sendyou a document (most web pages exist asdocuments with an .html extension). Thisdocument will be sent to your computer which willuse the proper application (your Internet browser)to display the document so you can view it.

Notes

Notes

Page 136: Data communication part1

Example

Web server EndSOURCE

- Layer 7 obtains the data in the form of theHTML document.

- Layer 6 adds information about the formatting.- Layer 5 adds information required to create asession between the web server and the webbrowser on the laptop.

Notes

Notes

Page 137: Data communication part1

Web server EndSOURCE

- Layer 7 obtains the data in the form of theHTML document.

- Layer 6 adds information about the formatting.

- Layer 5 adds information required to create asession between the web server and the webbrowser on the laptop.

Web server EndSOURCE

- Layer 7 obtains the data in the form of theHTML document.

- Layer 6 adds information about the formatting.- Layer 5 adds information required to create asession between the web server and the webbrowser on the laptop.

Notes

Notes

Page 138: Data communication part1

Web server EndSOURCE

- Layer 4 adds the transport protocol and thesource and destination port numbers, in thiscase TCP (it’s a unicast) and port 80 (HTTP).

- Layer 3 adds the source and destination IPaddresses, in this case a source of 192.168.5.1and a destination of 192.168.5.2.

Web server EndSOURCE

- Layer 4 adds the transport protocol and thesource and destination port numbers, in thiscase TCP (it’s a unicast) and port 80 (HTTP).

- Layer 3 adds the source and destination IPaddresses, in this case a source of 192.168.5.1and a destination of 192.168.5.2.

Notes

Notes

Page 139: Data communication part1

Web server endSOURCE

- Layer 2 learns the destination MAC addressand adds the source and destination MACaddresses, in this case, a source of 5-5-5-5-5-5and destination of 6-6-6-6-6-6.

- Layer 1 converts the entire package into bitsand sends it across the network to the laptop.

Web server endSOURCE

- Layer 2 learns the destination MAC addressand adds the source and destination MACaddresses, in this case, a source of 5-5-5-5-5-5and destination of 6-6-6-6-6-6.

- Layer 1 converts the entire package into bitsand sends it across the network to the laptop.

Notes

Notes

Page 140: Data communication part1

Laptop endDESTINATION

- Layer 1 receives the bits in electrical format,converts them to be read by layer 2, and handsthem to layer 2.

- Layer 2 examines the destination MAC addressto see whether it is addressed to it, sees theMAC address of 6-6-6-6-6 (its own), drops thatpart of the transmission, and hands theremaining data to layer 3.

- Layer 3 examines the destination IP address toensure that it is its own (192. 168.5.2), dropsthat part, and hands the rest of the package tolayer 4.

Laptop endDESTINATION

- Layer 1 receives the bits in electrical format,converts them to be read by layer 2, and handsthem to layer 2.

- Layer 2 examines the destination MAC addressto see whether it is addressed to it, sees theMAC address of 6-6-6-6-6 (its own), drops thatpart of the transmission, and hands theremaining data to layer 3.

- Layer 3 examines the destination IP address toensure that it is its own (192. 168.5.2), dropsthat part, and hands the rest of the package tolayer 4.

Notes

Notes

Page 141: Data communication part1

Laptop endDESTINATION

- Layer 1 receives the bits in electrical format,converts them to be read by layer 2, and handsthem to layer 2.

- Layer 2 examines the destination MAC addressto see whether it is addressed to it, sees theMAC address of 6-6-6-6-6 (its own), drops thatpart of the transmission, and hands theremaining data to layer 3.

- Layer 3 examines the destination IP address toensure that it is its own (192. 168.5.2), dropsthat part, and hands the rest of the package tolayer 4.

Laptop endDESTINATION

- Layer 4 examines the destination port number(port 80), alerts the browser that HTTP datais coming in, drops that part, and hands therest of the package to layer 5.

- Layer 5 uses the information that was placedon this layer by the web server to create thesession between the web server and the webbrowser and then hands the rest of theinformation to layer 6.

Notes

Notes

Page 142: Data communication part1

Laptop endDESTINATION

- Layer 4 examines the destination port number(port 80), alerts the browser that HTTP datais coming in, drops that part, and hands therest of the package to layer 5.

- Layer 5 uses the information that was placedon this layer by the web server to create thesession between the web server and the webbrowser and then hands the rest of theinformation to layer 6.

Laptop endDESTINATION

- Layer 6 performs any format translation thatmay be required and hands the remaining data(the HTML document) to layer 7.

- The layer 7 application (the web browser)receives the HTML document and opens thedocument in the browser window.

Notes

Notes

Page 143: Data communication part1

Laptop endDESTINATION

- Layer 6 performs any format translation thatmay be required and hands the remaining data(the HTML document) to layer 7.

- The layer 7 application (the web browser)receives the HTML document and opens thedocument in the browser window.

�UnderstandWhich of the following is not an advantage ofnetworking reference models?A. They encourage standardization by defining what functionsare performed at particular layers of the model.B. They prevent changes in one layer from causing a need forchanges in other layers, speeding development.C. They ensure that networks perform better.D. They encourage vendors to build on each other’sdevelopments through use of a common framework.E. None of the above

Notes

Notes

Page 144: Data communication part1

�UnderstandWhich of the following is not an advantage ofnetworking reference models?A. They encourage standardization by defining what functionsare performed at particular layers of the model.B. They prevent changes in one layer from causing a need forchanges in other layers, speeding development.C. They ensure that networks perform better. X

D. They encourage vendors to build on each other’sdevelopments through use of a common framework.E. None of the above

�UnderstandWhich layer of the OSI model is responsible forcoordinating the exchanges of information betweenthe layer 7 applications or services that are in use?

A. ApplicationB. SessionC. Data-LinkD. PhysicalE. None of the above

Notes

Notes

Page 145: Data communication part1

�UnderstandWhich layer of the OSI model is responsible forcoordinating the exchanges of information betweenthe layer 7 applications or services that are in use?

A. ApplicationB. Session X

C. Data-LinkD. PhysicalE. None of the above

�Understand

What is the information that is used on layer 3 ofthe OSI model?

A. A bit patternB. MAC addressesC. IP addressesD. Port numbersE. All of the above

Notes

Notes

Page 146: Data communication part1

�Understand

What is the information that is used on layer 3 ofthe OSI model?

A. A bit patternB. MAC addressesC. IP addresses X

D. Port numbersE. All of the above

�Reading Assignment

- Illustrate and Contrast OSI andTCP/IP models.

Notes

Notes

Page 147: Data communication part1

OSI and TCP/IP modelsComparison

OSI and TCP/IP Model

- There are seven layers in the OSI model andfour in the TCP/IP model.

- The top three layers of the OSI model(Application, Presentation and Session) map tothe Application layer of the TCP/IP model.

- The bottom two layers of the OSI model(Data-Link and Physical) map to the NetworkAccess layer of the TCP/IP model.

Notes

Notes

Page 148: Data communication part1

OSI and TCP/IP Model

- There are seven layers in the OSI model andfour in the TCP/IP model.

- The top three layers of the OSI model(Application, Presentation and Session) map tothe Application layer of the TCP/IP model.

- The bottom two layers of the OSI model(Data-Link and Physical) map to the NetworkAccess layer of the TCP/IP model.

OSI and TCP/IP Model

- There are seven layers in the OSI model andfour in the TCP/IP model.

- The top three layers of the OSI model(Application, Presentation and Session) map tothe Application layer of the TCP/IP model.

- The bottom two layers of the OSI model(Data-Link and Physical) map to the NetworkAccess layer of the TCP/IP model.

Notes

Notes

Page 149: Data communication part1

OSI vs. TCP/IP Model

- In the OSI model, it was envisioned that theSession layer would handle the establishmentand management of the communication sessionbetween the application or service being used.

- In TCP/IP, those functions are performed bythe TCP /IP protocol itself at a different layer,the Transport layer.

OSI vs. TCP/IP Model

- In the OSI model, it was envisioned that theSession layer would handle the establishmentand management of the communication sessionbetween the application or service being used.

- In TCP/IP, those functions are performed bythe TCP /IP protocol itself at a different layer,the Transport layer.

Notes

Notes

Page 150: Data communication part1

OSI vs. TCP/IP Model

- OSI model envisioned the host devices as deaf,dumb, and blind bystanders to the networkingprocess, not participants (dumb terminal).

- In TCP/IP, the hosts participate and take partin functions such as end-to-end verification,routing, and network control (intelligent roleplayers)

OSI vs. TCP/IP Model

- OSI model envisioned the host devices as deaf,dumb, and blind bystanders to the networkingprocess, not participants (dumb terminal).

- In TCP/IP, the hosts participate and take partin functions such as end-to-end verification,routing, and network control (intelligent roleplayers)

Notes

Notes

Page 151: Data communication part1

OSI vs. TCP/IP Model

- When TCP/IP was developed, it was decidedthat the division of the bottom layer intoData-Link and Physical layers was unnecessary.

- Thus their functions are combined in theNetwork Access layer of the TCP/IP model.

OSI vs. TCP/IP Model

- When TCP/IP was developed, it was decidedthat the division of the bottom layer intoData-Link and Physical layers was unnecessary.

- Thus their functions are combined in theNetwork Access layer of the TCP/IP model.

Notes

Notes

Page 152: Data communication part1

TCP/IP Model

- Developed by US Defense Advanced ResearchProject Agency (DARPA) for ARPANETpacket switched network.

- generally referred to as the TCP/IP protocolsuite, which consists of a large collection ofprotocols.

- predates the OSI reference model.

TCP/IP Model

- Developed by US Defense Advanced ResearchProject Agency (DARPA) for ARPANETpacket switched network.

- generally referred to as the TCP/IP protocolsuite, which consists of a large collection ofprotocols.

- predates the OSI reference model.

Notes

Notes

Page 153: Data communication part1

TCP/IP Model

- Developed by US Defense Advanced ResearchProject Agency (DARPA) for ARPANETpacket switched network.

- generally referred to as the TCP/IP protocolsuite, which consists of a large collection ofprotocols.

- predates the OSI reference model.

TCP/IP Model- Transmission Control Protocol (TCP)is the primary transport layer (layer 4)protocol, and is responsible for connectionestablishment and management and reliabledata transport between software processes ondevices.

- Internet Protocol (IP)is the primary OSI network layer (layer 3)protocol that provides addressing, datagramrouting and other functions in an internetwork.

Notes

Notes

Page 154: Data communication part1

TCP/IP Model- Transmission Control Protocol (TCP)is the primary transport layer (layer 4)protocol, and is responsible for connectionestablishment and management and reliabledata transport between software processes ondevices.

- Internet Protocol (IP)is the primary OSI network layer (layer 3)protocol that provides addressing, datagramrouting and other functions in an internetwork.

TCP/IP ModelNotes

Notes

Page 155: Data communication part1

TCP/IP Layers

- Application (Process) Layer

- Host-to-host (Transport) Layer- Internet Layer- Network Access/Interface Layer

TCP/IP Layers

- Application (Process) Layer- Host-to-host (Transport) Layer

- Internet Layer- Network Access/Interface Layer

Notes

Notes

Page 156: Data communication part1

TCP/IP Layers

- Application (Process) Layer- Host-to-host (Transport) Layer- Internet Layer

- Network Access/Interface Layer

TCP/IP Layers

- Application (Process) Layer- Host-to-host (Transport) Layer- Internet Layer- Network Access/Interface Layer

Notes

Notes

Page 157: Data communication part1

TCP/IP Model CommunicationProcess

Application (Process) layer

- corresponds to the OSI’s Application,Presentation, and Session layers

- defines protocols for node-to-node applicationcommunication

- controls user-interface specifications.

Notes

Notes

Page 158: Data communication part1

Application (Process) layer

- corresponds to the OSI’s Application,Presentation, and Session layers

- defines protocols for node-to-node applicationcommunication

- controls user-interface specifications.

Application (Process) layer

- corresponds to the OSI’s Application,Presentation, and Session layers

- defines protocols for node-to-node applicationcommunication

- controls user-interface specifications.

Notes

Notes

Page 159: Data communication part1

Application layer services

Application layer servicesNotes

Notes

Page 160: Data communication part1

�Recall

Telnet / Terminal Emulation- allows a user on a remote client machine, calledthe Telnet client, to access the resources ofanother machine, the Telnet server.

Notes

Notes

Page 161: Data communication part1

Telnet / Terminal Emulation

Domain Name ServiceDNS

- resolves hostnames-specifically, Internet names,such as www.dlsu.edu.ph

Notes

Notes

Page 162: Data communication part1

HTTPHypertext transfer protocol

- rules governing the delivery of web pages to theclient

�Understand

- Differentiate HTTP and HTML?

- HTML: hypertext markup languageDefinitions of tags that are added to Webdocuments to control their appearance.

- HTTP: hypertext transfer protocolThe rules governing the conversation between aWeb client and a Web server.

Notes

Notes

Page 163: Data communication part1

�Understand

- Differentiate HTTP and HTML?- HTML: hypertext markup languageDefinitions of tags that are added to Webdocuments to control their appearance.

- HTTP: hypertext transfer protocolThe rules governing the conversation between aWeb client and a Web server.

�Understand

- Differentiate HTTP and HTML?- HTML: hypertext markup languageDefinitions of tags that are added to Webdocuments to control their appearance.

- HTTP: hypertext transfer protocolThe rules governing the conversation between aWeb client and a Web server.

Notes

Notes

Page 164: Data communication part1

POP and SMTPPost Office and Simple Mail Transport Protocols

Server Message Block (SMB)Protocol

- supports file sharing in Microsoft-basednetworks

Notes

Notes

Page 165: Data communication part1

Gnutella Protocol- supports P2P services

Host-to-host (Transport) Layer

- parallels the functions of the OSI’s Transportlayer

- define protocols for setting up the level oftransmission service for applications.

- concerned with◦ reliable end-to-end communication◦ error-free delivery of data◦ packet sequencing

Notes

Notes

Page 166: Data communication part1

Host-to-host (Transport) Layer

- parallels the functions of the OSI’s Transportlayer

- define protocols for setting up the level oftransmission service for applications.

- concerned with◦ reliable end-to-end communication◦ error-free delivery of data◦ packet sequencing

Host-to-host (Transport) Layer

- parallels the functions of the OSI’s Transportlayer

- define protocols for setting up the level oftransmission service for applications.

- concerned with◦ reliable end-to-end communication◦ error-free delivery of data◦ packet sequencing

Notes

Notes

Page 167: Data communication part1

Transport Layer Role

Transport Layer Functions

- Enables multiple applications to communicateover the network at the same time on a singledevice

- Ensures that, if required, all the data isreceived reliably and in order by the correctapplication

- Employs error handling mechanisms- UDP- User Datagram protocol- an exchange ofdata w/o acknowledgment, sure delivery

Notes

Notes

Page 168: Data communication part1

Transport Layer Functions

- Enables multiple applications to communicateover the network at the same time on a singledevice

- Ensures that, if required, all the data isreceived reliably and in order by the correctapplication

- Employs error handling mechanisms- UDP- User Datagram protocol- an exchange ofdata w/o acknowledgment, sure delivery

Transport Layer Functions

- Enables multiple applications to communicateover the network at the same time on a singledevice

- Ensures that, if required, all the data isreceived reliably and in order by the correctapplication

- Employs error handling mechanisms

- UDP- User Datagram protocol- an exchange ofdata w/o acknowledgment, sure delivery

Notes

Notes

Page 169: Data communication part1

Transport Layer Functions

- Enables multiple applications to communicateover the network at the same time on a singledevice

- Ensures that, if required, all the data isreceived reliably and in order by the correctapplication

- Employs error handling mechanisms- UDP- User Datagram protocol- an exchange ofdata w/o acknowledgment, sure delivery

Transport Layer Purpose

- Segmenting data & managing each piece -data must be prepared to be sent across themedia in manageable pieces.

- Tracking the individual communicationbetween applications on the source anddestination hosts -maintains the multiple communication streamsbetween these applications.

Notes

Notes

Page 170: Data communication part1

Transport Layer Purpose

- Segmenting data & managing each piece -data must be prepared to be sent across themedia in manageable pieces.

- Tracking the individual communicationbetween applications on the source anddestination hosts -maintains the multiple communication streamsbetween these applications.

Transport Layer Purpose

- Reassembling the segments into streams ofapplication data -At the receiving host, each piece of data will bereconstructed and directed to the appropriateapplication.

- Identifying the different applications-assigns each application an identifier; theTCP/IP protocols call this identifier aport number.

Notes

Notes

Page 171: Data communication part1

Transport Layer Purpose

- Reassembling the segments into streams ofapplication data -At the receiving host, each piece of data will bereconstructed and directed to the appropriateapplication.

- Identifying the different applications-assigns each application an identifier; theTCP/IP protocols call this identifier aport number.

Transport Layer Protocols

- Transmission Control Protocol (TCP)◦ Connection-oriented◦ Guaranteed Delivery◦ Supports Flow Control and Error control

- User Datagram Protocol (UDP)◦ Connectionless-oriented◦ Nonguaranteed Delivery◦ No Flow Control and Error control

Notes

Notes

Page 172: Data communication part1

Transport Layer Protocols

- Transmission Control Protocol (TCP)◦ Connection-oriented◦ Guaranteed Delivery◦ Supports Flow Control and Error control

- User Datagram Protocol (UDP)◦ Connectionless-oriented◦ Nonguaranteed Delivery◦ No Flow Control and Error control

Internet Layer

- corresponds to the OSI’s Network layer.

- designates the protocols relating to the logicaltransmission of packets over the entire network.

- concerned with◦ logical addressing, i.e. IP (Internet Protocol)address◦ routing of packets among multiple networks

Notes

Notes

Page 173: Data communication part1

Internet Layer

- corresponds to the OSI’s Network layer.- designates the protocols relating to the logicaltransmission of packets over the entire network.

- concerned with◦ logical addressing, i.e. IP (Internet Protocol)address◦ routing of packets among multiple networks

Internet Layer

- corresponds to the OSI’s Network layer.- designates the protocols relating to the logicaltransmission of packets over the entire network.

- concerned with◦ logical addressing, i.e. IP (Internet Protocol)address◦ routing of packets among multiple networks

Notes

Notes

Page 174: Data communication part1

Internet Layer

Internet Protocol (IP)Notes

Notes

Page 175: Data communication part1

Internet Protocol (IP)Connectionless

Internet Protocol (IP)Unreliable Protocol

Notes

Notes

Page 176: Data communication part1

Internet Protocol (IP)Media Independent

Internet Protocol (IP)- Segments are encapsulated as packets

Notes

Notes

Page 177: Data communication part1

Network Access Layer

- interface to the local network

- concerned with the exchange of data betweenan end system (server, workstation, etc.) andthe network to which it is attached.

- concerned with◦ hardware addressing◦ protocols for the physical transmission ofdata

Network Access Layer

- interface to the local network- concerned with the exchange of data betweenan end system (server, workstation, etc.) andthe network to which it is attached.

- concerned with◦ hardware addressing◦ protocols for the physical transmission ofdata

Notes

Notes

Page 178: Data communication part1

Network Access Layer

- interface to the local network- concerned with the exchange of data betweenan end system (server, workstation, etc.) andthe network to which it is attached.

- concerned with◦ hardware addressing◦ protocols for the physical transmission ofdata

Network Access Layer

- the source and destination physical addressesare put on the front of the package in a partcalled the header.

- Information used to perform a frame checksequence on the message is placed at the backof the package in a section called the trailer.

- the package is converted to ones and zeros inthe format required by the physical medium inuse.

Notes

Notes

Page 179: Data communication part1

Network Access Layer

- the source and destination physical addressesare put on the front of the package in a partcalled the header.

- Information used to perform a frame checksequence on the message is placed at the backof the package in a section called the trailer.

- the package is converted to ones and zeros inthe format required by the physical medium inuse.

Network Access Layer

- the source and destination physical addressesare put on the front of the package in a partcalled the header.

- Information used to perform a frame checksequence on the message is placed at the backof the package in a section called the trailer.

- the package is converted to ones and zeros inthe format required by the physical medium inuse.

Notes

Notes

Page 180: Data communication part1

TCP/IP Data Encapsulation

TCP/IP Data Encapsulation

- Application layer adds any requiredinformation concerning the presentation andformatting of the data to the header.

- Transport layer adds port number informationto the data that was handed down from theApplication layer.

- Internet layer adds the required logical addressinformation to the segment.

Notes

Notes

Page 181: Data communication part1

TCP/IP Data Encapsulation

- Application layer adds any requiredinformation concerning the presentation andformatting of the data to the header.

- Transport layer adds port number informationto the data that was handed down from theApplication layer.

- Internet layer adds the required logical addressinformation to the segment.

TCP/IP Data Encapsulation

- Application layer adds any requiredinformation concerning the presentation andformatting of the data to the header.

- Transport layer adds port number informationto the data that was handed down from theApplication layer.

- Internet layer adds the required logical addressinformation to the segment.

Notes

Notes

Page 182: Data communication part1

TCP/IP Data Encapsulation

- Network Access layer adds physical addressinformation in the form of a frame header.

- Network Access layer also adds a frame trailerwhich contains information that can be used tocheck the integrity of the data, calledframe check sequence (FCS).

- Integrity means that the data has not changedeven 1 bit.

TCP/IP Data Encapsulation

- Network Access layer adds physical addressinformation in the form of a frame header.

- Network Access layer also adds a frame trailerwhich contains information that can be used tocheck the integrity of the data, calledframe check sequence (FCS).

- Integrity means that the data has not changedeven 1 bit.

Notes

Notes

Page 183: Data communication part1

TCP/IP Data Encapsulation

- Network Access layer adds physical addressinformation in the form of a frame header.

- Network Access layer also adds a frame trailerwhich contains information that can be used tocheck the integrity of the data, calledframe check sequence (FCS).

- Integrity means that the data has not changedeven 1 bit.

TCP/IP Data Encapsulation

- Network adaptor converts the information intoa series of ones and zeros.

- At the beginning of the frame is a series of onesand zeros that are designed to allow thereceiving device to lock on to or synch up withthe signal.

- Once the receiving device has synched up withthe frame, it will start reading.

Notes

Notes

Page 184: Data communication part1

TCP/IP Data Encapsulation

- Network adaptor converts the information intoa series of ones and zeros.

- At the beginning of the frame is a series of onesand zeros that are designed to allow thereceiving device to lock on to or synch up withthe signal.

- Once the receiving device has synched up withthe frame, it will start reading.

TCP/IP Data Encapsulation

- Network adaptor converts the information intoa series of ones and zeros.

- At the beginning of the frame is a series of onesand zeros that are designed to allow thereceiving device to lock on to or synch up withthe signal.

- Once the receiving device has synched up withthe frame, it will start reading.

Notes

Notes

Page 185: Data communication part1

Protocol Operation of Sendingand Receiving

�Readings

In what year was it mandated that all computersconnected to the ARPANET use TCP/IP?

A. 1969B. 1974C. 1979D. 1983E. None of the above

Notes

Notes

Page 186: Data communication part1

�Readings

In what year was it mandated that all computersconnected to the ARPANET use TCP/IP?

A. 1969B. 1974C. 1979D. 1983 X

E. None of the above

TCP/IP Protocol SuiteNotes

Notes

Page 187: Data communication part1

Application Protocols- Telnet (Terminal emulation)allows a user on a remote client machine, calledthe Telnet client, to access the resources ofanother machine, the Telnet server.

- File Transfer Protocol (FTP)the protocol for transferring files

- Trivial File Transfer Protocol (TFTP)stripped-down, stock version of FTP; TFTPhas no directory-browsing abilities; it can donothing but send and receive files.

Application Protocols

- Network File System (NFS)allows two different types of file systems tointeroperate. Ex. NT and Unix file systems

- Simple Mail Transfer Protocol (SMTP)answering our ubiquitous call to email, uses aspooled, or queued, method of mail delivery.

- Line Printer Daemon (LPD)designed for printer sharing

Notes

Notes

Page 188: Data communication part1

Application Protocols- X Windowdefines a protocol for writing client/serverapplications based on a graphical user interface(GUI)

- Simple Network Management Protocol (SNMP)collects and manipulates valuable networkinformation. It gathers data by polling thedevices on the network from a managementstation at fixed or random intervals, requiringthem to disclose certain information.

Application Protocols

- Domain Name Service (DNS)resolves hostnamesâĂŤspecifically, Internetnames, such as www.dlsu.edu.ph.

- Dynamic Host Configuration Protocol(DHCP)/Bootstrap Protocol (BootP)assigns IP addresses to hosts. It allows easieradministration and works well in small to evenvery large network environments.

Notes

Notes

Page 189: Data communication part1

Host-to-host (Transport)Protocols

- Transmission Control Protocol (TCP)a full-duplex, connection-oriented, reliable, andaccurate protocol, but costly in terms ofnetwork overhead.

- User Datagram Protocol (UDP)a minimalist protocol mechanism with nohandshaking dialogues, thus exposes anyunreliability of the underlying network protocolto the user’s program. There is no guarantee ofdelivery, ordering or duplicate protection.

Internet Protocols

- Internet Control Message Protocol (ICMP)a management protocol and messaging serviceprovider for IP. Its messages are carried as IPdatagrams.

- Address Resolution Protocol (ARP)finds the hardware address of a host from aknown IP address.

Notes

Notes

Page 190: Data communication part1

Internet Protocols- Reverse Address Resolution Protocol (RARP)discovers the identity of the IP address fordiskless machines by sending out a packet thatincludes its MAC address and a request for theIP address assigned to that MAC address.

- Proxy Address Resolution Protocol (ProxyARP)help machines on a subnet reach remotesubnets without configuring routing or even adefault gateway.

Other Terms

- De facto standardone that becomes the standard simply by being the methodthat all parties gradually choose to use over a period oftime, without a formal adoption process.

- Default gatewayThis is the IP address of the nearest router in the network.

Notes

Notes

Page 191: Data communication part1

Other Terms

- IP addressa number in a specific format that is used to identify acomputer.

- ISO (International Organization for Standardization)is the world’s largest developer of voluntary InternationalStandards. International Standards give state of the artspecifications for products, services and good practice,helping to make industry more efficient and effective.Note: ISO is derived from the Greek isos, meaning equal.

Other Terms

- Local vs. RemoteIf the source and destination hosts are on the same network,the destination device is considered to be on the localnetwork.If the two computers are on different networks, thedestination device is considered to be on a remote network.

Notes

Notes

Page 192: Data communication part1

Other Terms

- Peripheralsare any devices that operate in conjunction with thecomputer yet reside outside the computer’s box. Ex.display, mouse, keyboard, printer, camera, speakers, andscanners.

- Resourcerefers to anything that a user on one computer may want toaccess on a different computer. Ex. files, folders, printers,and scanners.

- Telecommutingworking from another physical location, usually from home.

Other Terms

- Standard vs. ProprietaryProprietary refers to any process or way of doing somethingthat works only on a single vendor’s equipment whilestandard any process that the industry has agreed upon.

Notes

Notes

Page 193: Data communication part1

�Understand

- How do you ensure that products from differentmanufacturers can work together as expected?

- Answer:Using Standards which provide guidelines tomanufacturers, vendors, government agencies,and other service providers to ensure the kindof interconnectivity necessary in today’smarketplace and in internationalcommunications.

�Understand

- How do you ensure that products from differentmanufacturers can work together as expected?

- Answer:Using Standards which provide guidelines tomanufacturers, vendors, government agencies,and other service providers to ensure the kindof interconnectivity necessary in today’smarketplace and in internationalcommunications.

Notes

Notes

Page 194: Data communication part1

OSI Model and NetworkingDevices

�Networking andInternetworking Devices

Notes

Notes

Page 195: Data communication part1

�Networking andInternetworking DevicesExamples

Repeaters

- a physical layer device used to interconnect themedia segments of an extended network.

- does not actually connect two LANs; itconnects two segments of the same LAN.

Notes

Notes

Page 196: Data communication part1

Repeaters

- a physical layer device used to interconnect themedia segments of an extended network.

- does not actually connect two LANs; itconnects two segments of the same LAN.

Repeaters- repeaters regenerate signals corruptedprimarily due to distance effects

- A repeater forwards every frame; it has nofiltering capability.

Notes

Notes

Page 197: Data communication part1

Repeaters- repeaters regenerate signals corruptedprimarily due to distance effects

- A repeater forwards every frame; it has nofiltering capability.

HubMultiport repeater

- a physical-layer device that connects multipleuser stations, each via a dedicated cable

- used to create a physical star network whilemaintaining the logical bus or ringconfiguration of the LAN

Notes

Notes

Page 198: Data communication part1

HubMultiport repeater

- a physical-layer device that connects multipleuser stations, each via a dedicated cable

- used to create a physical star network whilemaintaining the logical bus or ringconfiguration of the LAN

Bridge

- A physical and data-link layer device that linksone LAN segment to others

- Read all frames transmitted on one LAN andaccept those address to any station on theother LAN

- Using MAC protocol for second LAN,retransmit each frame

Notes

Notes

Page 199: Data communication part1

Bridge

- A physical and data-link layer device that linksone LAN segment to others

- Read all frames transmitted on one LAN andaccept those address to any station on theother LAN

- Using MAC protocol for second LAN,retransmit each frame

Bridge

- A physical and data-link layer device that linksone LAN segment to others

- Read all frames transmitted on one LAN andaccept those address to any station on theother LAN

- Using MAC protocol for second LAN,retransmit each frame

Notes

Notes

Page 200: Data communication part1

ReferencesTEXTBOOK:

- Data Communications and Networking,Behrouz Forouzan, 4th Edition, McGraw-Hill,2007

ReferencesSECONDARY SOURCE:

- Data and Computer Communications, WilliamStallings, 2007

Notes

Notes

Page 201: Data communication part1

ReferencesSECONDARY SOURCE:

- TCP/IP Protocol Suite, Behrouz Forouzan, 4thedition, 2010

ReferencesSECONDARY SOURCE:

- CISCO Networking Essentials, Troy McMillan,2012

Notes

Notes

Page 202: Data communication part1

ReferencesSECONDARY SOURCE:

- Network Fundamentals, Cisco NetworkingAcademy, 2007

Thank you for your attention!Notes

Notes