Data Communication and Computer Network



Similar documents
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Protocol Data Units and Encapsulation

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Communication Networks. MAP-TELE 2011/12 José Ruela

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

Overview of Computer Networks

524 Computer Networks

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Computer Networks Vs. Distributed Systems

UPPER LAYER SWITCHING

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Computer Networks. By Hardeep Singh

The OSI Model: Understanding the Seven Layers of Computer Networks

Communications and Computer Networks

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

IT Data Communication and Networks (Optional)

CPS221 Lecture: Layered Network Architecture

Networking Test 4 Study Guide

Mathatma Gandhi University

The OSI and TCP/IP Models. Lesson 2

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

DATA COMMUNICATION AND NETWORKS

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Computer Networking: A Survey

Data Communication Networks and Converged Networks

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

Local-Area Network -LAN

Ethernet. Ethernet. Network Devices

RARP: Reverse Address Resolution Protocol

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

Introduction to Networking

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

CSE 3461 / 5461: Computer Networking & Internet Technologies

Networked AV Systems Pretest

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Chapter 5. Data Communication And Internet Technology

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Introduction to Ethernet

Protocols and Architecture. Protocol Architecture.

CSCI 362 Computer and Network Security

COMPUTER NETWORK TECHNOLOGY (300)

Lecture 28: Internet Protocols

The OSI Model and the TCP/IP Protocol Suite

ELEC3030 Computer Networks

Overview of Routing between Virtual LANs

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Computer Networks CS321

11/22/

Transport Layer Protocols

Introduction to Networks

Communication Systems Internetworking (Bridges & Co)

CCT vs. CCENT Skill Set Comparison

Computer Networks III

LAN Switching and VLANs

Network Basics GRAPHISOFT. for connecting to a BIM Server (version 1.0)

- Hubs vs. Switches vs. Routers -

Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX

IST 220 Exam 3 Notes Prepared by Dan Veltri

Module 15: Network Structures

WHITE PAPER. IP-based Networks: Axis White Paper, Copyright 2002, Axis Communications

Zarządzanie sieciami telekomunikacyjnymi

Chapter 2 - The TCP/IP and OSI Networking Models

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

BASIC ANALYSIS OF TCP/IP NETWORKS

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Exhibit n.2: The layers of a hierarchical network

Chapter 14: Distributed Operating Systems

How To Understand The Layered Architecture Of A Network

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

The Network Layer Functions: Congestion Control

Objectives of Lecture. Network Architecture. Protocols. Contents

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

Internet Concepts. What is a Network?

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Region 10 Videoconference Network (R10VN)

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

CMPT 165: The Internet, Part 3

Protocols. Packets. What's in an IP packet

Introduction to computer networks and Cloud Computing

The IP Transmission Process. V1.4: Geoff Bennett

WAN Technology. Heng Sovannarith

Technical Support Information Belkin internal use only

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Chapter 16: Distributed Operating Systems

ET225 Networking Concepts. Chapter 1 What is a Computer Network?

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage

IT4405 Computer Networks (Compulsory)

IT-AD08: ADD ON DIPLOMA IN COMPUTER NETWORK DESIGN AND INSTALLATION

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Transcription:

1

Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X 25, TCP/IP. 2 C O N T E N T 1. INTRODUCTION.. 3-18 2. PHYSICAL LAYER. 19-39 3. DATA LINK LAYER 40-74 4. NETWORK LAYER 75-92 5. TRANSPORT LAYER.. 93-106 6. APPLICATION LAYER. 107-114 7. CRYPTOGRAPHY AND NETWORK SECURITY 115-122 8. TTA Practice Set.. 123-129

CHAPTER-1 INTRODUCTION 3 1. Introduction A computer network consists of a collection of computers, printers and other equipment that is connected together so that they can communicate with each other. Data communication and computer network are two different things. Data communication is the exchange of information between two or more devices through some transmission media. Components of a Network A computer network comprises the following components: a. A minimum of at least 2 computers b. Cables that connect the computers to each other, although wireless communication is becoming more common c. A network interface card d. Switch used to switch the data from one point to another. e. Network operating system software Types of Computer Network There are basically three types of computer network based on scale. (i) Local Area Network(LAN) LAN is privately owned and used to share resources (may be hardware or software resources) and to exchange information with the capacity of few kilometer. LANs are reliable because they are restricted in size. LAN s can be used to provide service within single office, single building or an entire campus. (ii) Metropolitan Area Network(MAN) MAN is designed to extend over the entire city. MAN is wholly owned and operated by a private company or may be a service provided by a public company. MAN can be created using connecting multiple LANs. (iii) Wide Area Network (WAN) WAN provides long-distance transmission of data over large geographical areas that may comprise a country, continent or even the whole world. In contrast to LANs, WANs may utilize public, leased or private communication devices. Types of Connection between Devices There are basically two ways to connecting the devices with each other: (i) Multipoint In multipoint a link is shared among all the devices. All the devices communicate through that link only. (ii) Point to Point In point to point connection every device is connected with other device using a dedicated link. Network TOPOLOGY There are basically 4 network topology are defined. Network topology is basically determines the way of communicating and sharing of information with each other device.

(i) Bus Topology In this topology, there is a single bus (connection) is shared with all the devices. Bus topology basically provides the multipoint connection. 4 (ii) Mesh Topology In the Mesh topology every device is connected with other device using a dedicated link.so in mesh topology we required (n (n-1))/2 links. (iii) Star Topology In the star topology every device is connected through using a single device called hub. Here number links required became number of devices (n). (iv) Ring Topology In the ring topology devices are connected in the form of ring. Every device is connected to 2 devices. Number of links required in the ring topology is 2n. Transmission Modes There are four types of transmission modes which are used to determine how data is going to transfer across the network. (i) Unicast Transmission Mode In the unicast transmission mode, information is sent by one sender to one receiver. (ii) Broadcast Transmission Mode This mode generally allows addressing the packet to all nodes on the network. When such a packet is transmitted and received by all the machines on the network.

(iii) (iv) MulticastTransmission Mode This mode is used when the same information must be sent to a set of recipients. Anycast Transmission Mode In this transmission mode, a set of receivers is identified. When a source sends information towards this set of receivers, the network ensures that the information is delivered to one receiver that belongs to this set. Reference Model Reference model determines that how network architecture will be. There are two reference models. a. TCP/IP reference model b. OSI reference model ISO OSI (Open Systems Interconnection) Reference Model It deals with connecting the systems which are open for communication with other systems. The OSI model has seven layers. Every layer performs a different functionality. Interface is provided in between layers. Just below layer provide the services to upper layer. (i) Physical Layer Physical layer is responsible of transmitting individual bits from one node to next node. Physical layers also deal with transmission media, interference, line states and encoding of the data and the connector types. Physical layer service is an unreliable connection-oriented service. There exist a variety of physical layer protocols such as RS-232C, Rs-449 standards developed by Electronics Industries Association (EIA). (ii) Data Link Layer Data Link Layer is responsible of delivery of frames from one node to next node. The main function of this layer are handles the physical transfer, farming ( the assembly of data into a single unit or block), flow control and error-control functions over a single transmission link, physical addressing. The data link layer is often subdivided into two parts Logical Link Control (LLC) and Medium Access Control (MAC). (iii)network Layer Network Layer is responsible of delivery of packet from source to destination. The main function of this layer are handles the routing, fragmentation, traffic shaping, logical addressing. Internet datagram, address resolution protocol, reverse address resolution protocol are the protocol of network layer. (iv)transport Layer Transport layer is responsible of delivery of segment from process to process. The main function of this layer are handles the segmentation, end to end flow and error control, port addressing. Transmission Control Protocol, User Datagram Protocol and Stream transfer control protocol are the protocol of transport layer. (v)session Layer Session layer allows two applications to establish, use and disconnect a connection between them called a session. It provides for name recognition and additional functions like security, which are needed to allow applications to communicate over the network. 5

(vi)presentation Layer Presentation layer Determines the format used to exchange data among networked computers.it is also responsible for encryption, decryption and compression of data. (vii)application Layer Application layer is responsible for providing services to user. There are so many protocols that are working on application layer like File transfer (FTP),Remote login (telnet)mail (SMTP),News (NNTP),Web (HTTP). TCP/IP reference model The TCP/IP reference model is the network model used in the current Internet architecture. All three top layers of OSI Model are compressed together in single Application layer of TCP/IP Model. Transport and Internet layers of TCP/IP correspond to the transport and network layer of OSI respectively. 6 Networking Device Hubs, Bridges, Switches and Routers are used to build networks: Hubsare used to build a LAN by connecting different computers in a star/hierarchal network topology. A hub is a very simple device called as dumb terminal, once it gets data packet sent from any computer, it does not check the destination address of that packet. It just forwards that packet to all other computers within the network. The node to which it is made will then pick it up while other nodes discard it. This amplifies that the traffic is shared. Passive Hub: The signal is forwarded as it is. It does not require any power supply. Active Hub: Active hub first regenerate the signal then transmit. Active Hub also called as multiport repeaters. Hubs work on the physical layer (lowest layer). Because of this they can t deal with addressing or data filtering. Switches checks for the destination MAC address in the packet header and forward it to the relevant port to reach that destination host only. Switches build a table of which MAC address

belongs to which LAN segment. If a destination MAC address is not in the table it forwards to all segments except the source segment. If the destination is same as the source, frame is discarded. Switches have built-in hardware chips solely designed to perform switching capabilities, therefore they are fast and come with many ports. Sometimes they are referred to as intelligent bridges or multiport bridges. There are two types of switches are there: 1. Cut-through Switch: Directly forward what the switch gets. 2. Store and forward Switch: receive the full frame before retransmitting it. Switches works on the data link layer that s why they deal with frames and filter them based on MAC addresses. VLANs (Virtual LANs) and broadcast domains: Switches do not control broadcast domains by default, however, if a VLAN is configured in a switch it will has its own broadcast domain. Bridges are used to extend networks by maintaining signals and traffic. Bridges are on the data link layer so in principle they are capable to do what switches do like data filtering and separating the collision domain, but they are less advanced. In a comparison with switches, they are slower because they use software to perform switching. They do not control broadcast domains and usually come with less number of ports. Routers are used to connect different LANs or a LAN with a WAN (e.g. the internet). Routers control both collision domains and broadcast domains. If the packet s destination is on a different network, a router is used to pass it the right way, so without routers the internet could not functions. Routers use NAT (Network Address Translation) in conjunction with IP Masquerading to provide the internet to multiple nodes in the LAN under a single IP address. Routers work on the network layer so they can filter data based on IP addresses. They have route tables to store network addresses and forward packets to the right port. Gateways are very intelligent devices or else can be a computer running the appropriate software to connect and translate data between networks with different protocols or architecture, so their work is much more complex than a normal router. For instance, allowing communication between TCP/IP clients and IPX/SPX or AppleTalk.Gateways operate at the network layer and above, but most of them at the application layer. Repeaters are simple devices that work at the physical layer of the OSI. They regenerate signals (active hubs do that too). 7

Key Point: 8 1. Internet is a collection of networks or network of networks. Various networks such as LAN and WAN connected through suitable hardware and software to work in a seamless manner. 2. A protocol is a formal set of rules and conventions that governs how computers exchange information over a network medium. A protocol implements the functions of one or more of the OSI layers. 3. Session layer is also called as port layer. 4. The Physical Layer PDU (protocol data unit) is the packet, consisting of bits or, more generally, symbols.it can be called as stream of bits. 5. The Data Link Layer PDU is the frame 6. The Network Layer PDU is the packet 7. The Transport Layer PDU is the segment for TCP, or the datagram for UDP 8. The Application Layer (layer 5,6,7) PDU is the Message. 9. VLAN is a logical group of network devices located on different LAN physical segments. However they are logically treated as if they were located on a single segment. SWITCHING A network consists of many switching devices. In order to connect multiple devices, one solution could be to have a point to point connection in between pair of devices. But this increases the number of connection. The other solution could be to have a central device and connect every device to each other via the central device which is generally known as Star Topology. Both these methods are wasteful and impractical for very large network. The other topology also cannot be used at this stage. Hence a better solution for this situation is SWITCHING. A switched network is made up of a series of interconnected nodes called switches. Types of Switching Techniques There are basically three types of switching methods are made available. Out of three methods, circuit switching and packet switching are commonly used but the message switching has been opposed out in the general communication procedure but is still used in the networking application. 1) Circuit Switching 2) Packet Switching 3) Message Switching

Circuit Switching 9 Circuit Switching is generally used in the public networks. It come into existence for handling voice traffic in addition to digital data. However digital data handling by the use of circuit switching methods are proved to be inefficient. The network for Circuit Switching is shown in figure. Circuit Switching Network Here the network connection allows the electrical current and the associated voice with it to flow in between the two respective users. The end to end communication was established during the duration of call. In circuit switching the routing decision is made when the path is set up across the given network. After the link has been sets in between the sender and the receiver then the information is forwarded continuously over the provided link. In Circuit Switching a dedicated link/path is established across the sender and the receiver which is maintained for the entire duration of conversation. Packet Switching In Packet Switching, messages are broken up into packets and each of which includes a header with source, destination and intermediate node address information. Individual Packets in packet switching technique take different routes to reach their respective destination. Independent routing of packets is done in this case for following reasons: 1. Bandwidth is reduces by the splitting of data onto different routes for a busy circuit. 2. For a certain link in the network, the link goes down during transmission the the remaining packet can be sent through the another route.

10 Packet Switching Network The major advantage of Packet switching is that they they are used for performing data rate conversion. When traversing the network switches, routers or the other network nodes then the packets are buffered in the queue, resulting in variable delay and throughput depending on the network s capacity and the traffic load on network. Packet switching contrasts with another principal networking paradigm, circuit switching, a method which sets up a limited number of dedicated connections of constant bit rate and constant delay between nodes for exclusive use during the communication session. In cases where traffic fees are charged, for example in cellular communication, packet switching is characterized by a fee per unit of information transmitted. Message Switching In case of Message Switching it is not necessary to establish a dedicated path in between any two communication devices. Here each message is treated as an independent unit and includes its own destination source address by its own. Each complete message is then transmitted from one device to another through internetwork. Message Switching Data Network Each intermediate device receive the message and store it until the nest device is ready to receive it and then this message is forwarded to the next device. For this reason a message switching network is sometimes called as Store and Forward Switching.

11 Message switches can be programmed with the information about the most efficient route as well as information regarding to the near switches that can be used for forwarding the present message to their required destination. The storing and Forwarding introduces the concept of delay. For this reasons this switching is not recommended for real time applications like voice and video.

Practice Set :Level-I 12 (1.) Network layer activities are (a) Logical addressing (b) Port addressing (c) Access control (d) All of these (2.) Hop-to-Hop delivery is related to (a) Data link layer (b) Network layer (c) Transport layer (d) All of these (3.) Process-to-Process delivery is related to (a) Data link layer (b) Network layer (c) Transport layer (d) All of these (4.) Which one of the following OSI layers performs error checking of data? (a) Network (b) Transport (c) Data link (d) Physical (5.) Flow control is the responsibility of (a) Data link layer (b) Transport layer (c) Both (a) and (b) (d) Application layer (6.) Which of the following address cannot be changed? (a) Hardware address (b) Logical address (c) Both (a) and (b) (d) None of these (7.) Congestion control is done in (a) MAC layer (b) Data link layer (c) Transport layer (d) Application layer (8.) Network to network delivery is done on (a) Network layer (b) Transport layer (c) Application layer (d) Data link layer (9.) Port number is (a) Process number (b) Computer s physical address (c) Both (a) and (b) (d) None of these (10.) Which of these network devices belongs at the OSI physical layer (layer one)? (a) Repeater (b) Router (c) Switch (d) Bridge (11.) Which of these network devices belong at the OSI data link layer (layer two)? (a) Router (b) Bridge (c) VPN (d) None of these (12.) Which of these network devices primarily functions at the OSI network layer (layer 3)? (a) Switch (b) Gateway (c) Router (d) All of these (13.) In OSI, the term PDU stands for (a) Private data unit (b) Protected data unit (c) Public data unit (d) Protocol data unit (14.) What is the Protocol Data Unit (PDU) employed at the Data Link Layer? (a) bits (b) frames (c) packets (d) segments (15.) Which layer of OSI model provides services directly to user applications? (a) application (b) presentation (c) session (d) transport (16.) What network topology implements at least two paths to and from each node? (a) bus (b) ring (c) star (d) mesh (17.) What type of network topology is depicted by a single cable where devices connect using T connectors? (a) star (b) bus (c) ring (d) 10 base T (18.) Which layer of the OSI model deal with physical transmission across a physical network? (a) physical (b) data link (c) network (d) Transport

THIS IS A SAMPLE FILE To buy complete package of TTA Study materials & Postal Course Email us following details at eiidelhi@gmail.com www.engineersinstitute.com 13 EXCLUSIVE coaching program for TTA-JE (BSNL) Enroll your seats immediately (Ltd. Seats ) Classroom Batch for TTA Coaching : REGULAR 2 Months TTA-Distance learning / TTA-Postal Correspondence course All India Test Series

14 BSNL TTA-JE: Regular Classroom Online Test Series Postal Correspondence BSNL JTO: Regular Classroom Online Test Series Postal Correspondence BSNL JTO LICE: Regular Classroom Online Test Series Postal Correspondence Ph. 011-26514888, 9990657855 GATE IES PSUs Regular Classroom Online Test Series Postal Correspondence