Computer Networks: Characteristics of Data Communications System
Computer Networks: Characteristics of Data Communications System
Half-duplex- Each station can both transmit and receive, but not at the same time. When
one device is sending, the other can only receive, and vice versa
Networks
A node can be a computer, printer, or any other device capable of sending and/or
receiving data generated by other nodes on the network.
Distributed Processing:
A task is divided among multiple computers instead of one single large machine.
Network Criteria:
A network must be able to meet a certain number of criteria. The most important of these
are performance, reliability, and security.
Performance:
Performance can be measured in many ways, including transit time and response time.
Transit time:
Is the amount of time required for a message to travel from one device to another.
Response time: Is the elapsed time between an inquiry and a response.
Reliability:
The frequency of failure, the time it takes a link to recover from a failure, and the
network's robustness in a catastrophe.
Security:
Protecting data from unauthorized access, protecting data from damage and development,
and implementing policies and procedures for recovery from breaches and data losses
Physical Structures
Type of Connection
A network is two or more devices connected through links. A link is a communications
pathway that transfers data from one device to another.
Multipoint
A multipoint (also called multidrop) connection is one in which more than two specific
devices share a single link. If several devices can use the link simultaneously, it is a
spatially shared connection. If users must take turns, it is a timeshared connection.
Physical Topology
Two or more devices connect to a link; two or more links form a topology. The topology
of a network is the geometric representation of the relationship of all the links and linking
devices (usually called nodes) to one another There are four basic topologies possible:
mesh, star, bus, and ring
Mesh
Mesh In a mesh topology, every device has a dedicated point-to-point link to every other
device. In a mesh topology, we need n(n -1) /2 duplex-mode links.
Advantages:
Privacy and Security.
Each connection can carry its own load, thus eliminating the traffic problems.
Point-to-point links make fault identification and fault isolation easy.
Disadvantages:
The amount of cabling and the number of I/O ports required, installation and
reconnection are difficult.
The hardware required to connect each link (I/O ports and cable) can be prohibitively
expensive.
Star Topology
Each device has a dedicated point-to-point link only to a central controller, usually called
a hub. The devices are not directly linked to one another. A star topology is less
expensive than a mesh topology.
Advantages:
Each device needs only one link and one I/O port to connect it to any number of others.
Far less cabling needs to be housed.
Robustness.
Disadvantages
Is the dependency of the whole topology on one single point, the hub. If the hub goes
down, the whole system is dead.
Bus Topology
A bus topology, on the other hand, is multipoint. One long cable act as a backbone to link
all the devices in a network. A drop line is a connection running between the device and
the main cable.
Advantages:
Ease of installation
Less cabling than mesh or star topologies.
Disadvantages
Difficult reconnection and fault isolation.
Ring Topology
Each device has a dedicated point-to-point connection with only the two devices on either
side of it. A signal is passed along the ring in one direction, from device to device, until it
reaches its destination.
Disadvantages
Unidirectional traffic
Hybrid Topology:
A network can be hybrid. For example, we can have a main star topology with each
branch connecting several stations in a bus.
Network Models
The two best-known standards are the OSI model and the Internet model. The OSI (Open
Systems Interconnection) model defines a seven-layer network; the Internet model
defines a five-layer network.
Categories of Networks
Two primary categories: Local-area networks and wide-area networks. A LAN normally
covers an area less than 2 mi; a WAN can be worldwide. Networks of a size in between
are normally referred to as metropolitan area networks and span tens of miles.
Semantics: The word semantics refers to the meaning of each section of bits. How is a
particular pattern to be interpreted.
Timing: when data should be sent and how fast they can be sent. For example, if a sender
produces data at 100 Mbps but the receiver can process.
Forums:
Telecommunications technology development is moving faster than the ability of
standards committees to ratify standards.
Internet Standards:
An Internet draft is a working document (a work in progress) with no official status and a
6-month lifetime. Upon recommendation from the Internet authorities, a draft may be
published as a Request for Comment (RFC). Each RFC is edited, assigned a number, and
made available to all interested parties. RFCs go through maturity levels and are
categorized according to their requirement level.
Layered task:
We use the concept of layers in our daily life. As an example, let us consider two friends
who communicate through postal mail. The process of sending a letter to a friend would
be complex if there were no services available from the post office. Topics discussed in
this section: Sender, Receiver, and Carrier Hierarchy
we have a sender, a receiver, and a carrier that transports the letter. There is a hierarchy
of tasks.
The letter is then on its way to the recipient. On the way to the recipient's local post
office, the letter may actually go through a central office. In addition, it may be
transported by truck, train, airplane, boat, or a combination of these.
Lower layer : The carrier transports the letter to the post office.
Middle layer : The letter is sorted and delivered to the recipient's mailbox.
Higher layer : The receiver picks up the letter, opens the envelope, and reads it.
An open system is a set of protocols that allows any two different systems to
communicate regardless of their underlying architecture. The purpose of the OSI model is
to show how to facilitate communication between different systems without requiring
changes to the logic of the underlying hardware and software. The OSI model is not a
protocol; it is a model for understanding and designing a network architecture that is
flexible, robust, and interoperable.
LAYERED ARCHITECTURE
In developing the model, the designers distilled the process of transmitting data to
its most fundamental elements. They identified which networking functions had related
uses and collected those functions into discrete groups that became the layers. Each
layer defines a family of functions distinct from those of the other layers. By defining
and localizing functionality in this fashion, the designers created an architecture that is
both comprehensive and flexible.
The OSI model is composed of seven ordered layers: physical (layer 1), data link (layer 2),
network (layer 3), transport (layer 4), session (layer 5), presentation (layer 6), and
application (layer 7).
Encapsulation
The data portion of a packet at level N - 1 carries the whole packet from level N. The
concept is called encapsulation. Level N - 1 is not aware of which part of the encapsulated
packet is data and which part is the header or trailer. For level N - 1, the whole packet
coming from level N is treated as one integral unit.
The OSI Model (Open Systems Interconnection Model) is a conceptual framework used
to describe the functions of a networking system. The OSI model characterizes
computing functions into a universal set of rules and requirements in order to support
interoperability between different products and software. In the OSI reference model, the
communications between a computing system are split into seven different abstraction
layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Created at a time when network computing was in its infancy, the OSI was published in
1984 by the International Organization for Standardization (ISO). Though it does not
always map directly to specific systems, the OSI Model is still used today as a means to
describe Network Architecture.
Network Layer
The network layer is responsible for receiving frames from the data link layer, and
delivering them to their intended destinations among based on the addresses contained
inside the frame. The network layer finds the destination by using logical addresses, such
as IP (internet protocol). At this layer, routers are a crucial component used to quite
literally route information where it needs to go between networks.
Transport Layer
The transport layer manages the delivery and error checking of data packets. It regulates
the size, sequencing, and ultimately the transfer of data between systems and hosts. One
of the most common examples of the transport layer is TCP or the Transmission Control
Protocol.
Session Layer
The session layer controls the conversations between different computers. A session or
connection between machines is set up, managed, and ermined at layer 5. Session layer
services also include authentication and reconnections.
Presentation Layer
The presentation layer formats or translates data for the application layer based on the
syntax or semantics that the application accepts. Because of this, it at times also called
the syntax layer. This layer can also handle the encryption and decryption required by the
application layer.
Application Layer
At this layer, both the end user and the application layer interact directly with the
software application. This layer sees network services provided to end-user applications
such as a web browser or Office 365. The application layer identifies communication
partners, resource availability, and synchronizes communication.
Network Layer
At the network layer (or, more accurately, the internetwork layer), TCP/IP supports the
Internetworking Protocol. IP, in turn, uses four supporting protocols: ARP, RARP,
ICMP, and IGMP
The Internetworking Protocol (IP) is the transmission mechanism used by the TCP/IP
protocols. It is an unreliable and connectionless protocol-a best-effort delivery service.
The Address Resolution Protocol (ARP) is used to associate a logical address with a
physical address.
The Reverse Address Resolution Protocol (RARP) allows a host to discover its Internet
address when it knows only its physical address. It is used when a computer is connected
to a network for the first time or when a diskless computer is booted.
The Internet Control Message Protocol (ICMP) is a mechanism used by hosts and
gateways to send notification of datagram problems back to the sender.
The Internet Group Message Protocol (IGMP) is used to facilitate the simultaneous
transmission of a message to a group of recipients.
Transport Layer
Traditionally the transport layer was represented in TCP/IP by two protocols: TCP and
UDP. IP is a host-to-host protocol, meaning that it can deliver a packet from one physical
device to another. UDP and TCP are transport level protocols responsible for delivery of
a message from a process (running program) to another process.
The User Datagram Protocol (UDP) is the simpler of the two standard TCPIIP transport
protocols. It is a process-to-process protocol that adds only port addresses, checksum
error control, and length information to the data from the upper layer.
The Transmission Control Protocol (TCP) provides full transport-layer services to
applications. TCP is a reliable stream transport protocol.
TCP divides a stream of data into smaller units called segments. Each segment includes a
sequence number for reordering after receipt, together with an acknowledgment number
for the segments received.
The Stream Control Transmission Protocol (SCTP) provides support for newer
applications such as voice over the Internet
Application Layer
The application layer in TCPIIP is equivalent to the combined session, presentation, and
application layers in the OSI model. Many protocols are defined at this layer.