SlideShare a Scribd company logo
Data Communications & Networking
                      Lecture-04


            Course Instructor : Sehrish Rafiq
            Department Of Computer Science
                     University Of Peshawar
Lecture overview
 Categories of Networks
 Internetworks
 An overview of the communication tasks
 Protocol Architecture
 Characteristics of a protocol
Categories of Networks




 In to which category a network falls is determined by its size, its
  ownership, the distance it covers and its physical architecture.
LAN(Local Area Network)
 A local Area network is usually privately owned and links the
  devices in a single office, building or campus.
 LAN size is limited to a few kilometers.
 LAN’s are designed to allow resources to be shared between
  personal computers or work stations.
 In addition to size LAN are distinguished from other types of
  networks by their transmission media and topology.
 Most common topologies:Bus,Ring & Star.
LAN(Local Area Network)
MAN(Metropolitan Area Network)
 A MAN is designed to extend over an entire city.


 It may be a single network such as cable television network or it
  may be a means of connecting a number of connecting a number
  of LANs in to a larger network so that resources may be shared
  LAN-to-LAN.

 A MAN may be wholly owned and operated by a private company
  such as local telephone company.
MAN(Metropolitan Area
     Network)
WAN(Wide Area Network)
 A WAN provides long distance transmission of voice, data, image
  and video information over large geographic areas that may
  comprise a country, a continent or even the whole world.

 WANs may utilize public, leased or private communication devices
  usually in communications and can therefore span an unlimited
  number of miles.

 A WAN that is wholly owned and used by a single company is often
  referred to as enterprise network.
WAN(Wide Area Network)
Internetworks
 When two or more networks are connected, they became an
  internetwork or internet.

 The Internet from “I” is a Wide area network while the
  internet from “i” refers to the interconnection of networks.

 Internet can be thought as internet but the reverse is not
  necessarily true.
History of Internet
   1960,A project of ARPA of US department of
    Defense
   Stanford Research Institute
   University of California at Los Angeles
   University of California at Santa Barbara
   University of Utah
   Features
   Redundant lines
   Decentralized Computing
   1980, NSF and other Government agencies
   1991,Commercial traffic
   April 1995,US government action
   2000,30 million users on 10 million
    computers,240000 networks, 100 countries
   Monthly growth
Communication Tasks
 Transmission System utilization
 Interfacing
 Signal generation
 Synchronization
 Exchange Management
 Error Detection & Correction
 Flow Control
 Addressing
 Routing
 Recovery
 Message formatting
 Security
 Network Management
Transmission System utilization
 Transmission System utilization refers to the need to make
  efficient use of transmission facilities that are typically shared
  among a number of communicating devices.
 Various techniques (referred to as multiplexing) are used to
  allocate the total capacity of a transmission medium among a
  number of users.
 Congestion Control techniques may be required to assure that the
  system is not overwhelmed by excessive demand for transmission
  services.
Interfacing & Signal generation

 To communicate a device must interface with the transmission
  system.
 Once an interface is established, signal generation is required for
  communication.
 The properties of the signal such as form and intensity must be
  such that they are:
 capable of being propagated through the transmission system
 Interpretable as data at the receiver.
Synchronization
 Not only must the signals be generated to confirm to the
  requirements of the transmission system and receiver, but there
  must be some form of synchronization between transmitter and
  receiver.
Exchange Management
 If data are to be exchanged in both directions over a period of
  time, the two parties must cooperate. e.g. Telephone.

 For data processing devices more will be done than simply
  establishing a connection, certain conventions must be decided
  upon.

 These conventions may include whether both devices may
  transmit simultaneously or must take turns, the amount of data to
  be sent at one time, the format of the data and what to do if
  certain contingencies such as an error arise.
Error Detection and Correction
 Error detection and correction are required in circumstances
  where errors cannot be tolerated.

 This is usually the case with data processing systems.


 For example in transferring a file from one computer to another it
  is simply not acceptable for the contents of the file to be
  accidentally altered.
Flow Control
 Flow Control is required to assure that the source does not
  overwhelm the destination by sending data faster than they can be
  processed and absorbed.
Addressing and routing
 When a transmission facility is shared by more than two devices,
  the source system must indicate the identity of the intended
  destination.

 The transmission system must assure that the destination system
  and only that system receives the data.

 Further the transmission system may itself be a network through
  which various paths may be taken.

 A specific route through this network must be chosen.
Recovery
 Recovery techniques are needed in situations in which an
  information exchange ,such as a database transaction or file
  transfer, is interrupted due to a fault somewhere in the system.

 The objective is either to be able to resume activity at the point of
  interruption or atleast to restore the state of systems involved to
  the condition prior to the beginning of exchange.
Message formatting
Message formatting has to do with an agreement between
  two parties as to the form and format of the data to be
  exchanged or transmitted, such as the binary code for
  characters.
Security
 The sender of data may wish to be assured that only the intended
  receiver actually receives the data.

 And the receiver of the data may wish to be assured that the
  received data have not been altered in transit and the data actually
  come from the purported sender.
Network Management
Finally, a data communication facility is a complex system
  that cannot create or run itself.

Network Management capabilities are needed to configure
  the system, monitor its status, react to failures and overloads
  and plan intelligently for future growth.
Protocol Architecture
Instead of implementing the logic for communication
  between two computers as a single module, the task is
  broken up in to subtasks, each of which is implemented
  separately as a structured set of modules.

That structure is referred to as a protocol architecture.
A Simplified Architecture for File
                      Transfer

 Computer Y                                                    Computer Z
                        Files and File Transfer Commands
File Transfer                                                 File Transfer
Application                                                   Application
Communication             Communications-related data units   Communication
service module                                                service module
Network access                                                Network access
module                           Communic
                                  Communic                    module
                                   ations
                                    ations
                                  Network
                                   Network
            Network Interface                  Network Interface
            Logic                              Logic
Characteristics of a Protocol
Direct/Indirect
Monolithic/Structured
Symmetric / Asymmetric
Standard / Non Standard
Suggested Readings
Section 1.1,Section 1.4, Section 2.1 of Data and computer
 communications sixth edition by william stallings
Section 2.4 Categories of networks Data communications
 and networking 2nd edition by Behrouz A foruzan
Thanks!!!

More Related Content

PPTX
Evolution of Computer Networking
PPTX
Data Communication and Networks
PPT
Fundamentals of data network
PPTX
Introduction to computer networks
PPT
Computer communications and networks
PPT
data communication and Network.ppt
PPTX
Network & internet presentation
PPTX
8 Networking for ICT.pptx
Evolution of Computer Networking
Data Communication and Networks
Fundamentals of data network
Introduction to computer networks
Computer communications and networks
data communication and Network.ppt
Network & internet presentation
8 Networking for ICT.pptx

What's hot (20)

PDF
Image Restoration (Digital Image Processing)
PPTX
Leaky Bucket & Tocken Bucket - Traffic shaping
PPT
Network Layer,Computer Networks
PPTX
Network management
PDF
Imaging geometry
PPTX
Digital Image Processing
PDF
Lecture 19 22. transport protocol for ad-hoc
PPT
Wireless routing protocols
PPTX
Lecture 12 time_domain_analysis_of_control_systems
PDF
Control system digital control
PDF
Multiple Access in Computer Network
PDF
Image processing fundamentals
PPT
Defected fruit detection
PPTX
Decomposition methods in DBMS
PPTX
fuzzy image processing
PPTX
Transport layer
PPTX
IPv4 Addressing
ODP
UMTS, Introduction.
Image Restoration (Digital Image Processing)
Leaky Bucket & Tocken Bucket - Traffic shaping
Network Layer,Computer Networks
Network management
Imaging geometry
Digital Image Processing
Lecture 19 22. transport protocol for ad-hoc
Wireless routing protocols
Lecture 12 time_domain_analysis_of_control_systems
Control system digital control
Multiple Access in Computer Network
Image processing fundamentals
Defected fruit detection
Decomposition methods in DBMS
fuzzy image processing
Transport layer
IPv4 Addressing
UMTS, Introduction.
Ad

Viewers also liked (6)

PPT
Lecture 02
PPT
Lecture 05
PPT
Lecture 09
PPT
Lecture 10
PPT
Lecture 08
PPSX
Data communication - Lecture-01
Lecture 02
Lecture 05
Lecture 09
Lecture 10
Lecture 08
Data communication - Lecture-01
Ad

Similar to Lecture 04 (20)

PPTX
Introduction to Computers Lecture # 13
PDF
Ch 1 network
PPTX
ppt_dcn.pptx networks networks security of networks
PPT
Data & comp. communication
DOCX
17 130920091458-phpapp01
PDF
ppt_dcn.pdf
PDF
Computer Networks-1 1st unit (10CS55) VTU
PPTX
Data computer networks from rajeev institute of technology
PPTX
Module_1 Final.pptx _Behrouz A. Forouzan, Data Communications and Networking,...
PPTX
Data Representation in Data Communication (1).pptx
PPTX
Presentation1 Networking.pptx
PPT
waleed khaliqi DataCommunication Lec !
PPTX
CCN 1 Slide (1).pptx
PDF
Data Communications and Networking By Behrouz A.Forouzan1-2.pdf
PPTX
Computer Network unit-1 complete Notes.pptx
DOCX
Data Communication, Networking & Internet
PPTX
Network Fundamentals1.pptx
PPT
Itmg360 chapter one_v05
PPTX
Chapter No 1 Introduction to Network and Network Models.pptx
PPTX
Chapter 2.pptx
Introduction to Computers Lecture # 13
Ch 1 network
ppt_dcn.pptx networks networks security of networks
Data & comp. communication
17 130920091458-phpapp01
ppt_dcn.pdf
Computer Networks-1 1st unit (10CS55) VTU
Data computer networks from rajeev institute of technology
Module_1 Final.pptx _Behrouz A. Forouzan, Data Communications and Networking,...
Data Representation in Data Communication (1).pptx
Presentation1 Networking.pptx
waleed khaliqi DataCommunication Lec !
CCN 1 Slide (1).pptx
Data Communications and Networking By Behrouz A.Forouzan1-2.pdf
Computer Network unit-1 complete Notes.pptx
Data Communication, Networking & Internet
Network Fundamentals1.pptx
Itmg360 chapter one_v05
Chapter No 1 Introduction to Network and Network Models.pptx
Chapter 2.pptx

More from Sehrish Rafiq (20)

PPTX
Introduction to Computers Lecture # 14
PPTX
Introduction to Computers Lecture # 12
PPTX
Introduction to Computers Lecture # 11
PPTX
Introduction to Computers Lecture # 10
PPTX
Introduction to Computers Lecture # 9
PPTX
Introduction to Computers Lecture # 8
PPTX
Introduction to Computers Lecture # 7
PPTX
Introduction to computers Lecture # 4
PPTX
Introduction to Computers Lecture # 5
PPTX
Introduction to Computers Lecture # 3
PPTX
Introduction to Computers Lecture # 2
PPTX
Introduction to Computers Lecture # 1
PPT
Data Communications and Networking Lecture 16
PPT
Lecture 24
PPT
Lecture 18
PPT
Lecture 21
PPT
Lecture 13
PPT
Lecture 12
PPT
Lecture 11
PPT
Lecture 07
Introduction to Computers Lecture # 14
Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 7
Introduction to computers Lecture # 4
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 1
Data Communications and Networking Lecture 16
Lecture 24
Lecture 18
Lecture 21
Lecture 13
Lecture 12
Lecture 11
Lecture 07

Recently uploaded (20)

PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Cloud computing and distributed systems.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Big Data Technologies - Introduction.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Network Security Unit 5.pdf for BCA BBA.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Reach Out and Touch Someone: Haptics and Empathic Computing
Digital-Transformation-Roadmap-for-Companies.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation_ Review paper, used for researhc scholars
Unlocking AI with Model Context Protocol (MCP)
Chapter 3 Spatial Domain Image Processing.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Cloud computing and distributed systems.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Building Integrated photovoltaic BIPV_UPV.pdf

Lecture 04

  • 1. Data Communications & Networking Lecture-04 Course Instructor : Sehrish Rafiq Department Of Computer Science University Of Peshawar
  • 2. Lecture overview  Categories of Networks  Internetworks  An overview of the communication tasks  Protocol Architecture  Characteristics of a protocol
  • 3. Categories of Networks  In to which category a network falls is determined by its size, its ownership, the distance it covers and its physical architecture.
  • 4. LAN(Local Area Network)  A local Area network is usually privately owned and links the devices in a single office, building or campus.  LAN size is limited to a few kilometers.  LAN’s are designed to allow resources to be shared between personal computers or work stations.  In addition to size LAN are distinguished from other types of networks by their transmission media and topology.  Most common topologies:Bus,Ring & Star.
  • 6. MAN(Metropolitan Area Network)  A MAN is designed to extend over an entire city.  It may be a single network such as cable television network or it may be a means of connecting a number of connecting a number of LANs in to a larger network so that resources may be shared LAN-to-LAN.  A MAN may be wholly owned and operated by a private company such as local telephone company.
  • 8. WAN(Wide Area Network)  A WAN provides long distance transmission of voice, data, image and video information over large geographic areas that may comprise a country, a continent or even the whole world.  WANs may utilize public, leased or private communication devices usually in communications and can therefore span an unlimited number of miles.  A WAN that is wholly owned and used by a single company is often referred to as enterprise network.
  • 10. Internetworks  When two or more networks are connected, they became an internetwork or internet.  The Internet from “I” is a Wide area network while the internet from “i” refers to the interconnection of networks.  Internet can be thought as internet but the reverse is not necessarily true.
  • 11. History of Internet  1960,A project of ARPA of US department of Defense  Stanford Research Institute  University of California at Los Angeles  University of California at Santa Barbara  University of Utah  Features  Redundant lines  Decentralized Computing  1980, NSF and other Government agencies  1991,Commercial traffic  April 1995,US government action  2000,30 million users on 10 million computers,240000 networks, 100 countries  Monthly growth
  • 12. Communication Tasks  Transmission System utilization  Interfacing  Signal generation  Synchronization  Exchange Management  Error Detection & Correction  Flow Control  Addressing  Routing  Recovery  Message formatting  Security  Network Management
  • 13. Transmission System utilization  Transmission System utilization refers to the need to make efficient use of transmission facilities that are typically shared among a number of communicating devices.  Various techniques (referred to as multiplexing) are used to allocate the total capacity of a transmission medium among a number of users.  Congestion Control techniques may be required to assure that the system is not overwhelmed by excessive demand for transmission services.
  • 14. Interfacing & Signal generation  To communicate a device must interface with the transmission system.  Once an interface is established, signal generation is required for communication.  The properties of the signal such as form and intensity must be such that they are:  capable of being propagated through the transmission system  Interpretable as data at the receiver.
  • 15. Synchronization  Not only must the signals be generated to confirm to the requirements of the transmission system and receiver, but there must be some form of synchronization between transmitter and receiver.
  • 16. Exchange Management  If data are to be exchanged in both directions over a period of time, the two parties must cooperate. e.g. Telephone.  For data processing devices more will be done than simply establishing a connection, certain conventions must be decided upon.  These conventions may include whether both devices may transmit simultaneously or must take turns, the amount of data to be sent at one time, the format of the data and what to do if certain contingencies such as an error arise.
  • 17. Error Detection and Correction  Error detection and correction are required in circumstances where errors cannot be tolerated.  This is usually the case with data processing systems.  For example in transferring a file from one computer to another it is simply not acceptable for the contents of the file to be accidentally altered.
  • 18. Flow Control  Flow Control is required to assure that the source does not overwhelm the destination by sending data faster than they can be processed and absorbed.
  • 19. Addressing and routing  When a transmission facility is shared by more than two devices, the source system must indicate the identity of the intended destination.  The transmission system must assure that the destination system and only that system receives the data.  Further the transmission system may itself be a network through which various paths may be taken.  A specific route through this network must be chosen.
  • 20. Recovery  Recovery techniques are needed in situations in which an information exchange ,such as a database transaction or file transfer, is interrupted due to a fault somewhere in the system.  The objective is either to be able to resume activity at the point of interruption or atleast to restore the state of systems involved to the condition prior to the beginning of exchange.
  • 21. Message formatting Message formatting has to do with an agreement between two parties as to the form and format of the data to be exchanged or transmitted, such as the binary code for characters.
  • 22. Security  The sender of data may wish to be assured that only the intended receiver actually receives the data.  And the receiver of the data may wish to be assured that the received data have not been altered in transit and the data actually come from the purported sender.
  • 23. Network Management Finally, a data communication facility is a complex system that cannot create or run itself. Network Management capabilities are needed to configure the system, monitor its status, react to failures and overloads and plan intelligently for future growth.
  • 24. Protocol Architecture Instead of implementing the logic for communication between two computers as a single module, the task is broken up in to subtasks, each of which is implemented separately as a structured set of modules. That structure is referred to as a protocol architecture.
  • 25. A Simplified Architecture for File Transfer Computer Y Computer Z Files and File Transfer Commands File Transfer File Transfer Application Application Communication Communications-related data units Communication service module service module Network access Network access module Communic Communic module ations ations Network Network Network Interface Network Interface Logic Logic
  • 26. Characteristics of a Protocol Direct/Indirect Monolithic/Structured Symmetric / Asymmetric Standard / Non Standard
  • 27. Suggested Readings Section 1.1,Section 1.4, Section 2.1 of Data and computer communications sixth edition by william stallings Section 2.4 Categories of networks Data communications and networking 2nd edition by Behrouz A foruzan