0% found this document useful (0 votes)
34 views64 pages

Module 1

The document provides an overview of data communication and networking, covering key concepts such as data flow, network types, and topologies. It discusses fundamental characteristics of data communication, including delivery, accuracy, and timeliness, as well as various network configurations like bus, ring, star, and mesh topologies. Additionally, it outlines the types of connections and switching techniques used in networks.

Uploaded by

Rashmi K T
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views64 pages

Module 1

The document provides an overview of data communication and networking, covering key concepts such as data flow, network types, and topologies. It discusses fundamental characteristics of data communication, including delivery, accuracy, and timeliness, as well as various network configurations like bus, ring, star, and mesh topologies. Additionally, it outlines the types of connections and switching techniques used in networks.

Uploaded by

Rashmi K T
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 64

Sri Krishna Institute of

(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,


Technology
Karnataka)

COMPUTER NETWORKS

MODULE 1

1 /
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

Introduction To Data Communication And Networking


AGENDA

 Data communication
 Networks
 Network Types
 Network Models
 Protocol Layering
 TCP/IP protocol
 The OSI model
 Physical layer
 Transmission media
 Switching 2 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

Data Communication
• Data communication is the transfer of data between the source and the receiver via
some form via some form of transmission medium such as a wire cable.
• Source transmits the data and receiver receives it.
Fundamental Characteristics
• The effectiveness of a data communication system depend on four fundamental
characteristics:

 Delivery- sender should send data to proper destination.

 Accuracy-data should be delivered accurately.

 Timelines-data should reach in proper time.


3 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

Five Components of Data Communication

1.Message: Information to be communicated. Ex: text, numbers,pictures,audio and video.


2.Sender: It is the device that sends the data message. Ex: computer, telephone handset.
3.Receiver: It is the device that receives the data message. Ex: computer, workstation, telephone.
Handset.
4.Transmission Medium: It is the physical path by which message travels from sender to receiver.
Ex: Twisted wire, coaxial cable, fiber-optics cable and radio waves.
5. Protocol: It is a set of rules and regulations to follow while sending and receiving data.

4 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

Data Flow
• The flow of data between two nodes or devices.
• The direction of data flow or Communication can
be in three forms
Simplex
Half duplex
Full duplex

5 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

Simplex mode
• One node will transmit and another node will Receive the data.
• Dataflow or Communication is unidirectional.
• Example: keyboard, monitor.

6 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

Half duplex
Data flows in both direction but one direction at a time.

Communication in both direction but not simultaneously.


Ex: walkie-talkie – conversation on walkie-talkie.

7 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

FULL duplex

• Data flows in both direction simultaneously.

• Two way street, i.e. sending data and receiving data at the same time.
• Ex: Telephone network.
8 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

Data representation
Data can be represented in five formats
 Text-we can send data in text format it is represented in bits format.

It is the combination of 0’s and 1’s.


 Numbers- we can send data in numbers. It is also converted in to bits and transmitted.

 Images- we can send data in image format. Image is nothing but matrix of pixels.

 Audio- Data is in the form of recording or broadcasting of sound and music.

 Video- Data is in the form broadcasting picture or movie. It Is the combination of


both audio and image. //skit.org.in
06/25/2025 9
skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

NETWORKS
• Network is a interconnection of set of devices to communicate each other.
• Computer Network is made up of nodes and links.
NODE
It is capable of sending and receiving a data.
EX: COMPUTERS, WORKSTATION, ROUTER, SWITCHES ETC
LINK
• It carries the data or information.
• It is responsible for sending and receiving the data.
• It can be wired or wireless. Node link Node
• Wired link ex: coaxial cable, Fiber optic cable, USB cable.
• Wireless link ex: infrared, radio, microwave, satellite.

10 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
Network criteria
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

Performance:It measures how well a network can support communication between two nodes in
the Network. It is measured in many ways
– Response time: The total time a node takes to process an inquiry or a request from another
node/ device and respond.
– Throughput: Throughput measures how much data is transferred successfully from the
sender node to the receiver node in a particular time frame.
– Delay: Delay is the measure of time taken to do the delivery.

Reliability:The Reliability of a network is measured by the frequency of failures it is undergoing


and the time it takes to recover from the failures.
Security:It measures how the Network secures the data amid failures and attacks and the policies
and procedures it implements to protect itself from damages and unauthorized access.

11 //skit.org.in
06/25/2025 skit.org.i
Types of connection
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

Point to point
• Dedicated link between two devices.
• The entire channel capacity is reserved only for two
devices in the connection.
• Use actual length of wire to connect two ends.
• There is a single transmitter and a single receiver.
• Ex: Tv and remote for wireless.
12 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
Technology
Karnataka) Multipoint connection
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,

• More than two devices share a single link.


• The channel's capacity is shared temporarily among the devices
connected to the link.
• There is a single transmitter and multiple receivers.
• Spatially shared connection- several devices using same link
simultaneously.
• Timeshared connection- each node takes turn while using the link.

13 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)
TOPOLOGY

Arrangement of nodes in such a way that we can make


communication among all the nodes.
Four types of Topologies
1. Bus topology
2. Ring topology
3. Star topology
4. Mesh topology
14 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka) Bus Topology
 A bus topology is a multipoint communication.
 One single and long cable is used to connect all the other devices in the network.
 Nodes are connected to the bus cable by drop lines and taps.
 Dropline is a connection between the device and the main cable.
 A tap is a connector used to connect with main cable and drop lines.
 In bus topology any computer can data to any other computer’s because all computers
are attached to the main cable.

15 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka) Advantages of bus topology
• It works very efficiently well when there is a small network.
• Very cost-effective as compared to other network topology.
• Easy to expand by joining the two cables together.

Disadvantages of bus topology

• Bus topology is not good for large networks.


• A fault or break in the network breaks entire transmission.
• This network topology is very slow as compared to other topologies.
• No security.
16 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of

RING TOPOLOGY
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

• It is like a bus topology in a closed loop.


• All devices are connected point to point in a shape of
ring.
• A signal is passed along the ring from one device to
another device until it reach its destination.
• Sending and receiving data takes place with the help of
token.
• Data flow is unidirectional.

17 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka) Advantages of Ring Topology
• Due to the presence of token passing the performance of ring topology becomes
better than bus topology under heavy traffic.
• All node have equal access.

Disadvantages of Ring Topology


• No security. due to the Uni-directional Ring, a data packet must have to pass
through all the nodes.
• If any device or node fails in the ring topology the entire network fails.

18 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
STAR TOPOLOGY
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

• A Star topology is a type of network topology in which all the devices or nodes are
physically connected to a central node hub.
• All the data or traffic must pass through the hub or switch.

19 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka) Advantages of Star Topology
• Easy to design and develop
• Fault identification is easy.
• Centralized management.
• A device failure (computer, cable) doesn't damage the entire network.

Disadvantages of Star Topology


• Increased cost due to hub especially for high-performance models.
• Failure of hub affects the whole network.
• The star network necessitates extensive cabling, which can be challenging to
manage, especially in large or complex layouts.
• Managing and maintaining the central hub requires more resources and technical
expertise than simpler topologies.
20 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
MESH TOPOLOGY
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

• Each node is connected to every other node in the network.


• When you send data from your device, it can take different routes to reach its

destination, depending on distance, traffic congestion, and link quality.


• This type of network is often used in large organizations or companies because it can
handle a large amount of data traffic and can be easily expanded.

21 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
Advantages
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka) of Mesh Topology
• Data can be transmitted from different devices simultaneously. It can withstand high
traffic.
• Failure during a single device won’t break the network.
• Fault tolerant and reliable :Even if one connection breaks, the network keeps sending data
through other paths.
• It provides high privacy and security.

Disadvantages of Mesh Topology


• Overall cost of the network is too high compared to other topology.
• Setup and maintenance of this topology is very difficult.

22 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
Technology
Karnataka)
NETWORK TYPES
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,

• Local Area Network (LAN)


• A local area network (LAN) is a computer network that interconnects computers or
devices within a limited area.
Example: school, lab, office, or home.
• A LAN can be small or large, ranging from a home network with one user to an
enterprise network with thousands of users and devices in an office or school.
• LANs are capable of transmitting data at very fast rate with limited distance.

23 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
• Technology
LAN can be connected in two ways
Karnataka)

• Wired LAN: devices connected with cables.


• Ex: Ethernet

• Wireless LAN: devices connected without cable.


• Ex: WI FI

24 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka) Wide Area Network(WAN)
 A wide area network is a telecommunication network that extends over a large
geographical area for the primary purpose of networking.
 Telecommunication network -Any communication at a distance.
 WAN is a interconnection of devices capable of communication.
 Here two or more LAN’s within a country can communicate with each other.

25 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
SWITCHING
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

• Switching is a process of transferring data between two devices in computer


network by selecting the best route for data transmission.
• Switching technique is used to connect the systems for making one-to-one
communication.
• A switching consists of interlinked nodes called switches.
• Switches are hardware or software device capable of creating temporary
connection between two devices.
• A Switch forward data from a network to another network when required.
• Switching network are categorized into
1. Circuit switched network
2. Packet switched network

26 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
Technology
Karnataka) CIRCUIT-SWITCHED NETWORK
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,

• There is a Dedicated communication path is established between two networks.


• It consists of a set of switches connected by physical links.
• A complete end-to-end path must exist before communication can take place.
• Circuit switching in a network operates in a similar way as the
telephone works.
• Circuit switching takes at the physical layer.

• Communication via circuit switching has three phase


 Circuit or connection establishment
 Data transfer
 Circuit or connection disconnect

27 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
EX: Telephone network connection.
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

28 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
CIRCUIT-SWITCHING PROPERTIES
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

In Efficiency
• If no data, capacity is wasted
channel capacity is dedicated for the whole duration of a
connection
Delay
• Long initial delay-circuit establishment takes time.
• Low data delay-after circuit establishment, information is
transmitted at a fixed rate.

• Mainly developed for voice services.

29 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
PACKET-SWITCHED NETWORK
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

• In Packet Switched Network a small units of data called packets are routed
through a network based on the destination address contained within each
packet.
• Each time one device sends a file to another, it breaks the file down into
packets so that it can determine the most efficient route for sending the data
across the network at that time.
• In packet switching no resource allocation for a packet. Resources are allocated
on demand.

30 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
Technology
Karnataka) INTERNET
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,

• This is a wide area network.


• Internet is a worldwide system of interconnected computer networks and electronic
devices that communicate with each other using an established set of protocols.
• There are so many WAN,LAN across the world are connected to each other.
• The process of transferring information over the internet from one device to another
relies on packet switching.
• The Internet is a packet-routing network that uses IP and TCP protocols for
communication.

31 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
Technology
Karnataka)
Accessing the Internet
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,

some common types of Internet service are:


Dial-up: In dial-up connection, computer uses its modem to dial a telephone number given to the
user by an Internet Service Provider.
DSL: DSL service uses a broadband connection, which makes it much faster than dial-up. DSL
connects to the Internet via a phone line but does not require you to have a landline at home.
Cable Networks: Cable service connects to the Internet via cable TV. It uses a broadband
connection and can be faster than both dial-up and DSL service; however, it is only available
where cable TV is available.
Wireless Network:3G and 4G service is most commonly used with mobile phones, and it
connects wirelessly through your ISP's network.
32 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka) Protocol Layering
• Protocol is a set of rules that both the sender and receiver needs to follow to
make communication effective.
• Layering- decomposing the problem into manageable components(layers).
• Simple communication need simple protocol.
• In Complex communication we divide the task or problem into smaller and
form layers to send those problems.
Scenario1: A single layer protocol

33 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU, Second Scenario
Technology
Karnataka)

34 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
Principles of Protocol Layering
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

Frist principle
Both layers need to perform two opposite tasks.
1. First layer is to send and receive mail.
2. Second layer is to encrypt and decrypt.
3. Third layer is to listen or talk.

Logical connection
An imaginary connection established at each layer through which they can send
the object created from that layer.
35 //skit.org.in
06/25/2025 skit.org.i
TCP/IP Protocol suite
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

• This model defines how data is transmitted over networks, ensuring reliable
communication between devices.
• The TCP/IP model consists of five layers: the application layer, transport layer,
network layer, data link layer and physical layer.
• TCP/IP is a hierarchical protocol made up of interactive modules, and each of them
provides specific functionality..
• It is named from two important protocols in it
• Transmission control protocol(TCP)
• Internet protocol (IP)

36 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

37 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)
Physical layer

• This is the lowest layer of the TCP/IP model architecture.


• It is responsible for carrying individual bits in a frame across the link.

Data Link layer


• It is responsible for moving packets through the link.
• The functions carried out by this layer are encapsulating the IP datagram into
frames transmitted by the network and mapping of IP addresses into physical
addresses.
• It defines how the data should be sent physically through the network.
These two layers is mainly responsible for the transmission of the data between
two devices on the same network.

38 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of Network Layer
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

• An network layer is the third layer of the TCP/IP model.


• Communication at the network layer is host to host communication.
• The main responsibility of the internet layer is to send the packets from any network,
and they arrive at the destination irrespective of the route they take.

• Following are the protocols used in this


layer are:
• IP Protocol
• ARP Protocol
• ICMP Protocol
39 //skit.org.in
06/25/2025 skit.org.i
IP PROTOCOL
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

• IP protocol is used in this layer, and it is the most significant part of the entire TCP/IP suite.
• Following are the responsibilities of this protocol:
• IP Addressing: This protocol implements logical host addresses known as IP addresses. The IP
addresses are used by the internet and higher layers to identify the device and to provide
internetwork routing.
• Host-to-host communication: It determines the path through which the data is to be
transmitted.
• Data Encapsulation and Formatting: An IP protocol accepts the data from the transport layer
protocol. It encapsulates the data into message known as IP datagram.
• Routing: it is responsible for routing packet from source to its destination, which can be
accomplished by routing the IP datagram
40 through various devices such as routers. //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)
ARP
• ARP stands for Address Resolution Protocol.
• ARP is a network layer protocol which is used to find the physical address from the IP
address.

ICMP
• ICMP stands for internet control message protocol.
• It stands for Internet Control Message Protocol and notification regarding datagram
problems can be sent back to the user using this. Any issue with the network is
immediately notified to the user by ICMP. It can only inform the user about the errors
and cannot rectify the problem
41 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of Transport Layer
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

• It is responsible for giving service to the application layer


• The transport layer is responsible for the reliability, flow control, and correction
of data which is being sent over the network.
• The two protocols used in the transport layer are User Datagram protocol and
Transmission control protocol.

User Datagram Protocol (UDP)


• It provides connectionless service and end-to-end delivery of transmission.
• It is a simple protocol.
• It is an unreliable protocol as it discovers the errors but not specify the error.
• User Datagram Protocol discovers the error, and ICMP protocol reports the error
to the sender that user datagram has been damaged.
42 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

Transmission Control Protocol (TCP)


 It provides a full transport layer services to applications.
 It creates a virtual circuit between the sender and receiver, and it is active for the duration of the
transmission.
 TCP is a reliable protocol as it detects the error and retransmits the damaged frames. Therefore, it ensures
all the segments must be received and acknowledged before the transmission is considered to be
completed and a virtual circuit is discarded.
 At the sending end, TCP divides the whole message into smaller units known as segment, and each
segment contains a sequence number which is required for reordering the frames to form an original
message.
 At the receiving end, TCP collects all the segments and reorders them based on sequence numbers.
 It provides flow control, error control and congestion control.
43 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU, Application Layer
Technology
Karnataka)

• An application layer is the topmost layer in the TCP/IP model.

• It is a process to process communication.

• This layer allows the user to interact with the application.

Following are the main protocols used in the application layer:


• HTTP: HTTP stands for Hypertext transfer protocol. This protocol allows us to access the data over the

world wide web. It transfers the data in the form of plain text, audio, video.

• SNMP: SNMP stands for Simple Network Management Protocol.it is used by administrator to manage

internet at global and local levels.

44 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

• SMTP: SMTP stands for Simple mail transfer protocol. Used in electronic mail

service.

• DNS: DNS stands for Domain Name System. It is used by other protocols to find

the network layer address of a computer.

• TELNET: It is an abbreviation for Terminal Network. Accessing site remotely.

• FTP: FTP stands for File Transfer Protocol. FTP is a standard internet protocol

used for transmitting the files from one computer to another computer.

45 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Encapsulation
Technology
Karnataka)

The process of adding headers and trailers around data being sent
through a network. At source we have only encapsulation.
At Application layer: data to be exchanged is called as message, it
doesn’t contain any header and trailer. This message is passed to
transport layer.
At 46 //skit.org.in
Transport layer: It takes message as payload, adds header and
06/25/2025 skit.org.i
Decapsulation and Encapsulation at router
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

• Decapsulation: the reverse process of encapsulation occurs when data is received on the
destination computer.
• At router we have both encapsulation and decapsulation.
• Data link layer receives set of bits, it decapsulates frame into datagram and passes to
network layer.
• At network layer it only inspects source and destination address and consults its forwarding
table to find next hop. The datagram is passed to datalink layer of the next link.
• The data link layer of next link encapsulates the datagram and passes it to physical layer
for transmission.
Decapsulation at destination
• At destination each layer decapsulates the packet received.
• Removes the payload and deliver packet to next higher layer protocol until message
reaches the application layer.
47 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
ADDRESSING
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

TCP/IP includes an Internet


addressing scheme that allows users
and applications to identify a
specific network or host with which
to communicate.

48 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of Multiplexing and
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
demultiplexing
Karnataka)

 The TCP/IP protocol suite uses several protocols at some layer. We have multiplexing at source and
demultiplexing at destination.
 Multiplexing means the protocol at a layer can encapsulate a packet from several next higher layer
protocols.
 Demultiplexing means the protocol can decapsulate and send a packet to several next higher layer protocols.

49 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)
OSI MODEL
• OSI stands for Open System Interconnection is a reference model that
describes how to facilitate communication between different systems without
requiring changes to the logic of the underlying hardware or software.
• OSI model was developed by the International Organization for Standardization
(ISO) in 1984, and it is now considered as an architectural model for the inter-
computer communications.
• OSI consists of seven layers, and each layer performs a particular network
function.
• OSI model divides the whole task into seven smaller and manageable tasks.
Each layer is assigned a particular task.
• Each layer is self-contained, so that task assigned to each layer can be
performed independently.

50 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU, Layers of OSI Model
Technology
Karnataka)

There are the seven OSI layers. Each layer has different functions. A list of seven
layers are given below:
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer

• Each layers are related and each of which defines a part of the process of moving
51 //skit.org.in
06/25/2025
information across the network. skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka) OSI VERSUS TCP/IP
 The biggest difference between the OSI and TCP/IP models is the OSI model has seven
layers instead of five. Although both the TCP/IP and OSI models transport data, the
ways they send it are slightly different.
 The session and presentation layers are separate
in OSI Model, but in TCP/IP model they are not
distinguished.
 TCP/IP model, the transport layer has more than
One protocol, so some functionalities of session
Layer are available in some
transport layer protocol.

52 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU, PACKET SWITCHING
Technology
Karnataka)

The packet switching is a switching technique in which the message is divided into
packets, and they are sent individually which allow faster and efficient data transfer.
Two types of packet switched networks:
1.Datagram network
2.Virtual circuit network

53 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU, Datagram Network:
Technology
Karnataka)

• It is a packet switching technology in which packet is known as a datagram


• Each packet is considered as an independent entity.
• Each packet contains the information about the destination and switch uses this
information to forward the packet to the correct destination.
• The packets are reassembled at the receiving end in correct order.
• In Datagram Packet Switching technique, the path is not fixed.
• Intermediate nodes take the routing decisions to forward the packets.
• Datagram Packet Switching is also known as connectionless switching.

54 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
• Technology
Problems
Karnataka)
during data transmission
• Datagrams can arrive out of order with different delays between the packets.
• Packets may also be lost or dropped because of lack of resources.
• In most protocols it is the responsibility of the upper layer protocol to reorder the
datagrams or ask for lost datagrams before passing them on to the application.
• There are no setup or teardown phases.
• How are the packets routed to their destination??

55 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
Routing table in a datagram network
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

• Each packet switch has a routing table which is based on the destination address.
• The routing tables are dynamic and are updated periodically.
• The destination addresses and the corresponding forwarding output ports are
recorded in the tables.
• The destination address in the header of a packet in a datagram network remains
the same during the entire journey of the packet.
• When the switch receives the packet, this destination address is examined, the
routing table is consulted to find the corresponding port through which the packet
should be forwarded.

56 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)
EFFICIENCY
• Better than circuit switched network
• Resources are allocated only when there are packets to be
transferred.
• If a source sends a packet and there is a delay of few minutes
before another packet can be sent, the resources can be
reallocated during these minutes for other packets from other
sources.
• Switching in the internet is done by using the datagram
approach to packet switching at the network layer.

57 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of Delay in datagram
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
network
Karnataka)

• There may be greater delay in a datagram network than in a virtual circuit


network.
• Although there are no setup and teardown phases, each packet may experience a
wait at a switch before it is forwarded.

58 //skit.org.in
06/25/2025 skit.org.i
Virtual circuit switching
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Network
Karnataka)

• A virtual circuit network is a cross between a circuit switched network and a


datagram network.

Charateristics:
• Packets form a single message travel along the same path.
• Three phases to transfer data(setup, data transfer and tear down)
• Resources can be allocated during setup phase.
• Data are packetized and each packet carries an address in the header
• Implemented in data link layer. 59 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
Virtual circuit switching Network Addressing
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

Global addressing
• Source and destination needs unique addresses(used by the switches
only to create a virtual circuit identifier) during the set up phase.

Local Addressing(VCI- virtual circuit identifier)


• Actually used for data transfer

• A small address used by a frame between two

• switches.
60 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)
Setup request

• The switch, in the setup phase acts as a packet switch, it has a routing table used to know the output
port number //skit.org.in
06/25/2025 61
skit.org.i
Setup Acknowledgement
Sri Krishna Institute of
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

• When destination B receives the up frame, and it is ready to receive frames


from A, it assign a VCI. This VCI lets the destination know that the frame
comes from A not other sources.

62 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
Data transfer and tear down phase
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

• After sending all frames, a special frame is send to end the connection.
• Destination B responds with tear down confirmation frame .

63 //skit.org.in
06/25/2025 skit.org.i
Sri Krishna Institute of
Delay in virtual circuit Network
(Approved by AICTE, Accredited by NAAC, Affiliated to VTU,
Technology
Karnataka)

• In datagram network each packet may experience a wait at a switch before it is


forwarded. In addition the delay is not uniform for
• The packets of a message in a virtual circuit network, there is a one-time delay for setup
and a one-time delay for tear down. If resource allocated during the setup phase, there is
no Wait time for individual packets.

64 //skit.org.in
06/25/2025 skit.org.i

You might also like