Subject Name: Data Communication and Networking
Subject code : SAZ6B/ SAE6A/ SEU6D
Syllabus Unit I: Introduction to Data Communication, Network, Protocols & standards
and standards organizations - Line Configuration - Topology - Transmission mode
- Classification of Network - OSI Model - Layers of OSI Model.
PART-A
1. What are the goals of a network?
2. What is an interface?
3. What do you mean by bit stuffing?
4. Distinguish between LAN and WAN
5. What is a Network?
6. Name the characteristics that determine
the effectiveness of data communication system.
7. What are the two types of line
configuration?
8. What do you mean by Data Communication?
9. Define Network.
10. List the seven layers of an OSI model.
11. What do you mean by Data Communication?
12. What is LAN?
13. What is the use of Microwaves?
PART-B
1. Explain the design issues of network
layer.
2. Explain briefly the five components of a
data communication system.
3. Explain any two types of network
topology.
4. Explain the five components of a data
communication system.
5. Explain the LAN and MAN Networks with a
neat Diagram.
6. Discuss about Twisted-Pair Cable.
7. Write a short note on protocol and
standards.
8. Explain the LAN and MAN networks, with
neat diagrams.
9. Explain the five components of a data
communication system.
10. What are the advantages and
disadvantages of optical fiber?
PART-C
1. Explain the various classification of
network in detail.
2. Discuss in detail about OSI model.
3. Explain the various network topologies
with neat diagrams.
முன்நோக்கி செல்லும் போது கனிவாயிரு. ஒருவேளை பின்நோக்கி
வரநேரிட்டால் யாராவது உதவுவார்கள்.
சலித்துக் கொள்பவன் ஒவ்வொரு வாய்ப்பிலும் உள்ள ஆபத்தைப் பார்க்கிறான். சாதிப்பவன் ஒவ்வொரு ஆபத்திலும் உள்ள வாய்ப்பினைப் பார்க்கிறான்.
1. What are the goals of a network?
ü
The main goal of networking is "Resource
sharing" to make all programs, data and equipment available to
anyone on the network without the regard to the physical location of the
resource and the user.
ü
A second goal is to provide high reliability by
having alternative sources of supply.
2. What is a Link?
ü
At the lowest level, a network can consist of
two or more computers directly connected by some physical medium such as
coaxial cable or optical fiber. Such a physical medium is called as Link.
3. What do you mean by bit stuffing?
ü Bit stuffing is the
process of adding one extra 0 whenever five consecutive 1s follow a 0 in the
data, so that the receiver does not mistake the pattern 0111110 for a flag.
4. Distinguish between LAN and WAN
ü
LAN
(Local Area Network) is a computer network covering a small geographic
area, like a home, office, school, or group of buildings.
ü One
LAN can be connected to other LANs over any distance via telephone lines and
radio waves.
ü LAN
covers 100 m.
ü
The network is spread to a very small location.
ü
WAN (Wide
Area Network) is a computer network that covers a broad area (e.g., any
network whose communications links cross metropolitan, regional, or national
boundaries over a long distance)
ü Computers
connected to a wide-area network are often connected through public networks,
such as the telephone system. They can also be connected through leased lines
or satellites.
ü WAN
covers more than 100 m.
ü
The network is spread world wide
5. Define Network. (Or) What is a Network?
ü
A network
is a set of devices (often referred to as nodes) connected by communication
links.
ü
A node
can be a computer, printer, or any
other device capable of sending
and/or receiving data generated by other nodes on the network.
6. Name the characteristics that determine
the effectiveness of data communication system.
7. What are the two types of line
configuration?
ü
Line configuration. The physical layer is
concerned with the connection of devices to the media.
ü In a
point-to-point configuration, two devices are connected through a dedicated
link.
ü
In a multipoint configuration, a link is shared
among several devices.
8. What do you mean by Data Communication?
ü When we communicate, we are sharing
information. This sharing can be local
or remote. Local communication usually occurs face to face, while remote communication takes place over
distance.
ü The term telecommunication,
which includes telephony, telegraphy, and television, means
communication at a distance.
ü
Data
communications are the exchange of data between two devices via some form of transmission medium such as a wire cable
9. List the seven layers of an OSI model.
The layers of OSI
ü
Physical Layer
ü
Data Link Layer
ü
Network Layer
ü
Transport Layer
ü
Session Layer
ü
Presentation Layer
ü
Application Layer
10. Which layers are network support
layers?
ü
Physical Layer
ü
Data link Layer and
ü
Network Layers
11. Which layers are user support layers?
ü
Session Layer
ü
Presentation Layer and
ü
Application Layer
12. What is LAN?
ü
A local area network (LAN) is usually privately
owned and links the devices in a single office, building, or campus.
ü
A LAN can be as simple as two PCs and a printer
in someone’s home office; or it can extend throughout a company and include
audio and video peripherals.
ü
Currently, LAN size is limited to a few
kilometers.
13. What is the use of Microwaves?
Microwaves
ü
Electromagnetic waves having frequencies between
I and 300 GHz are called microwaves.
ü
Microwaves are unidirectional.
ü
When an antenna transmits microwave waves, they
can be narrowly focused.
ü
This means that the sending and receiving
antennas need to be aligned.
ü
The unidirectional property has an obvious
advantage.
ü
A pair of antennas can be aligned without
interfering with another pair of aligned antennas.
14. What is a node?
ü A network can
consist of two or more computers directly connected by some physical medium
such as coaxial cable or optical fiber.
ü Such a physical
medium is called as Links and the computer it connects is called as Nodes.
எல்லாத் துன்பங்களுக்கும் இரண்டு மருந்துகள் உள்ளன. ஒன்று காலம், இன்னொன்று மெளனம்.
15. What are the key elements of protocols?
The key elements of protocols are
ü Syntax
It refers to the structure or format of the data that is the order in
which they are presented.
ü Semantics
It refers to the meaning of each section of bits.
ü Timing
Timing refers to two characteristics: When data should be sent and how
fast they can be sent.
16. What is point-point link?
ü A point-to-point
connection provides a dedicated link between two devices.
ü The entire capacity
of the link is reserved for transmission between those two devices.
ü Most point-to-point
connections use an actual length of wire or cable to connect the two ends.
ü Example: Change
television channels by infrared remote control, you are establishing a
point-to-point connection between the remote control and the television's
control system.
Possible
questions and answers for university exams Five marks questions and ten mark
questions
1.
Write
fundamental characteristics of DATA COMMUNICATIONS.
o
When we
communicate, we are sharing information. This sharing can be local or remote. Local communication usually occurs face
to face, while remote communication
takes place over distance.
o
The term
telecommunication, which
includes telephony, telegraphy, and television, means communication at a
distance.
o
Data
communications are the exchange of data between two devices via some form of transmission medium such as a wire cable.
o
The
effectiveness of a data communications system depends on three fundamental
characteristics: delivery, accuracy and timeliness.
ü Delivery: The system must deliver data to the correct
destination. Data must be received by the intended device or user and only by
that device or user.
ü Accuracy: The system must deliver the data accurately.
Data that have been altered in transmission and left uncorrected are unusable.
ü Timeliness: The system must deliver data in a timely
manner. Data delivered late are useless.
அதிகம் பேசாதவனை உலகம் அதிகம் விரும்புகிறது. அளந்து பேசுபவனை அதிகம் மதிக்கிறது. அதிகம் செயல்படுபவனையே கைகூப்பித் தொழுகிறது.
2.
Explain
briefly the five components of a data communication system.
3. Explain the five components of a data
communication system.
A data communications system has five components
ü Message: The message is the information (data) to be
communicated. Popular forms of information include text, numbers, pictures, audio, and video.
ü Sender: The sender is the device that sends the data
message. It can be a computer, workstation,
telephone handset, video camera, and so on.
ü Receiver: The receiver is the device that receives the
message. It can be a computer, workstation,
telephone handset, television, and so on.
ü Transmission
medium: The transmission
medium is the physical path by which a message travels from sender to receiver.
Some examples of transmission media include twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves.
ü Protocol: A protocol is a set of rules that govern
data communications. It represents an agreement between the communicating
devices. Without a protocol, two devices may be connected but not
communicating.
4.
Write a short note on protocol and standards.
In computer
networks, communication occurs between entities in different systems.
For communication
to occur, the entities must agree on a protocol. A protocol is a set of rules
that govern data communications.
A
protocol defines
What
is communicated?
How
it is communicated?
When
it is communicated?
The key elements
of a protocol are Syntax, Semantics, and
Timing.
Syntax:
ü The term syntax refers to the structure or
format of the data, meaning the order in which they are presented.
ü For example, a simple protocol might expect
the first 8 bits of data to be the address of the sender, the second 8 bits to
be the address of the receiver, and the rest of the stream to be the message
itself.
Semantics:
ü The word semantics refers to the meaning of
each section of bits. How are a
particular pattern to be interpreted, and what action is to be taken based on
that interpretation? For example, does an address identify the route to be taken or the final
destination of the message?
Timing:
ü The term timing refers to two
characteristics: when data should be sent and how fast they can be sent.
ü For example, if a sender produces data at 100
Mbps but the receiver can process data at only 1 Mbps, the transmission will
overload the receiver and some data will be lost.
Standards
ü Standards are essential in creating and
maintaining an open and competitive market for equipment manufacturers and in
guaranteeing national and international interoperability of data and
telecommunications technology and processes.
ü Standards provide guidelines to
manufacturers, vendors, government agencies, and other service providers to
ensure the kind of interconnectivity necessary in today's marketplace and in
international communications.
ü Data communication standards fall into two
categories: de facto (meaning "by fact" or "by convention") and
de jure (meaning "by law" or "by regulation").
ü De
facto: Standards that have
not been approved by an organized body but have been adopted as standards
through widespread use are de facto standards.
ü De facto standards are often established
originally by manufacturers who seek to define the functionality of a new
product or technology.
ü De
jure: Those standards that
have been legislated by an officially recognized body are de jure standards.
5.
Write
data flow in Networks.
Simplex:
ü
In simplex mode, the communication is
unidirectional, as on a one-way street. Only one of the two devices on a link
can transmit; the other can only receive.
ü Example:
Keyboards
and traditional monitors are examples of simplex devices. The keyboard
can only introduce input; the monitor can only accept output.
ü
The simplex mode can use the entire capacity of
the channel to send data in one direction.
Half-Duplex
ü
In half-duplex mode, each station can both
transmit and receive, but not at the same time. When one device is sending, the
other can only receive, and vice versa
ü
The half-duplex mode is like a one-lane road
with traffic allowed in both directions.
Example: Walkie-talkies and CB (citizens band) radios are both
half-duplex systems.
ü
The half-duplex mode is used in cases where
there is no need for communication in both directions at the same time; the
entire capacity of the channel can be utilized for each direction.
Full-Duplex
ü
In full-duplex mode (also called duplex), both
stations can transmit and receive simultaneously the full-duplex mode is like a
two-way street with traffic flowing in both directions at the same time.
ü
In full-duplex mode, signals going in one
direction share the capacity of the link: with signals going in the other
direction.
ü
One common example of full-duplex communication
is the telephone network.
ü
When two people are communicating by a telephone
line, both can talk and listen at the same time.
அறிவு ஒன்றுதான் அச்சத்தை முறிக்கும் அரிய மருந்து. அறிவை வளர்த்துக் கொண்டால் எல்லாவிதமான பயங்களும் அகன்றுவிடும்.
6.
Explain
any two types of network topology.
ü
The topology of a network is the geometric
representation of the relationship of all the links and linking devices
(usually called nodes) to one another.
ü
There are four basic topologies possible: Mesh, Star, Bus, and Ring.
a) Mesh Topology:
ü
In a mesh topology, every device has a dedicated point-to-point link to every other device.
ü The
term dedicated means that the link
carries traffic only between the two
devices it connects.
ü
To find the number of physical links in a fully
connected mesh network with N nodes,
we first consider that each node must be connected to every other node.
Advantages:
ü
First, the use of dedicated links guarantees
that each connection can carry its own data load, thus eliminating the traffic
problems that can occur when links must be shared by multiple devices.
ü
Second, a mesh topology is robust. If one link
becomes unusable, it does not incapacitate the entire system.
ü
Third, there is the advantage of privacy
or security. When every message travels along a dedicated line, only
the intended recipient sees it.
Disadvantages
ü
A mesh is related to the amount of cabling and
the number of I/O ports required.
ü First,
because every device must be connected to every other device, installation
and reconnection are difficult.
ü
Second, the sheer bulk of the wiring
can be greater than the available space (in walls, ceilings, or floors) can
accommodate
Example:
ü One
practical example of a mesh topology is the connection of telephone regional offices
in which each regional office needs to be connected to every other
regional office.
b) Star Topology:
ü
In a star
topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub.
ü
The devices are not directly linked to one
another.
ü
If one device wants to send data to another, it
sends the data to the controller, which then relays the data to the other
connected device
பழமையைப் பற்றி ஒன்றுமே தெரியாமல் புதுமையைச் சிறப்பாகப் படைக்க முடியாது.
Advantages
ü
A star topology is less expensive than a mesh
topology.
ü
This factor also makes it easy to install and
reconfigure.
ü
Other advantages include robustness. If one link
fails, only that link is affected. All other links remain active.
ü
This factor also lends itself to easy fault
identification and fault isolation.
Disadvantage
ü
In a star
topology, is the dependency of the whole topology on one single point, the hub.
ü
If the hub goes down, the whole system is dead.
ü
The star topology is used in local-area networks (LANs)
c) Bus Topology:
ü
Bus Topology the preceding examples all describe
point-to-point connections.
ü
A bus topology, on the other hand, is
multipoint.
ü
One long cable acts as a backbone to link all the devices in a network Nodes are connected to the bus cable by drop lines and
taps.
ü
A drop line is a connection running between the
device and the main cable.
ü
A tap
is a connector that either splices into the main cable or punctures the
sheathing of a cable to create a contact with the metallic core.
Advantages
ü
Advantages of a bus topology include ease of
installation.
ü
Backbone cable can be laid along the most
efficient path, then connected to the nodes by drop lines of various lengths.
ü
A bus uses less cabling than mesh or star
topologies.
ü
In a star, for example, four network devices in
the same room require four lengths of cable reaching all the way to the hub.
ü
In a bus, this redundancy is eliminated.
ü
Each drop line has to reach only as far as the
nearest point on the backbone.
செயல் புரியாத மனிதனுக்கு தெய்வம் ஒருபோதும் உதவி செய்யாது.
Disadvantages
ü
Disadvantages include difficult reconnection and
fault isolation.
ü
A bus is usually designed to be optimally
efficient at installation.
ü
It can therefore be difficult to add new
devices. Signal reflection at the taps can cause degradation in quality.
ü
A fault or break in the bus cable stops all
transmission, even between devices on the same side of the problem.
ü
The damaged area reflects signals back in the
direction of origin, creating noise in both directions. Bus topology was the
one of the first topologies used in the design of early Local Area Networks.
ü
Ethernet LANs can use a bus topology
d) Ring Topology:
ü
In a ring topology, each device has a dedicated
point-to-point connection with only the two devices on either side of it.
ü
A signal is passed along the ring in one
direction, from device to device, until it reaches its destination. Each device
in the ring incorporates a repeater.
ü
When a device receives a signal intended for
another device, its repeater regenerates the bits and passes them along.
ü
A ring is relatively easy to install and
reconfigure.
Advantage
ü
Each device is linked to only its immediate
neighbors. To add or delete a device requires changing only two connections.
The only constraints are media and traffic considerations (maximum ring length
and number of devices).
ü
Fault isolation is simplified.
Disadvantage
ü
Unidirectional traffic can be a disadvantage.
ü
In a simple ring, a break in the ring (such as a
disabled station) can disable the entire network.
ü
This weakness can be solved by using a dual ring
or a switch capable of closing off the break.
ü
Ring topology was prevalent when IBM introduced
its local-area network Token Ring.
7.
Explain
the OSI Network architecture specifying the functions of each layer.
LAYERS IN THE OSI MODEL
வாசிப்புப் பழக்கம் என்பது அருமையான ருசி, அழகான பசி. ஒரு முறை சுவைக்கப் பழகிவிட்டால் அது தொடர்ந்து வரும்.
The functions of each layer in the OSI model
Physical
Layer:
“The physical layer is responsible
for movements of individual bits from one hop (node) to the next.”
ü
The Physical Layer coordinates the functions
required to carry a bit stream over
a physical medium.
ü
It deals with the mechanical and electrical
specifications of the interface and transmission medium.
ü
It also defines the procedures and functions
that physical devices and interfaces have to perform for transmission to Occur.
ü
Figure shows the position of the physical layer
with respect to the transmission medium and the data link layer.
The physical layer is also concerned with the
following:
Physical
characteristics of interfaces and medium:
ü
The physical layer defines the characteristics
of the interface between the devices and the transmission medium.
ü
It also defines the type of transmission medium.
Representation
of bits:
ü
The physical layer data consists of a stream of
bit (sequence of 0s or 1s) with no interpretation.
ü
To be transmitted, bits must be encoded into
signals--electrical or optical.
Data rate:
ü
The transmission rate-the number of bits sent
each second-is also defined by the physical layer.
Synchronization
of bits:
ü
The sender and receiver not only must use the
same bit rate but also must be synchronized at the bit level.
ü
In other words, the sender and the receiver
clocks must be synchronized.
Line
configuration:
ü
The physical layer is concerned with the
connection of devices to the media.
ü
In a point-to-point configuration, two devices
are connected through a dedicated link.
ü
In a multipoint configuration, a link is shared
among several devices.
Physical
topology:
ü
The physical topology defines how devices are
connected to make a network.
ü
Devices can be connected by using a mesh topology (every device is
connected to every other device), a star
topology (devices are connected through a central device), a ring topology (each device is
connected to the next, forming a ring),
a bus topology (every device is on a common link), or a hybrid topology (this is a combination of two or more
topologies).
Transmission
mode:
ü
The physical layer also defines the direction of
transmission between two devices: simplex, half-duplex, or full-duplex.
ü
In simplex
mode, only one device can send; the other can only receive. The simplex
mode is a one-way communication.
ü
In the
half-duplex mode, two devices can send and receive, but not at the same
time.
ü
In a
full-duplex (or simply duplex)
mode, two devices can send and receive at the same time.
ரகசியத்தை வெளிப்படுத்தியவனுக்கும், துக்கத்தை வெளிப்படுத்தாதவனுக்கும் மனதில் நிம்மதி இருக்காது.
Data
Link Layer:
ü The data link layer transforms the physical
layer, a raw transmission facility, to a reliable link.
ü It makes the physical layer appear error-free
to the upper layer (network layer).
“The data
link layer is responsible for moving frames from one hop (node) to the next.”
Other responsibilities of the data link layer
include the following:
Framing:
ü The data link layer divides the stream of
bits received from the network layer into manageable data units called frames.
Physical
addressing:
ü If frames are to be distributed to different
systems on the network, the data link layer adds a header to the frame to
define the sender and/or receiver of the frame.
ü If the frame is intended for a system outside
the sender's network, the receiver address is the address of the device that
connects the network to the next one.
Flow
control:
ü If the rate at which the data are absorbed by the receiver
is less than the rate at which data are produced in the sender, the
data link layer imposes a flow control mechanism to avoid overwhelming the
receiver.
Error
control:
ü The data link layer adds reliability to the
physical layer by adding mechanisms to detect and retransmit damaged or lost
frames.
ü It also uses a mechanism to recognize duplicate
frames.
ü Error control is normally achieved through a trailer
added to the end of the frame.
Access
control:
ü When two or more devices are connected to the
same link, data link layer protocols are necessary to determine which
device has control over the link at any given time.
Network Layer:
“The network layer
is responsible for the delivery of individual packets from the source host to
the destination host.”
வாழ்வின் வெற்றி என்பது ஒரு மனிதன் பின்பற்றும் சத்தியத்தைப் பொறுத்தது.- ஸ்ரீ அன்னை
ü The network layer is responsible for the
source-to-destination delivery of a packet, possibly across multiple networks
(links).
ü Whereas the data link layer oversees the
delivery of the packet between two systems on the same network (links), the
network layer ensures that each packet gets from its point of origin to its
final destination.
ü If two systems are connected to the same
link, there is usually no need for a network layer. However, if the two systems
are attached to different networks (links) with connecting devices between the
networks (links), there is often a need for the network layer to accomplish
source-to-destination delivery
Other responsibilities of the network layer
include the following:
Logical
addressing:
ü The physical addressing implemented by the
data link layer handles the addressing problem locally.
ü If a packet passes the network boundary, we
need another addressing system to help distinguish the source and destination
systems.
ü The network layer adds a header to the packet
coming from the upper layer that, among other things, includes the logical
addresses of the sender and receiver.
Routing:
ü When independent networks or links are
connected to create internetworks (network of networks) or a large network, the
connecting devices (called routers or switches) route or switch the packets to
their final destination.
ü One of the functions of the network layer is
to provide this mechanism.
Transport
Layer:
“The
transport layer is responsible for the delivery of a message from one process
to another.”
ü The transport layer is responsible for process-to-process
delivery of the entire message.
ü A process is an application program running
on a host.
ü Whereas the network layer oversees source-to-destination
delivery of individual packets, it does not recognize any relationship
between those packets.
ü It treats each one independently, as though
each piece belonged to a separate message, whether or not it does.
ü The transport layer, on the other hand,
ensures that the whole message arrives intact and in order, overseeing
both error
control and flow control at the source-to-destination level.
Other responsibilities of the transport layer include the following:
Service-point addressing:
ü Computers often run several programs at the
same time.
ü For this reason, source-to-destination
delivery means delivery not only from one computer to the next but also from a
specific process (running program) on one computer to a specific process
(running program) on the other.
ü The transport layer header must therefore
include a type of address called a service-point address (or port address).
ü The network layer gets each packet to the
correct computer; the transport layer gets the entire message to the correct
process on that computer.
Segmentation
and reassembly:
ü A message is divided into transmittable
segments, with each segment containing a sequence number.
ü These numbers enable the transport layer to
reassemble the message correctly upon arriving at the destination and to
identify and replace packets that were lost in transmission.
Connection
control:
ü The transport layer can be either
connectionless or connection oriented.
ü A connectionless transport layer treats each
segment as an independent packet and delivers it to the transport layer at the destination
machine.
ü A connection oriented transport layer makes a
connection with the transport layer at the destination machine first before
delivering the packets.
ü After all the data are transferred, the
connection is terminated.
Flow
control:
ü Like the data link layer, the transport layer
is responsible for flow control. However, flow control at this layer is
performed end to end rather than across a single link.
Error
control:
ü Like the data link layer, the transport layer
is responsible for error control.
ü However, error control at this layer is
performed process-to process rather than across a single link.
ü The sending transport layer makes sure that
the entire message arrives at the receiving transport layer without error (damage,
loss, or duplication).
ü Error correction is usually achieved through
retransmission.
நேர்மையும் நல்லெண்ணமும் இருக்கின்றபோதெல்லாம் இறைவனின் உதவியும் உள்ளது.- ஸ்ரீ அன்னை
Session Layer:
“The session
layer is responsible for dialog control and synchronization.”
ü The services provided by the first three
layers (physical, data link, and network) are not sufficient for some
processes.
ü The session layer is the network dialog
controller.
ü It establishes, maintains, and synchronizes
the interaction among communicating systems.
Specific responsibilities of the session layer include the following:
Dialog control:
ü The session layer allows two systems to enter
into a dialog.
ü It allows the communication between two
processes to take place in either half duplex (one way at a time) or full-duplex
(two ways at a time) mode.
Synchronization:
ü The session layer allows a process to add
checkpoints, or synchronization points, to a stream of data.
ü For example, if a system is sending a file of
2000 pages, it is advisable to insert checkpoints after every 100 pages to
ensure that each 100-page unit is received and acknowledged independently. In
this case, if a crash happens during the transmission of page 523, the only
pages that need to be resent after system recovery are pages 501 to 523. Pages
previous to 501 need not be resent. Figure illustrates the relationship of the session
layer to the transport and presentation layers.
நீங்கள் சில ஆண்டுகளுக்கு முன்பு எதை விதைத்தீர்களோ அதைத்தான் அறுவடை செய்கிறீர்கள்.
Presentation
Layer
“The presentation
layer is responsible for translation, compression, and encryption.”
ü The presentation layer is concerned with the
syntax and semantics of the information exchanged between two systems.
Specific responsibilities of the presentation layer include the
following:
Translation:
ü The processes (running programs) in two
systems are usually exchanging information in the form of character strings,
numbers, and so on.
ü The information must be changed to bit
streams before being transmitted.
ü Because different computers use different
encoding systems, the presentation layer is responsible for interoperability
between these different encoding methods.
ü The presentation layer at the sender changes
the information from its sender-dependent format into a common format.
ü The presentation layer at the receiving
machine changes the common format into its receiver-dependent format.
Encryption:
ü To carry sensitive information, a system must
be able to ensure privacy. Encryption means that the sender transforms the
original information to another form and sends the resulting message out over
the network.
ü Decryption:
ü Reverse the original process to transform the
message back to its original form.
ü Compression:
ü Data compression reduces the number of bits
contained in the information.
ü Data compression becomes particularly
important in the transmission of multimedia such as text, audio, and video.
ஒவ்வொரு மனிதனும் விதக்கிறாள். ஒருவன் வாய்ச் சொற்களால் விதக்கிறான். இன்னொருவன் செயல்களால் விதைக்கிறான்.
Application Layer:
“The application layer is
responsible for providing services to the user.”
ü The application layer enables the user,
whether human or software, to access the network.
ü It provides user interfaces and support for
services such as electronic mail, remote file access and transfer, shared
database management, and other types of distributed information services.
ü Figure shows the relationship of the
application layer to the user and the presentation layer of the many
application services available, the figure shows only three:
ü XAOO (message-handling services),
ü X.500 (directory services), and file
transfer, Access, and Management (FTAM).
ü The user in this example employs XAOO to send
an e-mail message.
Specific services provided by the application layer include the
following
Network virtual terminal:
ü A network virtual terminal is a software
version of a physical terminal, and it allows a user to log on to a remote
host.
ü To do so, the specific service provided by
the application layer e application creates a software emulation of a terminal
at the remote host.
ü The user's computer talks to the software
terminal which, in turn, talks to the host, and vice versa.
ü The remote host believes it is communicating
with one of its own terminals and allows the user to log on.
நீ தனிமையில் இருக்கும் போது உனக்கு என்ன தோன்றுகிறதோஅது தான் உன் வாழ்கையை தீர்மானிக்கும்- சுவாமி விவேகானந்தர்
File transfer, access, and
management:
ü This application allows a user to access
files in a remote host (to make changes or read data), to retrieve files from a
remote computer for use in the local computer, and to manage or control files
in a remote computer locally.
Mail services:
ü This application provides the basis for
e-mail forwarding and storage.
Directory services:
ü This application provides distributed
database sources and access for global information about various objects and
services.
உன் வாழ்க்கையின் எந்த ஒரு நாளில் உன் முன்னால் எந்தப் பிரச்சினையையும் நீ சந்திக்காமல் முன் செல்கிறாயோ, அப்பொழுது தவறான பாதையில் நீ பயணிக்கிறாய் என்று அறிவாய்.- விவேகானந்தர்
Comments
Post a Comment