Fundamentals of Data Communication
Fundamentals of Data Communication
COMMUNICATION
1
DEFINING DATA
COMMUNICATION
• Data communication
• Electronic transfer of data from one location to another
• Enables an information system to deliver information
• Improves the flexibility of data collection and transmission
• Basis of virtual organizations
• Provides e-collaboration
2
WHY MANAGERS NEED TO KNOW
ABOUT DATA COMMUNICATION
• Separating an organization’s core functions from the data communication
systems that enable and support them is difficult
• Enhances decision makers’ efficiency and effectiveness
• Enables organizations to use e-mail and electronic file transfer to improve
efficiency and productivity
• Highlights how data communication technologies are used in the workplace
3
WHY MANAGERS NEED TO KNOW ABOUT
DATA COMMUNICATION (CONT’D.)
• Important concepts:
• The basics of data communication and networking
• The Internet, intranets, and extranets
• Wired and wireless networks
• Network security issues and measures
• Organizational and social effects of data communication
• Globalization issues
• Applications of data communication systems
4
BASIC CONCEPTS IN A DATA
COMMUNICATION SYSTEM
• Bandwidth
• Amount of data that can be transferred from one point to another
in a certain time period
• Attenuation
• Loss of power in a signal as it travels from the sending device to the
receiving device
5
BASIC CONCEPTS IN A DATA
COMMUNICATION SYSTEM (CONT’D.)
• Narrowband
• Voice-grade transmission channel capable of transmitting a maximum of 56,000 bps, so
only a limited amount of information can be transferred
• Protocols
• Rules that govern data communication, including error detection, message length, and
transmission speed
6
SENDER AND RECEIVER DEVICES
7
MODEMS
• Types
• Dial-up (analog)
• Digital subscriber line (DSL)
• Cable
8
COMMUNICATION MEDIA
• Communication media
• Also called channels
• Connect sender and receiver devices
• Conducted media
• Provide a physical path along which signals are transmitted
• Include twisted-pair cable, coaxial cable, and fiber optics
9
• Exhibit 6.1 Types of Communication Media
10
COMMUNICATION MEDIA
(CONT’D.)
• Radiated media
• Use an antenna for transmitting data through air or water
• Some work based on “line of sight”
• Include broadcast radio, terrestrial microwave, and satellite
• Types
• Point-to-point
• Multipoint system
11
PROCESSING CONFIGURATIONS
12
CENTRALIZED PROCESSING
• Advantage
• Being able to exercise tight control on system operations and
applications
• Disadvantage
• Lack of responsiveness to users’ needs
13
DECENTRALIZED PROCESSING
• Decentralized processing
• Each user, department, or division has its own computer for
performing processing
• Advantage
• More responsive to users
• Disadvantages
• Lack of coordination
• High costs
• Duplication of efforts
14
DISTRIBUTED PROCESSING
• Distributed processing
• Centralized control and decentralized operations
• Advantages
• Accessing unused processing power is possible
• Computer power can be added or removed
• Distance and location aren’t limiting
• More compatible with organizational growth
• Fault tolerance
• Resources can be shared to reduce costs
• Reliability is improved
• More responsive to user needs
15
DISTRIBUTED PROCESSING
(CONT’D.)
• Disadvantages
• Dependence on communication technology
• Incompatibility between equipment
• More challenging network management
16
OPEN SYSTEMS
INTERCONNECTION MODEL
• Seven-layer architecture for defining how data is transmitted
• Layers:
• Application
• Presentation
• Session
• Transport
• Network
• Data link
• Physical
17
TYPES OF NETWORKS
18
Token Ring Ethernet
Token ring is a star-shaped topology that is
Ethernet is a cheaper, fast-speed
used to transfer the data frames from one
topology that is used to transmit
workstation to another in the ring with the
the data to various workstations.
help of a special signal known as a token.
It does not follow the token’s
Only one workstation is allowed to speak at
permission mechanism as all the
a time, and the transmission takes place in a
workstations are allowed to speak
unidirectional manner.
when the network is free.
It uses the telephone wire or Shielded It uses the UTP wiring in the
Twisted Pair in order to transmit the data. physical later.
19
LOCAL AREA NETWORKS
20
WIDE AREA NETWORKS
21
METROPOLITAN AREA NETWORKS
22
• Exhibit 6.4 Metropolitan Area Networks
23
NETWORK TOPOLOGIES
24
STAR TOPOLOGY
• Disadvantages
• Single point of potential failure
• Increased cost due to many cables
25
RING TOPOLOGY
26
BUS TOPOLOGY
27
BUS TOPOLOGY (CONT’D.)
• Advantages
• Easy to extend
• Very reliable
• Wiring layout is simple and uses the least amount of cable of any
topology
• Best for handling steady (even) traffic
• Disadvantages
• Fault diagnosis is difficult
• Bus cable can be a bottleneck when network traffic is heavy
28
HIERARCHICAL TOPOLOGY
• Multiplexer
• Hardware device that allows several nodes to share
one communication channel
29
HIERARCHICAL TOPOLOGY
(CONT’D.)
• Advantages
• Network control
• Lower costs
• Disadvantages
• Expansion may be a problem
• Traffic congestion at root and higher-level nodes
30
MESH TOPOLOGY
• Disadvantages
• Costly
• Difficult to maintain
• Difficult to expand
31
MAJOR NETWORKING CONCEPTS
32
PROTOCOLS
• Agreed-on methods and rules that electronic devices use to
exchange information
• Deal with hardware, software, and networking
• Multiple protocol support is important
33
TRANSMISSION CONTROL
PROTOCOL/INTERNET PROTOCOL
• Industry-standard suite of communication protocols
• Main advantage is that it enables interoperability
• Originally intended for Internet communication
• Major protocols in the TCP/IP suite:
• Transmission Control Protocol (TCP)
• Operates at the OSI model’s Transport layer
• Internet Protocol (IP)
• Operates at the OSI model’s Network layer
34
ROUTING
• Packet
• Collection of binary digits, including message data and control
characters for formatting and transmitting
• Sent from computer to computer over a network
35
ROUTING
• Routing
• Process of deciding which path data takes
• Decisions made using routing table
• Centralized routing
• Distributed routing
36
37
ROUTERS
38
CLIENT/SERVER MODEL
• Server
• Remote computer on the network that provides information or services
in response to client requests
39
40
TWO-TIER ARCHITECTURE
41
N-TIER ARCHITECTURES
• Three-tier
• Most common n-tier architecture
• Advantage
• Improved network performance
• Disadvantage
• Network management more challenging
42
• Exhibit 6.6 A Two-Tier Client/Server Architecture
43
• Exhibit 6.7 An N-Tier Architecture
44
WIRELESS AND MOBILE
NETWORKS
• Wireless network
• Uses wireless instead of wired technology
• Mobile network
• Network operating on a radio frequency (RF), consisting of radio cells
served by a base station
• Advantages
• Mobility, flexibility, ease of installation, low cost
• Disadvantages
• Limited throughput and range, in-building penetration problems,
vulnerability to frequency noise, security
45
WIRELESS TECHNOLOGIES
• Groups
• Wireless LANs
• Wireless WANs
46
MOBILE NETWORKS
• Three-part architecture
• Base stations
• Mobile telephone switching offices (MTSOs)
• Mobile communication devices
• Technologies
• Time Division Multiple Access (TDMA)
• Code Division Multiple Access (CDMA)
47
• Exhibit 6.10 Mobile Network Architecture
48
WIRELESS SECURITY
49
TECHNIQUES FOR IMPROVING THE
SECURITY OF A WIRELESS NETWORK
50
TECHNIQUES FOR IMPROVING THE
SECURITY OF A WIRELESS NETWORK
(CONT’D.)
51
TECHNIQUES FOR IMPROVING THE
SECURITY OF A WIRELESS NETWORK
(CONT’D.)
EAP (Extensible Authentication Protocol)
52
TECHNIQUES FOR IMPROVING THE
SECURITY OF A WIRELESS NETWORK
(CONT’D.)
53
TECHNIQUES FOR IMPROVING THE
SECURITY OF A WIRELESS NETWORK
(CONT’D.)
WPA2 or 802.11i
• It uses EAP to obtain a master key
• With this master key, a user’s computer and the AP
negotiate for a key that will be used for a session
• After the session is terminated, the key is discarded
54
CONVERGENCE OF VOICE, VIDEO,
AND DATA
• Convergence
• Integrating voice, video, and data so that multimedia information can be
used for decision making
55
SUMMARY
56
Introduction to
Data Communication
Fundamentals of Data Communication
Recap
Data communication
• Electronic transfer of data from one location to another
• Enables an information system to deliver information
• Improves the flexibility of data collection and transmission
• Basis of virtual organizations
• Provides e-collaboration
Telecommunication Hardware
Telecommunications hardware has two main types of transmission media: wired and wireless.
Telecommunication
• Modems
• Routers
• Bridges
• Switches
• Hubs
• Digital signal processors (DSPs)
Data communication is a fundamental component of
modern telecommunication.
• is the transfer of data from one digital device to another. This transfer
occurs via point-to-point data streams or channels.
• These channels may previously have been in the form of copper
wires but are now much more likely to be part of a wireless network.
• There are two methods for transmitting data: Serial communication
and Parallel communication.
• There are different types of devices for data transmission: Wireless,
Optical fiber, Infrared, and more.
Types of Data
Transmission
Simplex communication
• Digital transmission involves encoding data as binary digits (0s and 1s)
and transmitting them as discrete signals. This technique offers higher
reliability and noise immunity compared to analog transmission.
Examples include Ethernet for local area networks and USB for
connecting peripherals to computers.
Elements of Data Communication
• The data link layer is responsible for the node-to-node delivery of the
message. The main function of this layer is to make sure data transfer is
error-free from one node to another, over the physical layer. When a
packet arrives in a network, it is the responsibility of the DLL to transmit it
to the Host using its MAC address.
• The packet received from the Network layer is further divided into
frames depending on the frame size of the NIC(Network Interface
Card). DLL also encapsulates the Sender and Receiver’s MAC address
in the header.
• The network layer works for the transmission of data from one host to
the other located in different networks. It also takes care of packet
routing i.e. selection of the shortest path to transmit the packet, from
the number of routes available. The sender & receiver’s IP addresses
are placed in the header by the network layer.
Function of Data Link Layer
• provides services to the application layer and takes services from the
network layer.
• The data in the transport layer is referred to as Segments. It is
responsible for the end-to-end delivery of the complete message.
• also provides the acknowledgment of the successful data transmission
and re-transmits the data if an error is found.
Transport Layer
• At the sender’s side: The transport layer receives the formatted data from
the upper layers, performs Segmentation, and also implements Flow and
error control to ensure proper data transmission. It also adds Source and
Destination port numbers in its header and forwards the segmented data to
the Network Layer.
The sender needs to know the port number associated with the receiver’s
application.
• At the receiver’s side: Transport Layer reads the port number from its header
and forwards the Data which it has received to the respective application.
It also performs sequencing and reassembling of the segmented data.
Functions of the Transport Layer
• Segmentation and Reassembly: This layer accepts the message from the
(session) layer, and breaks the message into smaller units. Each of the
segments produced has a header associated with it. The transport layer at
the destination station reassembles the message.
• Service Point Addressing: To deliver the message to the correct process, the
transport layer header includes a type of address called service point
address or port address. Thus by specifying this address, the transport layer
makes sure that the message is delivered to the correct process.
Functions of the Transport Layer
• At the very top of the OSI Reference Model stack of layers, we find
the Application layer which is implemented by the network
applications.
• These applications produce the data, which has to be transferred
over the network. This layer also serves as a window for the
application services to access the network and for displaying the
received information to the user.
Functions of Presentation Layer
• Step 1: Luffy interacts with e-mail applications like Gmail, outlook, etc.
He writes his email to send. (This happens in Layer 7: Application
layer)
• Step 2: Mail application prepares for data transmission like encrypting
data and formatting it for transmission. (This happens in Layer 6:
Presentation Layer)
• Step 3: There is a connection established between the sender and
receiver on the internet. (This happens in Layer 5: Session Layer)
• Step 4: Email data is broken into smaller segments. It adds sequence
numbers and error-checking information to maintain the reliability of
the information. (This happens in Layer 4: Transport Layer)
Luffy sends an e-mail to his friend Zoro
• Step 5: Addressing of packets is done in order to find the best route for
transfer. (This happens in Layer 3: Network Layer)
• Step 6: Data packets are encapsulated into frames, then MAC address is
added for local devices and then it checks for error using error
detection. (This happens in Layer 2: Data Link Layer)
• Step 7: Lastly Frames are transmitted in the form of electrical/ optical
signals over a physical network medium like ethernet cable or WiFi.
After the email reaches the receiver i.e. Zoro, the process will reverse and
decrypt the e-mail content. At last, the email will be shown on Zoro’s email
client.
Summary of OSI Model
Network
Client/Server Peer to Peer
Architecture
Network
Star Ring Bus
Topologies
Network
Communications Intranet Extranet Internet
Technology
Types of Network Architecture
Peer-To-Peer network
• Peer-To-Peer network is a network in which all
the computers are linked together with equal
privilege and responsibilities for processing the
data.
• Peer-To-Peer network is useful for small
environments, usually up to 10 computers.
• Peer-To-Peer network has no dedicated server.
• Special permissions are assigned to each
computer for sharing the resources, but this
can lead to a problem if the computer with the
resource is down.
Advantages Of Peer-To-Peer Network: Disadvantages Of Peer-To-Peer Network:
• It is less costly as it does not contain • In the case of Peer-To-Peer network,
any dedicated server. it does not contain the centralized
system . Therefore, it cannot back up
the data as the data is different in
different locations.
• If one computer stops working but, • It has a security issue as the device is
other computers will not stop managed itself.
working.
• It is easy to set up and maintain as
each computer manages itself.
Client/Server Network
• Client/Server network is a network model designed for the
end users called clients, to access the resources such as
songs, video, etc. from a central computer known as Server.
• The central controller is known as a server while all other
computers in the network are called clients.
• A server performs all the major operations such as security
and network management.
• A server is responsible for managing all the resources such
as files, directories, printer, etc.
• All the clients communicate with each other through a
server. For example, if client1 wants to send some data to
client 2, then it first sends the request to the server for the
permission. The server sends the response to the client 1 to
initiate its communication with the client 2.
Advantages Of Peer-To-Peer Network: Disadvantages Of Peer-To-Peer Network:
• A Client/Server network contains the • Client/Server network is expensive as
centralized system. Therefore we can it requires the server with large
back up the data easily. memory.
• A Client/Server network has a • A server has a Network Operating
dedicated server that improves the System(NOS) to provide the resources
overall performance of the whole to the clients, but the cost of NOS is
system. very high.
• Security is better in Client/Server • It requires a dedicated network
network as a single server administers administrator to manage all the
the shared resources. resources.
• It also increases the speed of the
sharing resources.
Network Topology
• Network topology is a physical arrangement through which various
endpoints and links in an enterprise network communicate with each
other.
• Organizations use network topology to define how their network
nodes are linked to each other.
• Two major categories: Physical network topology refers to the
structure of the physical medium for data transmission. On the other
hand, logical network topology refers to how the network transmits
data between devices, regardless of how these devices are connected
physically.
Types of Network Topology
1. Point to point topology
• Point to point is a simple topology that directly links two nodes
and reserves the entire bandwidth of the connection for them to
communicate with one another.
• Physically, point-to-point connections rely on a cable or wire that
connects the two endpoints.
Benefits of Point to Point Topology Challenges of Point to Point Topology
• Superior bandwidth, as only two • Only applicable for small areas with
nodes use the link nodes physically close to each other
• High speed when compared to other • High dependence on the common
types of network topologies link; if the link fails, the network goes
down
• Simple to implement • Only useful if the network has two
nodes; thus, not applicable for many
modern use cases
• Easy to maintain and handle
2. Bus topology
• In a bus topology, all the nodes are linked using a single cable with a
terminator on both ends. This configuration sees one main cable
acting as the backbone for the whole network.
• The server node transmits data from one end of the cable and in a
single direction to the client node. As the data travels to each node,
its destination address (MAC/IP) is checked to see if it is received and
processed
Benefits of Point to Point Topology Challenges of Point to Point Topology
• Easy to add new devices and replace or • Device failure and other network faults
remove existing devices without affecting are difficult to locate in the network
other devices connected to the network
• Failure in a few devices does not affect • Damage to the backbone cable can bring
other devices, or the network the entire network to a halt
• Less cable is required when compared to • Increase in the bandwidth consumption
other network topologies such as mesh of a few devices can affect the
and star; the cable can be extended easily performance of the whole network
whenever required
• Slower operations, as only one node
transmits data at a time
• Low privacy, as all nodes receive the
signal sent by the server
• Data loss over long distances
3. Ring topology
• In a ring topology, each node is linked
with its neighbor to form a closed
network.
• This configuration sees the data move
from one node to another, either
unidirectionally or bidirectionally.
• Used in smaller networks, like those in
schools.
Benefits of Point to Point Topology Challenges of Point to Point Topology
• Circular flow of data minimizes packet • A single failure in the cable can
collision disrupt overall network operations
• Unidirectional ring topologies feature • Unidirectional ring networks see data
high-speed data transmission packets pass through numerous
nodes before reaching their
destination
• Robust system–can handle a high • Adding, modifying, or removing nodes
number of nodes and heavy traffic is difficult and can disrupt network
activity
• Lower chances of data loss over long
distances
• Faults are located more easily, making
troubleshooting efficient
4. Star topology
• In a star topology, all nodes are
connected to a central hub using a
communication link. Each
• ode needs a separate wire to establish a
point-to-point connection with the hub,
which functions as a server to control
and manage the entire network.
•
Benefits of Point to Point Topology Challenges of Point to Point Topology
• Easy network maintenance and • Choosing the right central hub is vital,
management since each node has its as this device needs to be compatible
own cable with all nodes and links in the
network
• Failures affect only one device and • Higher requirement of cables and
problem areas are located swiftly connectors
• Adding new devices is simple and • Failure of the central hub brings down
straightforward the entire network
• Rapid data transfer
5. Tree topology
• In a tree topology, nodes are arranged
in a configuration that resembles a
tree’s leaves, branches, and trunk.
Endpoints, or ‘leaves,’ are connected
to mid-level nodes or ‘branches’
linked to the tree’s ‘trunk.’
• The trunk is the backbone connection
that links multiple mid-level nodes.
• Tree topologies are suitable for large
networks such as offices, university
campuses, and hospitals.
Benefits of Point to Point Topology Challenges of Point to Point Topology
• Ideal for nodes that are grouped together • Large volume of cabling and numerous
hubs are required
• Superior scalability; more nodes and • Difficult to configure and maintain
hierarchies can be added without
disrupting the existing network
• In case of damage to one part of the • Failure of the central backbone (trunk)
network, other nodes and hierarchies brings the entire network down
remain unaffected
• Swift and easy fault identification and
maintenance
• High-speed data transfer among nodes in
one hierarchy
6. Mesh topology
• all the nodes are
interconnected and can
send and receive their data
and relay data from other
nodes.
Benefits of Point to Point Topology Challenges of Point to Point Topology
• Extremely robust and redundant, as any • Requires many cables and input/output
node or link failure, affects a minimum (I/O) ports
number of endpoints
• Highly efficient data transfer due to • Time-consuming installation and
dedicated point-to-point links for all maintenance
devices
• Robust security and privacy • Cost-intensive
• Swift fault identification
7. Hybrid topology
• A hybrid network topology, as
the name suggests, features
characteristics of multiple
other topologies.
Benefits of Point to Point Topology Challenges of Point to Point Topology
• Combines the advantages of multiple • Depending on the configuration, such
topologies a network can be resource-intensive
to create and maintain
• Can be tailor-made to suit specific • Potentially complicated design that
network requirements could make troubleshooting difficult
• Highly flexible and scalable if • Requires compatible cabling and
implemented correctly other hardware for inter-topology
links
Network Communications Technology
• Intranet
• Extranet
• Internet
Intranet
• An intranet is a private network
contained within an enterprise
that is used to securely share
company information and
computing resources among
employees.
Extranet
• Is a private network that only
authorized users can access.
These authorized users may
include business partners,
suppliers, and even some
customers. They can use the
extranet to exchange
information with each other
without having to enter the
host company’s main network.
Internet
• The Internet, sometimes called
simply "the Net," is a worldwide
system of computer networks --
a network of networks in which
users at any one computer can,
if they have permission, get
information from any other
computer (and sometimes talk
directly to users at other
computers).
Network Communication
Protocols
Overview of Network Protocols
• Describes the rules that govern the transmission of data over
Communication Network
• Provide a method for orderly and efficient exchange of data between
the sender and the receiver.
Roles of Communication
What is Communication?
Establishing the Rules
• An identified sender and receiver
• Agreed upon method of communicating (face-to-face, telephone, letter,
photograph)
• Common language and grammar
• Speed and timing of delivery
• Confirmation and acknowledgment requirements
Message Encoding
Message Formatting and Encapsulation
Example: Personal letter contains the following elements:
• Identifier of the recipient’s location
• Identifier of the sender’s location
• Salutation or greeting
• Recipient identifier
• The message content
• Source identifier
• End of message indicator
Message Size
Message Timing
• People use timing to determine when to speak,
how fast or slow to talk, and how long to wait
for a response.
Message Timing
• Access Method
• Flow Control
• Response Timeout
Access Method
• Access method determines when
someone is able to send a message.
• These timing rules are based on
the environment.
Flow Control
• Timing also affects how much
information can be sent and the
speed that it can be delivered.
• If one person speaks too quickly, it is
difficult for the other person to hear
and understand the message
Response Timeout
• If a person asks a question and
does not hear a response within an
acceptable amount of time, the
person assumes that no answer is
coming and reacts accordingly
Message Delivery Options
Transmission Control Protocol/
Internet Protocol
What is a network protocol
A protocol is the special set of rules that end points in a telecommunication connection use
when they communicate.
• specify interactions between the communicating entities.
• exist at several levels in a telecommunication connection.
• each protocol has its own method of how data is formatted when sent
and
• what to do with it once received, how that data is compressed or how to
• check for errors in data.
Connectionless/Stateless Protocols
• Communication between two network endpoints in which a message can be sent
from one end point to another without prior arrangement.
• The device at one end of the communication transmits data to the other, without
first ensuring that the recipient is available and ready to receive the data.
• The device sending a message simply sends it addressed to the intended recipient. If
there are problems with the transmission, it may be necessary to resend the data
several times
IP is a connectionless protocol. With IP(actually TCP), messages (or other data) are broken up into
small independent "packets" and sent between computers via the Internet. IP is responsible for
"routing" each packet to the correct destination.
What is TCP/IP?
TCP - Transmission Control Protocol
TCP is responsible for breaking data down into small packets
before they can be sent over a network, and for assembling
the packets again when they arrived to the destination.
IP - Internet Protocol
IP takes care of the communication between computers. It is
responsible for addressing, sending and receiving the data
packets over the Internet.
What is a Protocol?
Why TCP/IP so Popular?
TCP/IP Model
TCP/IP key Features
• Logical addressing
• Routability
• Name resolution
• Multiplexing
• Interoperability
Logical Addressing
• big networks into smaller networks using devices such as routers to reduce
network traffic. A network can be again subdivided into smaller subnets so that a
message can travel efficiently from its source to the destination.(IP address)
• the address at which an item (memory cell, storage element, network host) appears
to reside from the perspective of an executing application program.
Routability
• TCP/IP data packets can be moved from one network segment to another.
• allows packets to be forwarded from one network to another, which at home is
between the user's local network and the Internet. The global standard routable
protocol is TCP/IP.
Name Resolution
• TCP/IP allows to use human-friendly names, which are very easy to remember .
Name Resolutions servers (DNS Servers) are used to resolve a human readable name
(also known as Fully Qualified Domain Names (FQDN)) to an IP address and vice
versa.
Interoperability
can work in a heterogeneous network. TCP/IP eliminates the cross-platform
boundaries.
Multiplexing
accepting data from different applications and directing that data to different
applications listening on different receiving computers
What is a port..
a port is an endpoint of communication in an operating system.
A port is always associated with an IP address of a host and the protocol type of the
communication, and thus completes the destination or origination address of a
communication session. A port is identified for each address and protocol by a 16-bit
number, commonly known as the port number.
The Network Interface layer is responsible for placing TCP/IP packets on the
network medium and receiving TCP/IP packets off the network medium.
TCP/IP was designed to be independent of the network access method, frame
format, and medium. In this way, TCP/IP can be used to connect different
network types.
Internet Layer
The Internet layer is responsible for addressing, packaging, and routing functions. The
core protocols of the Internet layer are IP, ARP, ICMP, and IGMP.
The Internet Protocol (IP) is a routable protocol responsible for IP addressing, routing,
and the fragmentation and reassembly of packets.
The Address Resolution Protocol (ARP) is responsible for the resolution of the Internet
layer address to the Network Interface layer address such as a hardware address.
Transport Layer
following Application layer protocols help facilitate the use and management of TCP/IP
networks:
• The Domain Name System (DNS) is used to resolve a hostname to an IP address.
• The Routing Information Protocol (RIP) is a routing protocol that routers use to
exchange routing information on an IP internetwork.
• The Simple Network Management Protocol (SNMP) is used between a network
management console and network devices (routers, bridges, intelligent hubs) to collect
and exchange network management information.
TCP/IP Protocol Suite
IP Routers
• When an IP packet is sent from a computer, it arrives at an IP router.
• The IP router is responsible for "routing" the packet to the correct
destination, directly or via another router.
• The path the packet will follow might be different from other packets of the
same communication. The router is responsible for the right addressing,
depending on traffic volume, errors in the network, or other parameters.
IP Addresses
An IP address is an identifier for a computer or device on a TCP/IP network. Networks using
the TCP/IP protocol route messages based on the IP address of the destination.
IPv4 uses 32 binary bits to create a single unique address on the network. An IPv4 address is
expressed by four numbers separated by dots. Each number is the decimal (base-10)
representation for an eight-digit binary (base-2) number
216.27.61.137
IPv6 uses 128 binary bits to create a single unique address on the network. An IPv6 address is
expressed by eight groups of hexadecimal (base-16) numbers separated by colons, as in
2001:cdba:0000:0000:0000:0000:3257:9652.
Domain Names
The network software generally needs a 32-bit Internet address ( IP i.e.: 192.123.12.2)
in order to open a connection.
Users prefer to deal with computer names rather than numbers. Thus there is a
database that allows the software to look up a name and find the corresponding
number.
Each system would have a file that listed all of the other systems, giving both their
name and number. These files have been replaced by a set of name servers that keep
track of host names and the corresponding Internet addresses.
TCP Communication
• https://www.youtube.com/watch?v=xjOWxpvo7uw
2. Repeater
• A repeater operates at the physical layer.
• Its job is to regenerate the signal over the same network before
the signal becomes too weak or corrupted.
• It extend the length to which the signal can be transmitted over
the same network.
• An important point to be noted about repeaters is that they do not
amplify the signal.
• When the signal becomes weak, they copy the signal bit by bit
and regenerate it at the original strength.
Repeater
3. Bridge
Active Hub - These are the hubs which have their own power supply and can
clean, boost, and relay the signal along with the network. It serves both as a
repeater as well as wiring centre. These are used to extend the maximum
distance between nodes.
Passive Hub - These are the hubs which collect wiring from nodes and power
supply from active hub. These hubs relay signals onto the network without
cleaning and boosting them and can’t be used to extend the distance between
nodes.
Intelligent Hub - It work like active hubs and include remote management
capabilities. They also provide flexible data rates to network devices. It also
enables an administrator to monitor the traffic passing through the hub and to
configure each port in the hub.
How Network Hub Works
Unmanaged Managed
• simple • allows to manage, configure, and
monitor the settings of your LAN
• fixed configuration that you
cannot make any changes • controls over LAN traffic, prioritizing
certain channels
• used for small networks
• offer redundancy features that
duplicate and recovery data
Performance
Unmanaged Managed
• plug and play immediately with • can prioritize channels
your network
• Priority SNMP to allow for remote
• no need to set anything up troubleshooting of the network
Unmanaged Managed
• have very basic security • have some major security benefits,
such as the ability to monitor and
control the network to shut down
active threats, protection for data,
control, and management plan
Cost
Unmanaged Managed
• unmanaged switches usually in • expect significant higher costs. These
price ranges from $50 to around can range from anywhere in $1500
$100 (USD) or more per port to $2800 (USD) per port
Application
Unmanaged Managed
• Used in small businesses • Better suited enterprise-sized
businesses with much larger network
• Home scope
• Single office • Data centers
Application
Unmanaged Managed
• Used in small businesses • Better suited enterprise-sized
businesses with much larger network
• Home scope
• Single office • Data centers
How Switch Work
A router reads its routing table to decide the best available route
the packet can take to reach its destination quickly and accurately.
• They basically works as the messenger agents that take data from
one system, interpret it, and transfer it to another system.
• Gateways are also called protocol converters and can operate at
any network layer.
• Gateways serve as the entry and exit point of a network; all data
routed inward or outward must first pass through and
communicate with the gateway in order to use routing paths.
• The first modems were dial-up meaning they had to dial a phone
number to connect to an ISP.
• These modems operated over standard analog phone lines and
used the same frequencies as telephone calls, which limited their
maximum data transfer rate to 56 Kbps.
• Dial-up modems also required full use of the local telephone line,
meaning voice calls would interrupt the Internet connection.
Modem