Chapter 1 Introduction
Chapter 1 Introduction
COLLEGE OF ENGINEERING
ELECTRONICS ENGINEERING DEPARTMENT
ECE 344
COMMUNICATIONS 4:
DATA COMMUNICATIONS
Communication is almost as important to us as our reliance on air, water, food, and shelter. In
today’s world, through the use of networks, we are connected like never before.
Networking Today
No Boundaries
• World without boundaries
• Global communities
• Human network
Network Components
Host Roles
Every computer on a network is called a
host or end device.
Servers are computers that provide
information to end devices:
• email servers
• web servers Server Description
Type
• file server
Email Email server runs email server software.
Clients are computers that send Clients use client software to access email.
requests to the servers to retrieve
information: Web Web server runs web server software.
Clients use browser software to access web pages.
• web page from a web server
• email from an email server
File File server stores corporate and user files.
The client devices access these files.
Network Components
Peer-to-Peer
It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of network design is
only recommended for very small networks.
Advantages Disadvantages
Easy to set up No centralized administration
Less complex Not as secure
Lower cost Not scalable
Used for simple tasks: transferring files and sharing printers Slower performance
Network Components
End Devices
An end device is where a message originates from or where it is received. Data originates with an end device, flows through the
network, and arrives at an end device.
Network Components
Intermediary Network Devices
An intermediary device interconnects end devices. Examples include
switches, wireless access points, routers, and firewalls.
Management of data as it flows through a network is also the role of
an intermediary device, including:
• Regenerate and retransmit data signals.
• Maintain information about what pathways exist in the network.
• Notify other devices of errors and communication failures.
Network Components
Network Media
Communication across a network is carried through a medium which allows a message to travel from source to destination.
LAN WAN
Interconnect end devices in a limited area. Interconnect LANs over wide geographical areas.
Administered by a single organization or individual. Typically administered by one or more service providers.
Provide high-speed bandwidth to internal devices. Typically provide slower speed links between LANs.
Common Types of Networks
The Internet
The internet is a worldwide collection of
interconnected LANs and WANs.
• LANs are connected to each other using
WANs.
• WANs may use copper wires, fiber optic
cables, and wireless transmissions.
The internet is not owned by any individual or
group. The following groups were developed to
help maintain structure on the internet:
• IETF
• ICANN
• IAB
Common Types of Networks
Network Architecture
Network Architecture refers to the technologies
that support the infrastructure that moves data
across the network.
There are four basic characteristics that the
underlying architectures need to address to
meet user expectations:
• Fault Tolerance
• Scalability
• Quality of Service (QoS)
• Security
Reliable Network
Fault Tolerance
A fault tolerant network limits the impact of a
failure by limiting the number of affected
devices. Multiple paths are required for fault
tolerance.
Reliable networks provide redundancy by
implementing a packet switched network:
• Packet switching splits traffic into packets
that are routed over a network.
• Each packet could theoretically take a
different path to the destination.
This is not possible with circuit-switched
networks which establish dedicated circuits.
Reliable Network
Scalability
A scalable network can expand
quickly and easily to support new
users and applications without
impacting the performance of
services to existing users.
Network designers follow accepted
standards and protocols in order to
make the networks scalable.
Reliable Network
Quality of Service
Voice and live video transmissions
require higher expectations for those
services being delivered.
Have you ever watched a live video
with constant breaks and pauses? This
is caused when there is a higher
demand for bandwidth than available
– and QoS isn’t configured.
• Quality of Service (QoS) is the
primary mechanism used to ensure
reliable delivery of content for all
users.
• With a QoS policy in place, the
router can more easily manage the
flow of data and voice traffic.
Reliable Network
There are two main types of
Network Security network security that must be
addressed:
• Network infrastructure security
• Physical security of network devices
• Preventing unauthorized access to the
devices
• Information Security
• Protection of the information or data
transmitted over the network
Recent Trends
The role of the network must
adjust and continually transform in
order to be able to keep up with
new technologies and end user
devices as they constantly come to
the market.
Several new networking trends
that effect organizations and
consumers:
• Bring Your Own Device (BYOD)
• Online collaboration
• Video communications
• Cloud computing
Network Trends
Online Collaboration
• Collaborate and work with others
over the network on joint projects.
• Collaboration tools including Cisco
WebEx (shown in the figure) gives
users a way to instantly connect
and interact.
• Collaboration is a very high priority
for businesses and in education.
• Cisco Webex Teams is a
multifunctional collaboration tool.
• send instant messages
• post images
• post videos and links
Network Trends
Video Communication
• Video calls are made to anyone, regardless of where they are located.
• Video conferencing is a powerful tool for communicating with others.
• Video is becoming a critical requirement for effective collaboration.
Network Trends
Cloud Computing
Cloud computing allows us to store personal files or backup our data on servers
over the internet.
• Applications can also be accessed using the Cloud.
• Allows businesses to deliver to any device anywhere in the world.
Cloud Computing
Four types of Clouds:
• Public Clouds
• Available to the general public through a pay-per-use model or for free.
• Private Clouds
• Intended for a specific organization or entity such as the government.
• Hybrid Clouds
• Made up of two or more Cloud types – for example, part custom and part public.
• Each part remains a distinctive object but both are connected using the same architecture.
• Custom Clouds
• Built to meet the needs of a specific industry, such as healthcare or media.
• Can be private or public.
Network Trends
Wireless Broadband
In addition to DSL and cable, wireless is
another option used to connect homes
and small businesses to the internet.
• More commonly found in rural
environments, a Wireless Internet
Service Provider (WISP) is an ISP that
connects subscribers to designated
access points or hotspots.
• Wireless broadband is another solution
for the home and small businesses.
• Uses the same cellular technology used
by a smart phone.
• An antenna is installed outside the
house providing wireless or wired
connectivity for devices in the home.
Network Security
Internal Threats:
• lost or stolen devices
• accidental misuse by
employees
• malicious employees
Network Security
Security Solutions
Security must be implemented in multiple layers
using more than one security solution.
Network security components for home or small
office network:
• Antivirus and antispyware software
should be installed on end devices.
• Firewall filtering used to block
unauthorized access to the network.
Network Security
Security Solutions
Larger networks have additional security
requirements:
• Dedicated firewall system
• Access control lists (ACL)
• Intrusion prevention systems (IPS)
• Virtual private networks (VPN)
The study of network security starts with a clear
understanding of the underlying switching and
routing infrastructure.