You are on page 1of 30

Data Communication and computer

Networking

MWU-IT@2023
Chapter-1
• Definition of computer networking
• Computer networking refers to the practice of connecting computers
and other digital devices together to share resources and exchange
information.
• It involves the use of hardware and software technologies that
enable communication between computers and other devices,
whether they are located in the same physical location or are
geographically dispersed.
• Setting up a computer network is a fast and reliable way of sharing
information and resources within a business.
• It can enables the organization to make a use of IT systems and
equipment effectively.

MWU-IT@2023
1.1- Reason for networking

• File sharing - you can easily share data between different users, or
access it remotely if you keep it on other connected devices.

MWU-IT@2023
Reason for networking… continued

• Resource sharing - using network-connected peripheral devices like


printers, scanners and copiers, or sharing software between multiple
users, saves money.

MWU-IT@2023
Reason for networking… continued

• Sharing a single internet connection - it is cost-efficient and can help


protect your systems if you properly secure the network.

5
Reason for networking… continued

• Increasing storage capacity - you can access files and multimedia,


such as images and music, which you store remotely on other
machines or network-attached storage devices

NAS (Network
attached storage)
6

MWU-IT@2023
1.2- Types of Network

1.2.1- Types of Network Based on coverage distance (Area)

• The four types of network based on geographical spread


are Personal Area Network (PAN), Local Area Network (LAN),
Metropolitan Area Network (MAN) and Wide Area Network (WAN).

1. Personal Area Network (PAN): cover a single person area.

2. Local Area Network (LAN): cover a room, campus or building.

3. Metropolitan Area Network (MAN): cover a city (connect two or


more LAN in the same city).

4. Wide Area Network (WAN): cover a country or world. Ex. Internet


7

MWU-IT@2023
Types of Network… continued

• Based on Architecture

• Network Architecture designates how your network is physically and


logically arranged and includes a broad scope of elements like
network components, services, protocols, and infrastructure.

1. Peer-to-Peer (P2P): In this type of network, all computers have


equal status; there are no 'clients' or 'servers'. As a result, it is quite
simple and good for smaller networks.

2. Client/Server: On such a network one machine is acting as the


server, providing data and services that are used by the clients.

MWU-IT@2023
Types of Network… continued

• Based on Topology
• Topology refers to the layout pattern of the network devices on a
network.
1. Star: All nodes are connected to a central network device (Hub,
switch, router).
2. Bus: All nodes are connected to a common medium along this
medium. This medium acts as a backbone for the network.
3. Ring: Each node connects to exactly two other nodes, forming a
single continuous pathway for signals through each node - a ring.
Data travel from node to node, with each node along the way
handling every packet.
4. Mesh: Every node has a connection to every other node in the
network.

MWU-IT@2023
Types of Network… continued

• Based physical medium, there are 2 types of networks:


1. Wired Network: As we all know, “wired” refers to any physical
medium made up of cables. Copper wire, twisted pair, or fiber optic
cables are all options. A wired network employs wires to link
devices to the Internet or another network, such as laptops or
desktop PCs.
2. Wireless Network: “Wireless” means without wire, media that is
made up of electromagnetic waves (EM Waves) or infrared waves.
Antennas or sensors will be present on all wireless devices.
Cellular phones, wireless sensors, TV remotes, satellite disc
receivers, and laptops with WLAN cards are all examples of
wireless devices. For data or voice communication, a wireless
network uses radiofrequency waves rather than wires.

10

MWU-IT@2023
1-3: Types of cable

• To connect two or more computers or networking devices in a


network, network cables are used. There are three types of network
cables; coaxial, twisted-pair, and fiber-optic.
1. Coaxial cable: This cable contains a conductor, insulator, braiding,
and sheath. The sheath covers the braiding, the braiding covers the
insulation, and the insulation covers the conductor. The following
image shows these components.

11

MWU-IT@2023
Types of cable… continued

2. Twisted-pair cables
• The twisted-pair cable was primarily developed for computer
networks. This cable is also known as Ethernet cable. Almost all
modern LAN computer networks use this cable.
• This cable consists of color-coded pairs of insulated copper wires.
Every two wires are twisted around each other to form pair. Based
on how pairs are stripped in the plastic sheath, there are two
types of twisted-pair cable; UTP and STP.
• In the UTP (Unshielded twisted-pair) cable, all pairs are wrapped
in a single plastic sheath.
• In the STP (Shielded twisted-pair) cable, each pair is wrapped
with an additional metal shield, then all pairs are wrapped in a single
outer plastic sheath.

12

MWU-IT@2023
Types of cable… continued

13

MWU-IT@2023
Types of cable… continued

3. Fiber optic cable


• This cable can transmit data over a long distance at the highest
speed. It can transmit data up to 40 kilometers at the speed of
100Gbps.
• Fiber optic uses light to send data. It reflects light from one endpoint
to another. Based on how many beams of light are transmitted at a
given time, there are two types of fiber optical cable; SMF and MMF.

14

MWU-IT@2023
1.4- Cable connectors

1. RJ45 (Registered Jack 45) is one of the most used networking


connector in network world.
• RJ45 is a connector made by plastic and it is larger than a classical
telephone connector, RJ11. RJ45 is the connector
of UTP and STP type cables.
• It is located at the two side of the cables (CAT-5, CAT-6 etc) and
with this connectors we can connect the cable between any two
network devices, to routers, to switches, firewalls etc. Here, RJ45 is
the point that we terminate a cable. This process is termed as
“termination” in network terminology. With this way, these two
network devices are connected.
• This process is done with the help of RJ-45 Crimping tool.

15

MWU-IT@2023
Cable connectors… continued

16

MWU-IT@2023
Cable connectors… continued

2. Coaxiel Cable Network Connectors


– BNC (Bayone-Neill-Concelman) Connector is one of the most
used Coaxial Cable Connectors.

17

MWU-IT@2023
Cable connectors… continued

3. Optical Cables: can be used with different types of connectors.


• The most used optical cable connectors are LC, SC and ST
connector. With this connectors optical cables are plugged to the
optical ports in the network devices.
• The most common Fiber Optic Networking Connectors are given
below:

18
1.4- Security Terminologies

• Data security: refers to protecting data from being accessed or


changed by unauthorized user or program.
• Data integrity: refers to protecting data from being modified by
unauthorized user or program.
• Network performance: refers to measures of service quality of a
network as seen by the customer.
• Network performance is measured by the following factors:
– Bandwidth commonly measured in bits/second is the maximum rate that
information can be transferred
– Throughput is the actual rate that information is transferred
– Latency the delay between the sender and the receiver decoding it, this is
mainly a function of the signals travel time, and processing time at any nodes the
information traverses
– Jitter variation in packet delay at the receiver of the information
– Error rate the number of corrupted bits expressed as a percentage or fraction of
the total sent 19

MWU-IT@2023
1.5-Network Devices… continued

• Hub: A hub is a physical device used to join multiple devices on the


same LAN. For example, a laptop, desktop computer and printer can
connect into a hub's ports with Ethernet cables and be part of the
same local network. Unlike a bridge, router or switch, a hub
broadcasts messages it receives from one port to all remaining ports
without examining the frames or isolating the message for the
intended destination.

• Repeater: A repeater strengthens a signal and resends it to its


destination. Repeaters are used to combat attenuation, bypass
interference and extend the range of a signal.
• A repeater operates at Layer 1 of the OSI model.

20

MWU-IT@2023
1.5-Network Devices… continued

• Bridge: A network bridge acts as an interconnection between two or


more LANs, essentially creating a single domain from separate
LANs. Bridge devices have switching capabilities, with which they
forward incoming data frames by examining media access control
(MAC) addresses. With each frame it receives, a bridge builds a
lookup table of MAC addresses and port locations. The bridge
references this table to determine whether to forward a frame along
or discard it, which happens when a MAC address is not within the
bridge's domain.
• Bridges are no longer commonly used within enterprise network
designs and are typically replaced by switches.
• A bridge operates at Layer 2 of the OSI model.

21

MWU-IT@2023
Network Devices… continued

• Switch: A network switch forwards data to its destination by


examining an incoming frame's MAC address and sending it to the
device with the matching address.
• A traditional switch operates at Layer 2 of the OSI model. Layer 3
switches operate at the network layer and transfer packets based on
the destination IP address.

• Router: A router directs data requests from one network to another.


Routers examine incoming packets to determine the appropriate
destination IP address and then forward the packet to that
destination. A router can also enable internet access through its
connection to a modem, or as a combined modem-router.
• A router operates at Layer 3 of the OSI model -- the network layer.

22

MWU-IT@2023
Network Security Device

• Firewall: A firewall is a network security device that monitors


incoming and outgoing network traffic and decides whether to allow
or block specific traffic based on a defined set of security rules.
Firewalls have been a first line of defense in network security for
over 25 years.

23

MWU-IT@2023
Network Devices… continued

• Gateway: A gateway is a network node that connects discrete


networks or systems that use different protocols, enabling data to
flow between the networks.
• Gateways use multiple protocols and translate an incoming packet's
information and protocol to make it compatible with the destination
environment. After a gateway processes the data packet, it typically
forwards it on to a router, which sends the packet toward its
destination within the network.
• Types of gateways include routers, web application firewalls and
email security gateways. Gateways are also frequently used within
IoT and cloud environments.
• Gateways can operate at any layer of the OSI model.

24

MWU-IT@2023
Network Devices … continued

25

MWU-IT@2023
1.6- Popular Protocols in computer Network

• Network Protocols are a set of established rules which control and


govern the interchange of information.
• Most common networking protocols are:
1. Address Resolution Protocol (ARP): A communication layer
protocol (mapping process between the data link layer and network
layer) which is used to identify a media access control (MAC)
address given the IP address.
2. Domain Name System (DNS): IP addresses are of numerical
format and hence they are not easily readable or remember-able to
humans. DNS is a hierarchical system that converts these IP
addresses into a human-readable hostname.
3. File Transfer Protocol/Secure (FTP/S): It is a network protocol
based on the client and server model architecture which is used to
transfer files between the client and the server on a computer
network. 26

MWU-IT@2023
1.6- Popular Protocols in computer Network

3. HyperText Transfer Protocol/Secure (HTTP/S): It is used for


secure communication on a computer network. Its main features
include authentication of the website accessed and then protecting
the privacy and integrity of the data that is exchanged.
4. IMAP and POP3: Used to store email and access email from the
mail server respectively.
5. Remote Desktop Protocol (RDP): Developed by Microsoft, it is a
protocol that provides users with a Graphical Interface to connect to
another computer over a network connection, where one user runs
RDP client software while another runs RDP server software.
6. Session Initiation Protocol (SIP): It is a signaling protocol that is
used for initiating, maintaining, altering, and terminating real-time
sessions.

27

MWU-IT@2023
1.6- Popular Protocols in computer Network

7. Simple Mail Transfer Protocol (SMTP): It is a communication


application layer protocol and is used to send emails.
8. Secure SHell (SSH): It is a cryptography-based network protocol
for operating network services securely and reliably over an
unsecured network (secure remote login).
9. Telnet: It is an application protocol that is used on the Internet
or local area network that provides bidirectional interactive text-
oriented communication that uses a virtual terminal connection.
10. Internet Protocol (IP): Standardized by IEEE in 1974, this protocol
is responsible for addressing and fragmenting data packets in
digital networks. Its goal is to ensure the successful delivery of
packets from source to destination.

28

MWU-IT@2023
1.6- Popular Protocols in computer Network

10. Transmission Control Protocol (TCP): is a connection-oriented


reliable protocol. Two devices need to establish a connection
before start using TCP and sending the data. It also provides an
acknowledgment to the sender device regarding the status of the
data being sent. So in case, the sender receives a negative
acknowledgment, it resends the data.
11. UDP is a connectionless and unreliable protocol. Unlike TCP,
there is no mechanism in UDP for packet recovery in case of
packet loss. Also, it doesn’t have any error checking process. But in
terms of latency and bandwidth, UDP is more efficient than TCP
12. Dynamic Host Configuration Protocol: This protocol works on
IP networks, assigning IP addresses to devices and hosts
connected to the network. It also allows them to communicate
with each other efficiently.
29

MWU-IT@2023
End of Chapter-1

READ THE REFERENCE BOOK


FOR DETAIL INFORMATION
30

MWU-IT@2023

You might also like