You are on page 1of 47

Basics of Data Communication

Semester 2 : Module 1 & 2


Its All About
The Network

Semester 2 : Module 1 & 2


Network Protocols
• Network protocols are a set of rules
and procedures that govern
communication between two or more
devices in a network. They define how
data is transmitted over the network,
how devices authenticate with one
another, and how they negotiate
other important parameters such as
data rates and flow control.

Semester 2 : Module 1 & 2


Basics of Data Communication
• The basic concepts in any communication system
include the following: -
• Sender
• Receiver
• Message
• Medium
• Encoding
• Decoding
• Noise
• Feedback
• Protocols

Semester 2 : Module 1 & 2


Digital Communication
• Digital communication refers to the transmission of digital data from one device to another over
a communication channel. There are various types of digital communication, including: -
• Wired Communication
• Examples include Ethernet, USB, and HDMI.
• Wireless Communication
• Examples include Wi-Fi, Bluetooth, and NFC.
• Satellite Communication
• Examples include satellite television, satellite phones, and satellite internet.
• Optical Communication
• Examples include 3G, 4G, and 5G mobile networks.

Semester 2 : Module 1 & 2


Digital Communication
• Digital communication refers to the
transmission of digital data from one device
to another over a communication channel.
There are various types of digital
communication, including: -
• Mobile Communication
• Examples include 3G, 4G, and 5G
mobile networks.
• Internet Communication
• Examples include email, instant
messaging, and video
conferencing.
• Voice over IP (VoIP) Communication
• Examples include Skype,
WhatsApp, and Zoom.
Semester 2 : Module 1 & 2
Networks based on Geography
• There are mainly three types of Networks based on Geography: -
• Local Area Network (LAN)
• Metropolitan Area Network (MAN)
• Wide Area Network (WAN)

Semester 2 : Module 1 & 2


Networks based on Topology
• There are several types of network topologies, each with its own advantages and disadvantages.
The main types of network topologies are: -
• Bus Topology
• Examples of bus topology include the Ethernet bus and the local talk bus.
• Star Topology
• Examples of star topology include Ethernet star and token ring star.
• Ring Topology
• Examples of ring topology include the IBM token ring and FDDI (Fiber Distributed Data
Interface).
• Mesh Topology
• Examples of mesh topology include wireless mesh networks and MANETs (Mobile Ad-
hoc Networks).

Semester 2 : Module 1 & 2


Networks based on Topology

• There are several types of network


topologies, each with its own advantages
and disadvantages. The main types of
network topologies are: -
• Tree Topology
• Examples of tree topology include
Ethernet tree and hierarchical
internetworking.
• Each topology has its own strengths and
weaknesses, and the choice of topology
depends on factors such as the size and
complexity of the network, the level of
redundancy and fault tolerance required,
and the cost and availability of hardware
and software
Semester 2 : Module 1 & 2
Network Protocols
• Network protocols are a
set of rules and procedures
that govern
communication between
two or more devices in a
network. They define how
data is transmitted over
the network, how devices
authenticate with one
another, and how they
negotiate other important
parameters such as data
rates and flow control.

Semester 2 : Module 1 & 2


OSI Model – Physical Layer
• Physical Layer
• Example:
• A typical example of the Physical
layer is a network cable, such as a
twisted pair, coaxial cable, or
fiber optic cable that physically
connects computers, switches,
routers, or other network
devices.
• Examples of Protocols employed at
Physical Layer
• Ethernet
• RS-232

Semester 2 : Module 1 & 2


OSI Model – Data Link Layer
• Data Link Layer
• Example:
• Ethernet and Wi-Fi protocols are
the most common examples of the
Data Link layer. Ethernet defines
the physical addressing of network
devices, the MAC layer, and the LLC
layer that provides error detection,
flow control, and access control
services.
• Examples of Protocols employed at Data
Link Layer
• Point-to-Point Protocol (PPP)
• Ethernet

Semester 2 : Module 1 & 2


OSI Model – Network Layer
• Example:
• The Internet Protocol (IP) is an
example of the Network layer
protocol. It defines the format of
IP addresses, the routing of
packets between networks, and
the fragmentation and
reassembly of packets in case of
large data transfer.
• Examples of Protocols employed at
Network Layer
• Internet Protocol (IP)
• Open Shortest Path First (OSPF)

Semester 2 : Module 1 & 2


OSI Model –Transport Layer
• Example:
• The Transmission Control Protocol
(TCP) and the User Datagram Protocol
(UDP) are examples of Transport layer
protocols. TCP provides reliable,
ordered, and error-checked delivery of
data between applications. UDP
provides a connection less, unreliable,
and low-overhead delivery of data
between applications.
• Examples of Protocols employed at
Transport Layer: -
• Transmission Control Protocol (TCP)
• User Datagram Protocol (UDP)

Semester 2 : Module 1 & 2


OSI Model –Session Layer
• Example:
• The Session Initiation Protocol
(SIP) is an example of the Session
layer protocol. It is used for
establishing, modifying, and
terminating multimedia sessions
between clients.
• Examples of Protocols employed at
Session Layer
• Remote Procedure Call (RPC)
• NetBIOS

Semester 2 : Module 1 & 2


OSI Model – Presentation Layer
• Example:
• The Secure Sockets Layer (SSL) and
the Transport Layer Security (TLS)
are examples of the Presentation
layer protocols. They provide
encryption and decryption
services for secure communication
between applications.
• Examples of Protocols employed at
Presentation Layer
• Secure Sockets Layer (SSL)
• ASCII

Semester 2 : Module 1 & 2


OSI Model – Application Layer
• Example:
• The Simple Mail Transfer
Protocol (SMTP) is an
example of the Application
layer protocol. It is used for
sending and receiving email
messages over the Internet.
• Examples of Protocols employed
at Application Layer: -
• Simple Mail Transfer Protocol
(SMTP)
• File Transfer Protocol (FTP)

Semester 2 : Module 1 & 2


TCP/IP Model
The TCP/IP model is a four-layered model that consists of the following layers:

Semester 2 : Module 1 & 2


TCP/IP Model-Application Layer
Application Layer
• This layer is responsible for providing network services to applications. It enables
communication between two or more applications over the internet.
• Examples of application layer protocols include HTTP, FTP, SMTP, DNS, and Telnet.
• At the Application Layer in the TCP/IP Model, the network devices that work are: -
• Web Servers
• Examples of web servers include Apache HTTP Server, Nginx, and Microsoft IIS.
• Email Servers
• Examples of email servers include Microsoft Exchange Server, Postfix, and Sendmail.
• DNS Servers
• Examples of DNS servers include BIND, Microsoft DNS Server, and Google Cloud DNS.

Semester 2 : Module 1 & 2


TCP/IP Model-Application Layer
• DNS Servers
• Examples of DNS servers include BIND, Microsoft DNS Server, and Google Cloud DNS.
• Proxy Servers
• Examples of proxy servers include Squid, Nginx, and Apache Traffic Server.
• DHCP Servers
• Examples of DHCP servers include ISC DHCP Server, Microsoft DHCP Server, and Cisco IOS
DHCP Server.
• FTP Servers
• Examples of FTP servers include vsftpd, Pure-FTPd, and FileZilla Server.
• Telnet/SSH Servers
• Examples of Telnet/SSH servers include OpenSSH, PuTTY, and TeraTerm.

Semester 2 : Module 1 & 2


TCP/IP Model-Application Layer
• Telnet/SSH Servers
• Examples of Telnet/SSH servers include OpenSSH, PuTTY, and TeraTerm.
• Examples of Protocols employed at the Application Layer: -
• HTTP (Hypertext Transfer Protocol)
• FTP (File Transfer Protocol)
• SMTP (Simple Mail Transfer Protocol)
• DNS (Domain Name System)
• Telnet

Semester 2 : Module 1 & 2


TCP/IP Model - Transport Layer
• This layer is responsible for the reliable transmission of data between hosts. It provides end-to-
end communication services for applications. Examples of transport layer protocols include TCP
(Transmission Control Protocol) and UDP (User Datagram Protocol). Examples of Protocols
employed at the Transport Layer: -
• TCP (Transmission Control Protocol)
• UDP (User Datagram Protocol)

Semester 2 : Module 1 & 2


TCP/IP Model - Internet Layer
• This layer is responsible for the routing of data packets between hosts on different networks. It
provides logical addressing and fragmentation of data packets. The main protocol of the
Internet layer is the Internet Protocol (IP). The Internet Layer in the TCP/IP Model is responsible
for the transmission of data packets between different networks. The following network devices
work at the Internet Layer: -
• Router
• IP Switch
• Layer 3 Switch
• Gateway
• Network Interface Card (NIC)
• The internet layer is responsible for the routing of data packets between hosts on different
networks. It provides logical addressing and fragmentation of data packets. The main protocol
of the internet layer is the Internet Protocol (IP). This protocol is responsible for routing data
packets between hosts on different networks. It provides logical addressing and fragmentation
of data packets.

Semester 2 : Module 1 & 2


TCP/IP Model - Network Access Layer
• Network Access Layer
• This layer is responsible for the physical transmission of data between hosts on the same
network. It provides hardware addressing and error detection for data transmission.
• Examples of network access layer protocols include Ethernet, Wi-Fi, and Token Ring.
• The network devices that work at the Network Access layer in the TCP/IP model are: -
• Network Interface Cards (NICs)
• Repeaters
• Hubs
• Switches
• Bridges
• Wireless Access Points (WAPs)

Semester 2 : Module 1 & 2


TCP/IP Model - Network Access Layer
• Overall, the network devices that work at the Network Access layer in the TCP/IP model are
responsible for providing physical connectivity to the network and ensuring reliable
communication between the devices.
• Examples of Protocols employed at Network Access Layer: -
• Ethernet
• This protocol is used for transmitting data over wired networks.
• Wi-Fi
• This protocol is used for transmitting data over wireless networks.
• Token Ring
• This protocol is used for transmitting data over token ring networks.

Semester 2 : Module 1 & 2


IPSec Protocol
• IPSec (Internet Protocol Security) is a protocol
suite used for securing Internet Protocol (IP)
communication by providing encryption,
integrity, and authentication of IP packets. It is
used to create a Virtual Private Network
(VPN) between two or more devices over the
internet. IPSec is widely used to secure
private network connections across the
internet.
• IPSec works by encrypting and authenticating
each IP packet that is sent between the two
devices. It uses two protocols: -
• Authentication Header (AH) and
Encapsulating Security Payload (ESP)
• IPSec can be used in two modes:
Transport mode and Tunnel mode.

Semester 2 : Module 1 & 2


TCP/IP
• TCP/IP
• TCP/IP (Transmission Control
Protocol/Internet Protocol) is a suite of
communication protocols used for
communication over the internet and
other interconnected networks. It is a
set of rules governing communication
between devices on a network, including
the transmission of data packets.
• The TCP/IP protocol suite consists of two
main protocols: -
• TCP (Transmission Control Protocol)
and IP (Internet Protocol)

Semester 2 : Module 1 & 2


TCP/IP
• TCP
• The Transmission Control Protocol (TCP) is one of the core protocols of the Internet Protocol Suite, which
is used to establish reliable and secure connections between devices on a network. TCP provides a
connection-oriented communication service, which means that a connection is established between two
devices before data transmission begins.
• IP
• Instead, it uses the best-effort delivery model, where each packet is forwarded independently to its
destination. IP provides the following services: -
• Addressing
• Fragmentation and Reassembly
• Routing
• Error Reporting
• IP has two versions:
• IPv4 & IPv6

Semester 2 : Module 1 & 2


DHCP
• Dynamic Host Configuration Protocol (DHCP) is a network protocol that is used to dynamically
assign IP addresses and other network configuration settings to devices on a network. DHCP
simplifies the process of network administration by automatically managing IP addresses and
other configuration details for devices that connect to a network.

Semester 2 : Module 1 & 2


DNS
• The Domain Name System (DNS) is a protocol used for
translating domain names into IP addresses. It is used
for resolving domain names, which are easy-to-
remember names such as google.com, into the
corresponding IP addresses, such as 216.58.194.174.
• The DNS protocol provides a hierarchical and distributed
naming system that is used to manage the mapping of
domain names to IP addresses

Semester 2 : Module 1 & 2


ICMP
• ICMP (Internet Control Message Protocol) is
a network protocol used by network devices,
such as routers, to communicate error
messages and operational information about
network conditions.
• It is a part of the Internet Protocol Suite
(TCP/IP).
• Some common uses of ICMP include: -
• Ping
• Traceroute
• Path MTU Discovery

Semester 2 : Module 1 & 2


SSL
• SSL (Secure Sockets Layer) is a protocol for
securing data transmission over the internet.
• SSL uses a combination of cryptographic
algorithms to achieve these security goals.
• Here are some of the key features of SSL: -
• Encryption
• Authentication
• Integrity
• Handshaking
• Session Resumption
• SSL is commonly used to secure web traffic,
such as HTTPS connections between web
browsers and web servers.

Semester 2 : Module 1 & 2


MIME
• MIME stands for Multipurpose Internet Mail
Extensions, and it is an extension to the Simple
Mail Transfer Protocol (SMTP) that enables
email messages to support multimedia
attachments, such as images, audio, and video.
• MIME uses a set of headers to define the
message content and format, including the
type of media, character encoding, and file
extension.
• The headers include: -
• Content-Type, Content-Disposition, and
Content-Transfer-Encoding.
• Content-Type header
• Content-Disposition header
• Content-Transfer-Encoding header
Semester 2 : Module 1 & 2
S/MIME
• S/MIME stands for Secure/Multipurpose Internet Mail Extensions.
• It is a protocol used for securing email messages sent over the Internet.
• S/MIME provides a mechanism for digitally signing and encrypting email messages, which
ensures the confidentiality and authenticity of email communications.

Semester 2 : Module 1 & 2


SMTP
• The Simple Mail Transfer Protocol (SMTP)
is an application layer protocol that
facilitates email communication between
servers and clients.
• To address these issues, several
extensions and protocols have been
developed that add security features to
SMTP, such as: -
• Secure SMTP (SSMTP)
• SMTPS
• STARTTLS

Semester 2 : Module 1 & 2


IMAP
• The IMAP protocol offers several key
features that make it useful for
managing email messages, including: -
• Message Flagging
• Server-side Searching
• Folder Management
• Email Synchronization

Semester 2 : Module 1 & 2


POP
• POP (Post Office Protocol) is a protocol used to retrieve email messages from a mail server.

Semester 2 : Module 1 & 2


PGP
• PGP (Pretty Good Privacy) is a
cryptographic protocol used for
email encryption and signing, as
well as for encrypting files and
messages in general. PGP was
developed in 1991 by Phil
Zimmermann, and its aim was to
provide easy-to-use encryption
tools for individuals who wanted to
secure their email communication
against unauthorized access.

Semester 2 : Module 1 & 2


DNS Sec
• The DNSSEC protocol works
by adding two new types of
records to the DNS database:
• DNSKEY & RRSIG
records.
• DNSSEC provides several
security benefits, including: -
• Authentication
• Data Integrity
• Non-repudiation
• Trust Hierarchy

Semester 2 : Module 1 & 2


HTTP
• HTTP, which stands for Hypertext Transfer Protocol, is a protocol used for exchanging data
between a client and a server over the internet. It is the primary protocol used to transfer
information on the World Wide Web.

Semester 2 : Module 1 & 2


HTTPS

• HTTPS (Hypertext Transfer Protocol


Secure) is a secure version of HTTP
(Hypertext Transfer Protocol), which is the
primary protocol used to exchange data
between web servers and clients.
• The benefits of using HTTPS include: -
• Data Confidentiality
• Authentication
• Data Integrity
• SEO
• Trust

Semester 2 : Module 1 & 2


SSH
• Secure Shell (SSH) is a
cryptographic network protocol
that provides a secure channel
between two networked devices.
SSH works by using a public-key
cryptography method to
authenticate the client and the
server. The client generates a pair
of cryptographic keys:
• A Public Key and a Private Key
• The public key is shared with
the server, while the private
key is kept secret on the client
machine.

Semester 2 : Module 1 & 2


Telnet
• Telnet is a network protocol used to
establish a remote terminal session
with a host system over the internet.
It enables a user to connect to a
remote system and control it
through a Command Line Interface
(CLI).

Semester 2 : Module 1 & 2


FTP
• FTP, or File Transfer Protocol, is a protocol
used for transferring files between two
systems over a network. It was developed
in the early 1970s and is one of the oldest
network protocols still in use.
• FTP uses two channels to communicate
between the client and server: -
• A Control Channel and a Data Channel
• FTP uses two modes of operation:
• Active Mode and Passive Mode.

Semester 2 : Module 1 & 2


SFTP
• SFTP, or Secure File Transfer Protocol, is
a secure file transfer protocol that
provides secure file transfer capabilities
over an encrypted SSH2 connection
• SFTP provides a number of benefits
over traditional FTP, including: -
• Secure File Transfer
• Strong Authentication
• Data Integrity
• Confidentiality

Semester 2 : Module 1 & 2


Semester 2 : Module 1 & 2
GOOD JOB !!
TAKE A BREAK

You might also like