The document provides an overview of basics of data communication including network protocols, digital communication, network topologies, OSI and TCP/IP models. It discusses key concepts such as sender, receiver, encoding, decoding, protocols. It describes different types of digital communication, network topologies based on geography and topology. It also explains the layers of OSI and TCP/IP models along with examples of protocols used in each layer.
The document provides an overview of basics of data communication including network protocols, digital communication, network topologies, OSI and TCP/IP models. It discusses key concepts such as sender, receiver, encoding, decoding, protocols. It describes different types of digital communication, network topologies based on geography and topology. It also explains the layers of OSI and TCP/IP models along with examples of protocols used in each layer.
The document provides an overview of basics of data communication including network protocols, digital communication, network topologies, OSI and TCP/IP models. It discusses key concepts such as sender, receiver, encoding, decoding, protocols. It describes different types of digital communication, network topologies based on geography and topology. It also explains the layers of OSI and TCP/IP models along with examples of protocols used in each layer.
Network Protocols • Network protocols are a set of rules and procedures that govern communication between two or more devices in a network. They define how data is transmitted over the network, how devices authenticate with one another, and how they negotiate other important parameters such as data rates and flow control.
Semester 2 : Module 1 & 2
Basics of Data Communication • The basic concepts in any communication system include the following: - • Sender • Receiver • Message • Medium • Encoding • Decoding • Noise • Feedback • Protocols
Semester 2 : Module 1 & 2
Digital Communication • Digital communication refers to the transmission of digital data from one device to another over a communication channel. There are various types of digital communication, including: - • Wired Communication • Examples include Ethernet, USB, and HDMI. • Wireless Communication • Examples include Wi-Fi, Bluetooth, and NFC. • Satellite Communication • Examples include satellite television, satellite phones, and satellite internet. • Optical Communication • Examples include 3G, 4G, and 5G mobile networks.
Semester 2 : Module 1 & 2
Digital Communication • Digital communication refers to the transmission of digital data from one device to another over a communication channel. There are various types of digital communication, including: - • Mobile Communication • Examples include 3G, 4G, and 5G mobile networks. • Internet Communication • Examples include email, instant messaging, and video conferencing. • Voice over IP (VoIP) Communication • Examples include Skype, WhatsApp, and Zoom. Semester 2 : Module 1 & 2 Networks based on Geography • There are mainly three types of Networks based on Geography: - • Local Area Network (LAN) • Metropolitan Area Network (MAN) • Wide Area Network (WAN)
Semester 2 : Module 1 & 2
Networks based on Topology • There are several types of network topologies, each with its own advantages and disadvantages. The main types of network topologies are: - • Bus Topology • Examples of bus topology include the Ethernet bus and the local talk bus. • Star Topology • Examples of star topology include Ethernet star and token ring star. • Ring Topology • Examples of ring topology include the IBM token ring and FDDI (Fiber Distributed Data Interface). • Mesh Topology • Examples of mesh topology include wireless mesh networks and MANETs (Mobile Ad- hoc Networks).
Semester 2 : Module 1 & 2
Networks based on Topology
• There are several types of network
topologies, each with its own advantages and disadvantages. The main types of network topologies are: - • Tree Topology • Examples of tree topology include Ethernet tree and hierarchical internetworking. • Each topology has its own strengths and weaknesses, and the choice of topology depends on factors such as the size and complexity of the network, the level of redundancy and fault tolerance required, and the cost and availability of hardware and software Semester 2 : Module 1 & 2 Network Protocols • Network protocols are a set of rules and procedures that govern communication between two or more devices in a network. They define how data is transmitted over the network, how devices authenticate with one another, and how they negotiate other important parameters such as data rates and flow control.
Semester 2 : Module 1 & 2
OSI Model – Physical Layer • Physical Layer • Example: • A typical example of the Physical layer is a network cable, such as a twisted pair, coaxial cable, or fiber optic cable that physically connects computers, switches, routers, or other network devices. • Examples of Protocols employed at Physical Layer • Ethernet • RS-232
Semester 2 : Module 1 & 2
OSI Model – Data Link Layer • Data Link Layer • Example: • Ethernet and Wi-Fi protocols are the most common examples of the Data Link layer. Ethernet defines the physical addressing of network devices, the MAC layer, and the LLC layer that provides error detection, flow control, and access control services. • Examples of Protocols employed at Data Link Layer • Point-to-Point Protocol (PPP) • Ethernet
Semester 2 : Module 1 & 2
OSI Model – Network Layer • Example: • The Internet Protocol (IP) is an example of the Network layer protocol. It defines the format of IP addresses, the routing of packets between networks, and the fragmentation and reassembly of packets in case of large data transfer. • Examples of Protocols employed at Network Layer • Internet Protocol (IP) • Open Shortest Path First (OSPF)
Semester 2 : Module 1 & 2
OSI Model –Transport Layer • Example: • The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) are examples of Transport layer protocols. TCP provides reliable, ordered, and error-checked delivery of data between applications. UDP provides a connection less, unreliable, and low-overhead delivery of data between applications. • Examples of Protocols employed at Transport Layer: - • Transmission Control Protocol (TCP) • User Datagram Protocol (UDP)
Semester 2 : Module 1 & 2
OSI Model –Session Layer • Example: • The Session Initiation Protocol (SIP) is an example of the Session layer protocol. It is used for establishing, modifying, and terminating multimedia sessions between clients. • Examples of Protocols employed at Session Layer • Remote Procedure Call (RPC) • NetBIOS
Semester 2 : Module 1 & 2
OSI Model – Presentation Layer • Example: • The Secure Sockets Layer (SSL) and the Transport Layer Security (TLS) are examples of the Presentation layer protocols. They provide encryption and decryption services for secure communication between applications. • Examples of Protocols employed at Presentation Layer • Secure Sockets Layer (SSL) • ASCII
Semester 2 : Module 1 & 2
OSI Model – Application Layer • Example: • The Simple Mail Transfer Protocol (SMTP) is an example of the Application layer protocol. It is used for sending and receiving email messages over the Internet. • Examples of Protocols employed at Application Layer: - • Simple Mail Transfer Protocol (SMTP) • File Transfer Protocol (FTP)
Semester 2 : Module 1 & 2
TCP/IP Model The TCP/IP model is a four-layered model that consists of the following layers:
Semester 2 : Module 1 & 2
TCP/IP Model-Application Layer Application Layer • This layer is responsible for providing network services to applications. It enables communication between two or more applications over the internet. • Examples of application layer protocols include HTTP, FTP, SMTP, DNS, and Telnet. • At the Application Layer in the TCP/IP Model, the network devices that work are: - • Web Servers • Examples of web servers include Apache HTTP Server, Nginx, and Microsoft IIS. • Email Servers • Examples of email servers include Microsoft Exchange Server, Postfix, and Sendmail. • DNS Servers • Examples of DNS servers include BIND, Microsoft DNS Server, and Google Cloud DNS.
Semester 2 : Module 1 & 2
TCP/IP Model-Application Layer • DNS Servers • Examples of DNS servers include BIND, Microsoft DNS Server, and Google Cloud DNS. • Proxy Servers • Examples of proxy servers include Squid, Nginx, and Apache Traffic Server. • DHCP Servers • Examples of DHCP servers include ISC DHCP Server, Microsoft DHCP Server, and Cisco IOS DHCP Server. • FTP Servers • Examples of FTP servers include vsftpd, Pure-FTPd, and FileZilla Server. • Telnet/SSH Servers • Examples of Telnet/SSH servers include OpenSSH, PuTTY, and TeraTerm.
Semester 2 : Module 1 & 2
TCP/IP Model-Application Layer • Telnet/SSH Servers • Examples of Telnet/SSH servers include OpenSSH, PuTTY, and TeraTerm. • Examples of Protocols employed at the Application Layer: - • HTTP (Hypertext Transfer Protocol) • FTP (File Transfer Protocol) • SMTP (Simple Mail Transfer Protocol) • DNS (Domain Name System) • Telnet
Semester 2 : Module 1 & 2
TCP/IP Model - Transport Layer • This layer is responsible for the reliable transmission of data between hosts. It provides end-to- end communication services for applications. Examples of transport layer protocols include TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Examples of Protocols employed at the Transport Layer: - • TCP (Transmission Control Protocol) • UDP (User Datagram Protocol)
Semester 2 : Module 1 & 2
TCP/IP Model - Internet Layer • This layer is responsible for the routing of data packets between hosts on different networks. It provides logical addressing and fragmentation of data packets. The main protocol of the Internet layer is the Internet Protocol (IP). The Internet Layer in the TCP/IP Model is responsible for the transmission of data packets between different networks. The following network devices work at the Internet Layer: - • Router • IP Switch • Layer 3 Switch • Gateway • Network Interface Card (NIC) • The internet layer is responsible for the routing of data packets between hosts on different networks. It provides logical addressing and fragmentation of data packets. The main protocol of the internet layer is the Internet Protocol (IP). This protocol is responsible for routing data packets between hosts on different networks. It provides logical addressing and fragmentation of data packets.
Semester 2 : Module 1 & 2
TCP/IP Model - Network Access Layer • Network Access Layer • This layer is responsible for the physical transmission of data between hosts on the same network. It provides hardware addressing and error detection for data transmission. • Examples of network access layer protocols include Ethernet, Wi-Fi, and Token Ring. • The network devices that work at the Network Access layer in the TCP/IP model are: - • Network Interface Cards (NICs) • Repeaters • Hubs • Switches • Bridges • Wireless Access Points (WAPs)
Semester 2 : Module 1 & 2
TCP/IP Model - Network Access Layer • Overall, the network devices that work at the Network Access layer in the TCP/IP model are responsible for providing physical connectivity to the network and ensuring reliable communication between the devices. • Examples of Protocols employed at Network Access Layer: - • Ethernet • This protocol is used for transmitting data over wired networks. • Wi-Fi • This protocol is used for transmitting data over wireless networks. • Token Ring • This protocol is used for transmitting data over token ring networks.
Semester 2 : Module 1 & 2
IPSec Protocol • IPSec (Internet Protocol Security) is a protocol suite used for securing Internet Protocol (IP) communication by providing encryption, integrity, and authentication of IP packets. It is used to create a Virtual Private Network (VPN) between two or more devices over the internet. IPSec is widely used to secure private network connections across the internet. • IPSec works by encrypting and authenticating each IP packet that is sent between the two devices. It uses two protocols: - • Authentication Header (AH) and Encapsulating Security Payload (ESP) • IPSec can be used in two modes: Transport mode and Tunnel mode.
Semester 2 : Module 1 & 2
TCP/IP • TCP/IP • TCP/IP (Transmission Control Protocol/Internet Protocol) is a suite of communication protocols used for communication over the internet and other interconnected networks. It is a set of rules governing communication between devices on a network, including the transmission of data packets. • The TCP/IP protocol suite consists of two main protocols: - • TCP (Transmission Control Protocol) and IP (Internet Protocol)
Semester 2 : Module 1 & 2
TCP/IP • TCP • The Transmission Control Protocol (TCP) is one of the core protocols of the Internet Protocol Suite, which is used to establish reliable and secure connections between devices on a network. TCP provides a connection-oriented communication service, which means that a connection is established between two devices before data transmission begins. • IP • Instead, it uses the best-effort delivery model, where each packet is forwarded independently to its destination. IP provides the following services: - • Addressing • Fragmentation and Reassembly • Routing • Error Reporting • IP has two versions: • IPv4 & IPv6
Semester 2 : Module 1 & 2
DHCP • Dynamic Host Configuration Protocol (DHCP) is a network protocol that is used to dynamically assign IP addresses and other network configuration settings to devices on a network. DHCP simplifies the process of network administration by automatically managing IP addresses and other configuration details for devices that connect to a network.
Semester 2 : Module 1 & 2
DNS • The Domain Name System (DNS) is a protocol used for translating domain names into IP addresses. It is used for resolving domain names, which are easy-to- remember names such as google.com, into the corresponding IP addresses, such as 216.58.194.174. • The DNS protocol provides a hierarchical and distributed naming system that is used to manage the mapping of domain names to IP addresses
Semester 2 : Module 1 & 2
ICMP • ICMP (Internet Control Message Protocol) is a network protocol used by network devices, such as routers, to communicate error messages and operational information about network conditions. • It is a part of the Internet Protocol Suite (TCP/IP). • Some common uses of ICMP include: - • Ping • Traceroute • Path MTU Discovery
Semester 2 : Module 1 & 2
SSL • SSL (Secure Sockets Layer) is a protocol for securing data transmission over the internet. • SSL uses a combination of cryptographic algorithms to achieve these security goals. • Here are some of the key features of SSL: - • Encryption • Authentication • Integrity • Handshaking • Session Resumption • SSL is commonly used to secure web traffic, such as HTTPS connections between web browsers and web servers.
Semester 2 : Module 1 & 2
MIME • MIME stands for Multipurpose Internet Mail Extensions, and it is an extension to the Simple Mail Transfer Protocol (SMTP) that enables email messages to support multimedia attachments, such as images, audio, and video. • MIME uses a set of headers to define the message content and format, including the type of media, character encoding, and file extension. • The headers include: - • Content-Type, Content-Disposition, and Content-Transfer-Encoding. • Content-Type header • Content-Disposition header • Content-Transfer-Encoding header Semester 2 : Module 1 & 2 S/MIME • S/MIME stands for Secure/Multipurpose Internet Mail Extensions. • It is a protocol used for securing email messages sent over the Internet. • S/MIME provides a mechanism for digitally signing and encrypting email messages, which ensures the confidentiality and authenticity of email communications.
Semester 2 : Module 1 & 2
SMTP • The Simple Mail Transfer Protocol (SMTP) is an application layer protocol that facilitates email communication between servers and clients. • To address these issues, several extensions and protocols have been developed that add security features to SMTP, such as: - • Secure SMTP (SSMTP) • SMTPS • STARTTLS
Semester 2 : Module 1 & 2
IMAP • The IMAP protocol offers several key features that make it useful for managing email messages, including: - • Message Flagging • Server-side Searching • Folder Management • Email Synchronization
Semester 2 : Module 1 & 2
POP • POP (Post Office Protocol) is a protocol used to retrieve email messages from a mail server.
Semester 2 : Module 1 & 2
PGP • PGP (Pretty Good Privacy) is a cryptographic protocol used for email encryption and signing, as well as for encrypting files and messages in general. PGP was developed in 1991 by Phil Zimmermann, and its aim was to provide easy-to-use encryption tools for individuals who wanted to secure their email communication against unauthorized access.
Semester 2 : Module 1 & 2
DNS Sec • The DNSSEC protocol works by adding two new types of records to the DNS database: • DNSKEY & RRSIG records. • DNSSEC provides several security benefits, including: - • Authentication • Data Integrity • Non-repudiation • Trust Hierarchy
Semester 2 : Module 1 & 2
HTTP • HTTP, which stands for Hypertext Transfer Protocol, is a protocol used for exchanging data between a client and a server over the internet. It is the primary protocol used to transfer information on the World Wide Web.
Semester 2 : Module 1 & 2
HTTPS
• HTTPS (Hypertext Transfer Protocol
Secure) is a secure version of HTTP (Hypertext Transfer Protocol), which is the primary protocol used to exchange data between web servers and clients. • The benefits of using HTTPS include: - • Data Confidentiality • Authentication • Data Integrity • SEO • Trust
Semester 2 : Module 1 & 2
SSH • Secure Shell (SSH) is a cryptographic network protocol that provides a secure channel between two networked devices. SSH works by using a public-key cryptography method to authenticate the client and the server. The client generates a pair of cryptographic keys: • A Public Key and a Private Key • The public key is shared with the server, while the private key is kept secret on the client machine.
Semester 2 : Module 1 & 2
Telnet • Telnet is a network protocol used to establish a remote terminal session with a host system over the internet. It enables a user to connect to a remote system and control it through a Command Line Interface (CLI).
Semester 2 : Module 1 & 2
FTP • FTP, or File Transfer Protocol, is a protocol used for transferring files between two systems over a network. It was developed in the early 1970s and is one of the oldest network protocols still in use. • FTP uses two channels to communicate between the client and server: - • A Control Channel and a Data Channel • FTP uses two modes of operation: • Active Mode and Passive Mode.
Semester 2 : Module 1 & 2
SFTP • SFTP, or Secure File Transfer Protocol, is a secure file transfer protocol that provides secure file transfer capabilities over an encrypted SSH2 connection • SFTP provides a number of benefits over traditional FTP, including: - • Secure File Transfer • Strong Authentication • Data Integrity • Confidentiality
Semester 2 : Module 1 & 2
Semester 2 : Module 1 & 2 GOOD JOB !! TAKE A BREAK