Chapter 1
Chapter 1
Chapter 1
Mizan-Tepi University
Chapter One
(Phone : +251921789156, Email : habtewold@mtu.edu.et)
Compiled By Habtewold Desta (MSc, Networking and Information Security) 1
Introduction to Computer Networks
INTRODUCTION
• Data Communications: the movement of
computer information from one point to
another by means of electrical or optical
transmission systems (called networks).
3
Introduction to Computer Networks
A Communications Model
• What is the purpose of communications?
– Exchange of information between two parties
• Key elements
• Source: Generates data to be transmitted. E.g., telephones, PCs.
• Transmitter: A transmitter transforms and encodes the information in
such a way as to produce electromagnetic signals that can be
transmitted across some sort of transmission system.
• Transmission System
− It can be a single transmission line or a complex network connecting
source and destination.
• Destination: Takes incoming data from the receiver
• Receiver: The receiver accepts the signal from the transmission
system and converts it into a form that can be handled by the
destination device.
4
Introduction to Computer Networks
5
Introduction to Computer Networks
6
Introduction to Computer Networks
Transmission of Information
• One basic choice facing a business user is the
selection of transmission medium.
– Within the business premise
• Completely up to the business
– Long-distance communications
• Up to the long-distance carrier
New technologies
» Optical fiber transmission
» Wireless transmission
– How to improve the efficiency of the use of network
facilities?
• Multiplexing and compression
7
Introduction to Computer Networks
Computer Networks
Computer network
connects two or more
autonomous computers.
8
Introduction to Computer Networks
Applications of Networks
Resource Sharing
Hardware (computing resources, disks, printers)
Software (application software)
Information Sharing
Easy accessibility from anywhere (files, databases)
Search Capability (WWW)
Communication
Email
Message broadcast
Remote computing
Distributed processing (GRID Computing) 10
Introduction to Computer Networks
Network Topology
The network topology
defines the way in
which computers,
printers, and other
devices are connected.
A network topology
describes the layout of
the wire and devices as
well as the paths used
by data transmissions.
11
Introduction to Computer Networks
Bus Topology
Commonly referred to
as a linear bus, all the
devices on a bus
topology are connected
by one single cable.
12
Introduction to Computer Networks
Ring Topology
A frame travels around the ring called
Token, stopping at each node. If a node
wants to transmit data, it adds the data
as well as the destination address to the
frame.
The frame then continues around the
ring until it finds the destination node,
which takes the data out of the frame.
Single ring – All the devices on the
network share a single cable
Dual ring – The dual ring topology allows
data to be sent in both directions.
14
Introduction to Computer Networks
Mesh Topology
The mesh topology
connects all devices
(nodes) to each other
for redundancy and
fault tolerance.
It is used in WANs to
interconnect LANs and
for mission critical
networks like those
used by banks and
financial institutions.
Implementing the mesh
topology is expensive
and difficult. 15
Introduction to Computer Networks
Network Components
Physical Media
Interconnecting Devices
Computers
Networking Software
Applications
16
Introduction to Computer Networks
Networking Media
Networking media can
be defined simply as
the means by which
signals (data) are sent
from one computer to
another (either by cable
or wireless means).
17
Physical Media
PHYSICAL MEDIA
18
Physical Media
PHYSICAL MEDIA
19
Physical Media
PHYSICAL MEDIA
Copper
Coaxial Cable - Thick or Thin
Unshielded Twisted Pair (UTP) - CAT 3,4,5,5e&6
Shielded Twisted Pair (STP)
Optical Fiber
Multi mode
Single mode
Wireless
Short Range
Medium Range (Line of Sight)
Satellite
20
Physical Media
23
Physical Media
24
Physical Media
Categories of UTP
UTP comes in several categories that are
based on the number of twists in the wires,
the diameter of the wires and the material
used in the wires.
Category 1 is the wiring used primarily for telephone
connections.
Category 2 transmits 4 MBps
Category 3 transmits 10 MBps
Category 4 Transmits 100 MBps
Category 5 Transmits 1000 MBps
Category 5e, 6 and Category 6E are currently the
most common Ethernet cables used up to 10 GBPs.26
Physical Media
Fiber Media
Optical fibers use light
to send information
through the optical
medium.
It uses the principal of
total internal reflection.
Modulated light
transmissions are used
to transmit the signal.
27
Physical Media
Fiber Media
Light travels through the optical media by the way of
total internal reflection.
Two types of Fiber media :
Multimode
Singlemode
Multimode Fiber can support less bandwidth than
Singlemode Fiber.
Singlemode Fiber has a very small core and carry
only one beam of light. It can support Gbps data
rates over > 100 Km without using repeaters.
28
Physical Media
Single-mode fiber
Carries light pulses
along single path
Uses Laser Light
Source
Multimode fiber
Many pulses of light
generated by LED
travel at different
angles
29
Physical Media
Fiber Media
The bandwidth of the fiber is limited due to
the dispersion effect.
Distance Bandwidth product of a fiber is
almost a constant.
Fiber optic cables consist of multiple fibers
packed inside protective covering.
62.5/125 µm (850/1310 nm) multimode fiber
50/125 µm (850/1310 nm) multimode fiber
10 µm (1310 nm) single-mode fiber
30
Physical Media
Fiber-Optic Cable
Contains one or several glass fibers at its core
Surrounding the fibers is a layer called cladding
31
Physical Media
Wireless Media
Very useful in difficult
terrain where cable
laying is not possible.
Provides mobility to
communication nodes.
Right of way and cable
laying costs can be
reduced.
Susceptible to rain,
atmospheric variations
and Objects in
transmission path.
Physical Media
Wireless Media
Indoor : 10 – 50m : BlueTooth, WLAN
Short range Outdoor : 50 – 200m: WLAN
Mid Range Outdoor : 200m – 5 Km : GSM, CDMA,
WLAN Point-to-Point, Wi-Max
Long Range Outdoor : 5 Km – 100 Km : Microwave
Point-to-Point
Long Distance Communication : Across Continents :
Satellite Communication
Physical Media
Frequency Bands
Propagatio
Band Range Application
n
VLF 3–30 KHz Ground Long-range radio navigation
Radio beacons and
LF 30–300 KHz Ground
navigational locators
MF 300 KHz–3 MHz Sky AM radio
Citizens band (CB),
HF 3–30 MHz Sky
ship/aircraft communication
Sky and VHF TV,
VHF 30–300 MHz
line-of-sight FM radio
Line-of- UHF TV, cellular phones,
UHF 300 MHz–3 GHz
sight paging, satellite
Line-of-
SHF 3–30 GHz Satellite communication
sight
Line-of-
EHF 30–300 GHz Long-range radio navigation
sight
Physical Media
Wireless LAN
PC
Access Point
Internet Switch
Router
PC
Access Point
Physical Media
Terrestrial Microwave
Microwaves do not
follow the curvature of
earth
Line-of-Sight
transmission
Height allows the
signal to travel farther
Two frequencies for
two way
communication
Repeater is used to
increase the distance
Hop-by-Hop
Physical Media
Satellite Communication
Introduction to Computer Networks
Networking Devices
HUB, Switches, Routers,
Wireless Access Points,
Modems etc.
38
Introduction to Computer Networks
39
Introduction to Computer Networks
41
Introduction to Computer Networks
42
Introduction to Computer Networks
Encapsulation
43
Introduction to Computer Networks
De-encapsulation
44
Introduction to Computer Networks
45
Introduction to Computer Networks
PC 1 R2
R1 172.16.1.99
192.168.1.110 192.168.1.1
AA-AA-AA-AA-AA-AA 22-22-22-22-22-22
11-11-11-11-11-11
Web Server
172.16.1.99
AB-CD-EF-12-34-56
PC 2 FTP Server
192.168.1.111 192.168.1.9
BB-BB-BB-BB-BB-BB CC-CC-CC-CC-CC-CC
46
Introduction to Computer Networks
Internet Elements
• The purpose of the Internet is to interconnect end systems, called
hosts
– Such as PCs, servers, notebooks, PDAs, smart phones, etc.
• Most hosts that use the Internet are connected to a network, such
as a LAN or a WAN
• Networks are in turn connected by routers. Each router attaches to
two or more networks.
• A host may send data to another host anywhere on the Internet:
– The source host breaks the data into a sequence of packets, called IP
packets, or IP datagrams.
– Each packet includes the unique numeric addresses of the source host
and destination host, called IP addresses.
– Based on the destination IP address, each packet travels through a
series of routers and networks from source to destination.
• Each router, upon receiving an IP packet, makes a routing decision and
forwards the packet along its way to the destination.
47
Introduction to Computer Networks
Internet Elements
48
Introduction to Computer Networks
Internet Architecture
• Today’s Internet is made up of thousands of overlapping
hierarchical networks.
• Individual hosts and LANs are connected to an Internet
Service Provider (ISP) through a Point of Presence
(POP).
– Customer Premises Equipment (CPE): the communications
equipment located onsite with the host, such as the modem.
• Different levels of ISPs
– Local ISP, Regional ISP, Backbone ISP
• Backbone ISPs may be connected through the Network
Access Point (NAP).
49
Introduction to Computer Networks
Internet Architecture
50
Introduction to Computer Networks
Types of Standards
51
Introduction to Computer Networks
52
Introduction to Computer Networks
54
Introduction to Computer Networks
Applications
E-mail
Searchable Data (Web Sites)
E-Commerce
News Groups
Internet Telephony (VoIP)
Video Conferencing
Chat Groups
Instant Messengers
Internet Radio
56
Introduction to Computer Networks
Network Security
57
Introduction to Computer Networks
Security Threats
The most common external threats to networks
include:
✓ Viruses, worms, and Trojan horses
✓ Spyware and adware
✓ Zero-day attacks, also called zero-hour attacks
✓ Hacker attacks
✓ Denial of service attacks
✓ Data interception and theft
✓ Identity theft
58
Introduction to Computer Networks
Security Solutions
Network security components often include:
✓ Antivirus and antispyware
✓ Firewall filtering
✓ Dedicated firewall systems
✓ Access control lists (ACL)
✓ Intrusion prevention systems (IPS)
✓ Virtual Private Networks (VPNs)
59
Introduction to Computer Networks
Thank You!!!
60