Datacommunication and Computer Networking
Datacommunication and Computer Networking
Datacommunication and Computer Networking
NETWORK
DATA COMMUNICATIONS
Data communication Refers to the exchange of data
between A source and A receiver.
The device that transmits the data is known as source and
the device that receives the transmitted
Data is known as receiver.
Number:
Numbers are also represented by bit patterns, the number
is directly converted to a binary number to simplify
mathematical operations.
Images:
Images are also represented by bit patterns. In its simplest form,
an image is composed of a matrix of pixels (picture elements),
where each pixel is a small dot. The size of the pixel depends on
the resolution.
Audio:
Audio refers to the recording or broadcasting of sound or music.
Audio is by nature different from text, numbers, or images. It is
continuous, not discrete.
Video:
Video refers to the recording or broadcasting of a picture or
movie. Video can either be produced as a continuous entity (e.G.,
By a TV camera), or it can be a combination of images, each a
discrete entity, arranged to convey the idea of motion
Types of Data
Data moves faster and timing errors are less frequent b/c time
of both is synced.
As a disadvantage :
• It requires more transmission channels than serial
Cont......
Parallel transmission is used when:
◦ A large amount of data is being sent
◦ The data being sent is time-sensitive
◦ And the data needs to be sent quickly
0
1
1
0
Sender 0 Receiver
0
1
0
i) Attenuation:
Attenuation means a loss of energy. When a signal, simple or
composite, travels through a medium, it loses some of its energy
in overcoming the resistance of the medium. That is why a wire
carrying electric signals gets warm, if not hot, after a while.
Some of the electrical energy in the signal is converted to heat. To
compensate for this loss, amplifiers are used to amplify the
signal.
Cont....
ii) Distortion:
3/17/2023
systems is sent, called transmission media (or) transmission
media is a pathway that carries the information from sender to
Compiled by Waggari M
receiver. Transmission media is also called as communication
channel.
36
-In telecommunications, transmission media can be divided into
two broad categories: Guided/Wired and Unguided/Wireless.
Guided media include twisted-pair cable, coaxial cable, and
3/17/2023
fiber-optic cable. Unguided medium is free space.
Compiled by Waggari M
37
1. Guided/Bounded Media
Guided media are the physical links through which signals are
confined to narrow path.
3/17/2023
Bound transmission media are the cables that are tangible or have
physical existence and are limited by the physical geography.
Compiled by Waggari M
Three common types of bounded media are used of the data
transmission. These are coaxial cable, twisted pair cable and
fiber optics cable
38
1. Coaxial Cable
Coaxial cable is very common and widely used commutation
media. For example TV wire is usually coaxial.
3/17/2023
Coaxial cable has two wires of copper. The core wire lies in
Compiled by Waggari M
center and is made of solid conductor. Core is enclosed in an
insulating sheath. Over the sheath the second wire is wrapped
around and that too in turn encased by insulator sheath. This all
is covered by plastic cover.
Copper
Insulating core
Protective Shield material
39
plastic covering
Characteristics Of Coaxial Cable
Low cost
3/17/2023
Easy to install
Mostly used in LAN
Compiled by Waggari M
Coaxial cables provide high bandwidth rates of up to 450 mbps.
Advantages of Coaxial Cable
Inexpensive
Easy to wire
Easy to expand
3/17/2023
The most popular network cabling is Twisted pair.it is a light
weight,easy to install ,inexpensive and support many different
Compiled by Waggari M
types of network. It also supports the speed of 100mps.There
are two types of twisted pairs cabling
1. Unshielded twisted pair (UTP)
2. Shielded twisted pair (STP)
3/17/2023
LAN.
• Is easy to work with
Compiled by Waggari M
• Is easy to install
• UTP is subject to external electromagnetic interference. Coper
conductor
Colour-code
Plastic
insulation
encasement 42
2. Shielded twisted pair (STP)
STP offers a protective sheathing around the copper wire.
STP provides better performance at lower data rates
3/17/2023
STP are not commonly used in networks
Installation is easy
Compiled by Waggari M
Cost is moderately expensive
It still suffer from outside interference but not as much UTP.
Coper
conductor
Colour-code
Plastic Shield insulation
encasement 43
3. Fiber optic cable (FOC)
Fiber Optic works on the properties of light.FOC is a light
pipe which is used to carry a light beam from one place to
3/17/2023
another. The core of fiber optic cable is made of high quality
glass or plastic. From one end of it light is emitted, it travels
Compiled by Waggari M
through it and at the other end light detector detects light
stream and converts it to electric data form. Fiber Optic
provides the highest mode of speed. It comes in two
modes, one is single mode fiber and s econd is
multimode fiber. Single mode fiber can carries single ray of
light whereas multimode is capable of carrying multiple
beams of light.
44
3/17/2023 Compiled by Waggari M
45
2.Unguided/Unbound Media
Unbound transmision media are the way of transmitting data
without using any cables. These media are not bounded by
3/17/2023
physical greography. There is no connectivity between the
sender and receiver. Information is spread over the air, and
Compiled by Waggari M
anyone including the actual recipient may collect the
information. This type of transmission is called wireless.
46
I. Radio Waves
Although there is no clear-cut demarcation between radio
waves and microwaves, electromagnetic waves ranging in
3/17/2023
frequencies between 3 kHz and 1 GHz are normally called
radio waves. Radio waves, for the most part, are omni-
Compiled by Waggari M
directional. When an antenna transmits radio waves, they
are propagated in all directions. This means that the sending
and receiving antennas do not have to be aligned.
Omni directional
Antenna
47
CONT...
The omni-directional property has a disadvantage, too. The radio
waves transmitted by oneantenna are susceptible to interference
3/17/2023
by another antenna that may send signals using the same
frequency or band.
Compiled by Waggari M
II. Microwaves
Electromagnetic waves having frequencies between I and 300
GHz are called microwaves.Microwaves are unidirectional.
When an antenna transmits microwave waves, they can be
narrowly focused. This means that the sending and receiving
antennas need to be aligned. The unidirectional property has an
obvious advantage. A pair of antennas can be aligned without
interfering with another pair of aligned antennas.Ex:-nsatellite
TV dish
48
3/17/2023 Compiled by Waggari M
49
III. Infrared
Infrared waves, with wavelengths from 1 mm to 770 mm, can
be used for short-range communication.the remote control
3/17/2023
used in TV,VCR and stereos all use infrared communication
they are relatively directional,cheap and easy to build, but
Compiled by Waggari M
have a major drawback: they do not pass through solid
object(cannot penetrate walls).infrared light is suitable for
indoor wireless LAN.
50
Introduction to Computer Networks
Computer Networking
3/17/2023
A computer network is a set of computers connected together
for the purpose of sharing resources. Computers on a network
Compiled by Waggari M
are called nodes. The connection between computers can be
done via cabling, most commonly Ethernet cable, or wirelessly
through radio wave. Connected computers can share resources,
like internet,printers,file servers,and other.
51
3/17/2023 Compiled by Waggari M
52
Uses of Computer Networks
Network Line Configuration:
A network is two or more devices connected through links. A link
is a communications pathway that transfers data from one
3/17/2023
device to another. For visualization purposes, it is simplest
to imagine any link as a line drawn between two points. For
Compiled by Waggari M
communication to occur, two devices must be connected in some
way to the same link at the same time.There are two possible
types of connections: point-to-point and multipoint.
53
1. Point-to-Point: A point-to-point connection provides a
dedicated link between two devices. The entire capacity of the
link is reserved for transmission between those two devices.
3/17/2023
When you change television channels by infrared remote
control, you are establishing a point-to-point connection
Compiled by Waggari M
between the remote control and the television's control system.
54
2. Multipoint: A multipoint (also called multi drop) connection
is one in which more than two specific devices share a single
link. In a multipoint environment, the capacity of the channel
3/17/2023
is shared, either spatially or temporally.
If several devices can use the link simultaneously, it is a
Compiled by Waggari M
spatially shared connection. If users must take turns, it is a
timeshared connection
55
Network Topologies
The topology defines how the devices
(computers,printers..etc) are connected and how the
3/17/2023
data flows from one device to another. There are
two conventions while representing the topologies.
The physical topology defines how the devices are
Compiled by Waggari M
physically wired. The logical topology defines how
the data flows from one device to another.
3/17/2023
The purpose of the meshdesign is to provide a high level of
redundancy. If one network cable fails, the data always has an
Compiled by Waggari M
alternative path to get to its destination.
57
Advantages
Provides redundant paths between devices
A mesh topology is robust. If one link becomes unusable,
3/17/2023
it does not incapacitate the entire system.
There is the advantage of privacy or security. When every
Compiled by Waggari M
message travels along a dedicated line, only the intended
recipient sees it.
Point-to-point links make fault identification and fault isolation
easy.
The network can be expanded without disruption to current
users.
58
Disadvantages
Requires more cable than the other LAN topologies
3/17/2023
The hardware required to connect each link (I/O ports and
cable) can be prohibitively expensive.
Compiled by Waggari M
Complicated implementation.
59
Star Topology
- In a star topology, each device has a dedicated point-to-point
link only to a central controller,usually called a hub.
3/17/2023
- The devices are not directly linked to one another. Unlike a
mesh topology, a star topology does not allow direct traffic
Compiled by Waggari M
between devices.
- The controller acts as an exchange: If one device wants to
send data to another, it sends the data to the controller, which
then relays the data to the other connected device.
60
3/17/2023 Compiled by Waggari M
61
Advantages
- A star topology is less expensive than a mesh topology.
3/17/2023
- In a star, each device needs only one link and one I/O port to
connect it to any number of others. This factor also makes it
easy to install and reconfigure.
Compiled by Waggari M
- Cable failure affects only a single user.
- Easy to troubleshoot and isolate problems.
- Far less cabling needs to be housed, and additions,
moves, and deletions involve only one connection: between
that device and the hub.
62
Disadvantages
- The dependency of the whole topology bon one single point,
the hub. If the hub goes down, the whole system is dead.
3/17/2023
- Although a star requires far less cable than a mesh, each node
must be linked to a central hub
Compiled by Waggari M
- Requires more cable than most of the other topologies.
- More difficultthan other topologies to implement.
63
Bus Topology
A bus networkuses a trunk or backbone to which all of the
computers on the network connect. In a bus topology all
3/17/2023
devices are connected to the transmission medium as
backbone. There must be a terminator at each end of the
Compiled by Waggari M
bus to avoid signal reflections, which may distort the
original signal. Signal is sent in both directions, but some
buses are unidirectional.
64
Advantages
- Compared to other topologies, a bus is cheap and easy to
implement.
3/17/2023
- A bus uses less cabling than mesh or star topologie
- Good for small networks
Compiled by Waggari M
- Does not use any specialized network equipment.
Disadvantages
- Difficult reconnection and fault isolation.
- A fault or break in the bus cable stops all transmission, even
between devices on the same sideof the problem.
- There might be network disruption when computers are added
or removed.
65
Ring Topology
In Ring topology, each host machine connects to exactly
two other machines, creating a circular network structure.
3/17/2023
When one host tries to communicate or send message to a host
which is not adjacent to it, the data travels through all
Compiled by Waggari M
intermediate hosts. To connect one more host in the existing
structure administrator may need only one more extra cable.
66
Advantages
- A ring is relatively easy to install and reconfigure.
3/17/2023
- Fault isolation is simplified
-Cable faults are easily located, making troubleshooting easier
Compiled by Waggari M
.
Disadvantages
- Unidirectional traffic can be a disadvantage.
- In a simple ring, a break in the ring (such as a disabled station)
can disable the entire network.
- Expansion to the network can cause network disruption.
67
Tree/Hybrid Topology
Also known as Hierarchical Topology is the most
common form of network topology in use present
3/17/2023
day. This topology imitates as extended Star
Topology and inherits properties of Bus
topology. This topology divides the network into
Compiled by Waggari M
multiple levels/layers of network. Mainly in
LANs, a network is bifurcated into three types of
network devices. The lowest most is access-
layer where user‟s computer are attached.
The middle layer is known as distribution
layer, which works as mediator between
upper layer and lower layer. The highest most
layer is known as Core layer, and is central
point of the network, i.e. root of the tree from
which all nodes fork. 68
3/17/2023 Compiled by Waggari M
69
All neighbouring hosts have point-to-point
3/17/2023
connection between them. Like bus
topology, if the root goes down, the entire
Compiled by Waggari M
network suffers. Though it is not the
single point of failure. Every connection
serves as point of failure, failing of
which divides the network into
unreachable segment and so on.
70
Network Types
There are basically three categories of
networks based on its size and geographical
3/17/2023
coverage
Compiled by Waggari M
▪ Local Area Network (LAN)
▪ Wide Area Network (WAN)
▪ Metropolitan Area Network (MAN)
▪ Personal Area Network (PAN)
71
Local Area Network (LAN)
This is one of the original categories of network,and one of the simplest.
LAN is a privately owned computer network covering a small networks
geographical area,like a home,office,or groups of buildings. The function
3/17/2023
of the LAN is to interconnect workstation computers for the purposes of
sharing files and resources. Because of its localized nature, the LAN is
Compiled by Waggari M
typically high speed and cheaper to set up than a WAN, Early LANs had
data rates in the 4 to 16 megabits per second (Mbps) range. Today,
however, speeds are normally 100 or 1000 Mbps.
3/17/2023
distance transmission of data, image, audio, and video information
over large geographic areas that may comprise a country, a
continent, or even the whole world.
Compiled by Waggari M
✓ WAN are characterized by the slowest data communication rates
and the largest distances. It generally utilize different and much
more expensive networking equipment than do LANs.
✓ Organizations supporting WANs using the internet protocol are
known as Network Service Providers (NSPs). These form the core
of the internet.by connecting the NSP WANs together using links at
Internet Packet Interchanges a global communication infrastructure
is formed.
74
3/17/2023 Compiled by Waggari M
75
Metropolitan Area Network (MAN)
This is a network which is larger than a LAN but
smaller than a WAN, and incorporates elements of
3/17/2023
both it typically spans a town or city and is owned by
a single person or company.
Compiled by Waggari M
✓ MANs rarely extend beyond 100 KM and frequently
compise a combination of different hardware and
transmission media
3/17/2023
building. A typical PAN would include one or more
computer,telephones,peripheral devices,video game
Compiled by Waggari M
consoles and other personal entertainment
devices.PAN can be constructed with cables or
wirelessly.This type of network provides great
flexibility for example:-
✓ Send a document to printer in the office upstaires while you are sitting
on the couch with ur laptop
3/17/2023
client/server model. The model used for a network is
determined by several factors, including how the
Compiled by Waggari M
network will be used, how many users will be on the
network, and budgetary considerations.
1. Peertopeer Networking Model
A peer-to-peer network is a decentralized network
model offering no centralized storage of data or
centralized control over the sharing of files or
resources.Each computers acts as both the client and the
server, communicating directly with the other computer
78
Peer-to-peer networks are typically found in small
offices or in residential settings where only a limited
number of computers will be attached and only a few
3/17/2023
files and resources shared. A general rule of thumb is
to have no more than 10 computers connected to a
Compiled by Waggari M
peer-to-peer network.
2. Client/Server Networking Model
A client/Server computer network is one which has a
centralized infrastructure. It allows for centralized
network management of all network
services,including user management, security, and
backup procedures.
✓ Most data and applications are installed on the
server. When clients need access to these resources, 79
they access them from the server.
Table 1 Comparison of Networking Models
3/17/2023
Basic Clients and server are not There is a specific server
distinguished,each node act as client and specific clients
and server connected to the server
Compiled by Waggari M
Size Restricted to a maximum of 10 The size of the network
computers. is limited only by server
size and network
hardware, and it can have
thousands of connected
systems.
Service Each node can request for services The client request for
and can also provide the services service and server
respond with the service
80
Focus connectivity Sharing the information
Data Each peer has its own data The data is stored in a
centralized server
Administration Each individual is responsible for A skilled network
3/17/2023
the administration of his or her administrator is often
own system. A administrator is required to maintain and
not needed. manage the network.
Compiled by Waggari M
Security Each individual is responsible for Security is managed
maintaining security for shared from a central location
files or resources connected to but often requires a
the system. skilled administrator to
correctly configure.
Cost Minimal startup and The client-server are
implementation cost. expensive to implement
Stability Peer-to-peer suffer if the number Client-server is more
of peers increases in the system stable and scalable
81
Interconnection of Networks: Internetwork
3/17/2023
Today, it is very rare to see a LAN, a MAN,
or a LAN in isolation; they are connected to
Compiled by Waggari M
one another.When two or more networks are
connected, they become an internetwork, or
internet.
82
3/17/2023 Compiled by Waggari M
83
Network, internet, and Internet
✓ A network is a group of connected communicating devices
3/17/2023
such as computers and printers.
✓ An internet (note the lowercase letter i) is two or more
Compiled by Waggari M
networks that can communicate with each other.
✓ The most notable internet is called the Internet (uppercase
letter I), a collaboration of more than hundreds of thousands of
interconnected networks.
✓ Private individuals as well as various organizations such as
government agencies, schools, research facilities, corporations,
and libraries in more than 100 countries use the Internet.
84
3/17/2023 Compiled by Waggari M
85
3/17/2023 Compiled by Waggari M
86
Difference between Internet and Intranet
Internet Intranet
3/17/2023
Internet is wide network of Intranet is also a network of
computers and is open for all computers designed for specific
Compiled by Waggari M
group of users
Internet itself contains a large number Intranet can be accessed from internet
of intranets. but with restrictions
The number of users who use internet The number of users is limited
is unlimited
The visitors traffic is unlimited The traffic allowed is also limited
Internet contains different source of Intranet conatins only specific group
information and is available for all information.
87
Networking Devices
Repeater
A repeater is an electronic device that amplifies the
signal it receives, or else, you can think of repeater as
a device which receives a signal and retransmits it at
a higher level or higher power so that the signal can
cover longer distances.
✓ It can regenerate signals at the bit level to allow them to travel
a longer distance on the media.
✓ It operates at Physical Layer of OSI
✓ A repeater does not actually connect two LANs; it connects
two segments of the same LAN. The segments connected are
still part of one single LAN. A repeater is not a device that can
connect two LANs of different protocols.
✓ A repeater forwards every frame; it has no filtering capability.
3/17/2023
travel along. Such a device is called a passive hub. do not
amplify the electrical signal of incoming packets before
broadcasting them out to the network. It is just a
Compiled by Waggari M
connector. It connects the wires coming from different
branches.
Active Hubs:- a type of hub that can perform
amplification, as does a repeater. Far more common
nowadays is an active hub, which, as well as providing a
path for the data signals, regenerates the signal before it
forwards it to all of the connected devices.
Intelligent hubs:- add extra features to an active hub that
are of particular importance to businesses. 91
Bridge
✓ Bridges are used to logically separate network segments
within the same network.
3/17/2023
✓ The function of the bridge is to make intelligent
decisions about whether or not to pass signals on to the
Compiled by Waggari M
next segment of a network. When a bridge receives a
frame on the network, the destination MAC address is
looked up in the bridge table to determine whether to
filter, flood, or copy the frame onto another segment.
✓ If a router connects two different types of networks,then
a bridge connects two subnetworks as a part of the same
networkyou can think of two different labs or floors
connected by bridge.
✓ Broadcast Packets are forwarded to all directions.
92
3/17/2023
Compiled by Waggari M
A bridge has filtering capability. It can check the
destination address of a frame and decide if the frame
should be forwarded or dropped. If the frame is to be
forwarded, the decision must specify the port.
93
Switch
Switches provide a unique network segment on
each port, thereby separating collision domains.
3/17/2023
Today, network designers are replacing hubs in
their wiring closets with switches to increase their
Compiled by Waggari M
network performance and bandwidth while
protecting their existing wiring investments.
✓ Switch is more intelligent than Hub.while hub just
does the work of data forwarding, a switch does
‘filter and forwarding’ more intelligent way of
dealing with data packets.
✓ When packet is received at one of the interfaces of
the switch,it filters the packet and sends only to the
94
interface of the intended receiver.
3/17/2023 Compiled by Waggari M
95
Types of Switches
1.Cut-through switch
In a cut-through switching environment, the
3/17/2023
packet begins to be forwarded as soon as it is
received. This method is veryfast, but creates the
Compiled by Waggari M
possibility of errors being propagated through the
network, as there is no error checking.
2.Store and Forward Switch
Unlike cut-through, in a store-and-forward switching
environment, the entire packet is received and error checked
before being forwarded. The upside of this method is that errors
are not propagated through the network. The downside is that
the error checking process takes a relatively long time, and
store-and-forward switching is considerably slower as a result.96
Router
A router is a network device which is responsible for
routhing traffic from one to another network. These two
could be a private company net to public network. You
3/17/2023
can think a router as a traffic police who directs different
net traffic to different directions.
Compiled by Waggari M
✓ A router can be a dedicated hardware device or a
computer systemwith more than one network interface
and the appropriate routing software.
✓ When a router receives a packet of data, it reads the
header of the packet to determine the destination address.
Once it has determined the address, it looks in its routing
table to determine whether it knows how to reach the
destination and, if it does, it forwards the packet to the
next hop on the route. The next hop might be the final
destination, or it might be another router.
97
3/17/2023 Compiled by Waggari M
98
Modem
A modem, short for modulator/demodulator, is a
device that converts the digital signals generated
3/17/2023
by a computer into analog signals that can travel
over conventional phone lines.
Compiled by Waggari M
Our computer generates binary data or digital
data in forms of 1s and 0s and on the other hand,
a wire carries an analog signal and that’s where a
modem comes in.
A modem stands for (Modulator+Demodulator)
That means it modulates and demodulates the
signal between the digital data of a computer and
analog signal of a telephone line.
99
Network Interface Card (NIC): is a hardware
device that acts as an interface through which a
computer connects to a network. NICs work at
3/17/2023
both data link layer (layer 2) and the Physical layer
(layer 1) of the OSI model. At the data link layer,
the NIC converts the data packets into data frames;
Compiled by Waggari M
at the physical layer, it is responsible for
converting the data into signals, and transmitting
them across the communication medium. NIC is
usually an expansion card on the computer with a
port to plug in the network cable. NIC has its own
MAC address.
3/17/2023
common for both environments: it takes
both network software and hardware
Compiled by Waggari M
(cables,routers,etc) to transfer data from
your computer to another or from a
computer thousands of miles away to
yours. And at the end ,to get the data you
want right to you, it comes down to
addresses, so along with an IP
address(logical address), there is also a
101
hardware address(physical address)
Typically it is tied to a key connection
Communication Standards
❖OSIReference Model
❖TCP/IP Protocol Model
Communication and Layer Architecture
❖ A network is a combination of hardware and software
that sends data from one location to another.
❖ The hardware consists of the physical equipment that
carries signals from one point of the network to
another.
❖ The software consists of instruction sets that make
possible the services that we expect from a network For
example, the task of sending an e-mail from one point
in the world to another can be broken into several tasks,
each performed by a separate software package.
Layered Tasks
We use the concept of layers in our daily life. As an example, let us
consider two friends who communicate through postal mail.
The process of sending a letter to a friend would be complex if
there were no services available from the post office.
❖ Layers describe the logical groupings of the
functionalityandcomponents in an applicaton
❖ Layer architecture simplifies the network design.
❖ It is easy to debug network applications in a layered
architecture network.
❖ The network management is easier due to the layered
architecture.
❖ Network layers follow a set of rules, called protocol.
❖ The protocol defines the format of the data being
exchanged, and the control and timing for the handshake
between layers.
Open Systems Interconnection (OSI)
1. OSI Model
❖ The OSI model is not a protocol; it is a model for
understanding and designing a network architecture that
is flexible, robust and interoperable
❖ In 1984, the Open Systems Interconnection (OSI)
reference model was approved as an international
standard for communications architecture.
❖ The OSI model describes how information or data
makes its way from application programmes (such as
spreadsheets) through a network medium (such as wire)
to another application programme located on another
network.
❖ The OSI reference model divides the problem of moving
information between computers over a network medium
into SEVEN smaller and more manageable problems.
❖ This separation into smaller more manageable functions
is known as layering.
OSI Model Layers
❖ Layer 7 – Application Layer
The Application Layer represents the interface between the end-
user and the network. Some of the protocols that reside here are
HTTP, SMTP, or FTP. Generally speaking all applications that
you use to connect to something resides here: Internet Explorer,
Mozilla Firefox, Outlook Express, Yahoo Messenger, etc.
❖ Layer 6 – Presentation Layer
The Presentation Layer transforms data to make a general
interface to the Application layer.It decodes, encodes and
compresses data for the upper layer. You will notice that every
layer serves the layer above it. Translates data into a form usable
by the application layer. The redirector operates here.
Responsible for protocol conversion, translating and
encrypting data, and managing data .
The following are the various services in presentation layer:
POP, SMTP (e-mail, Post office protocol, Simple
MailTransfer Protocol), Usenet (for news groups), HTTP (hyper
text transfer protocol for web applications), FTP, TFTP (File
transfer protocol, trivial FTP for file transfer), Telnet (Terminal
Network),DNS(Domain name server,) SNMP (Simple Network
Management Protocol).
Layer 5 – Session Layer:
The Session Layer includes the sessions between computers. It
opens,maintains and terminates the connections p, between the
client and the foreign server
Allows applications on connecting systems to standard ports
& establish a session. Provides synchronization between
communicating computers. Messages are sent between layers.
Protocols and Implementations:
Video: Quicktime, MPEG
Graphics: Graphics Interchange Format (GIF), Joint
Photographic Experts Group (JPEG)
❖ On layers 5-7 the data package is in the form of data stream.
Layer 4 Transport Layer:
❖ The Transport Layer provides data flow between computers; it
relieves the upper layers of the concern of getting and sending the
data of getting and sending the data.
❖ Responsible for packet handling. Ensures error-free delivery.
Repackages messages (while receiving), divides messages into
smaller packets (while transmitting), and handles error handling.
segments of message fragments are sent between layers.
Protocols:
❖ Transmission Control Protocol (TCP) – Connection Oriented
❖ User Datagram Protocol (UDP) – Connectionless.
TCP - connection-oriented communication for applications to
ensure error free delivery; UDP -connectionless communications
and does not guarantee packet delivery between transfer points.
Layer 3 Network Layer:
Translates system names into addresses. Responsible for
addressing, determining routes for sending, managing network
traffic problems, packet switching, routing, data congestion, and
reassembling data. Datagrams are sent between layers.
Depends on source
Only two devices whichare directly connected by the same
“wire”can exchange data directly
❖ Devices not on the same network must communicate via
intermediate system
❖ Router is an intermediate system
❖ The network layer determines the best way to transfer data. It
manages device addressing and tracks the location of devices.
Hardware:
The router operates at this layer.
Layer 2 Data link Layer:
Sends data from network layer to physical layer. Manages
physical layer communications between connecting systems.
Data frames are sent between layers.
❖ The Data Link Layer takes the bits from layer one andarranges
them into data structures called frames.
❖ It also uses a Frame Header stating the sender MAC address
and destination MAC address in it.
❖ Note that these values change by passing through network
nodes like router interfaces or servers.
Hardware:
❖ Bridges
❖ Switch
❖ WAP (Wireless Access Point
Layer 1 – Physical Layer:
❖ The Physical Layer defines the electrical part of the
communication: the binary signals that are transmitted and
received in the data exchange.
❖ Transmits data over a physical medium. Defines cables, cards,
and physical aspects. Data bits are sent.
3/17/2023
source host to the destination host solely based on their
addresses. For this purpose the Internet Protocol defines
addressing methods and structures for datagram
Compiled by Waggari M
encapsulation.
129
3/17/2023 Compiled by Waggari M
130
3/17/2023 Compiled by Waggari M
131
IP Addressing
▪ Communication at the network layer is host-to-host
(computer-to-computer); a computer somewhere in
3/17/2023
the world needs to communicate with another
computer somewhere else in the world.
Compiled by Waggari M
▪ Usually, computers communicate through the
Internet.
▪ The packet transmitted by the sending computer may
pass through several LANs or WANs before reaching
the destination computer.
▪ For this level of communication, we need a global
addressing scheme; we use the term IP address to
mean a logical address in the network layer of the
TCP/IP protocol suite. 132
Position of IP in TCP/IP protocol suite
3/17/2023
Compiled by Waggari M
133
▪ An IPv4 address is a 32-bit address that uniquely and
universally defines the connection of a device (for
example, a computer or a router) to the Internet.
3/17/2023
▪ IPv4 addresses are unique and universal.
Compiled by Waggari M
▪ They are unique in the sense that each address
defines one, and only one, connection to the Internet.
▪ Two devices on the Internet can never have the same
address at the same time.
134
Notations
There are two prevalent notations to show an 1Pv4 address:
binary notation and dotted-decimal notation.
3/17/2023
Binary Notation
In binary notation, the IPv4 address is displayed as 32 bits.
Each octet is often referred to as a byte. So it is common to hear
Compiled by Waggari M
an IPv4 address referred to as a 32-bit address or a 4-byte
address. The following is an example of an IPv4 address in
binary notation:
01110101 10010101 00011101 00000010
Dotted-Decimal Notation
To make the IPv4 address more compact and easier to read,
Internet addresses are usually written in decimal form with a
decimal point (dot) separating the bytes. The following is the
dotted-decimal notation of the above address:
117.149.29.2 135
Example: Dotted-decimal notation and binary notation for an IPv4
address
3/17/2023
Compiled by Waggari M
136
Find the error, if any, in the following IPv4 addresses
3/17/2023
Compiled by Waggari M
Solution
a. There must be no leading zero (045).
b. There can be no more than four numbers.
c. Each number needs to be less than or equal to 255.
d. A mixture of binary notation and dotted-decimal
notation is not allowed. 137
Address classes
▪ The Class of the address and the subnet mask determine which
part belongs to the network address and which part belongs to
3/17/2023
the node address.
▪ There are 5 different address classes.
Compiled by Waggari M
▪ The address space is divided into five classes: A, B, C, D, and
E. Each class occupies some part of the address space.
138
3/17/2023 Compiled by Waggari M
139
Class A addresses begin with 0xxx, or 0 to 127decimal.
Class B addresses begin with 10xx, or 128 to 191decimal.
Class C addresses begin with 110x, or 192 to 223decimal.
3/17/2023
Class D addresses begin with 1110,or 224 to 239decimal.
Class Eaddresses begin with 1111, or 240 to 255decimal.
Compiled by Waggari M
Class D addresses are reserved for multicasting;
Class E addresses are reserved for future use.
Class D and E should not be used for host addresses
140
Previously, when an organization requested a block of
addresses, it was granted one in class A, B, or C.
▪ Class A addresses were designed for large organizations
3/17/2023
with a large number of attached hosts or routers.
▪ Class B addresses were designed for midsize
Compiled by Waggari M
organizations with tens of thousands of attached hosts or
routers.
▪ Class C addresses were designed for small organizations
with a small number of attached hosts or routers.
141
IP address can be one of the 3 classes A, B or C
Now we can see how the Class determines, by default, which
3/17/2023
part of the IP belongs to the network (N) and which part
belongs to the node (h).
Compiled by Waggari M
Class A -- NNNNNNNN.hhhhhhhh.hhhhhhhh.hhhhhhhh
Class B -- NNNNNNNN.NNNNNNNN.hhhhhhhh.hhhhhhhh
Class C --
NNNNNNNN.NNNNNNNN.NNNNNNNN.hhhhhhhh
Netid and Hostid
▪ Class A : 255.0.0.0
▪ Class B :255.255.0.0
▪ Class C :255.255.255.0
142
Mask
▪ Although the length of the netid and hostid (in bits) is
predetermined in classful addressing, we can also use a mask
3/17/2023
(also called the default mask), a 32-bit number made of
contiguous 1s followed by contiguous 0s. The masks for
Compiled by Waggari M
classes A, B, and C are shown below
▪ The mask can help us to find the netid and the hostid. For
example, the mask for a class A address has eight 1 s, which
means the first 8 bits of any address in class A define the netid;
the next 24 bits define the hostid.
143
3/17/2023 Compiled by Waggari M
144
Network Addresses
▪ A very important concept in IP addressing is the
network address.
3/17/2023
▪ When an organization is given a block of addresses, the
organization is free to allocate the addresses to the
devices that need to be connected to the Internet.
Compiled by Waggari M
▪ The first address in the class, however, is normally (not
always) treated as a special address.
▪ The first address is called the network address and
defines the organization network.
▪ It defines the organization itself to the rest of the world.
▪ The first address is the one that is used by routers to
direct the message sent to the organization from the
outside. 145
▪ The n leftmost bits of the address x.y.z.t/n define the network
(organization network); the 32 – n rightmost bits define the
particular host (computer or router) to the network.
3/17/2023
▪ The two common terms are prefix and suffix.
▪ The part of the address that defines the network is called the
Compiled by Waggari M
prefix; the part that defines the host is called the suffix.
▪ The prefix is common to all addresses in the network; the
suffix changes from one device to another.
146
Simply this means IP address has 2
components (portgens)
1) Network portion (network bits) – hold left
3/17/2023
portion of the address up to some boundary
2) Host portion (host bits) – hold right
Compiled by Waggari M
portion of the address remaing from network
bits
3/17/2023
▪ The n/w address is the one that result when all host bits are
not set (make 0)
Compiled by Waggari M
▪ Broad cast address:-is the one that results when all the host
bits are set (make all 1)
▪ For n number of host bits the maximum no of hosts for that
specific n/w is 2n-2, where n is a number of host
▪ 1st host address:- address of a host that is one greater than
the n/w address
▪ Last host address:- address of a host that is one less than the
broadcast address
148
Example 1: givin an IP address of 172.16.0.10/29 then
find
A. Network Address
3/17/2023
B. 1st host Address
C. 2nd host address
Compiled by Waggari M
D. Broad cast address
E. Last host address
F. Host address range
G. Max no of hosts within this n/w
149
Soln
172.16.0.10/29
the 1st 29 bits are for n/w bit and the remaining 3 bits are a host
3/17/2023
bits
10101100.00010000.00000000.00001010
Compiled by Waggari M
all host should be zero
10101100.00010000.00000000.00001000
a) n/w address=172.16.0.8/29
b) 1st host add=172.16.0.9/29
c) 2nd host add=172.16.0.10/29
d) BA (set host to 1),00001111 =172.16.0.15/29
e) Last host add= 172.16.0.14/29
f) Range =172.16.0.9/29-172.16.0.14/29
g) 2(3)-2= 6
150
Subnetting
▪ Subnetting is a process of breaking down one network into
multiple network segments by placing a router in b/n each
3/17/2023
network segments .
▪ If an organization was granted a large block in class A or B, it
Compiled by Waggari M
could divide the addresses into several contiguous groups and
assign each group to smaller networks (called subnets) or, in
rare cases, share part of the addresses with neighbors.
▪ Subnetting increases the number of 1s in the mask. And it
creates many other networks from a network.
151
▪ During the process of sub-netting , we borrow
some bits from the host portion in order to
divide the large network into smaller network.
3/17/2023
▪ Borrowing bits from the host portion reduces
Compiled by Waggari M
the number of hosts
▪ In the process of sub-netting we don’t have
control over the network bits. We must borrow
the sub-netting bits from the host portion.
▪ Communication between these sub-networks is
achieved through a router
152
What Is The Favore Of Subnetting
1, Reduce n/w traffic
2, To improve network performance and security
3/17/2023
3, Easy for managment
4, Faster data rate
Compiled by Waggari M
5, Non-sub-netted networks waste a lot of IPv4
addresses
153
Subnetting example
There are 4 types of subnetting examples
1. Subnetting when given the require number of clients
3/17/2023
2. Subnetting when given the require number of n/w
3. Given on IP address and subnetting mask
Compiled by Waggari M
4. VLSM most efficent one, there is no wastege in this
mechanism
154
The Big Five FAQ In Design
1) How many subnet does the chosen subnet mask can produce
2x where x is a number of masked host
(1’s in the new subnet mask)
3/17/2023
2) How many host are available per subnet
2n-2 where n is number of unmasked bits
Compiled by Waggari M
(0’s in the new subnet mask)
3) What are the valid subnets
256- subnet mask
4) What are the broad cast address for each subnet
it is the number right before the next subnet so the BA for
the 0 subnet is 64-1=63 for 64-127 f0r 128-191 for 192-
255
5) What are the valid host addess range
1-62, 65-126, 129-190......
155
Example 1:- A service provider has given a class c
networks 209.50.1.0 your company must break into
many subnets as possible as long as there are 50
clients per subnet
3/17/2023
1, 50= 00110010
6 bits to get number 50
Compiled by Waggari M
2, 255.255.255.0
11111111.11111111.11111111.00000000
we must ensure that 6 of the client bits (0)
remains asclients bit and save the host from the right
to satsfiy the requirements
11111111.11111111.11111111.11000000
this is our
increment
156
64
3, starting from the given add your increment to
the subnetted octet
3/17/2023
209.50.1.0-63
209.50.1.64-127
Compiled by Waggari M
209.50.1.128-191
// Answer all the big FAQ questions
.
.
157
Example 2:- A service provider has given you the class c
n/w range 216.21.5.0 then your company wants to
break into 20 separet subnets
3/17/2023
1) 20 =00010100 5 bits to get number 20
Compiled by Waggari M
2) 255.255.255.0
11111111.11111111.11111111.00000000
here we are going to reserve the bit in subnet mask
11111111.11111111.11111111.11111000
8
3) 216.21.5.0 -7
.8-15
.16-23
158
.24
Great exception in doing subnetting
* 128,64, 32,16,8,4 these number throw off our calculation
when we are doing baed on number of network
* 127,63,31,15,7,3 throw off our calaculation when we are
3/17/2023
doing based on the number of clients.
Thus rules to over come this problem
Compiled by Waggari M
* Substract 1 when doing with n/w
* Add 1 when doing based on the number of clients
Example:- if one person ask us to do him for 7 host per each
subnet....it will be 6 which is incorrect
IP= 192.168.10.0
need= 7
1) 00000111= 3 bits to get number 7
2) save the host bit
11111111.11111111.11111111.00000000
00001000= 8 is our increment
159
3) 192.168.10.0-7// b/n this there is only 6 which is incorrect
8
COMPUTER NETWORK SECURITY AND INTEGRITY
Chapter 5
➢ Physical location : The physical location of the system initiating an entry request is
checked to ensure that a request is actually originating from a known and authorized
location. In networks, to check the authenticity of a client’s location a network or
Internet protocol (IP) address of the client machine is compared with the one on the
system user fi le. This method is used mostly in addition to other security measures
because it alone cannot guarantee security. If used alone, it provides access to the
requested system to anybody who has access to the client machine.
Solution
The cipher is probably monoalphabetic because both
occurrences of L’s are encrypted as O’s.
Solution
The cipher is not monoalphabetic because each occurrence of L is
encrypted by a different character. The first L is encrypted as N;
the second as Z.