AAiT Network Chapter One and Two
AAiT Network Chapter One and Two
Table of Contents
1. Introduction to Data Communications and Computer networks ......................................................... 4
1.1 Introduction: ................................................................................................................................. 4
1.2 Basic components of communication networks ........................................................................... 4
1.3 Types of Transmission mode ........................................................................................................ 5
1.4 Fundamentals of Information Transmission Media and Coding................................................... 7
1.5 Types of Computer Networks ....................................................................................................... 7
i. Local Area Network ....................................................................................................................... 8
ii. Wireless Area Network ................................................................................................................. 9
iii. Wide Area Network....................................................................................................................... 9
iv. Metropolitan Area Network ......................................................................................................... 9
v. Campus Area Network ................................................................................................................ 10
1.6 Data Communication Hardware ................................................................................................. 10
1.7 Types of Network Topologies ..................................................................................................... 12
2. OSI 7 Layers and Concept of Open standard ..................................................................................... 17
2.1 Application Layer ........................................................................................................................ 19
2.2 Presentation Layer ...................................................................................................................... 19
2.3 Session Layer ............................................................................................................................... 20
2.4 Transport Layer ........................................................................................................................... 21
2.5 Network Layer ............................................................................................................................. 21
2.6 Data Link Layer ............................................................................................................................ 21
2.7 Physical Layer .............................................................................................................................. 22
2.8 Advantages of OSI Model............................................................................................................ 22
2.2 OSI vs. TCP/IP Model ................................................................................................................... 22
2|Page
AAiT SITE Fundamentals of Networking
3|Page
AAiT SITE Fundamentals of Networking
Chapter One
✓ Delivery: The system must deliver data to the correct destination. Data must be
received by the intended devices or user and only by that devices or user.
✓ Accuracy: The system must deliver the data accurately. Data that have been altered in
transmission and left uncorrected must not be used.
✓ Timeliness: The system must deliver the data in time. The data delivered late are
useless. For example, in the case of audio and video, timely deliver means delivering the
data as they are produced in the same order of production and without significant
delay. This type of delivery is called real-time transmission (live streaming)
✓ Messages
✓ Sender
✓ Receiver
✓ Medium and
✓ Protocol
4|Page
AAiT SITE Fundamentals of Networking
Simplex: In simplex mode communication is unidirectional, i.e only one of the two devices on the link
can transmit data and the other will only receive the data. Take an example of Computer and Monitor.
The compute will send data to the monitor and the monitor will only display it.
5|Page
AAiT SITE Fundamentals of Networking
So, simplex data transfer is Uni-directional. And monitor will never send data back to the computer.
Same is true between computer and key board. Keyboard receive data from computer but computer will
never receive data from key board.
Half Duplex: In half Duplex both the linked devise can transmit and receive the data. But not at the
same time. i.e when the first devices are sending the data the second will only receive, similarly when
the second is sending the data the first will be receive. Example the use of a walkie-talkie is a half-
duplex.
In a half-Duplex transmission, the entire capacity of a channel is taken over by whichever of the two
devices is transmitting at the same time.
Full Duplex: In full duplex mode (Duplex) both the linked devise can transmit and receive the data at the
same time. The one example is mobile phone or telephone line between two users. Both users can talk
and hear at the same time. The signals going in either direction share the capacity of the link. This
sharing can occur in two ways. Either the link contains two physically separate transmission paths. One
for sending and the other for receiving or the capacity of the channel is divided between signals
travelling in both directions.
6|Page
AAiT SITE Fundamentals of Networking
✓ And the process of converting analog signal into digital signal is called analog to digital
conversion or digitizing an analog signal.
✓ The process of converting the digital signal into analog signal is called digital to analog
conversion or modulating a digital signal.
✓ The process of sending an analog signal over long distances using high frequency carrier signal is
called analog to analog conversion or modulating an analog signal.
7|Page
AAiT SITE Fundamentals of Networking
Regardless of size, a LAN's single defining characteristic is that it connects devices that are in a single,
limited area.
A wireless local area network (WLAN) is a wireless distribution method for two or more devices. WLANs
use high-frequency radio waves and often include an access point to the Internet. A WLAN allows users
to move around the coverage area, often a home or small office, while maintaining a network
connection. A WLAN is sometimes called a local area wireless network (LAWN).
9|Page
AAiT SITE Fundamentals of Networking
A network interface card (NIC) is a hardware component without which a computer cannot be
connected over a network. It is a circuit board installed in a computer that provides a dedicated network
connection to the computer. It is also called network interface controller, network adapter or LAN
adapter.
Purpose
Network Cables: there are different types of cables that will be used to connect the network equipment.
That could be between the network device or network device with end user device. Below is the most
basic cable types, characteristics, benefits and it features:
Twisted-pair cable. You probably see this during your lap session and the name itself comes from the
type of cable inside the shield. This cable consists of color-coded pairs of insulated copper wires. Every
two wires are twisted around each other to form pair. Usually, there are four pairs. Each pair has one
solid color and one stripped color wire. Solid colors are blue, brown, green, and orange. In stripped
color, the solid color is mixed with the white color.
Based on how pairs are stripped in the plastic sheath, there are two types of twisted-pair cable; UTP and
STP.
In the UTP (Unshielded twisted-pair) cable, all pairs are wrapped in a single plastic sheath.
In the STP (Shielded twisted-pair) cable, each pair is wrapped with an additional metal shield, then all
pairs are wrapped in a single outer plastic sheath.
✓ Both STP and UTP can transmit data at 10Mbps, 100Mbps, 1Gbps, and 10Gbps.
✓ Since the STP cable contains more materials, it is more expensive than the UTP cable.
✓ Both cables use the same RJ-45 (registered jack) modular connectors.
✓ The STP provides more noise and EMI resistance than the UTP cable.
✓ The maximum segment length for both cables is 100 meters or 328 feet.
✓ Both cables can accommodate a maximum of 1024 nodes in each segment.
This cable consists of a core, cladding, buffer, and jacket. The core is made from thin strands of glass or
plastic that can carry data over a long distance. The core is wrapped in the cladding; the cladding is
wrapped in the buffer, and the buffer is wrapped in the jacket.
Fiber optic cable is completely immune to EMI and RFI. This cable can transmit data over a long distance
at the highest speed. It can transmit data up to 40 kilometers at the speed of 100Gbps.
Fiber optic uses light to send data. It reflects light from one endpoint to another. Based on how many
beams of light are transmitted at a given time, there are two types of fiber optical cable; SMF and MMF.
This cable carries only a single beam of light. This is more reliable and supports much higher bandwidth
and longer distances than the MMF cable. This cable uses a laser as the light source and transmits 1300
or 1550 nano-meter wavelengths of light.
This cable carries multiple beams of light. Because of multiple beams, this cable carries much more data
than the SMF cable. This cable is used for shorter distances. This cable uses an LED as the light source
and transmits 850 or 1300 nano-meter wavelengths of light.
Switch: Switch is where you end user lives. All end user device like computer, laptop, printer, CCTV
camera, IP Phone… etc will be connected to these devices. There is different type of switch which is
access switch, distribution switch and core switch. Based on its functionality, the layer where each
switch will be presented is different. It operates at layer two of the OSI model and uses MAC address as
source and destination address for communication purpose.
Router: Unlike switch which will broadcast its traffic to all its port to find the destination devices, router
is a bit intelligent and decide where to send the traffic based on the destination IP address of the
devices. It uses routing table and exit interface to decide where to send the data. It operates at layer 3
of the OSI model.
Firewall: At your network premises, you might have different application such as website at DMZ,
mailbox sever at server farm, or edge server at DMZ or FTP server. If you want to protect those servers
from being access by unauthorized person, you need to deploy firewall at the edge of your network and
11 | P a g e
AAiT SITE Fundamentals of Networking
create rules or policy to enforce who can access the resource with specific ports. It operates both at
Layer 3 and Layer 4 of OSI model.
Point to Point: Point-to-point topology is the easiest of all the network topologies. In this method, the
network consists of a direct link between two computers.
Advantages:
✓ This is faster and highly reliable than other types of connections since there is a direct
connection.
✓ No need for a network operating system
✓ Does not need an expensive server as individual workstations are used to access the files
✓ No need for any dedicated network technicians because each user sets their permissions
Disadvantages:
✓ The biggest drawback is that it only be used for small areas where computers are in close
proximity.
✓ You can't back up files and folders centrally
✓ There is no security besides the permissions. Users often do not require to log onto their
workstations.
Bus Topology
Bus topology uses a single cable which connects all the included nodes. The main cable acts as a spine
for the entire network. One of the computers in the network acts as the computer server. When it has
two endpoints, it is known as a linear bus topology.
12 | P a g e
AAiT SITE Fundamentals of Networking
Advantages:
✓ Cost of the cable is very less as compared to other topology, so it is widely used to build small
networks.
✓ Famous for LAN network because they are inexpensive and easy to install.
✓ It is widely used when a network installation is small, simple, or temporary.
✓ It is one of the passive topologies. So, computers on the bus only listen for data being sent, that
are not responsible for moving the data from one computer to others.
Disadvantages:
✓ In case if the common cable fails, then the entire system will crash down.
✓ When network traffic is heavy, it develops collisions in the network.
✓ Whenever network traffic is heavy, or nodes are too many, the performance time of the
network significantly decreases.
✓ Cables are always of a limited length.
Ring Topology
In a ring network, every device has exactly two neighboring devices for communication purpose. It is
called a ring topology as its formation is like a ring. In this topology, every computer is connected to
another computer. Here, the last node is combined with a first one.
This topology uses token to pass the information from one computer to another. In this topology, all the
messages travel through a ring in the same direction.
Advantages:
13 | P a g e
AAiT SITE Fundamentals of Networking
Disadvantages:
✓ Unidirectional traffic.
✓ Break in a single ring can risk the breaking of the entire network
✓ Modern days high-speed LANs made this topology less popular.
✓ In the ring, topology signals are circulating at all times, which develops unwanted power
consumption.
✓ It is very difficult to troubleshoot the ring network.
✓ Adding or removing the computers can disturb the network activity.
Star Topology
In the star topology, all the computers connect with the help of a hub. This cable is called a central node,
and all other nodes are connected using this central node. It is most popular on LAN networks as they
are inexpensive and easy to install.
14 | P a g e
AAiT SITE Fundamentals of Networking
Advantages:
Disadvantages:
Mesh Topology
The mesh topology has a unique network design in which each computer on the network connects to
every other. It is developing a P2P (point-to-point) connection between all the devices of the network. It
offers a high level of redundancy, so even if one network cable fails, still data has an alternative path to
reach its destination.
15 | P a g e
AAiT SITE Fundamentals of Networking
• Partial Mesh Topology: In this type of topology, most of the devices are connected almost
similarly as full topology. The only difference is that few devices are connected with just two or
three devices.
In a full mesh topology, all nodes/devices are directly connected. The type of redundancy is increased in
a full-mesh topology. These types of network topology are used in the backbone network. If there is high
traffic between any nodes then other routes are chosen for traffic balancing.
16 | P a g e
AAiT SITE Fundamentals of Networking
Advantages:
Disadvantages:
Chapter Two
17 | P a g e
AAiT SITE Fundamentals of Networking
OSI layer used to encapsulate and decapsulate data as it moves from source to destination vice versa.
Below is the picture that explain how the data moves from sender to receiver.
18 | P a g e
AAiT SITE Fundamentals of Networking
Two communicating devices communicating may be using different encoding methods, so layer 6 is
responsible for translating incoming data into a syntax that the application layer of the receiving device
can understand.
19 | P a g e
AAiT SITE Fundamentals of Networking
If the devices are communicating over an encrypted connection, layer 6 is responsible for adding the
encryption on the sender’s end as well as decoding the encryption on the receiver's end so that it can
present the application layer with unencrypted, readable data.
Finally, the presentation layer is also responsible for compressing data it receives from the application
layer before delivering it to layer 5. This helps improve the speed and efficiency of communication by
minimizing the amount of data that will be transferred.
The session layer also synchronizes data transfer with checkpoints. For example, if a 100-megabyte file is
being transferred, the session layer could set a checkpoint every 5 megabytes. In the case of a
disconnect or a crash after 57 megabytes have been transferred, the session could be resumed from the
last checkpoint, meaning only 45 more megabytes of data need to be transferred. Without the
checkpoints, the entire transfer would have to begin again from scratch.
20 | P a g e
AAiT SITE Fundamentals of Networking
The transport layer is also responsible for flow control and error control. Flow control determines an
optimal speed of transmission to ensure that a sender with a fast connection doesn’t overwhelm a
receiver with a slow connection. The transport layer performs error control on the receiving end by
ensuring that the data received is complete, and requesting a retransmission if it isn’t.
21 | P a g e
AAiT SITE Fundamentals of Networking
The OSI model helps network device manufacturers and networking software vendors:
✓ Create devices and software that can communicate with products from any other vendor,
allowing open interoperability
✓ Define which parts of the network their products should work with.
✓ Communicate to users at which network layers their product operates – for example, only at the
application layer, or across the stack.
22 | P a g e
AAiT SITE Fundamentals of Networking
The Transfer Control Protocol/Internet Protocol (TCP/IP) is older than the OSI model and was created by
the US Department of Defense (DoD). A key difference between the models is that TCP/IP is simpler,
collapsing several OSI layers into one:
✓ TCP/IP is a functional model designed to solve specific communication problems, and which is
based on specific, standard protocols. OSI is a generic, protocol-independent model intended to
describe all forms of network communication.
✓ In TCP/IP, most applications use all the layers, while in OSI simple applications do not use all
seven layers. Only layers 1, 2 and 3 are mandatory to enable any data communication.
23 | P a g e
AAiT SITE Fundamentals of Networking
Chapter Three
3. Network Layer
24 | P a g e