Computer Networks and Communication
Computer Networks and Communication
Networking Fundamentals
Outcome
COMPUTER NETWORKS • Understand what is Computer Network
AND COMMUNICATION • Identify end devices and intermediary devices
• Understand the basic characteristics of computer network
(CSC421) • Understand data communication
• Understand the difference between serial and parallel
communication.
• Understand the importance of protocols in computer network
• Know the elements of protocol
5 6
1
24/05/2024
7 8
Data Communication
Data communications are exchange of data between two nodes via
some form of link (transmission medium).
Since communication involves exchange of data between two nodes,
there will be the need for data flow.
9 10
2
24/05/2024
13 14
Message Size
Just as humans break long messages into smaller parts or
sentences, long messages too must be broken into smaller
pieces to travel across a network.
If the capacity of a link is small and data to be transmitted is big
(big data), the system breaks the data into smaller units called
packets that the transmission can handle.
15 16
17 18
3
24/05/2024
Outcome
- Understand LAN, MAN and WAN
- Know various devices involved in LAN, MAN and WAN
- Know the new trends in Computer Networks
- Understand other types of network
19 20
21 22
4
24/05/2024
- Virtual Private Network (VPN):- Let its users send and receive
data as if their devices were connected to a private network.
25 26
27 28
29 30
5
24/05/2024
Ring topology
Advantages of Bus topology
Is a bus topology in a closed loop. A form of peer—to-peer LAN
- Only one wire. So, it is less expensive topology.
- Suited for temporary network - Two connections: one to each of its nearest neigbours.
- Node failure does not affect others. - Unidirectional
- Sending and receiving data takes place with the help of a
Disadvantages of Bus topology TOKEN
- Not fault tolerant network
- Limited cable length – message must pass through a common
and single cable to other nodes
- No security
31 32
33 34
Disadvantages
- Single point of failure affect the whole network
- Bottleneck due to overloaded switch/hub
- Increased cost due to switch/hub
35 36
6
24/05/2024
Mesh topology
Advantages of Mesh topology
• Each node is directly connected to every other nodes in the
- Fault tolerant
network.
- Reliable
• Fault tolerant and reliable.
Disadvantages
- Issues with broadcasting messages
- Expensive and impractical for large networks
37 38
No. of No. of No. of ports connecting Total No. of ports in the network
nodes (N) cables (CN) each device (NOP) (TNOP) = N x NOP
2 2 2 4
3 3 2 6
4 4 2 8
N N 2 2xN
39 40
Question
- Traffic problem can be minimized using what topology?
Basics of IP addressing
- How many ports and cable links are needed for the star
topology below? Outcome:
- Understand the basics of IP addressing
- Know how to see the IP address in real device
- Identify valid and invalid IP addresses
41 42
7
24/05/2024
IP Address
IP stands for Internet Protocol
There are two variations of IP address – IPV4 and IPV6
IPV4 address
- Every node in the computer network is identified with the help Nigeria
of IP address. Ghana
- They are logical address – can change based on the location
of the network device.
- Can be assigned manually or dynamically
- Represented in decimal and it has 4 octets (x.x.x.x)
- Ranges from 0.0.0.0 to 255.255.255.255 (32bits)
43 44
45 46
MAC address
MAC stands for Media Access Control IP addresses are router friendly
address while MAC addresses
- Every node in LAN is identified with the help of MAC address are switch friendly address.
- Physical address or hardware address
- Unique
- Cannot be changed
- Assigned by the manufacturer
- Represented in hexadecimal (e.g. 70-20-84-00-ed-fc - 48bits)
- Separator are hyphen(-), period(.) or colon(:)
By way of illustration
- IP address = location of a person
- MAC address = name of the person
47 48
8
24/05/2024
49 50
Analogy: Suppose someone residing in Lafia intend to send a Port address or port number is the logical address of each
package to someone in Abuja. He/she first sends the package to application or process that uses a network or the internet to
Abuja, then the courier service man will locate the house of the communicate. It uniquely identifies a network-based application
person to receive the package. If there are many people in the on a computer.
house, the courier service will need to locate the right person. • In a node, many processes will be running
• Data which are sent/received must reach the right process
Reaching Abuja = reading our network (IP address) • Every process in a node is uniquely identified using port
Reaching apartment = reaching the host (MAC address) number
Reaching the right person = reaching the right process (port • Port = communication endpoint
address) • It can be fixed port number or dynamic port number
• OS assigns dynamic port numbers and its in the range (0-
65535)
51 52
53 54
9
24/05/2024
55 56
57 58
Message switching
• Message Switching is a switching technique in which a message is
transferred as a complete unit and routed through intermediate
nodes at which it is stored and forwarded.
• In Message Switching technique, there is no establishment of a
dedicated path between the sender and receiver.
• The destination address is appended to the message. Message
Switching provides a dynamic routing as the message is routed
through the intermediate nodes based on the information available
in the message.
• Message switches are programmed in such a way so that they can
provide the most efficient routes.
• Each and every node stores the entire message and then forward it
to the next node. This type of network is known as store and
forward network.
• Message switching treats each message as an independent entity.
59 60
10
24/05/2024
61 62
65 66
11
24/05/2024
69 70
71 72
12
24/05/2024
75 76
Working of the OSI reference model Working of the OSI reference model…
77 78
13
24/05/2024
79 80
81 82
83 84
14
24/05/2024
• IPCONFIG
85 86
To lookup the IP address of any web address you are working with,
type ‘nslookup’ in your command prompt.
This command gives information about the layer 2 (data link
layer) of the network protocol.
87 88
• PING • TRACERT
We can check whether our computer is communicating with the This command shows intermediary devices through which your
web address by typing the command ‘ping’ followed by the IP
address or web address of the web application in the command data moves until it gets to the destination server.
prompt.
15
24/05/2024
CPT is an innovative and powerful networking simulation tool - We will connect two computers using CPT and then configure
used for practice, discovery and troubleshooting. It helps to their IP addresses
understand networks practically.
- We will then check the commands below in the command
prompt of the CPT
How to download CPT
- Ipconfig
- Open google.com
- Ipconfig /all
- Type www.netacad.com
- Scroll down to “Packet Tracer” option - Ping
- Follow instructions/steps and download
91 92
Basics of Cisco Packet Tracer (Hub) Basics of Cisco Packet Tracer (Switches)
- Hub also known as network hub
- Hub works at the physical layer of the OSI model • A switch is a networking hardware that connects devices on a
- Used to set up LAN computer network to establish a local area network.
- Has multiple ports • Unlike hub, switch has memory
- Hub works in layer 1 of the OSI model
• Stores MAC Address Table
One basic limitation of a hub is that, when a packet arrives at one port, • A switch is a Layer 2 device for setting up LAN
it is copied to the other ports so that all segments of the LAN can see
all the packets.
93 94
- Stores routing table Decisions are taken based on MAC address Decisions are taken based on IP address
95 96
16
24/05/2024
97 98
Recapture…
99 100
101 102
17
24/05/2024
• Line configuration refers to the way two or more • A point – to – point connection provides a dedicated link
communication devices are connected to a communication between two devices.
link. • The entire capacity of the link is reserved for transmission
• The communication link can be wired or wireless between those two devices.
• For communication to happen, two nodes must be connected
to the same link at the same time.
• There are two possible line configurations
– Point – to – point
– Multipoint
103 104
105 106
LLC Sub-layer
Sub-layers of the Data link layer
• Handles communication between upper and lower layers
Data link layer has two sub-layers • Takes the network protocol data and adds control information
- Logical Link Control (LLC) or Data Link Control (DLC) Sub- to help deliver the packet to the destination (flow control)
layer
- MAC Sub-layer
MAC Sub-layer
107 108
18
24/05/2024
Data encapsulation
Network Security & Management
• Frame assembly before transmission and frame disassembly
upon reception of a frame. • We live in information age where we keep data about every
• MAC layer adds a header and trailer to the network layer PDU aspects of our lives.
• This information need to be secured from attacks
MAC sub-layer provides three primary functions: • To secure any information, it need to be:
- Framing – Hidden from unauthorized access (confidentiality)
- Physical addressing or MAC addressing – Protected from unauthorized change (integrity)
- Error control – Available to authorized entity when needed (availability)
109 110
111 112
113 114
19
24/05/2024
115
20