Software Development Short Note
Software Development Short Note
Data
• Analog Data
• Digital Data
Signal
• Analog Signal
• Digital Signal
Analog Signal
Digital Signal
DATA COMMUNICATION AND NETWORK SHORT NOTE
Analog
• Expensive
• Susceptible to noise
• Low attenuation
Digital
• Cheap
• High attenuation
• Distortion is effective
– Periodic
– Non periodic
• Non periodic signal changes without exhibiting a pattern or cycle that repeat
over times
•
• Peak Amplitude (A)
• Frequency(f )
• Period(T)
DATA COMMUNICATION AND NETWORK SHORT NOTE
• T=1/f
• F=1/T
• T- seconds(s)
• f- Hz(Hertz)
Cycle
ω = 2π f T = 2π / ω
Wavelength
V = f
DATA COMMUNICATION AND NETWORK SHORT NOTE
Composite Signals
DATA COMMUNICATION AND NETWORK SHORT NOTE
Bandwidth
BW = fmax - fmin
Digital Signal
• Bit Rate
• Bit length
– Bit length is the distance one bit occupies on the transmission medium
Transmission impairment
• Attenuation
• Distortion
• Noise
Attenuation
DATA COMMUNICATION AND NETWORK SHORT NOTE
Distortion
Noise
▪ Thermal noise
▪ Induced noise
▪ Crosstalk
▪ Impulse noise
Signal Modulation
• Analog to analog
• Digital to analog
• Analog to digital
• Digital to Digital
Analog voice is tolerant of the distortion, but for digital data errors will be introduced.
• Digital transmission-- transmission of digital data (using either analog or digital signals).
– For long distances, repeaters are used.(which recover the pattern of 0’s and 1’s and re-
transmits)
CODEC (coder-decoder)
• Modulation is a process of mixing a signal with a sinusoid to produce a new signal. This new
signal, conceivably, will have certain benefits of an un-modulated signal, especially during
transmission
Analog Transmission
The instantaneous amplitude of the carrier wave is varied in accordance with the modulating wave.
The instantaneous frequency of the carrier wave is varied in accordance with the modulating wave.
The instantaneous phase of the carrier wave is varied in accordance with the modulating wave
Digital Transmission
• Accessing, databases and transferring, processing and retrieval of data can be done on-line
• Online credit card checking, e-commerce and Electronic Fund Transfer are possible
• Easily administered
• Provides an efficient means of communication such as e-mail, Voice mail, and Video
conferencing
Establishment of Communication
• Availability of a sender
• Availability of a Receiver
Data Communication
• Communication of binary encoded data from one place to another is known as Data
Communication.
• In Data Communications all kinds of data (Text, Audio, Imaging) are encoded into binary form
at the sender and decoded at the receiver.
DATA COMMUNICATION AND NETWORK SHORT NOTE
• Software download
Network Security
• Protect vital information while still allowing access to those who need it
Who is vulnerable?
• Pharmaceutical companies
• Multinational corporations
• Computer Security - generic name for the collection of tools designed to protect data and to
thwart hackers
• Internet Security - measures to protect data during their transmission over a collection of
interconnected networks
DATA COMMUNICATION AND NETWORK SHORT NOTE
Confidentiality
❖ Data confidentiality: Assures that private or confidential information is not made available or
disclosed to unauthorized individuals.
❖ Privacy: Assures that individuals control or influence what information related to them may be
collected and stored and by whom and to whom that information may be disclosed.
Integrity
❖ Data integrity: Assures that information and programs are changed only in a specified and
authorized manner.
❖ System integrity: Assures that a system performs its intended function in an unimpaired
manner, free from deliberate or inadvertent unauthorized manipulation of the system.
Availability
• Assures that systems work promptly and service is not denied to authorized users.
Cryptography
• Network security is mostly achieved through the use of cryptography, a science based on
abstract algebra.
Cryptography components
Digital Signature
Networks Types
1. Peer to Peer
2. client/server (Server-based).
Peer-to-Peer
• This is a simple network configuration that requires some basic knowledge-how to set up.
• Each of the interconnected machines share dual capability and responsibility on the network
• Advantages
• Disadvantages
– No centralization.
– Limited users.
Client/server (server-based).
– Server based networks, has a machine at the heart of its operations called the server.
– The server's essential role on the network is to be continuously available to handle the
many requests generated by its clients.
• Advantages
– Centralized user accounts, security and access controls simplify network administration.
– Supports greater numbers of users, or networks where resources are heavily used
• Disadvantages
– Single point of failure, server goes down, the network goes down.
Types of Network
Network Topology
– BUS
– RING
– STAR
– TREE
– MESH
Transmission Media
• Twisted Pair
• Coaxial cable
• Optical fiber
DATA COMMUNICATION AND NETWORK SHORT NOTE
DATA COMMUNICATION AND NETWORK SHORT NOTE
DATA COMMUNICATION AND NETWORK SHORT NOTE
Wireless Media
Terrestrial Microwave
• Parabolic dish
• Focused beam
• Line of sight
Satellite Microwave
• Satellite receives on one frequency, amplifies or repeats signal and transmits on another
frequency
– Height of 35,784km
• Television
Broadcast Radio
• Omnidirectional
• FM radio
• Line of sight
– Reflections
DATA COMMUNICATION AND NETWORK SHORT NOTE
Infrared
• Blocked by walls
Wireless Propagation
– Ground wave
• Up to 2MHz
• AM radio
– Sky wave
• (Actually refracted)
– Line of sight
• Above 30Mhz
• More later…
DATA COMMUNICATION AND NETWORK SHORT NOTE
Access Point(AP)
❑ To solve compatibility problems among devices, an infrastructure mode topology can be set up
using an access point (AP) to act as a central hub for the WLAN.
LAN Components
A network interface card (NIC) is a printed circuit board that provides network
communication capabilities to and from a personal computer. Also called a LAN adapter.
Repeaters
• Repeaters clean, amplify, and resend signals that are weakened by long cable length.
Hubs
• multi-port repeaters
• Uplink
Bridge
A bridge is a physical unit, typically a box with two ports in it, that you use to connect network
segments.
You can use a bridge to join two existing LANs or to split one LAN into two segments.
Bridges convert network transmission data formats as well as perform basic data transmission
management.
Switch
• A switch is a box with multiple cable jacks, making it look similar to a hub.
• In fact, some manufacturers have hubs and switches of various sizes that are identical in
appearance, except for their markings.
• Advantages of switches
– Reduced workload, computers only receive packets intended for them specifically
• Disadvantages of switches
Switch Types
DATA COMMUNICATION AND NETWORK SHORT NOTE
• A cut-through switch forwards packets immediately by reading the destination address. The
switch doesn't even wait for the entire packet to arrive before it begins forwarding it.
• A store-and-forward switch waits until an entire packet arrives before forwarding it to its
destination.
Routers
– Bandwidth is shared
Gateways
DATA COMMUNICATION AND NETWORK SHORT NOTE
• a link between two computer programs allowing them to share information and bypass
certain protocols on a host computer(computer program)
❑ Coordinates the functions required to transmit a stream of bits over a physical medium.
o voltage
❑ DLL transforms the physical layer function of transmission of raw bits into a
reliable one and is responsible for node to node delivery.
❑ Defines the logical network layout so routers can determine how to forward packets
through an internetwork
DATA COMMUNICATION AND NETWORK SHORT NOTE
• The transport layer provides transport services from the source host to the destination host.
end host
acknowledgments
❑ Network Devices
o Gateways
another system.
TCP/IP Model
– Application layer
– Transport layer
– Internet layer
The application layer of the TCP/IP model handles high-level protocols, issues of
representation, encoding, and dialog control.
The transport layer provides transport services from the source host to the destination host. It
constitutes a logical connection between these endpoints of the network. Transport
protocols segment and reassemble upper-layer applications into the same data stream
between endpoints.
The purpose of the Internet layer is to select the best path through the network for packets to
travel. The main protocol that functions at this layer is the Internet Protocol (IP). Best path
determination and packet switching occur at this layer.
The network access layer is also called the host-to-network layer. It the layer that is
concerned with all of the issues that an IP packet requires to actually make a physical link to
the network media. It includes LAN and WAN details, and all the details contained in the OSI
physical and data-link layers. NOTE: ARP & RARP work at both the Internet and Network
Access Layers.
DATA COMMUNICATION AND NETWORK SHORT NOTE
Device Addressing
Addressing
• Four levels of addresses are used in an internet employing the TCP/IP protocols: physical,
logical(IP), port, and specific.
Physical Address
• Eg. Ethernet uses 48 bit physical address that imprinted on the NIC .
Logical address(IP)
• Logical addresses are necessary for universal communications that are independent of
underlying physical networks.
• A universal addressing system is needed in which each host can be identified uniquely,
regardless of the underlying physical network.
• The logical addresses are designed for this purpose. A logical address in the Internet is
currently a 32-bit address that can uniquely define a host connected to the Internet.
• No two publicly addressed and visible hosts on the Internet can have the same IP address.
Port Address
• The IP address and the physical address are necessary for a quantity of data to travel from a
source to the destination host.
• However, arrival at the destination host is not the final objective of data communications on
the Internet.
• A system that sends nothing but data from one computer to another is not complete.
• Today, computers are devices that can run multiple processes at the same time.
• is a unique identifier assigned to most network adapters or network interface cards (NICs) by
the manufacturer for identification, and used in the Media Access Control protocol sub-layer.
DATA COMMUNICATION AND NETWORK SHORT NOTE
• It may also be known as an Ethernet Hardware Address (EHA), hardware address, adapter
address, or physical address.
Network Protocols
• In order for computers to communicate with one another, they must agree on a set of rules
for who says what, when they say it, and what format they say it in
• Some common protocols are HTTP (for web pages), FTP (for file transfer), and SMTP (Simple
Mail Transfer Protocol)
DATA COMMUNICATION AND NETWORK SHORT NOTE
TCP/IP
• The Internet (and most other computer networks) are connected through TCP/IP networks
– IP, Internet Protocol, is used to move packets (chunks) of data from one place to
another
• Example: 192.168.1.1
– TCP, Transmission Control Protocol, ensures that all necessary packets are present,
and puts them together in the correct order
– Datagrams
– Connection Oriented
• Connectionless
• One Way
• Fast, Simple
• No guarantee of delivery
DATA COMMUNICATION AND NETWORK SHORT NOTE
• Error Messages
• Simple Headers
Application Protocols
FTP
– User authentication
– Anonymous
• used to transfer computer files between a client and server on a computer network.
DATA COMMUNICATION AND NETWORK SHORT NOTE
• built on a client-server model architecture and uses separate control and data connections
between the client and the server.
• GET/PUT/DEL/CWD
HTTP
• HTTP is a pull protocol, the user pulls information from a remote site.
HTTPS
• HTTPS consists of communication over Hypertext Transfer Protocol (HTTP) within a connection
encrypted by Transport Layer Security or its predecessor, Secure Sockets Layer.
The main motivation for HTTPS is authentication of the visited website and protection of the
privacy and integrity of the exchanged data
SMTP
• Uses port 25
DATA COMMUNICATION AND NETWORK SHORT NOTE
POP3
IMAP
• Improved POP3
• Only transfers as much as needed per message (headers, subject only on list)
DHCP
DNS
• consists of different types of DNS messages that are processed according to the information in
their message fields
– Queries
– Responses
– Updates
ARP
• Protocol used by the Internet Protocol (IP), specifically IPv4, to map IP network addresses to
the hardware addresses used by a data link protocol.
• The protocol operates below the network layer as a part of the interface between the OSI
network and OSI link layer.
RARP
• used by a client computer to request its Internet Protocol (IPv4) address from a computer
network, when all it has available is its Link Layer or hardware address, such as a MAC
address.
Telnet
• User command and an underlying TCP/IP protocol for accessing remote computers.
• Through Telnet, an administrator or another user can access someone else's computer
remotely.
DATA COMMUNICATION AND NETWORK SHORT NOTE
SSH
• A cryptographic network protocol for operating network services securely over an unsecured
network.
• The best known example application is for remote login to computer systems by users.
DNS
What is DNS?
• Defines a hierarchical namespace where each level of the namespace is separated by a “.”
• Can be:
– Windows 2000
– Microsoft Windows® NT 4
– UNIX
– Linux
– NetWare
– Etc.
DATA COMMUNICATION AND NETWORK SHORT NOTE
It is the phone number that allows you to communicate over the phone, not the person’s
name.
Protocol
Hostnam Domain Name Resource or File
e/name
of the
Resolver
• Issues queries that ask for specific types of mappings of computers and IP addresses (records)
.
(root)
.net
.com
.lab8.net
.mylab.com
.
(root)
.net
.com
.lab8.net
.mylab.com
DATA COMMUNICATION AND NETWORK SHORT NOTE
Top-level domains
IP addresses –IPv4
• The IP Address identifies a system’s location on the network in the same way a street address
identifies a house on a city block
• Just as a street address must identify a unique residence, an IP address must be unique and
have uniform format
– Network ID
– Host ID
Network ID
• All hosts on the same network require the same network ID, which should be unique to the
internet work
DATA COMMUNICATION AND NETWORK SHORT NOTE
Host ID
– Binary
• Each IP address is 32 bits long and is composed of four 8 bit fields, called octets
• Octets are separated by periods and represent a decimal number in the range 0-255
• The 32 bits of the IP address are allocated to the network ID & host ID
IP address
DATA COMMUNICATION AND NETWORK SHORT NOTE
• Class A
– Class A addresses are assigned to networks with a very large number of hosts
• Class B
– The two high order bit in a class B address is always set to binary 1 0.
DATA COMMUNICATION AND NETWORK SHORT NOTE
• Class C
Note:
Subnet mask
• The subnet mask used in the TCP/IP configuration for a network tells the OS which part of an IP
address is the network portion and which part identifies the host.
• Using a subnet mask, a computer or other device can know if an IP address of another computer
is on its network or another network
• The ones in a subnet mask say, “On our network, this part of an IP address is the network part,”
• and the group of zeros says, “On our network, this part of an IP address is the host part.”