Computer Networks and Communication
Computer Networks and Communication
Outcome
COMPUTER NETWORKS • Understand what is Computer Network
AND COMMUNICATION • Identify end devices and intermediary devices
• Understand the basic characteristics of computer network
(CSC421) • Understand data communication
• Understand the difference between serial and parallel
communication.
• Understand the importance of protocols in computer network
• Know the elements of protocol
5 6
Basic characteristics of computer network
QoS is ability to:
There are four qualities every computer network should posses 1. Set priorities
• Fault tolerance 2. Manage data traffic to reduce data loss, delay etc
• Scalability
• Quality of Service Example is setting priority between e-mail data and VoIP. Delay
• Security is not a problem in e-mail communication.
7 8
Data Communication
Data communications are exchange of data between two nodes via
some form of link (transmission medium).
Since communication involves exchange of data between two nodes,
there will be the need for data flow.
9 10
13 14
Message Size
Just as humans break long messages into smaller parts or
sentences, long messages too must be broken into smaller
pieces to travel across a network.
If the capacity of a link is small and data to be transmitted is big
(big data), the system breaks the data into smaller units called
packets that the transmission can handle.
15 16
17 18
Illustration of the elements of a protocol Classification of Computer Networks
Outcome
- Understand LAN, MAN and WAN
- Know various devices involved in LAN, MAN and WAN
- Know the new trends in Computer Networks
- Understand other types of network
19 20
21 22
- Virtual Private Network (VPN):- Let its users send and receive
data as if their devices were connected to a private network.
25 26
27 28
29 30
Ring topology
Advantages of Bus topology
Is a bus topology in a closed loop. A form of peer—to-peer LAN
- Only one wire. So, it is less expensive topology.
- Suited for temporary network - Two connections: one to each of its nearest neigbours.
- Node failure does not affect others. - Unidirectional
- Sending and receiving data takes place with the help of a
Disadvantages of Bus topology TOKEN
- Not fault tolerant network
- Limited cable length – message must pass through a common
and single cable to other nodes
- No security
31 32
33 34
Disadvantages
- Single point of failure affect the whole network
- Bottleneck due to overloaded switch/hub
- Increased cost due to switch/hub
35 36
Mesh topology
Advantages of Mesh topology
• Each node is directly connected to every other nodes in the
- Fault tolerant
network.
- Reliable
• Fault tolerant and reliable.
Disadvantages
- Issues with broadcasting messages
- Expensive and impractical for large networks
37 38
No. of No. of No. of ports connecting Total No. of ports in the network
nodes (N) cables (CN) each device (NOP) (TNOP) = N x NOP
2 2 2 4
3 3 2 6
4 4 2 8
N N 2 2xN
39 40
Question
- Traffic problem can be minimized using what topology?
Basics of IP addressing
- How many ports and cable links are needed for the star
topology below? Outcome:
- Understand the basics of IP addressing
- Know how to see the IP address in real device
- Identify valid and invalid IP addresses
41 42
IP Address
IP stands for Internet Protocol
There are two variations of IP address – IPV4 and IPV6
IPV4 address
- Every node in the computer network is identified with the help Nigeria
of IP address. Ghana
- They are logical address – can change based on the location
of the network device.
- Can be assigned manually or dynamically
- Represented in decimal and it has 4 octets (x.x.x.x)
- Ranges from 0.0.0.0 to 255.255.255.255 (32bits)
43 44
45 46
MAC address
MAC stands for Media Access Control IP addresses are router friendly
address while MAC addresses
- Every node in LAN is identified with the help of MAC address are switch friendly address.
- Physical address or hardware address
- Unique
- Cannot be changed
- Assigned by the manufacturer
- Represented in hexadecimal (e.g. 70-20-84-00-ed-fc - 48bits)
- Separator are hyphen(-), period(.) or colon(:)
By way of illustration
- IP address = location of a person
- MAC address = name of the person
47 48
Basics of Port addressing
IPV4 address MAC address
Needed for communication Needed for communication Outcome:
32bits 48bits - Understand the basics of Port addressing (port number)
Represented in decimal Represented in hexadecimal - Know three key points to ponder
- See port number in real devices
Router needs IP address to forward Switch needs MAC address to
data forward data
Example: 10.12.23.45 Example: 34-20-84-00-ED-FV
49 50
Analogy: Suppose someone residing in Lafia intend to send a Port address or port number is the logical address of each
package to someone in Abuja. He/she first sends the package to application or process that uses a network or the internet to
Abuja, then the courier service man will locate the house of the communicate. It uniquely identifies a network-based application
person to receive the package. If there are many people in the on a computer.
house, the courier service will need to locate the right person. • In a node, many processes will be running
• Data which are sent/received must reach the right process
Reaching Abuja = reading our network (IP address) • Every process in a node is uniquely identified using port
Reaching apartment = reaching the host (MAC address) number
Reaching the right person = reaching the right process (port • Port = communication endpoint
address) • It can be fixed port number or dynamic port number
• OS assigns dynamic port numbers and its in the range (0-
65535)
51 52
53 54
Switching Technique Circuit switching
• Circuit switching is a switching technique that establishes a
Definition:- Network switching is the process of channeling data dedicated path between sender and receiver.
received from any number of input ports to another designated port that
• In the Circuit Switching Technique, once the connection is
will transmit the data to its desired destination.
established then the dedicated path will remain to exist until the
- Switching in computer network helps in deciding the best route for connection is terminated.
data transmission, if there are multiple paths in a larger network.
• Circuit switching in a network operates in a similar way as the
- One – to – one connection telephone works.
• A complete end-to-end path must exist before the communication
Switching techniques: takes place.
- Circuit Switching • In case of circuit switching technique, when any user wants to send
- Message Switching the data, voice, video, a request signal is sent to the receiver then
- Packet Switching the receiver sends back the acknowledgment to ensure the
* Datagram approach
availability of the dedicated path. After receiving the
* Virtual circuit approach
acknowledgment, dedicated path transfers the data.
55 56
57 58
Message switching
• Message Switching is a switching technique in which a message is
transferred as a complete unit and routed through intermediate
nodes at which it is stored and forwarded.
• In Message Switching technique, there is no establishment of a
dedicated path between the sender and receiver.
• The destination address is appended to the message. Message
Switching provides a dynamic routing as the message is routed
through the intermediate nodes based on the information available
in the message.
• Message switches are programmed in such a way so that they can
provide the most efficient routes.
• Each and every node stores the entire message and then forward it
to the next node. This type of network is known as store and
forward network.
• Message switching treats each message as an independent entity.
59 60
Advantages Of Message Switching Packet switching
• Data channels are shared among the communicating devices • The packet switching is a switching technique in which the message is
that improve the efficiency of using available bandwidth. sent in one go, but it is divided into smaller pieces, and they are sent
• Traffic congestion can be reduced because the message is individually.
temporarily stored in the nodes. • The message splits into smaller pieces known as packets and packets
• Message priority can be used to manage the network. are given a unique number to identify their order at the receiving end.
• The size of the message which is sent over the network can • Every packet contains some information in its headers such as source
be varied. Therefore, it supports the data of unlimited size. address, destination address and sequence number.
• Packets will travel across the network, taking the shortest path as
possible.
Disadvantages Of Message Switching
• All the packets are reassembled at the receiving end in correct order.
• The message switches must be equipped with sufficient
storage to enable them to store the messages until the • If any packet is missing or corrupted, then the message will be sent to
message is forwarded. resend the message.
• The Long delay can occur due to the storing and forwarding • If the correct order of the packets is reached, then the
facility provided by the message switching technique. acknowledgment message will be sent.
61 62
65 66
Advantages Of Packet Switching:
Differences between datagram and virtual approach • Cost-effective: In packet switching technique, switching devices do not
require massive secondary storage to store the packets, so cost is
minimized to some extent. Therefore, we can say that the packet
Datagram approach Virtual Circuit approach switching technique is a cost-effective technique.
• Reliable: If any node is busy, then the packets can be rerouted. This
Node takes routing decisions to Node does not take any routing
ensures that the Packet Switching technique provides reliable
forward the packets. decision.
communication.
Congestion cannot occur as all the Congestion can occur when the node • Efficient: Packet Switching is an efficient technique. It does not require
packets travel in different directions. is busy, and it does not allow other any established path prior to the transmission, and many users can use
packets to pass through. the same communication channel simultaneously, hence makes use of
available bandwidth very efficiently.
Disadvantages Of Packet Switching:
It is more flexible as all the packets It is not very flexible.
• The protocols used in a packet switching technique are very complex
are treated as an independent entity. and requires high implementation cost.
• If the network is overloaded or corrupted, then it requires retransmission
of lost packets. It can also lead to the loss of critical information if errors
are nor recovered.
67 68
69 70
71 72
Application Layer Session Layer
• It enables the user to access the network resources. • It establishes, maintains, and synchronizes the interaction among
• It provides the following services: communicating devices.
• It provides the following services:
– File Transfer and Access Management
– Dialog control
– Mail Services
– Synchronization
– Directory Services
Transport Layer
Presentation Layer
• It is responsible for process to process delivery of the entire
message.
• It is concerned with the syntax and semantics of the
information exchanged between two systems. • It provides the following services:
– Port addressing
• It provides the following services:
– Segmentation and reassembly
– Translation
– Connection control – connection /connectionless oriented
– Encryption
– End – to – end flow control
– Compression – Error control
73 74
75 76
Working of the OSI reference model Working of the OSI reference model…
77 78
The TCP/IP Model
- TCP/IP stands for Transmission Control Protocol/Internet
Protocol
- The layers in the TCP/IP protocol suite do not exactly match
those in the OSI model
- TCP/IP is a hierarchical protocol made up of interactive
models, each of which provides a specific functionality.
79 80
81 82
83 84
Basic Networking Commands
• IPCONFIG
85 86
To lookup the IP address of any web address you are working with,
type ‘nslookup’ in your command prompt.
This command gives information about the layer 2 (data link
layer) of the network protocol.
87 88
• PING • TRACERT
We can check whether our computer is communicating with the
This command shows intermediary devices through which your
web address by typing the command ‘ping’ followed by the IP
address or web address of the web application in the command data moves until it gets to the destination server.
prompt.
CPT is an innovative and powerful networking simulation tool - We will connect two computers using CPT and then configure
used for practice, discovery and troubleshooting. It helps to their IP addresses
understand networks practically.
- We will then check the commands below in the command
prompt of the CPT
How to download CPT
- Ipconfig
- Open google.com
- Ipconfig /all
- Type www.netacad.com
- Scroll down to “Packet Tracer” option - Ping
- Follow instructions/steps and download
91 92
Basics of Cisco Packet Tracer (Hub) Basics of Cisco Packet Tracer (Switches)
- Hub also known as network hub
- Hub works at the physical layer of the OSI model • A switch is a networking hardware that connects devices on a
- Used to set up LAN computer network to establish a local area network.
- Has multiple ports • Unlike hub, switch has memory
- Hub works in layer 1 of the OSI model
• Stores MAC Address Table
One basic limitation of a hub is that, when a packet arrives at one port, • A switch is a Layer 2 device for setting up LAN
it is copied to the other ports so that all segments of the LAN can see
all the packets.
93 94
- Stores routing table Decisions are taken based on MAC address Decisions are taken based on IP address
95 96
Basics of Cisco Packet Tracer (Repeater) Physical Layer and Media
Fundamental principles of Physical Layer
• The data signals generally become too weak or corrupted if they - One of the major functions of the physical layer is to move
tend to travel a long distance. data in the form of electromagnetic signals across a
• Repeater regenerates the signal over the same network transmission medium.
• It operates at the physical layer - The data usable to a person or an application are not in a
• They do not amplify the signal form that can be transmitted over a network. For example,
• It is a 2 port device image must first be changed to a form that transmission
media can accept.
- Data must be transformed into electromagnetic signals before
Working principle of a Repeater using CPT
transmission can occur.
97 98
Recapture…
99 100
101 102
Line Configuration Point – to – point connection
• Line configuration refers to the way two or more • A point – to – point connection provides a dedicated link
communication devices are connected to a communication between two devices.
link. • The entire capacity of the link is reserved for transmission
• The communication link can be wired or wireless between those two devices.
• For communication to happen, two nodes must be connected
to the same link at the same time.
• There are two possible line configurations
– Point – to – point
– Multipoint
103 104
105 106
LLC Sub-layer
Sub-layers of the Data link layer
• Handles communication between upper and lower layers
Data link layer has two sub-layers • Takes the network protocol data and adds control information
- Logical Link Control (LLC) or Data Link Control (DLC) Sub- to help deliver the packet to the destination (flow control)
layer
- MAC Sub-layer
MAC Sub-layer
107 108
Data encapsulation
Network Security & Management
• Frame assembly before transmission and frame disassembly
upon reception of a frame. • We live in information age where we keep data about every
• MAC layer adds a header and trailer to the network layer PDU aspects of our lives.
• This information need to be secured from attacks
MAC sub-layer provides three primary functions: • To secure any information, it need to be:
- Framing – Hidden from unauthorized access (confidentiality)
- Physical addressing or MAC addressing – Protected from unauthorized change (integrity)
- Error control – Available to authorized entity when needed (availability)
109 110
111 112
113 114
Services and Techniques to prevent
attacks
• Cryptography:- Secret writing. It’s the science and art of
transforming messages to make them secured and immune to
attack. Involves concealing the contents of a message by
enciphering.
– Symmetric-key cipher
– Asymmetric-key cipher
115