0% found this document useful (0 votes)
21 views

Lesson 01

Uploaded by

Nushail Ziyadh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Lesson 01

Uploaded by

Nushail Ziyadh
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 61

Data communication

and Computer
Networks Lesson 01

University of Colombo | 2024 ICT 3143


1.) Fundamentals of Communication Technology and Data communications model

2.) Data representation, data flow and data transmission mechanisms

3.) Network classifications and architecture of the internet


4.) Protocols and standards
5.) Layered architecture of a network
6.) Introduction to OSI reference model and TCP/IP protocol suit

7.) Network addressing methods – physical, logical and port addressing


3.) Network classifications and
architecture of the internet
1
What is a computer network?
● A network consists of two or more computers or devices
(collection of devices or nodes ) connected together , and they
can communicate and share resources (exchange information ).

University of Colombo | 2024


2
Resources
A resource may be:
• A file, folder
• Applications Software
• A printer
• Internet Connection
• Storage devices like shared drives or Network-Attached Storage (NAS)
systems are used to store data in one central location. All users connected to the network
can access, save, and retrieve files from this central storage.
University of Colombo | 2024
3
Why we use Networking?
★ Sharing information -Allows multiple devices to share printers, storage,
and internet
★ Sharing hardware or software-multiple computers and devices to
share resources such as printers, files, and internet connections, making it more efficient
and cost-effective.
★ Communication-Enables easy communication through emails, chat, and
video calls
★ Centralize administration and support-centralized data
storage, making it easier to access, manage, and back up important information from
multiple devices.
★ Improved Security-to protect data and resources from unauthorized access.
★ Cost-Effective: Reduces the need to buy multiple devices, like printers, by sharing
them

University of Colombo | 2024


4
Computer Network
● A computer network is a system of interconnected
computers and devices that communicate with each
other to share resources, such as data, files, and
applications.
● These connections can be established through wired
(e.g., Ethernet cables) or wireless (e.g., Wi-Fi)
methods, allowing multiple devices to work together,
exchange information, and access shared resources
like printers, servers, and the internet.

University of Colombo | 2024


5
Advantages of Networking
1. Improved Communication - Networking facilitates easy and fast communication between users
through email, instant messaging, and video conferencing
2. Resource Sharing -Networking allows multiple computers to share resources such as printers, files,
and internet connections, which reduces costs and improves efficiency.
3. Remote Access - Networking allows users to access resources and data remotely, providing flexibility
and the ability to work from different locations.
4. Enhanced Security - Networking enables the implementation of centralized security measures, such
as firewalls and access controls, to protect data and resources from unauthorized access.
5. Centralized Data Management - Networking enables centralized storage and management of data,
making it easier to access, back up, and secure information across multiple devices.
6. Scalability -Networks can be easily expanded by adding new devices and users without significant
changes to the existing infrastructure.

University of Colombo | 2024


6
Disadvantages of Networking
1. Security Risks: Networks can be vulnerable to hacking, malware, and unauthorized
access, which can compromise sensitive data.
2. Complex Setup: Setting up and maintaining a network can be complicated, requiring
technical expertise and regular monitoring.
3. Cost : Initial setup costs, including hardware, software, and ongoing maintenance, can
be expensive.
4. Dependence on Central Resources: If the central server or main connection fails, it
can disrupt the entire network, affecting all connected devices.
5. Privacy Concerns: Shared networks can lead to potential privacy issues if not properly
secured, allowing unauthorized users to access personal or confidential information.
6. Maintenance and Upkeep: Networks require regular updates and maintenance to
ensure smooth operation and security, which can be time-consuming and costly.

University of Colombo | 2024


COMPUTER NETWORKS || INTRODUCTION || ADVANTAGES AND DISADVANTAGES OF COMPUTER NETWORK (youtube.com)
7
Classification of Networking
Networks can be classified in various ways based on different criteria.

❖ Based on Geographic Area: LAN,WAN,MAN,PAN


❖ Based on Network Architecture: Client- Server Network,Peer-to-Peer
Network
❖ Based on Topology: Star,Bus,Ring,Mesh
❖ Based on Transmission Medium: Wired Network,Wireless Network

University of Colombo | 2024


1. Based on Geographic Area: 8
Local Area Network (LAN) : Connects computers and devices within a
small geographic area, such as a home, office, or school.
Characteristics
● Limited Area Coverage: Typically covers a single building or a group of nearby
buildings.
● High Data Transfer Rates: Usually has high-speed data transfer rates due to the
proximity of connected devices.
● Ownership: Generally owned, managed, and maintained by a single organization or
individual.
● Wired or Wireless: Can be connected using Ethernet cables (wired LAN) or Wi-Fi
(wireless LAN).

University of Colombo | 2024


9

● Examples: A home network connecting a computer, printer, and smart devices.


An office network linking employee computers to shared resources like printers and servers.

University of Colombo | 2024


Wide Area Network (WAN): 10

● Covers a large geographic area, often spanning cities, countries, or even continents. It
connects multiple smaller networks, such as LANs or MANs, to form a larger network.
Characteristics:
● Extensive Coverage: Can connect devices and networks across vast distances.
● Lower Data Transfer Rates: Typically has lower data transfer speeds compared to LANs,
due to the long distances involved.
● Uses Various Transmission Media: WANs often use a variety of communication
technologies, including fiber optics, satellite links, and leased lines.

A company might use a WAN to connect its offices in New York, London, and Tokyo, allowing them to
share data and communicate as if they were in the same building.
University of Colombo | 2024
11

Examples:

● The Internet, which connects millions of smaller networks worldwide.


● A company’s network connecting its offices in different cities or countries.
University of Colombo | 2024
Metropolitan Area Network (MAN) 12
Designed to cover a larger geographic area than a LAN but smaller than a WAN, typically spanning a
city or a large campus.
Characteristics:
● City-Wide Coverage: Connects multiple LANs within a metropolitan area, such as within a city or a large
campus.
● Moderate Data Transfer Rates: Provides higher data transfer speeds compared to WANs but lower than
LANs.
● Uses Various Transmission Technologies: Includes fiber optics, leased lines, and other high-speed
connections.
Examples:
● A network connecting multiple offices of a company across a city.
● A city-wide Wi-Fi network providing internet access in public places.
University of Colombo | 2024
13

University of Colombo | 2024


Personal Area Network(Pan)
14
● A Personal Area Network (PAN) is a small network designed for personal use, typically covering
a range of just a few meters.
● It connects devices like smartphones, tablets, laptops, and wearable devices for personal use,
often through wireless technologies like Bluetooth or infrared.

Characteristics:

● Small Range: Typically within a range of 10 meters.


● Wireless Connectivity: Commonly uses Bluetooth, infrared, or other short-range wireless protocols.
● Personal Devices: Designed for connecting personal devices for individual use.

Example:
● Connecting a phone to a wireless headset.
● Syncing data between a smartphone and a laptop via Bluetooth.
University of Colombo | 2024
15

Network Types: LAN, WAN, PAN, CAN, MAN, SAN, WLAN (youtube.com)

University of Colombo | 2024


16
17

University of Colombo | 2024


Based on Network 18
Architecture/Base of the role
1. Client-Server Network:
2. Peer-to-Peer Network (P2P):

Client: A client is a computer or software application that requests services or


resources from another computer, known as the server.
Examples: Web browsers (requesting web pages), email clients (retrieving emails)

Server : A server is a computer or software application that provides resources,


services, or data to clients over a network.
Examples: Web servers (hosting websites), email servers (handling email
communication)

University of Colombo | 2024


19
1.Client-Server Architecture:

● A network design where multiple clients (users or devices) request services or


resources from a central server.
Characteristics:
● Centralized Management: Servers provide resources and manage requests from
clients.
● Role Division: Clients request services, while servers provide them.

University of Colombo| 2024


2.) Peer-to-Peer (P2P) Architecture:
20

● A network design where each device (peer) acts as both a client and a server,
sharing all resources directly with other peers.

Characteristics:

● Decentralized: No central server; all devices share resources equally.


● Equal Roles: Each peer can request and provide resources.

University of Colombo | 2024


21

University of Colombo| 2024


22
Advantages & Disadvantages

Client-Server Peer-to-Peer (P2P)


Centralized management of resources and services. Decentralized, reducing the burden on a single server.
Servers can handle multiple clients. Easy to add new peers without affecting the central
system.
Easier to implement and manage security policies. More challenging to enforce consistent security.

Higher costs for servers and infrastructure. Lower initial cost, as there is no need for central
servers.
If the server fails, clients lose access to services. Each peer can be a point of failure, but there is no
central dependency.
Requires more complex setup and configuration. Simpler setup, but may become complex with many
peers.

University of Colombo | 2024


Peer-to-peer and Client-server Network | P2P & client server network (youtube.com)
Based on Topology
23

The arrangement of computers in a network is called network topology.

Bus Topology:

● All devices (noded) share a single communication line or cable.


● Data travels in one direction; each device waits for its turn.
● Simple but if the main cable fails, the entire network goes down.

University of Colombo | 2024


Advantages & Disadvantages of Bus Topology 24
Advantages
● It is Simple & reliable for very small networks.
● easy to use & understand
● cost is very low as compared to other topologies
● It can easily be extended to include more co computer network

Disadvantages
● If the main cable fails, the entire network goes down.
● Heavy network traffic can slow down communication.
● Adding or removing devices can disrupt the entire network.

discuss the other topologies advantages and disadvantages

University of Colombo | 2024


25
Star Topology:
● All devices are connected to a central hub or switch.
● Easy to install and manage; if one device fails, others remain unaffected.
● However, if the central hub fails, the network goes down.

● Devices can be connected or disconnected


without affecting the network.
● Star topologies are more expensive to install than
bus networks, because there are several more
cables that need to be installed, plus the cost of
the hubs that are needed.

University of Colombo | 2024


26
Ring Topology: Tree Topology:
● Devices are connected in a
circular manner, forming a ring. ● Tree topology combines the characteristics
● Data travels in one or both of bus topology and star topology.
directions around the ring. ● all the computers are connected with each
● Failure in any cable or device other in hierarchical fashion.
can take down the entire ● top-most node in tree topology is known
as a root node, and all other nodes are the
network.
descendants of the root node.

University of Colombo | 2024


Mesh Topology:
27
● Every device is connected to every other device.
● It does not contain the switch, hub or any central computer which acts as a
central point of communication.
● Provides high redundancy and reliability, but is complex and expensive to
implement.
● Best for high-reliability networks like those in military or financial sectors.

University of Colombo | 2024


28
Hybrid Topology:

● A combination of two or more different types of topologies.


● Flexible and scalable, but complex to design and manage.

University of Colombo | 2024


29

Network Topology - YouTube

University of Colombo | 2024


30

University of Colombo | 2024


Based on Transmission Medium:
31
● Transmission media is a communication channel that carries the information
from the sender to the receiver. Data is transmitted through the electromagnetic
signals.
● The main functionality of the transmission media is to carry the information in
the form of bits through LAN(Local Area Network).

University of Colombo | 2024


Classification Of Transmission Media:
32
Thick Coaxial
Cable

Coaxial Cable

Thin Coaxial
Copper Cable
Cable

Guided Media

Twisted pair

Transmission UTP
Media

STP

UnGuided Fiber Optics


Media
Single mode
fiber

Multi mode
fiber

University of Colombo | 2024


Guided Media
33
❖ Networks that use physical cables (like copper wires or fiber optic cables) to
transmit data. It is also known as Bounded media.

Types Of Guided media:

In the network you will commonly find three types of cables used these are the,
coaxial cable, fiber optic and twisted pair.

University of Colombo | 2024


Twisted Pair Cable 34
● To try to reduce electromagnetic interference, insulated copper wires are twisted together
in pairs to create twisted pair cables.
● Twisted pair made up of a pair of insulated copper cables twisted with each other.
● A twisted pair cable is cheaper, more flexible, easy to install, and provides greater speeds
as compared to other transmission media.
● It is commonly used for both telephone and Ethernet networks.
● Twisted pair cables can be used to transmit both digital and analog signals.
● These are further subdivided into unshielded and shielded twisted pair cables

University of Colombo | 2024


i) Unshielded Twisted Pair (UTP)
35
● These consist of 4 pairs of copper wires that are present inside a plastic sheath. and wires that are
coiled around one another.
● These wires are twisted to protect them from interference from external sources and crosstalk between
neighboring pairs within the cable
● commonly used in Ethernet networks (LAN) for home and office environments, as well as for
telephone lines.
● The lack of shielding around the wires makes UTP cables more flexible and less expensive than their
shielded counterparts.
Advantages: Disadvantages:

❖ Cost-effective and widely ❖ Less protection against


available. electromagnetic
❖ UTP cables are cheaper compared interference(Without shielding,
to shielded cables. UTP cables are more vulnerable to
❖ Easier to install due to their electromagnetic interference in
flexibility and lighter weight. high-noise environments.)

University of Colombo | 2024


Following are the categories of the unshielded twisted pair cable.
36

Category 1 : Category 1 is used for telephone lines that have low-speed data.
Category 2 : It can support upto 4Mbps.
Category 3 : It can support upto 16Mbps.
Category 4 : It can support upto 20Mbps. Therefore, it can be used for long-distance
communication.
Category 5 : It can support up to 200Mbps.

University of Colombo | 2024


ii)Shielded Twisted Pair (STP)
37

● STP cables have an extra shielding layer around the twisted wires to protect against
electromagnetic interference (EMI).
● The shielded twisted pair cable is widely used in high-speed networks.
● The major difference between UTP and shielded twisted pair is that STP makes use
of a metallic shield to wrap the wires. This metallic shield prevents interference to a
better extent than UTP.
● STP cables provide better noise immunity compared
to Unshielded Twisted Pair (UTP) cables, making
them suitable for environments with high levels of
interference, such as industrial areas.
● STP cables are more expensive than UTP cables due
to the added shielding material and complexity in
design.
University of Colombo | 2024
38
Advantages & Disadvantages
STP

Advantages: Disadvantages
Provides better protection against interference More expensive than UTP.
More reliable in electrically noisy environments. Thicker and less flexible, making installation more difficult.

UTP

Advantages Disadvantages
Cheaper and more flexible than STP. Offers less protection against interference compared to
STP.
Easier to install and manage. May not perform as well in environments with high
interference.
It can be used for high-speed LAN. can only be used for shorter distances because of
attenuation.
University of Colombo | 2024

Ethernet Cables, UTP vs STP, Straight vs Crossover, CAT 5,5e,6,7,8 Network Cables (youtube.com)
39
Coaxial Cable
● Coaxial cable is very commonly used transmission media, for example, TV wire is
usually a coaxial cable.
● The name of the cable is coaxial as it contains two conductors parallel to each
other.
● It has a higher frequency as compared to Twisted pair cable.
Disadvantages Advantages:

● It is more expensive as compared to


● Strong resistance to EMI.
twisted pair cable.
● Good for long-distance transmission.
● If any fault occurs in the cable
causes the failure in the entire ● High bandwidth capabilities.
network. University of Colombo | 2024
40
● The core copper conductor is used for the transmission of signals and the insulator is
used to provide insulation to the copper conductor the insulator is surrounded by a
braided metal conductor which helps to prevent the interference of electrical signals
and prevent cross talk.
● Coaxial cable, also known as coax

The most common coaxial standards are:

50-Ohm RG-7 or RG-11 Used with thick Ethernet


50-Ohm RG-58 Used with thin Ethernet
75-Ohm RG-59 Used with cable television

University of Colombo | 2024


Fibre Optic 41
● Cable uses electrical signals for communication.
● high-speed transmission medium that uses light to carry data, instead of
electrical signals, through strands of glass or plastic fibers.
● It is widely used for internet connections, telecommunications, and network
backbone systems due to its high bandwidth and long-distance capabilities.

● Fiber optics cables that holds the optical fibres coated in


plastic that are used to send the data by pulses of light.
● The plastic coating protects the optical fibres from heat,
cold, electromagnetic interference from other types of
wiring.

University of Colombo | 2024


Advantages: 42
● High Bandwidth: Can transmit large amounts of data at very high speeds.
● Long Distances: Signal loss is minimal, allowing for longer transmission distances compared to
copper cables.
● Immunity to Electromagnetic Interference (EMI): Since data is transmitted as light, it is not
affected by electrical interference

Disadvantages

● Fiber optic cables are costly and difficult to install and maintain.
● They are unidirectional and provide one-way communication. To have bidirectional
communication, you have to install two cables..

★ Fiber optic cables are crucial for modern communication infrastructure, providing the
high-speed, high-capacity data transmission necessary for the internet,
telecommunications, and other data-driven applications.
University of Colombo | 2024
43
Unguided Media
● An unguided transmission transmits the electromagnetic waves without
using any physical medium. Therefore it is also known as wireless
transmission.
● In unguided media, air is the media through which the electromagnetic
energy can flow easily.

University of Colombo | 2024


44
Infrared

❏ An infrared transmission is a wireless technology used for communication


over short ranges.
❏ The frequency of the infrared in the range from 300 GHz to 400 THz.

University of Colombo | 2024


Radio waves 45
❏ Radio waves are the electromagnetic waves that are transmitted in all the directions of
free space.
❏ Radio waves are omnidirectional, i.e., the signals are propagated in all the directions.

Satellite Transmission

❏ A satellite is a physical object that travels around the Earth at a set altitude
❏ Satellite communication is now more dependable than cable and fibre optic
technologies because it is more adaptable
❏ We can communicate with any location on the planet using satellite communication
46
Components Of Computer Network
● Computer network components are the major parts which are needed to
install the software. Some important network components are NIC,
switch, cable, hub, router, and modem. Depending on the type of
network that we need to install, some network components can also be
removed. For example, the wireless network does not require a cable.

1. Nodes : Devices like computers, smartphones, and printers that connect to the
network.
2. Network Interface Card - NIC is a hardware component used to connect a
computer with another computer onto a network
University of Colombo | 2024
There are two types of NIC: 47
Wired NIC
Wireless NIC

3. Switches: Devices that connect multiple nodes within a network and manage data
traffic.
4. Routers: Devices that direct data between different networks (e.g., between your
home network and the internet).
5. Cables/Wireless: The medium through which data travels, either wired (Ethernet
cables) or wireless (Wi-Fi).
6. Firewall : Security system that monitors and controls incoming and outgoing
network traffic.

University of Colombo | 2024


48
Network Interface Card (NIC)
● The NIC provides the physical interface for connecting to a network, either
wired (through Ethernet cables) or wireless (through Wi-Fi).
● It handles the process of sending and receiving data over the network.
● Each NIC has a unique identifier known as a MAC (Media Access Control)
address, which is used to identify it on the network.
● NICs support various network protocols, enabling them to communicate using
standards like Ethernet, Wi-Fi, etc.

University of Colombo | 2024


Hub 49
A Hub is a hardware device that divides the network connection among
multiple devices. When computer requests for some information from a
network, it first sends the request to the Hub through cable. Hub will
broadcast this request to the entire network. All the devices will check
whether the request belongs to them or not. If not, the request will be
dropped.

Switch
A switch is a hardware device that connects multiple devices on a computer
network. A Switch contains more advanced features than Hub. The Switch
contains the updated table that decides where the data is transmitted or not.
Switch delivers the message to the correct destination.

University of Colombo | 2024


50
Different between hub & switch
HUB SWITCH
A basic device that connects multiple computers in A smarter device that connects multiple computers
a network. in a network.
Broadcasts data to all devices connected, regardless Sends data only to the specific device that needs it.
of the destination.
Less efficient, as it can cause network congestion. More efficient, reducing unnecessary data traffic
and improving network performance.

University of Colombo | 2024


51

University of Colombo | 2024


Internetwork 52
● A network of networks is called an internetwork, or simply the internet. It is the largest network in
existence on this planet.

● The internet hugely connects all WANs and it can have connection to LANs and Home
networks.Internet enables its users to share and access enormous amount of information worldwide.

● It uses WWW, FTP, email services, audio and video streaming etc. At huge level, internet works on
Client-Server model.

● Internet uses very high speed backbone of fiber optics.

● Internet is widely deployed on World Wide Web services using HTML linked pages and is accessible by
client software known as Web Browsers.

University of Colombo | 2024


53
Ethernet
● Ethernet is a widely used technology for networking computers and other devices within
a local area network (LAN). It involves both hardware and protocols to enable devices to
communicate over wired connections. Ethernet shares media.

● Network which uses shared media has high probability of data collision. Ethernet uses
Carrier Sense Multi Access/Collision Detection (CSMA/CD) technology to detect
collisions.

● On the occurrence of collision in Ethernet, all its hosts roll back, wait for some random
amount of time, and then re-transmit the data.

University of Colombo | 2024


54
Intranet
An intranet is a private network used within an organization. It's like a
mini-internet that only the company's employees can access.It helps employees
share information, communicate, and work together more easily.Only people
inside the organization can use it. It’s not available to the public.It’s protected
from outside threats and only accessible by authorized users.
A company intranet works by
combining the following components:

Web server
Local area networks (LANs)
Firewall

University of Colombo | 2024


55
Extranet
An extranet is a private network that allows people outside of an organization to
access certain parts of its internal network.It lets authorized external parties, like
partners, suppliers, or customers, access specific information or resources.Unlike
an intranet, an extranet is accessible to people outside the company, but only
with permission.It might include shared documents, project information, or
collaboration tools that involve external partners.It’s protected with security
measures to ensure only the right external users can get in.

University of Colombo | 2024


56

University of Colombo | 2024


57

Intranet Extranet
Accessible only by internal employees of an Accessible by both internal employees and authorized
organization. external users like partners, suppliers, or customers
Restricted to within the organization’s network or via Requires secure authentication to ensure only
secure login for remote employees. authorized external users can access the network.
Generally has strong security controls to protect Includes additional security measures to protect
sensitive internal information from outside threats. against unauthorized access while sharing data with
external users.

University of Colombo | 2024


THANK YOU

You might also like