Communication
Communication
Chapter#2
Communication
Network 2
• Wireless LANs (WLANs) are similar to LANs but there are no wires or cables.
• they provide wireless network communications over fairly short distances (up to 100
metres)
• use radio or infrared signals instead of using cables.
• Devices, known as wireless access points (WAPs), are connected into the wired network at
fixed locations.
• Because of the limited range, most commercial LANs need several WAPs to permit
uninterrupted wireless communications.
• The WAPs use either spread:
• spectrum technology (which is a wideband radio frequency with a range from a few
metres to 100 metres)
• or infrared (which has a very short range of about 1 to 2 metres and is easily blocked,
and therefore has limited use
PAN 9
• A thick client can either be a device or software that can work offline or
online; it is still able to do some processing whether it is connected to a
server or not.
• An example of software is a computer game which can run independently
on a user’s computer, but can also connect to an online server to allow
gamers to play and communicate with each other.
Thin VS Thick client 15
Peer-to-peer model 16
Peer-to-peer model 17
• A user would choose the peer-to-peer network model for one or more of
following reasons:
• » The network of users is fairly small.
• » There is no need for robust security.
• » They require workstation-based applications rather than being server-
based.
Network topologies 19
• Topology defines the structure of the network of how all the components are
interconnected to each other.
• The factors listed on the left increase in the direction of the arrows.
• The bandwidth increases through radio and microwave to infrared but the
ability of the waves to penetrate solid objects is greatest for radio waves.
• The increased attenuation for infrared transmission, which has the highest
frequency, means that it is only suitable for indoor applications.
• The fact that it will not penetrate through a wall is then of benefit because
the transmission cannot escape and cause unwanted interference
elsewhere.
Wireless networking 32
• The highest altitude satellites are in geostationary Earth orbit (GEO) over the
equator and these are used to provide long-distance telephone and computer
network communication.
• ‘Geostationary’ means that the satellite orbits at the same speed as the Earth
spins.
• Only three GEO satellites are needed for full global coverage.
• Closer to Earth are a group of medium-Earth-orbit (MEO) satellites some of which
provide the global positioning system (GPS).
• Ten MEO satellites are needed for global coverage.
• Low Earth-orbit (LEO) satellites work in ‘constellations’ to supplement the mobile
phone networks.
• Fifty LEO satellites are needed for full global coverage
• The disadvantage of satellites is that the greater transmission distance causes
transmission delays, which can cause technical problems for the network.
Wired networks 36
• Twisted pair cables are the most common cable type used in LANs.
• However, of the three types of cable, it has the lowest data transfer rate and
suffers the most from external interference (such as electromagnetic radiation).
• However, it is the cheapest option.
• There are two types of twisted pair cable: unshielded and shielded.
• Unshielded is used by residential users.
• Shielded is used commercially (the cable contains a thin metal foil jacket which
cancels out some of the external interference).
Wired networks 37
• Coaxial cables are the most commonly used cables in MANs and by cable
television companies.
• The cost of coaxial cables is higher than twisted pair cables but they offer a better
data transfer rate and are affected less by external interference.
• Coaxial cables also have about 80 times the transmission capacity of twisted pair.
• Coaxial suffers from the greatest signal attenuation, but offers the best anti-
jamming capabilities.
Wired networks 38
• Fibre optic cables are most commonly used to send data over long distances,
because they offer the best data transfer rate, the smallest signal attenuation and
have a very high resistance to external interference.
• The main drawback is the high cost.
• Unlike the other two types of cable, fibre optics use pulses of light rather than
pulses of electricity to transmit data.
Wired networks 39
WEP, WPA, and WPA2 are WiFi security protocols that secure wireless connections. They keep your data hidden and
protect your communications, while blocking hackers from your network.
41
HUB 42
• Hubs are hardware devices that can have a number of devices or computers
connected to them.
• A hub’s main task is to take any data packet (a group of data being transmitted)
received at one of its ports and then send the data to every computer in the
network.
• Using hubs is not a very secure method of data distribution and is also wasteful of
bandwidth.
• Note that hubs can be wired or wireless devices.
Switch 43
• unlike a hub, the switch checks the data packet received and works out its
destination address (or addresses) and sends the data to the appropriate
computer(s) only.
• This makes using a switch a more secure and efficient way of distributing data.
• Each device or computer on a network has a media access control (MAC) address
which identifies it uniquely.
• Data packets sent to switches will have a MAC address identifying the source of
the data and additional addresses identifying each device which should receive
the data.
• Note that switches can be wired or wireless devices.
Repeater 44
• When signals are sent over long distances, they suffer attenuation or signal loss.
• Repeaters are devices which are added to transmission systems to boost the
signal so it can travel greater distances.
• They amplify signals on both analogue (copper cable) and digital (fibre optic cable)
communication links.
• Repeaters can also be used on wireless systems.
• These are used to boost signals to prevent any ‘dead spots’ in the Wi-Fi zone.
• These devices plug into electric wall sockets and send out booster signals.
• They are termed non-logical devices because they will boost all signals which have
been detected; they are not selective.
Repeating hubs 45
• Bridges are devices that connect one LAN to another LAN that uses the same
protocol (communication rules).
• They are often used to connect together different parts of a LAN so that they can
function as a single LAN.
Routers 47
• Routers enable data packets to be routed between the different networks for
example, to join a LAN to a WAN.
• The router takes data transmitted in one format from a network (which is using a
particular protocol) and converts the data to a protocol and format understood by
another network, thereby allowing them to communicate via the router.
Routers 48
• A broadband router is a type of networking device that allows end users to access bro-
adband Internet from an Internet service provider (ISP).
• Broadband routers sit behind a firewall.
• The firewall protects the computers on a network.
• The router’s main function is to transmit internet and transmission protocols between
two networks and allow private networks to be connected.
• The physical address which is also called a media access control, or MAC, address ide
ntifies a device to other devices on the same local network.
• The internet address -- or IP address -- identifies the device globally.
• Since every computer on the same network has the same part of an internet protocol
(IP) address, the router is able to send the data packet to the appropriate switch
• and it will then be delivered using the MAC destination address (see next section).
• If the MAC address doesn’t match any device on the network, it passes on to another
switch on the same network until the appropriate device is found.
Gateway 50
• A gateway is a network point (or node) that acts as an entrance to another network.
• The gateway converts data packets from one protocol to another.
• Gateways can also act as routers, firewalls or servers – in other words, any device that
allows traffic to flow in and out of the networks.
Modems
• Modern computers work with digital data, whereas many of the public
communication channels still only allow analogue data transmission.
• To allow the transmission of digital data over analogue communication channels we
need to use a modem (modulator demodulator).
• This device converts digital data to analogue data. It also does the reverse
Modems 51
• If two end-systems were to transmit messages at the same time there would be what is
described as a ‘collision’.
• This is when the voltages associated with the transmission interfere with each other causing
corruption of the individual messages. The risk is that two messages using the same data
channel could be sent at the same time, leading to a collision.
• The method adopted for dealing with this was CSMA/CD (carrier sense multiple access with
collision detection).
• This relied on the fact that if a message was being transmitted there was a voltage level on the
Ethernet cable which could be detected by an end-system.
(CSMA/CD) 55
• Although there might be some legacy Ethernet LANs still operating, modern Ethernet
is switched.
• The star configuration has a switch as the central device.
• The switch controls transmission to specific end systems. Each end-system is
connected to the switch by a full-duplex link, so no collision is possible along that link.
• Since collisions are now impossible, CSMA/CD is no longer needed.
Bit streaming 56
• Bit streaming is a contiguous sequence of digital bits sent over the internet or a
network that requires a high speed data communication link.
• Since bit streaming often involves very large files (such as video) it is necessary for
the files to undergo some data compression before transmission.
• It is also necessary to have some form of buffering to ensure smooth playback of the
media files.
• The data transmission rate from the file server to the buffer must be greater than the
rate at which data is transmitted from buffer to media player.
• The media player will always check to ensure data lies between a minimum value
(often referred to as low water mark) and a maximum value (often referred to as a
high water mark).
Bit streaming 57
Bit streaming 58
Bit streaming 59
WWW (WORLD WIDE WEB) :
internet
» This is a collection of multimedia web pages and other
documents which are stored on websites.
• massive network of networks,
made up of computers and other
» http(s) protocols are written using HyperText Mark-up
electronic devices; Language (HTML).
• It stands for interconnected
network. » Uniform resource locators (URLs) specify the location of all
• uses TCP/IP communication web pages.
protocols.
» Web resources are accessed by web browsers.
The Internet is, as has been
described above, an Internetwork. » The world wide web uses the internet to access information
By contrast, the World Wide Web from servers and other computers.
(WWW) is a distributed application
the web consists of an enormous collection of websites each
which is available on the Internet. having one or more web pages. The special feature of a web
page is that it can contain hyperlinks which, when clicked, give
direct and essentially immediate access to other web pages.
ISP 62
• the initial function of an Internet Service Provider (ISP) was to give Internet access to
an individual or company.
• This function is now performed by what we can call an ‘access ISP’. These access ISPs
then connect to what we can call ‘middle tier’ or regional ISPs, which in turn are
connected to tier 1 (or ‘backbone’) ISPs.
• An ISP is a network and connections between ISPs are handled by Internet Exchange
Points (IXPs).
• The tier 1 ISPs are at the top of the hierarchy, along with major Internet content
providers.
Router and the internet 63
• We can also think of the Internet in terms of the connections that carry the most
traffic, which consist of a set of fibre-optic cables laid under the sea and across land,
which can be described as a ‘mesh’ structure.
• This mesh of cables contains many points where the cables connect together, which
we call nodes.
• At every node is a device called the router. Routers are found not only in the general
‘mesh’ of the Internet but also within the ISP networks.
• Each router is connected to several other routers and its function is to choose the best
route for a transmission.
Public switched telephone network (PSTN) 64
• During the early years of networking the telephone network carried analogue voice data.
• However, digital data could be transmitted provided that a modem was used to convert the
digital data to analogue signals.
• Another modem was used to reverse the process at the receiving end.
• Such so-called ‘dial-up’ connections provided modest-speed, shared access when required.
• However, an organisation could instead pay for a leased line service that provided a
dedicated, permanently connected link with guaranteed transmission speed.
• Typically, organisations made use of leased lines to establish WANs
• More recently, the PSTNs have upgraded their main communication lines to fibre-optic cable
employing digital technology.
• This has allowed them to offer improved leased line services to ISPs but has also given them
the opportunity to provide their own ISP services.
• In this role they provide two types of service:
• The first is a broadband network connection for traditional network access.
• The second is WiFi hotspot technology.
Cell phone network 65
• For users of devices with mobile (cell) phone capability there is an alternative method
for gaining Internet access.
• This is provided by mobile phone companies acting as ISPs.
• The mobile phone, equipped with the appropriate software, communicates with a
standard cell tower to access the wireless telephone network, which in turn provides a
connection to the Internet.
IP(Internet Protocol) addressing 66
• The Internet requires technical protocols to function. A protocol suite called TCP/IP is
used as a standard.
• One aspect of this is IP addressing, which is used to define from where and to where
data is being transmitted.
• An Internet Protocol address is a numerical label such as 192.0.2.1 that is assigned to a
device connected to a computer network that uses the Internet Protocol for communication.
• IPv4 was devised in the late 1970s, before the invention of the PC and the mobile
phone.
• IPv4 provides for a large but limited number of addresses for devices, which is no
longer enough to cover all the devices expected to use the Internet in future.
IP addressing
▪ is used to define from where and to where
• The system uses the group of bits to
define network (netID) and network
data is being transmitted.
host (hostID).
• A network ID or NetID is the ▪ IPv4 addressing scheme is based on 32 bits
fragment of IP address that
classifies the network for a
specified host i.e., it tells us which ▪ The 32 bits allow 232 different addresses.
network the host belongs to
• It is the fragment of an IP address ▪ IPv4 was devised in the late 1970s, before
that uniquely classifies a host on a
the invention of the PC and the mobile
specified TCP/IP network.
phone.
A packet with a destination address that is not
on the same network as the source address will
be forwarded, or routed, to the appropriate ▪ IPv4 provides for a large but limited number
network. Once on the correct network, the host of addresses for devices, which is no longer
part of the address determines which interface
the packet gets delivered to. enough to cover all the devices expected to
use the Internet in future.
The other feature of the original scheme was that allocated addresses were based on the concept of different
classes of networks. There were five classes; we are going to look at the first three classes.
70
Class B
191.255.255.255 = 10111111.11111111.11111111.11111111
• The simple method used to achieve this is to add an 8-bit suffix to the address that specifies the number of
bits for the netID.
The 21 bits representing the netID have been highlighted. The remaining 11 bits represent the hostID which
would therefore have the binary value 11000001110.
Sub-netting Example: o We can consider a medium-sized
organisation with about 150 employees
each with their own computer workstation.
o Let’s assume that there are six individual
department LANs and one head-office
o Note that the diagram has been simplified
by showing the LANs connected to a
gateway. This is a device that connects
networks with different protocols. For the
connection to the Internet the gateway
would either first connect to a router or
have the capability to act as a router itself.
o The organisation would need seven
individual Class C netIDs; one for each
LAN. Each of these would point to one of
the LAN gateways
o This would mean 256 individual codes for
Since the organisation only has 150 workstations in total, there
identifying different workstations on just
are 1642 unused addresses. Not only would these be unused
they would be unavailable for use by any other organisation.
one LAN. For the seven LANs the total
number of workstations that could be
identified would be: 256 × 7 = 1792.
Sub-netting Example: o The sub-netting solution for this
organisation would require allocating
just one Class C netID.
o The sub-netting now works by having a
defined structure for the 256 codes
constituting the hostID.
o A sensible solution for this
organisation is to use the top three bits
as a code for the individual LANs and
the remaining five bits as codes for the
individual workstations.
o On the Internet, all of the allocated IP
addresses have a netID pointing to the
hostID code 00001110 would be the address for workstation
router. The router then has to interpret
14 on the head office LAN 0 (LAN 000) the hostID to direct the transmission to
hostID code 01110000 would be the address for workstation the appropriate workstations on one of
16 on LAN 3 (LAN 011). the LANS via a gateway
With 150 workstations the organisation hasn’t used all of the 256 allocated IP addresses. However, there are only 106 unused which is a
reasonable number to have available in case of future expansion.
Sub-netting Example: o The subnet mask is used to divide up
which portion of the address
represents the network ID and which
part is used for the hosts on the
network.
• Private IP addresses are reserved for internal use behind a router or other NAT device.
• Private IP addresses (which are internal value only) allow for an entirely separate set
of addresses within a network.
• They allow access to the network without taking up a public IP address space.
• However, devices using these private IP addresses cannot be reached by internet
users.
• Public IP addresses are the ones allocated by a user’s ISP to identify the location of
their device.
• Devices using these IP addresses are accessible from anybody using the internet.
Static IP addresses 79
Characteristics:
•Fixed: Does not change over time.
•Unique: Each device with a static IP address has a unique identifier.
•Direct Access: Allows direct access to the device on the network.
•Cost: Typically requires an additional fee from the Internet Service Provider (ISP).
Use Cases:
Servers: Web servers, email servers, and database servers often use static IP addresses for
consistent accessibility and management.
•Gaming: Some online games require static IP addresses for multiplayer functionality or to
avoid being disconnected.
Static IP addresses 80
Characteristics:
•Fixed: Does not change over time.
•Unique: Each device with a static IP address has a unique identifier.
•Direct Access: Allows direct access to the device on the network.
•Cost: Typically requires an additional fee from the Internet Service Provider (ISP).
Use Cases:
Servers: Web servers, email servers, and database servers often use static IP addresses for
consistent accessibility and management.
•Gaming: Some online games require static IP addresses for multiplayer functionality or to
avoid being disconnected.
Dynamic IP addresses 81
•Characteristics:Temporary:
•Changes over time.
•Shared: Multiple devices can share the same dynamic IP address at different times.
•Indirect Access: Requires Network Address Translation (NAT) to map the dynamic IP
address to the device's internal IP address.
•Cost: Typically included in the basic internet service plan.
• Use Cases:
• Home Users: Most home users have dynamic IP addresses
IPv6 82
• Web browsers are software that allow users to access and display web pages on their
screens.
• They interpret HTML sent from websites and display the results.
• Web browsers use uniform resource locators (URL) to access websites; these are represented
by a set of four numbers, such as 109.108.158.1.
• But it is much easier to type this into a browser using the following format: protocol://website
address/path/filename
• The domain name service (DNS) (also known as domain name system) gives domain names
for internet hosts and is a system for finding IP addresses of a domain name.
• Domain names eliminate the need for a user to memorise IP addresses.
• The DNS process involves converting a host name (such as www.hoddereducation.co.uk) into
an IP address the computer can understand (such as 107.162.140.19).
• Often, DNS servers contain a database of URLs with the matching IP addresses.
Domain name service (DNS) 85
① The user opens their web browser and types in the URL
(www.hoddereducation.co.uk) and the web browser asks
the DNS server (1) for the IP address of the website.
② The DNS server can’t find www.hoddereducation.co.uk
in its database or its cache and sends out a request to DNS
server (2).
③ DNS server (2) finds the URL and can map it to
107.162.140.19; the IP address is sent back to DNS server
(1) which now puts the IP address and associated URL into
its cache/database.
④ This IP address is then sent back to the user’s
computer.
⑤ The computer now sets up a communication with the
website server and the required pages are downloaded. The
web browser interprets the HTML and displays the
information on the user’s screen.