0% found this document useful (0 votes)
24 views40 pages

DCNS

The document provides information about data communication and computer networking topics including data transmission methods, transmission media, network devices, protocols, addressing, and routing. It covers these topics over multiple pages with detailed explanations and examples.

Uploaded by

haile
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views40 pages

DCNS

The document provides information about data communication and computer networking topics including data transmission methods, transmission media, network devices, protocols, addressing, and routing. It covers these topics over multiple pages with detailed explanations and examples.

Uploaded by

haile
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 40

1

exit exam tutorial for


Data Communication and Computer Networking

1
Blue Print
1

2
Data Communications

Data communications are the exchange of data between two devices


via transmission medium such as a wire cable and wireless
communication system made up of hardware and software
 The effectiveness of a data communications system depends on four
fundamental characteristics:
1. Delivery
2. Accuracy
3. Timeliness
4. Jitter: the to the variation in the packet arrival time.
Component of data communication

A data communications system has five component

1. Message is the information (data) to be communicated.


2. Sender is the device that sends the data message.
3.Rreceiver is the device that receives the message.
4. Transmission medium:- path by which a message travels from
sender to receiver( wired of wireless)
5. Protocol: is a set of rules that govern data communications between
the communicating devices
Data transmission
 The transmission of binary data across a link (communication channel) can
be either parallel or serial mode.

 In parallel mode:- multiple bits are sent together each clock with each
clock tick.
Data transmission …
 Parallel Data Transmission

 It is organize bits into groups of n bits to send.


 Use n wires to send n bits at one time.
 each bit has its own wire, and all n bits of one group can transmit
 advantage
 high speed.
Data transmission …
Serial Data transmission
 Signals are sent one bit at a time
 Travels long distances
Synchronous data transmission

 both sender and receiver use the same clock signals


 No need any buffer and parity bit(start or stop bit)
 no gap between each frames during transmission
 Receiver waits ready for sender and responds in real time (e.g.
phone call).
Asynchronous data transmission

 Both sender and receiver no required clock signals


 Have added parity bits (which called start and stop bit)
 gap between frames or group of bits (bytes) by start and stop bits
 Need buffer for data until synchronize both sender and receiver
 e.g. mailbox
Signals
Analog
 The propagating of data Digital
from one point to another by
means of electromagnetic signals.
 Use media: wire, fiber optic, space
 Signal can be:
 Analog signal is a continuously varying electromagnetic wave that
may be propagated over a variety of media
 Modem: binary voltage pulses analog signal by encoding the
digital data onto a carrier frequency.
 Digital signal: sequence of voltage pulses that transmitted over a
wire medium
 Codec (coder-decoder): analog signal digital signal
Digital data transmission

 the transmission media can be


 digital transmission
digital data can be transmitted on the form of
 ASK,
 FSK,PSK
 Analog transmission
 AM
 FM
 PM
Data Type vs. Transmission Type
 analog data such a voice, quite a bit of distortion can be tolerated and
the data remain intelligible.
 For digital data, cascaded amplifiers will introduce bit errors
Data Transmission Mode
The transmission mode can be:
 Simplex transmission
Signals are transmitted in only one direction e.g. Television
 Half duplex
Signals can be transmitted in either direction, but only one way at a
time. e.g. police radio
 Full duplex
Both stations may transmit simultaneously. e.g. telephone
Transmission Impairments

 The imperfection of signals travel through transmission media,


 Consequences over two types of signals:
 analog signals: degradation of signal quality
 digital signals: bit errors(0 change to 1 vice versa)
 The most significant causes for transmission impairments include:
 Attenuation
 Distortion
 Noise
Transmission Impairments
 Attenuation:- means loss of energy.
 Solution : Amplifier Or repeater
 Distortion: signal changes form or shape distortion in composite signals
 Noise: influences on effective communication the interpretation of
conversations between parties
 Several types of noise
 Thermal noise: random motion of electrons in a wire creates an extra
signal not originally sent by the transmitter
 Induced noise: comes from sources such as motors and appliance
 Crosstalk: electrical coupling between nearby twisted pairs.
 Impulse noise: signal with high energy in a very short time comes from
power lines, lightning
Multiplexing

 Multiple sender sends data to multiple receivers using single link

The two most basic forms of multiplexing are :


 Time-division multiplexing (TDM) –for digital signal

 Frequency-division multiplexing (FDM) –for analog signal


Transmission media
 a physical path for data transfer through electromagnetic signals.
 There are types of transmission media
UTP
 Twisted pair cable STP

 Guided (wired)  Coaxial cable Thinet


Thicknet
 Fiber optic

 Unguided(wireless )
 Infrared
 Radio frequency
 Microwave
Network Line Configuration
 Line configuration:- way two or more communication devices
attached to a link
 There are two possible line configurations.
1. Point-to-Point
 It Provides dedicated link between two devices
 E.g. remote control & Tvs using infrared

2. Multipoint
 one or more than two specific devices share a single link
capacity of the channel
Network Line Configuration
2. Multipoint
 one or more than two specific devices share a single link
capacity of the channel
 share a single link can be two possibilities in a Multipoint:
1. Spatial Sharing
 Several devices can share the link simultaneously
2. Temporal (Time) Sharing:
 users must take turns using the link
Networking and internetworking devices

 Internetworking device: a any hardware within networks that


connect different network resources(CPU, memory , data, printer)
etc.
 Network devices are physical devices (hardware) on a computer
network to communicate and interact with one another.
Passive: no cleaning, boosting
 Repeater amplifier or regenerate of signal
Active: have power supply .
 Hub – can not filter signal Cleaning , boosting
 No intelligent
 Switch – filter the signal
 Learn and forward the signal
 Use MAC address
Networking and internetworking devices

 Bridge -filtering content by reading the MAC addresses of the source and
destination

 Routers :- use to connect two networks


 routing packet source to destination
 a layer 3 of OSI model
 Use routing protocols
 Static
 Dynamic routing protocols
 Use IP addressing
Networking and internetworking devices
 Gateway: acts like a gate among the networks for entrance or
exit
 Translate all protocols on one network into the protocols
on another.
 operate at any of the seven layers of the OSI model.
NIC, etc.
Network Topology: away nodes, devices, and connections on your
network
There are two types of networks topologies:
1. Physical topology: star , ring, mesh, bus, hybrid etc.
 actual connections (wires, cables, etc.) of how the
network is arranged
2. Logical topology: way the packet transfer from source to
destination
Connection-oriented and connectionless services

 Connection oriented services

 Establish path
 Data transmission
 Terminate connection
 reliable services
 Acknowledge ,TCP

 Connectionless services
 No connection established ( route data independently)
 Unreliable
 Fast delivery
Communications network protocols
 There are two reference models
1. OSI Model is a logical and conceptual model that defines network
communication used by systems open to interconnection and
communication with other systems.
 Why of OSI Model?
 Helps to understand communication over a network
 Troubleshooting is easier by separating functions into
different network layers.
 Helps to understand new technologies as they are developed.
 Allows to compare primary functional relationships on
various network layers
Communications network protocols
 OSI reference model
1

25
Communications network protocols
 The difference b/n OSI and TCP/IP reference model

26
Communications network protocols
 TCP/IP model
What is IP Routing? Types, Routing Table, Protocols
 IP Routing is a process of sending packets from a host on one network to another
host on a different remote network

 Routing metric are the value that allows the routers to decide the best
route for the data packet
 Different routing metrics are:
 Hops, Bandwidth, Load, Cost ,Reliability
 A routing table is used by routers to decide path to destination
network
 Every router maintains a routing table which is stored in its RAM
 There are mainly three different methods for populating a routing
table:
Routing protocols
Class of Addressing
Addressing

IP addressing divided in two parts( NETID and HOSTID)


IP Addressing

Limitations of classful IP addressing


 Risk of running out of address space soon
 Class boundaries did not encourage efficient allocation of address space

 Solution for Depletion of IPv4


 Subnetting
 NAT
 IPV6
Network Standards and standardization bodies

the rules for data communications that are needed for interoperability of networking
technologies and processes
Two types of network standards
De facto − facts without approval by any organization. the HTTP had started as a de
facto standard.
De jure − by legislation by any officially recognized standards organization
Standards Organizations
 International Standards Organization (ISO)
 International Telecommunication Union (ITU)
 IEEE, American National Standards Institute (ANSI)
 Internet Research Task Force (IETF)
 Electronic Industries Association (EIA)
Local and wide area networks

 Technology in in computer network: two or more computer systems


are connected together and communicate information between

WAN Technologies
LAN technologies:
 Ethernet (original , fast , gigabyte,  Point to point technology
10G ( CSMA/CD, /AD) (leased line,
 Token Ring  Circuit switching technology
 FDDI  Packet switching technology
 LocalTalk (macintosh computer)  X.25 technologies
 Power over Ethernet( VOIP, IP  Frame Relay, and
camera)  Asynchronous Transfer Mode
 Wifi(RF) (ATM),
 Mobile net, Microwave,
satellite
 Message switching
Local and wide area networks

 Selecting Appropriate LAN Technology is considered :


 Cost efficiency
 Installed base
 Maintainability
 Performance
Local and wide area networks

 Selecting Appropriate LAN Technology is considered :


 Cost efficiency
 Installed base
 Maintainability
 Performance
Data security and integrity
 Security is the process of protecting the data from attack/ threat
 Goals of security
 Confidentiality
 Integrity
 Availability
 Threat: any malicious activity that compromises the confidentiality
and integrity of online data and systems.
 Hacker: is skilled computer expert that uses technical knowledge to
attack the system
 Attacker: any attempt to destroy, expose, alter, disable, steal or gain
unauthorized access to or make unauthorized use of an asset
Data security and integrity
 Types of Threats
 Interruption
 Interception
 Fabrication
 Modification
 Cryptography: science and art of transforming messages to make them secure and
immune to attacks
 Types of Cryptography
 Symmetric (e.g. substation and transposition) sharing same key by both
ends e.g DES, AES
 Asymmetric: use two key (public an private) e.g. RSA
 Hashing
Data security and integrity
 Firewall: is used to control the incoming and outgoing packets
 Types of firewall
1. Stateless packet filters: forward/drop packet based on: source IP
address, destination IP address, TCP/UDP ports

2. Stateful packet filters


3. Application gateway
 Virtual private networks: use tunneling to send data over the public
internet
 Transport layer security: user SLL, TLS to protect the packet from
unauthorized access
 Authentication protocol : used for verification of identity of the user
Thank you

40

You might also like