0% found this document useful (0 votes)
20 views26 pages

Data Communication Lecture 8

Uploaded by

sachintha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views26 pages

Data Communication Lecture 8

Uploaded by

sachintha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26

L ect u re 08

D a t a communication

M r. S a c h i n t h a A s h i k a

C N T 4 0 0 1 - D a t a Communication 1
U n i t Aim
This unit aims to provide the student with a good grounding in data
communications and networking. The unit focuses on breadth of
understanding rather than depth and attempts to cover a varied range of
networking topics by means of an organized high-level approach.

2
Le arning Outcomes
On successful completion of this module, students should be
able to:

• Explain data communication concepts and usage of network


protocols.
• Classify types of local area networks and wide area
networks.
• Analyze data security and integrity over public networks
• Design a medium size network with wide area network
connectivity.

3
Reference Materials
• "Data Communications and Networking" by Behrouz A. Forouzan: This
comprehensive textbook covers the fundamentals of data communication and
networking, including protocols, technologies, and applications.

• "Computer Networking: A Top-Down Approach" by James F. Kurose and Keith W.


Ross: This book takes a top-down approach to computer networking, starting with
applications and working down to the lower layers of the network stack.

4
Outline
• Network redundancy and loop
avoidance
• Data security over networks
• Data integrity and confidentiality
over data
networks
• Cryptography concepts
• symmetric key and asymmetric key

5
Network redundancy and loop avoidance

6
Network Redundancy
• Network redundancy is the inclusion of extra or backup network devices
and links to ensure network availability and reliability.
• Purpose:
• To provide fault tolerance.
• To ensure continuous network service in case of device or link failures

7
Types of Network Redundancy
• Link Redundancy:
• Multiple network links between devices.

• Device Redundancy:
• Backup devices such as switches, routers, and
servers.

• Path Redundancy:
• Multiple routes between source and destination.

8
Benefits of Network Redundancy
• Increased Reliability:
• Reduces network downtime.

• Fault Tolerance:
• Allows for continued operation despite
failures.

• Load Balancing:
• Distributes network traffic to prevent
congestion.

9
Challenges with Network Redundancy
• Complexity:
• Increased network complexity and
management.

• Cost:
• Higher initial and maintenance costs.

• Potential for Loops:


• Redundant paths can create network
loops.

10
Network Loops
• A network loop occurs when there are multiple active paths between
network devices.
• Consequences:
• Broadcast storms.
• MAC address table instability.
• Network congestion and downtime

11
L o o p Avoidance Techniques
• Spanning Tree Protocol
(STP):
• Ensures a loop-free topology.

• Rapid Spanning Tree


Protocol (RSTP):
• Faster convergence than
STP.

• Multiple Spanning Tree


Protocol (MSTP):
• Manages multiple
spanning trees for
different VLANs.

12
B e st Practices for Redundancy and L o o p Avoidance

• Network Design:
• Plan for redundancy but avoid unnecessary
complexity.

• Proper Configuration:
• Ensure correct setup of STP/RSTP/MSTP.

• Monitoring and Maintenance:


• Regularly monitor network performance.
• Update firmware and software

13
D a t a security over networks

14
Confidentiality
• Data confidentiality ensures that information is accessible only to those
authorized to access it.
• Purpose:
• To protect sensitive information from unauthorized access.

15
Integrity
• Data integrity refers to the accuracy, consistency, and reliability of
data during its lifecycle.
• Purpose:
• To ensure that data is not altered or tampered with during transmission

16
Availability
• Availability is compromised when the servers storing your data are
offline or when remote access to servers is limited or unavailable.
• Availability guarantees that systems, applications and data are
available to users when
they need them

17
Cryptography concepts
• Cryptography is the practice of securing information by
transforming it into an unreadable format.
• The purpose is to protect data from unauthorized access and
ensure privacy.
• Types of Cryptography
• Symmetric Key Encryption
• Asymmetric Key Encryption

18
Symmetric Ke y Encryption

19
Use of words as keys

•We could use a word as a key: e.g.


A B C D E F G H I J K L M N O P Q R S T U V WX Y Z

w o r d a b c e f g h i j k l m n p q s t u v x y z

•So here: E(A) = w, E(B) = o, ..., E(Z) = z


•Example: SECRET is encrypted to qarpas
•But…
• Why not go a step further and use a totally random
substitution?
• This would require a long (25-character) key
• The number of possible keys would be enormous!
• It would take an enemy ages to check them all brute
force!
A Simple Polyalphabetic Cipher
Plaintext: H E L P
1 2 3 4

Plaintext Alphabet
A B C D E F G H I J K L M N O P Q R S T U V WX Y Z
Ciphertext Alphabet (Odd)
H I J K L M N O P Q R S T U V WX Y Z A B C D E F G
Ciphertext Alphabet (Even)
WX Y Z A B C D E F G H I J K L M N O P Q R S T U V

Ciphertext: O A S L
22
Asymmetric Ke y Encryption

23
24
25
T h a n k You

26

You might also like