Data Communication Lecture 8
Data Communication Lecture 8
D a t a communication
M r. S a c h i n t h a A s h i k a
C N T 4 0 0 1 - D a t a Communication 1
U n i t Aim
This unit aims to provide the student with a good grounding in data
communications and networking. The unit focuses on breadth of
understanding rather than depth and attempts to cover a varied range of
networking topics by means of an organized high-level approach.
2
Le arning Outcomes
On successful completion of this module, students should be
able to:
3
Reference Materials
• "Data Communications and Networking" by Behrouz A. Forouzan: This
comprehensive textbook covers the fundamentals of data communication and
networking, including protocols, technologies, and applications.
4
Outline
• Network redundancy and loop
avoidance
• Data security over networks
• Data integrity and confidentiality
over data
networks
• Cryptography concepts
• symmetric key and asymmetric key
5
Network redundancy and loop avoidance
6
Network Redundancy
• Network redundancy is the inclusion of extra or backup network devices
and links to ensure network availability and reliability.
• Purpose:
• To provide fault tolerance.
• To ensure continuous network service in case of device or link failures
7
Types of Network Redundancy
• Link Redundancy:
• Multiple network links between devices.
• Device Redundancy:
• Backup devices such as switches, routers, and
servers.
• Path Redundancy:
• Multiple routes between source and destination.
8
Benefits of Network Redundancy
• Increased Reliability:
• Reduces network downtime.
• Fault Tolerance:
• Allows for continued operation despite
failures.
• Load Balancing:
• Distributes network traffic to prevent
congestion.
9
Challenges with Network Redundancy
• Complexity:
• Increased network complexity and
management.
• Cost:
• Higher initial and maintenance costs.
10
Network Loops
• A network loop occurs when there are multiple active paths between
network devices.
• Consequences:
• Broadcast storms.
• MAC address table instability.
• Network congestion and downtime
11
L o o p Avoidance Techniques
• Spanning Tree Protocol
(STP):
• Ensures a loop-free topology.
12
B e st Practices for Redundancy and L o o p Avoidance
• Network Design:
• Plan for redundancy but avoid unnecessary
complexity.
• Proper Configuration:
• Ensure correct setup of STP/RSTP/MSTP.
13
D a t a security over networks
14
Confidentiality
• Data confidentiality ensures that information is accessible only to those
authorized to access it.
• Purpose:
• To protect sensitive information from unauthorized access.
15
Integrity
• Data integrity refers to the accuracy, consistency, and reliability of
data during its lifecycle.
• Purpose:
• To ensure that data is not altered or tampered with during transmission
16
Availability
• Availability is compromised when the servers storing your data are
offline or when remote access to servers is limited or unavailable.
• Availability guarantees that systems, applications and data are
available to users when
they need them
17
Cryptography concepts
• Cryptography is the practice of securing information by
transforming it into an unreadable format.
• The purpose is to protect data from unauthorized access and
ensure privacy.
• Types of Cryptography
• Symmetric Key Encryption
• Asymmetric Key Encryption
18
Symmetric Ke y Encryption
19
Use of words as keys
w o r d a b c e f g h i j k l m n p q s t u v x y z
Plaintext Alphabet
A B C D E F G H I J K L M N O P Q R S T U V WX Y Z
Ciphertext Alphabet (Odd)
H I J K L M N O P Q R S T U V WX Y Z A B C D E F G
Ciphertext Alphabet (Even)
WX Y Z A B C D E F G H I J K L M N O P Q R S T U V
Ciphertext: O A S L
22
Asymmetric Ke y Encryption
23
24
25
T h a n k You
26