0% found this document useful (0 votes)
20 views42 pages

Chapter 1

The document provides an overview of data communication and computer networks, defining data communication as the transfer of data between devices and discussing various types of data transmission (simplex, half-duplex, full-duplex). It explains the uses and advantages of computer networks, including resource sharing and communication methods, while also addressing potential disadvantages such as security risks and maintenance costs. Additionally, the document categorizes networks by geographical span (LAN, MAN, WAN) and architecture (peer-to-peer, client/server), and outlines the hardware and software components essential for network functionality.

Uploaded by

Tsegaye Eshetu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views42 pages

Chapter 1

The document provides an overview of data communication and computer networks, defining data communication as the transfer of data between devices and discussing various types of data transmission (simplex, half-duplex, full-duplex). It explains the uses and advantages of computer networks, including resource sharing and communication methods, while also addressing potential disadvantages such as security risks and maintenance costs. Additionally, the document categorizes networks by geographical span (LAN, MAN, WAN) and architecture (peer-to-peer, client/server), and outlines the hardware and software components essential for network functionality.

Uploaded by

Tsegaye Eshetu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 42

CHAPTER 1

Data Communication and Computer


Networks

1
What is data communication?

Data communication is the process of transferring data from


one place to another or between two locations.
It allows electronic and digital data to move between two
networks, no matter where the two are located geographically,
what the data contains, or what format they are in.
A common example of data communication is connecting your
laptop to a Wi-Fi network. This action requires a wireless
medium to send and receive data from remote servers.

2
Cont…
Communication: sharing information. Sharing can be local
(face to face) or remote (over distance)
telecommunication (tele: far) means communication at a
distance (telephone, television, telegraphy).
data refers to information presented in whatever form is agreed
upon by the parties creating and using the data.
Data communications are the exchange of data between two
devices via some form of transmission medium such as a wire
cable.
Communicating devices : made up of : H.W( physical
equipments )and S.W
3
Uses of computer network
Computer networks enhance how users communicate with each other by
using various electronic methods like email, instant messaging, online chat,
voice and video calls, and video conferencing
Networks also enable the sharing of computing resources

 Distributed computing leverages resources from multiple computers across


a network to perform tasks collaboratively.
allow for the sharing of files and information, giving authorized users
access to data stored on other computers.

4
The type of data transmission demonstrates the direction in which the data
moves between the sender and receiver.

1.Simplex data transmission: Data is sent from sender to receiver


• It is one-way communication or we can say that unidirectional communication in which
one device only receives and another device only sends data and devices uses their
entire capacity in transmission.

For example, IoT, entering data using a keyboard, listing music using a speaker, etc

2.Half-duplex data transmission: Data can transmit both ways, but not
simultaneously
• It is a two-way communication, or we can say that it is a bidirectional communication in
which both the devices can send and receive data but not at the same time. When one
device is sending data then another device is only receiving and vice-versa.

For example, walkie-talkie. 5


Cont…
3.Full-duplex data transmission: Data can transmit both ways
at the same time

• It is a two-way communication or we can say that it is a


bidirectional communication in which both the devices can
send and receive data at the same time. For example, mobile
phones, landlines, etc.

6
Computer Networks
A network is a set of devices connected by communication links. A
network is simply two or more computers that are linked together. A
node can be a computer, printer, or any other device capable of
sending and receiving data generated by other nodes on the network
A node can be a computer, printer, or any other device capable of
sending and/or receiving data generated by other nodes on the
network.

7
Network Applications
They provide numerous advantages:

• Resource sharing such as printers and storage devices


• Exchange of information by means of e-mails and FTP
• Information sharing by using Web or Internet
• Interaction with other users using dynamic web pages
• Video conferences
• Parallel computing
• Instant messaging
8
Network Criteria

A network must meet the following network criteria:


• Performance – It is measured by transit time and response
time also depends on users, medium, hardware, and software.

• Reliability – reliability is measured by the frequency of


failure.

• Security – Security protects data from unauthorized access.

9
Types of Computer networks

Networks can be classified into several types based on

• Geographical span -LAN, MAN and WAN

• Administration -Private network & public network

• Architecture-Client/Server & peer-to-peer

• A private network is used inside an organization.

10
Types of Network- Geographical Span

1.LAN (Local Area Network)


• Local Area Network is generally privately owned that links the
devices in a single office, building, or campus.

• Its size is limited to a few kilometers.

• It is designed to allow resources to be shared between personal


computers or workstations.

• In general a given LAN will use only one type of


transmission medium. The most common LAN topologies are

bus, ring, and star.. 11


Uses of LAN

• Resource Sharing: A Local Area Network allows devices such as computers,


printers, and storage devices, to share resources and access them from any device
that is connected to the network.

• Data Exchange: A Local Area Network provides a high-speed communication


channel for the exchange of data between different devices on the network.

• Internet Access: A Local Area Network provide internet access to all devices that is
connected to the same network.

• Gaming: A Local Area Network allows multiple users to play multiplayer games
over the network.

• File Sharing: A Local Area Network enables the sharing of files and documents
between multiple devices on the same network.

• Backup and Recovery: A Local Area network can provide backup and recovery
12
2.MAN(Metropolitan Area Network)
• A metropolitan area network (MAN) is a network with a size
between a LAN and a WAN.

• A company can use MAN to connect the LANs in all its offices
throughout a city.

• It normally covers the area inside a town or a city.

• MAN-is A network that is larger than a LAN and connects


clients and servers from multiple buildings.

• Because of the distance it covers, a MAN may use different


transmission technology and media than a LAN.
13
Uses of MAN

• Some common uses of a MAN are:

• Data and resource sharing among different locations in a city or


metropolitan area.

• It is used to connect different LAN in a city or metropolitan area.

• It is used to delivering broadband services such as internet access,


telephony and video conferencing.

• Providing centralized data processing and storage facilities.

• Supporting real-time data and video applications.

• It is used to connect remote offices to the main corporate network.


14
WAN(Wide Area Network)

• A wide area network (WAN) provides long-distance


transmission of data, image, audio, and video information
over large geographic areas that may comprise a country,
a continent, or even the whole world.

• The largest and most varied WAN in the world is the


Internet.
• It is used to connects all the company’s computers and devices,
allowing them to share information and resources .
15
Uses of WAN

• It is used to connect remote locations, such as branch offices and


telecommuters, to the main office or headquarters.

• It is used to sharing the resources such as printers and servers among


multiple locations.

• It is used to facilitating, communication and collaboration between


employees, customers and partners of the company.

• It is used to providing remote access to business applications and data..

• It is used to delivering internet access, VPN (Virtual Private Network)


services and other managed network services.

• Enabling the transfer of large data files and multimedia content.


16
Types of Network-Architecture

• Computers can be positioned on a network in different ways relative


to each other.

• They can have different levels of control over shared resources.

• They can also be made to communicate and share resources according


to different schemes.

• The following sections describe two fundamental network models:

• peer-to-peer and client/server.

17
Peer-to-Peer
In a peer-to-peer network:-

• There are no dedicated servers.

• There is no hierarchy among the computers.

• All the computers are equal and therefore are known as peers.

• Each computer functions as both a client and a server.

• There is no administrator responsible for the entire network.

• The user at each computer determines what data on that


computer is shared on the network.

18
Peer-to-Peer Networks
• The simplest form of a network is a peer-to-peer network.

• In a peer-to-peer network, every computer can communicate


directly with every other computer.

• By default, no computer on a peer-to-peer network has more


authority than another.

• However, each computer can be configured to share only some


of its resources and prevent access to other resources.

• Every computer is capable of sending and receiving


information to and from every other computer.
19
Peer-to-Peer Networks

20
Client/Server Networks

• A network that uses a server to enable clients to share data, data storage
space, and devices is known as a client/server network.

• Client—A computer on the network that requests resources or services


from another computer on a network.

• Clients usually take the form of personal computers, also known as


workstations.

• Every computer on a client/server network acts as a client or a server.

• Clients on a client/server network do not share their resources directly


with each other, but rather use the server as an intermediary.
21
Cont….
• Clients and servers communicate through connectivity devices such

as switches or routers.

• Server—A computer on the network that manages shared

resources; servers usually have more processing power, memory,

and hard disk space than clients.

• To function as a server, a computer must be running an NOS

(network operating system).

• An NOS is a special type of software designed to do the following:


• Manage data and other resources for a number of clients.
22


• Restrict when and from where users can access the network.
• Dictate which rules computers will use to communicate.
• Supply applications to clients.

• Examples of NOS: UNIX and Linux, Microsoft Windows


Server 2003 or Server 2008, and Mac OS X Server.

• (But, stand-alone computer, or a client computer, uses an


operating system, such as Windows XP/7 or Windows
Vista(Windows Vista is a major release of the Windows NT operating

system developed by Microsoft), which has more limited resource


management capabilities.)
23
Client/Server Networks

24
Client/Server
• In an environment with more than 10 users, a peer-to-peer will
probably not be adequate.

• Therefore, most networks have/required dedicated servers.

• A dedicated server is one that functions only as a server and is


not used as a client or workstation.

• Client requests the server to serve the requests.

Specialized Servers

• Some of the examples of different types of servers included on


many large networks.
25
Specialized Servers
1-File Servers :File servers offer services that allow network users to share files.

2- Print Servers :Allow users to share printers.Allow multiple and simultaneous


access to printing facilities.

3- Database Servers :Database server can provide a network with powerful


database services.

4 -Application Servers :Servers store vast amounts of data that is organized to


make it easy to retrieve.

• An application server differs from a file server in that with file server the
data or file is downloaded to the computer which making the request.

• With an application server, the database /file stays on the server and only the
results of a request are downloaded to the computer which making the request.26
Specialized Servers
5-Mail Servers

• Mail servers - separate server and client applications.

• Data selectively downloaded from the server to the client.

6-Web Servers :Stores different web pages.

7- Proxy Server : implements Internet connectivity and


network security for an entire organization.

27
28
Advantage of network
• Information Sharing – Authorized users can use computers on the network to
access and share data. Use in group projects for share data among all the team
members.

• Hardware Sharing – Devices that are connected to the network can be shared
between multiple users. For example one printer that is connected to the network
are shared between multiple users.

• Software Sharing – If many users want to use a single paid software then Instead
of purchasing and installing that software on each computer , it can be installed on
the server. And all the users can able to use that software from that location.

• Collaborative Environment – It provide common environment for all the users


where all .
29
Disadvantage of network
• Security Risks: Networks can be effected by cyber-attacks, unauthorized access,
and data leakage.

• Cost: Maintaining a network can be expensive. Because hardware (like routers,


switches, and cables) and software (like security and management tools) that is used
in network communication are vary expensive.

• Performance Issues: Network performance can be affected by high traffic, and


slow data transfer speeds.

• Privacy : With increased data sharing over networks, there are high chance to
protect data . Users personal information may be stolen by someone if any
protection algorithm is not applied.

• Maintenance: Regular maintenance is required to ensure network reliability and


performance. This includes software updates, hardware replacements, which can be
time-consuming and costly. 30
Hardware component of Network
• Network hardware is defined as a set of physical or network devices
that are essential for interaction and communication between
hardware units operational on a computer network

1. NIC(Network Interface Card):is a network adapter used to

connect the computer to the network. It is installed in the computer to


establish a LAN. It has a unique ID that is written on the chip, and it
has a connector to connect the cable to it. The cable acts as an
interface between the computer and the router or modem.

31
Types of NIC

• Wired NIC: Cables and Connectors use Wired NIC to transfer


data.

• Wireless NIC: These connect to a wireless network such as Wifi,


Bluetooth, etc

2. HUB: is a multi-port repeater

3. Router: is a device like a switch that routes data packets based


on their IP addresses. The router is mainly a Network Layer device

4. Modem: is a short form of Modulator/Demodulator

5. Switch 32
33
34
Software Components of Network
Network Software is mainly focused on reducing design issues like
managing, improving, or deploying a network.
It helps network administrators to manage a network and prevents
unauthorized access and various cyber-attacks, as by using network
software one can restrict access to the network.
• The two major software used in computer networks are the Operating
system and the Protocol suite.
• Here the function of the Operating system is to support the network. For example,
Windows, Mac, and Linux OS can easily connect to a network. One can use the OS to
make the system a server.
• Protocol suite consists of layers and each layer is working according to different
protocols. Here, protocol is a set of rules upon which communication devices agree
35 to
The software components of a network include:
Application layer: refers to the applications and services running
on the network.
Control layer: lies at the center of the architecture and defines
network topology and traffic routing.
Infrastructure layer: physically handles network traffic based on
the configuration at the control level.
Operating system: software required for installing computer
networks.
Protocols: software required for installing computer networks.
36
PROTOCOLS

• A protocol is consists of a set of rules that govern data


communications. It determines what is communicated, how it is
communicated and when it is communicated. The key elements
of a protocol are syntax, semantics and timing.
• It permits connected devices to communicate with each other, irrespective
of internal and structural differences.

• The protocols can be broadly classified into three major


categories:
1.Network Communication
2.Network Management
3.Network Security 37
Network Communication

• These protocols formally set out the rules and formats through
which data is transferred.

• These protocols handle syntax, semantics, error detection,


synchronization, and authentication. Some of them are

1. Hypertext Transfer Protocol(HTTP)


It is a layer 7 protocol that is designed for transferring a hypertext
between two or more systems.
HTTP works on a client-server model, most of the data sharing over the
web is done through using HTTP.
38
2.Transmission Control Protocol(TCP)

It is a connection-oriented protocol i.e., it establishes a connection


between applications before sending any data. It is used for
communicating over a network. It has many applications such as emails,
FTP, streaming media, etc.
3. User Datagram Protocol(UDP)

It is used when we want faster transmission, for


multicasting and broadcasting connections, etc.
It is a connectionless protocol

4.Internet Protocol(IP)
It is a protocol through which data is sent from one host to another over
the internet. It is used for addressing and routing data packets so that they
can reach their destination. 39
Network Management
These protocols assist in describing the procedures and policies that are
used in monitoring, maintaining, and managing the computer network.
Network management protocols can also be used for troubleshooting
connections between a host and a client.

1. Internet Control Message Protocol(ICMP)


is used for reporting congestions, network errors, diagnostic purposes,
and timeouts.
2. File Transfer Protocol(FTP)

FTP is a Client/server protocol that is used for moving files to or from a


host computer, it allows users to download files, programs, web pages,
and other things that are available on other services. 40
Network Security
These protocols make sure that no unauthorized devices, users, or services can
access the network data. Primarily, these protocols depend on encryption to secure
data.

1. Secure Socket Layer(SSL)


All the data transferred through SSL is encrypted thus stopping any unauthorized
person from accessing it.
It is a network security protocol mainly used for protecting sensitive data and
securing internet connections

2. Transport Layer Security(TLS)


It is generally used for encrypted communication between servers and web apps,
like a web browser loading a website, it can also be used for encryption of
messages, emails. 41
42

You might also like