com 414 lecture note HND II
com 414 lecture note HND II
- Definition
- Importance
- Applications
- Components
- Data Representation
- Data Flow
3. Network Models
- OSI Model
- TCP/IP Model
4. Physical Layer
- Transmission Media
- Flow Control
6. Network Layer
- IP Addressing
- Routing Protocols
MIAPOLY Data Communication and Networking HND II CS
- Subnetting
7. Transport Layer
- Port Numbers
8. Application Layer
- WLAN
- Cellular Networks
- Satellite Communication
- Cryptography
- Network Attacks
- Security Protocols
Definition
- Data Communication: The exchange of data between devices via some form of transmission
medium (e.g., wire cable).
- Networking:
Importance
- Facilitates communication
- Resource sharing
- Data sharing
MIAPOLY Data Communication and Networking HND II CS
- Distributed computing
- Internet
- Video Conferencing
- Online Gaming
Components
Data Representation
Data Flow
Simplex is the data transmission mode in which the data can flow only in one direction, i.e.,
the communication is unidirectional. In this mode, a sender can only send data but cannot
receive it. Similarly, a receiver can only receive data but cannot send it.
In this mode, every station can both- receive and transmit data- but not at the very same
moment. When one of the devices sends information, the other one can only then receive it. It
also happens vice versa because the transmission is not unidirectional.
MIAPOLY Data Communication and Networking HND II CS
Full-duplex data transmission means that data can be transmitted in both directions on a
signal carrier at the same time. For example, on a local area network with a technology that
has full-duplex transmission, one workstation can be sending data on the line while another
workstation is receiving data.
3. Network Models
OSI Model
TCP/IP Model
Transmission Media
• Twisted-Pair Cable
Twisted-pair cable consists of pairs of insulated copper wires twisted together. This design
reduces electromagnetic interference and crosstalk between adjacent pairs, making it suitable
for data transmission. There are two main types: Unshielded Twisted Pair (UTP) and
Shielded Twisted Pair (STP). UTP is commonly used in telephone systems and Ethernet
networks, while STP offers additional protection against interference, making it suitable for
industrial environments.
• Coaxial Cable
Coaxial cable features a central conductor, an insulating layer, a metallic shield, and an outer
insulating layer. This construction provides excellent protection against electromagnetic
interference, allowing for high-frequency signal transmission over long distances. Coaxial
cables are widely used in cable television systems, internet connections, and other broadband
communications due to their high bandwidth and durability.
• Fiber-Optic Cable
MIAPOLY Data Communication and Networking HND II CS
Fiber-optic cable transmits data as light pulses through thin strands of glass or plastic fibers.
It offers extremely high bandwidth, low signal attenuation, and immunity to electromagnetic
interference. Fiber-optic cables are ideal for high-speed data transmission over long distances
and are commonly used in telecommunications, internet infrastructure, and advanced
networking applications. They come in two main types: single-mode (for long-distance
communication) and multi-mode (for shorter distances).
• Radio Waves
Radio waves are a type of electromagnetic radiation with wavelengths longer than infrared
light. They are widely used for wireless communication due to their ability to travel long
distances and penetrate through buildings and other obstacles. Applications of radio waves
include AM and FM radio broadcasting, television signals, cell phone communications, and
Wi-Fi networks. They operate at frequencies ranging from about 3 kHz to 300 GHz.
MIAPOLY Data Communication and Networking HND II CS
• Microwaves
Microwaves are a subset of radio waves with shorter wavelengths and higher frequencies,
typically ranging from 1 GHz to 300 GHz. They are used in various communication
technologies, such as satellite links, radar systems, and point-to-point communication links.
Microwaves can transmit large amounts of data over long distances with relatively low
interference, making them suitable for telecommunications and data transmission. They are
also used in microwave ovens for cooking by heating food through dielectric heating.
• Infrared
Infrared (IR) radiation lies between visible light and microwaves on the electromagnetic
spectrum, with wavelengths ranging from about 700 nm to 1 mm. Infrared is commonly used
for short-range communication, such as remote controls for televisions and other electronic
devices, as well as in infrared sensors and security systems. Infrared communication requires
a direct line of sight and is often used in applications where wireless data transfer over short
distances is needed. Additionally, IR is used in fiber-optic communication and thermal
imaging.
MIAPOLY Data Communication and Networking HND II CS
1. Digital Data
Digital data refers to information that is stored and processed in a binary format, using a
series of 0s and 1s (bits). This format allows for efficient data storage, manipulation, and
transmission. Digital data is the foundation of modern computing and telecommunications,
enabling various applications like text, audio, video, and multimedia to be represented and
transmitted in a reliable and standardized manner.
Digital Signals:
MIAPOLY Data Communication and Networking HND II CS
Digital signals are used to represent digital data through discrete levels or states. Unlike
analog signals, which vary continuously, digital signals have a finite number of distinct
values. This makes them more resistant to noise and interference, leading to more reliable
communication.
NRZ encoding is a method of mapping binary data to signal levels without returning to a zero
(neutral) voltage between bits. In NRZ, a binary '1' is represented by one voltage level and a
binary '0' by another. There are two main types:
- NRZ-L (NRZ-Level): The signal level is constant during the bit interval, and
the voltage does not return to zero.
NRZ encoding is simple and efficient but can suffer from synchronization issues when long
sequences of identical bits are transmitted, leading to a lack of transitions that are necessary
for maintaining synchronization.
Manchester Encoding:
This ensures that there is always a transition for each bit, aiding in clock synchronization
between the sender and receiver. Manchester encoding effectively doubles the bandwidth
requirement compared to NRZ because each bit period contains two transitions, but it
provides more reliable data transmission by preventing long sequences without transitions.
Analog transmission involves the transmission of information using continuous signals that
vary in amplitude, frequency, or phase to represent the data. Unlike digital signals, which use
discrete binary values (0s and 1s), analog signals are characterized by continuous waveforms.
Error detection techniques are crucial for ensuring data integrity during transmission. Two
common methods are the Parity Check and Cyclic Redundancy Check (CRC).
Parity Check
MIAPOLY Data Communication and Networking HND II CS
The parity check is a simple error detection method that adds an extra bit, called a parity bit,
to a group of data bits. The parity bit ensures that the total number of 1s in the group
(including the parity bit) is even (even parity) or odd (odd parity).
Even Parity: The parity bit is set so that the total number of 1s in the group is even.
Odd Parity: The parity bit is set so that the total number of 1s in the group is odd.
Parity checks can detect single-bit errors but cannot detect errors where two bits are flipped,
as the parity will remain the same.
The CRC is a more complex and robust error detection method that uses polynomial division
to generate a checksum (CRC code) for a block of data. The transmitter appends this
checksum to the data before transmission. Upon receiving the data, the receiver performs the
same division and compares the result with the transmitted checksum to detect errors.
Flow Control
Basic Operation:
The sender then waits for an acknowledgment (ACK) from the receiver.
Upon receiving the ACK, the sender sends the next frame.
If the sender does not receive an ACK within a specified timeout period, it assumes the frame
was lost or corrupted and retransmits the frame.
Acknowledgment (ACK):
The receiver sends an ACK to the sender to confirm the successful reception of a frame.
If a frame is received with errors, the receiver discards it and does not send an ACK,
prompting the sender to retransmit the frame after the timeout period.
Timeout:
A timeout period is set by the sender. If the ACK is not received within this period, the sender
retransmits the frame.
Efficiency Considerations:
The Stop-and-Wait protocol can lead to inefficient use of the communication channel,
especially over long distances or high-latency networks, due to the idle time while waiting for
ACKs.
The channel utilization is low because only one frame is in transit at any time.
Error Handling:
Lost frames: If a frame is lost, the sender retransmits it after the timeout period.
Lost ACKs: If an ACK is lost, the sender retransmits the frame after the timeout period, and
the receiver must handle duplicate frames correctly.
Channel partitioning techniques allow multiple signals to share the same communication
channel by dividing it into separate sections. Two common methods for channel partitioning
are Time Division Multiplexing (TDM) and Frequency Division Multiplexing (FDM).
TDM divides the channel into time slots, with each slot assigned to a different signal or data
stream. Each signal transmits its data in its assigned time slot, allowing multiple signals to
share the same channel sequentially.
1. Time Slots: The channel is divided into fixed-duration time slots, and each signal is
assigned a specific slot.
2. Synchronous TDM: Each time slot is preassigned to a specific signal, and slots are
allocated whether or not the signal has data to transmit.
3. Asynchronous (or Statistical) TDM: Time slots are dynamically allocated to signals
with data to transmit, improving channel utilization.
4. Synchronization: Both the sender and receiver must be synchronized to ensure data is
correctly interpreted.
Example:
- Suppose four signals (A, B, C, D) share a channel. In TDM, the channel is divided into time
slots, and each signal transmits its data in turn:
- Slot 1: Signal A
- Slot 2: Signal B
- Slot 3: Signal C
- Slot 4: Signal D
FDM divides the channel into different frequency bands, with each band assigned to a
different signal or data stream. Each signal transmits simultaneously in its designated
frequency band, allowing multiple signals to share the channel concurrently.
1. Frequency Bands: The channel is divided into non-overlapping frequency bands, and
each signal is assigned a specific band.
2. Guard Bands: Small frequency gaps (guard bands) are placed between adjacent
frequency bands to prevent interference and crosstalk.
Example:
- Suppose four signals (A, B, C, D) share a channel. In FDM, the channel is divided into
frequency bands, and each signal transmits in its own band:
Comparison:
- TDM:
- Requires synchronization.
- FDM:
Applications:
- TDM:
- Telecommunication systems.
- FDM:
- Cable television.
Both TDM and FDM are fundamental techniques for efficient use of communication
channels, enabling multiple signals to be transmitted over a single channel without
interference.
Random access methods are used in communication networks to manage how multiple
devices share a common communication channel. These methods allow devices to transmit
data whenever they have data to send, with mechanisms to handle potential collisions when
MIAPOLY Data Communication and Networking HND II CS
two or more devices transmit simultaneously. Three common random-access methods are
ALOHA, CSMA/CD, and CSMA/CA.
ALOHA
ALOHA is one of the simplest random-access protocols and was originally developed for
wireless communication in the ALOHAnet project.
Types of ALOHA:
1. Pure ALOHA:
- If a collision occurs (two devices transmit simultaneously), the data is considered lost.
2. Slotted ALOHA:
Efficiency:
CSMA/CD is a protocol used primarily in wired Ethernet networks to manage access to the
communication channel.
1. Carrier Sense: Devices listen to the channel before transmitting to check if it is idle (no
other transmission is occurring).
3. Collision Detection: Devices monitor the channel while transmitting to detect collisions.
4. Collision Handling:
Efficiency:
CSMA/CA is a protocol used primarily in wireless networks (e.g., Wi-Fi) to manage access
to the communication channel.
1. Carrier Sense: Devices listen to the channel before transmitting to check if it is idle.
3. Collision Avoidance:
MIAPOLY Data Communication and Networking HND II CS
- Before transmitting, devices perform a random backoff time even if the channel is idle.
- Devices use a Request to Send (RTS) and Clear to Send (CTS) handshake to reserve the
channel, further reducing the chances of collisions.
4. Acknowledgment:
- After successful transmission, the receiver sends an acknowledgment (ACK) to the sender.
- If no ACK is received, the sender assumes a collision occurred and retransmits after a
random backoff time.
Efficiency:
- CSMA/CA is designed for wireless networks where collision detection is not feasible due to
the nature of radio transmissions. It focuses on avoiding collisions through careful timing
and signalling.
Comparison:
- ALOHA:
CSMA/CD:
- CSMA/CA:
Token Passing: is a network communication protocol where a token, a small data packet, is
passed around the network nodes. This token grants the holder the right to communicate,
ensuring orderly and collision-free data transmission.
Token Ring:
- Structure: In a Token Ring network, all nodes are connected in a circular (ring) topology.
- Operation: A token circulates around the ring, and a node can only send data when it
possesses the token. After sending data, the token is released back into the ring.
- Advantages: Predictable access times and reduced collisions, making it suitable for
timesensitive applications.
- Disadvantages: If any node or the connection fails, it can disrupt the entire network.
Token Bus:
- Structure: In a Token Bus network, nodes are connected in a linear or bus topology.
- Operation: The token is passed in a logical sequence between nodes on the bus, not
necessarily in physical order.
- Advantages:
- Disadvantages:
Both Token Ring and Token Bus protocols ensure orderly communication and reduce data
collisions, making them effective for certain network environments.
6. Network Layer
IP Addressing
IPv4 (Internet Protocol version 4) is the fourth version of the Internet Protocol and is widely
used to identify devices on a network using an addressing system. Here’s a breakdown of its
key features:
32-bit Address
Division: These 32 bits are divided into four octets (8 bits each).
This illustrates how an IP address can be represented in different number systems, useful for
networking and computer science applications.
IPv6 (Internet Protocol version 6) is the most recent version of the Internet Protocol designed
to address the limitations of IPv4, particularly the exhaustion of available IPv4 addresses.
Here’s a detailed look at its key features:
128-bit Address
Division: These 128 bits are divided into eight 16-bit blocks.
Binary Representation: An IPv6 address in binary format would look like a long string of 128
bits.
Routing Protocols
Routing Protocols
MIAPOLY Data Communication and Networking HND II CS
Routing protocols are used to determine the best path for data to travel across a network.
They can be classified based on their operational mechanisms. Here’s an overview of three
major types of routing protocols: Distance Vector, Link State, and Path Vector.
- Mechanism: Uses distance vectors (hops) to determine the best path. Each router sends its
routing table to its immediate neighbors periodically.
- Features:
- RIP Version 2 (RIPv2): Supports subnetting (classless routing) and includes authentication
features.
- Mechanism: Each router has a complete map of the network topology and independently
calculates the shortest path to every destination using the Dijkstra algorithm.
- Features:
- Supports advanced features like authentication, route summarization, and load balancing.
- Mechanism: Uses path vectors and maintains the path information that gets updated
dynamically to ensure loop-free and efficient routing between autonomous systems (ASes).
- Metric: Policy-based metrics such as path length, AS-path, and various path attributes.
- Features:
- BGP-4: The current version used for both IPv4 and IPv6.
- Manages routes using path attributes, which provide flexibility for route selection and
policy enforcement.
Summary
- Distance Vector Protocols: like RIP are simple and suitable for small networks but have
limitations in scalability and hop count.
- Link State Protocols: like OSPF provide a detailed network map, allowing for efficient and
scalable routing in large and complex networks.
MIAPOLY Data Communication and Networking HND II CS
- Path Vector Protocols: like BGP are essential for inter-domain routing on the global
Internet, offering robust policy-based routing capabilities.
Subnetting
Subnetting
Subnetting is a technique used in network design to divide a larger network into smaller,
more manageable sub-networks, or subnets. This helps in efficient IP address allocation,
improved security, and better network performance.
Subnet Mask
Purpose: The subnet mask is used to separate an IP address into the network and host
portions.
Structure: It is a 32-bit number that masks an IP address and divides it into network and host
addresses.
Binary and Decimal Format: Each bit of the subnet mask can be either a 1 (network part) or a
0 (host part). It is usually represented in dotted decimal format.
Example:
IP Address: 192.168.1.10
Host Part: 10
MIAPOLY Data Communication and Networking HND II CS
Purpose: CIDR is a method for allocating IP addresses and IP routing that replaces the old
system based on classes (A, B, C) with a more flexible and efficient system.
Notation: CIDR uses a notation that combines the IP address with the number of bits used for
the network part (prefix length).
Prefix Length: Indicates how many bits are used for the network portion of the address. In
this case, /24 means the first 24 bits are the network part, leaving the remaining 8 bits for host
addresses.
Benefits:
Example Breakdown
Binary: 11111111.11111111.11111111.00000000
CIDR Notation
Prefix Length: /24 indicates that the first 24 bits are the network portion.
7. Transport Layer
8. Application Layer
Protocols
WLAN
Cellular Networks
- Generations: 1G to 5G.
Satellite Communication
Cryptography
Network Attacks
Phishing: This involves fraudulent attempts to obtain sensitive information (like passwords,
credit card details) by disguising as a trustworthy entity in electronic communication.
DoS (Denial of Service): Attackers flood a network or server with traffic, overwhelming its
capacity and making it unavailable to users.
DDoS (Distributed Denial of Service): Similar to DoS but conducted from multiple sources,
making it harder to mitigate. Botnets are often used to orchestrate such attacks.
Firewalls: These filter incoming and outgoing network traffic based on predetermined
security rules, helping to prevent unauthorized access.
Intrusion Detection Systems (IDS): IDS monitors network traffic for suspicious activity or
policy violations and alerts administrators when potential threats are detected.
These techniques, along with others like encryption, strong authentication, and regular
security audits, form a comprehensive approach to securing networks against various types of
attacks.
Security Protocols
Purpose: TLS and its predecessor SSL are cryptographic protocols designed to provide
secure communication over a computer network.
Usage: They are commonly used to secure web browsers' communication with websites
(HTTPS), email transmission (SMTPS, IMAPS), and other applications requiring data
confidentiality and integrity.
Features: TLS/SSL ensure that data transmitted over the network is encrypted, preventing
eavesdropping and tampering.
MIAPOLY Data Communication and Networking HND II CS
Purpose: IPsec is a suite of protocols that authenticate and encrypt IP packets to ensure the
confidentiality, integrity, and authenticity of data transmitted over an IP network.
Usage: It is often used in Virtual Private Networks (VPNs) to create secure tunnels between
devices or networks over the Internet or other insecure networks.
Features: IPsec can operate in two main modes: Transport mode, which encrypts only the
data portion of each packet, and Tunnel mode, which encrypts the entire IP packet.
These protocols are fundamental in ensuring secure communication and data protection
across networks, each serving specific purposes and offering robust security mechanisms
against various threats.