Week9 (1)
Week9 (1)
and Communication
Technologies
GE100
S A I M A YA S M E E N
Lecture # 9
Computer
Networks
1. Transmission Media
Transmission media is the pathway through which data is transmitted
between devices in a network. It can be wired (physical cables) or
wireless (using signals through the air).
Types of
Transmission Media:
1. Guided Media (Wired):
◦ Physical cables that guide data signals.
◦ Example: Ethernet cables used in LANs.
Advantages:
◦ Simple and inexpensive.
◦ Suitable for small networks.
Limitations:
◦ Does not differentiate between devices, leading to unnecessary traffic (data collisions).
◦ Slower compared to more advanced devices like switches.
Advantages:
◦ More efficient and faster than a hub.
◦ Improves network performance by avoiding data collisions.
Usage: Commonly used in Local Area Networks (LANs) in offices and schools.
Example: Connecting multiple computers in an office to share resources like
printers and internet.
Network Devices and
Their Functions
3. Router
Definition: A device that connects different networks and directs data packets based on
their IP addresses.
Function:
◦ Acts as a gateway between a local network (e.g., home or office) and external networks (e.g.,
the internet).
◦ Determines the best path for data packets to reach their destination.
◦ Assigns local IP addresses to devices within a network.
Advantages:
◦ Enables communication between different networks.
◦ Provides internet connectivity.
Usage: Found in homes, businesses, and data centers for internet access and network
management.
Example: A Wi-Fi router that connects your home devices to the internet.
Network Devices and
Their Functions
4. Modem
Definition: A device that converts digital signals from your computer into analog
signals for transmission over telephone lines or cable and vice versa.
Function:
◦ Facilitates internet access by connecting to an Internet Service Provider (ISP).
◦ Works as a bridge between the local network and the ISP.
Types:
◦ DSL Modem (uses telephone lines).
◦ Cable Modem (uses coaxial cable).
Advantages:
◦ Provides internet access to devices in a network.
◦ Converts signals seamlessly for communication with ISPs.
Advantages:
◦ Enables mobile devices to access the network without physical connections.
◦ Expands the range of a network.
Usage: Used in offices, schools, and public places (e.g., cafes) to provide Wi-Fi.
Example: A Wi-Fi router often includes an access point for wireless connectivity.
Network Devices and
Their Functions
6. Repeater
Definition: A device that boosts or amplifies weak signals in a network to
extend the coverage area.
Function:
◦ Receives a weak signal, amplifies it, and retransmits it.
◦ Extends the range of both wired and wireless networks.
Advantages:
◦ Prevents signal degradation over long distances.
◦ Useful for large buildings or outdoor networks.
Advantages:
◦ Enhances network security.
◦ Protects sensitive data and resources.
Types:
◦ Hardware Firewall: A physical device installed between the network and the internet.
◦ Software Firewall: Installed on individual computers.
Advantages:
◦ Makes interoperability between networks possible.
◦ Allows seamless communication between incompatible systems.
Advantages:
◦ Allows any device with a NIC to connect to a network.
◦ Supports both wired and wireless connectivity.
Usage: Found in computers, laptops, and other devices that need network
access.
Example: A Wi-Fi card in a laptop enables it to connect to a wireless network.
2. Network Protocols
A network protocol is a set of rules that devices follow to communicate
and exchange data on a network.
2. Network Protocols
•HTTP is a protocol used to transfer data, like text, images, videos, or files,
between a web browser (client) and a web server.
How it Works:
1.When you enter a URL (e.g., www.google.com), your browser sends an HTTP
request to the web server hosting that page.
2.The server processes the request and responds with the requested data
(e.g., an HTML page).
Usage:
•Loading websites.
•Accessing web-based applications.
2. Network Protocols
2. FTP (File Transfer Protocol)
Definition:
FTP is a protocol used to transfer files between a client (your computer) and a server.
How it Works:
A connection is established between the client and server.
The user can upload files to the server or download files from it.
Usage:
Uploading website files to a hosting server.
Downloading large files, such as software or backups.
Example:
A web developer uploads a new website design to a server using FTP.
Security Note:
FTP transfers data in plain text, making it less secure. For sensitive files, secure
versions like SFTP or FTPS are recommended.
2. Network Protocols
3. TCP (Transmission Control Protocol)
Definition:
TCP is a reliable protocol that ensures all data sent between devices arrives correctly
and in order.
How it Works:
Before sending data, TCP establishes a connection between the sender and receiver
(known as a three-way handshake).
Data is split into packets and sent to the receiver.
The receiver ensures all packets are received and reassembled in the correct order.
Usage:
Web browsing, file downloads, and email where reliability is crucial.
Example:
When downloading a document, TCP ensures the entire file is received without
corruption.
2. Network Protocols
4. UDP (User Datagram Protocol)
Definition:
UDP is a fast, lightweight protocol that sends data without guaranteeing delivery or
order.
How it Works:
Data packets are sent directly to the receiver without establishing a connection.
The receiver processes packets as they arrive, even if some are lost or out of order.
Usage:
Online gaming, video streaming, and voice calls where speed is more important than
reliability.
Example:
Watching a live football match online uses UDP to deliver real-time video with minimal
delay.
2. Network Protocols
5. IP (Internet Protocol)
•IP is responsible for addressing and routing data packets so they
can travel across networks and reach the correct destination.
How it Works:
1.Each device on a network has a unique IP address (e.g.,
192.168.1.1).
2.Data packets are labeled with the sender's and receiver's IP
addresses.
3.Routers forward these packets to the correct destination based
on the IP addresses.
Usage:
•Ensures that your messages, files, or requests reach the correct
device.
Example:
•When sending an email, IP ensures the message is routed to the
correct mail server.
Mailing Protocols
1. SMTP (Simple Mail Transfer Protocol)
Purpose: Used to send emails from a client to a server or between servers.
Working: SMTP works by transferring email messages from the sender’s email
client to the email server or between servers. It operates on port 25 or 587
(for secure transmission). SMTP only handles the sending of messages, not
receiving or storing them.
Usage:
◦ To send emails.
◦ Email clients (like Outlook, Thunderbird) or webmail interfaces (like Gmail) use
SMTP to send email to the mail server.
Example:
◦ A user sends an email from their Gmail account. SMTP is used to transfer that email
to the Gmail server and then to the recipient’s mail server.
Mailing Protocols
2. POP3 (Post Office Protocol version 3)
Purpose: Used by email clients to retrieve emails from a mail server.
Working: POP3 downloads emails from the server to the client’s local
system and removes the email from the server. This means the emails are
no longer accessible from other devices unless configured to leave copies
on the server.
Usage:
◦ When you want to download emails to your device and don’t need to keep
them on the server for future access.
Example:
◦ A user uses an email client (e.g., Microsoft Outlook) to check their emails. POP3
connects to the server, retrieves the emails, and deletes them from the server.
Mailing Protocols
3. IMAP (Internet Message Access Protocol)
Purpose: Allows email clients to retrieve and manage messages from the mail
server without downloading them. It keeps emails on the server and
synchronizes them across multiple devices.
Working: IMAP works by allowing the client to access and manage emails on
the server without removing them from the server. IMAP supports folders,
message flags, and synchronization across devices.
Usage:
◦ Preferred when accessing email from multiple devices (e.g., phone, tablet, and
computer).
Example:
◦ A user checks their email using their phone. IMAP allows the same email to appear
on the phone, laptop, and tablet, keeping all emails synchronized across devices.
Mailing Protocols
4. MIME (Multipurpose Internet Mail Extensions)
Purpose: Not a standalone protocol but an extension of the SMTP
protocol. It allows emails to carry multimedia content (such as images,
audio, video) and non-ASCII text.
Working: MIME defines how emails can carry not just plain text but also
attachments, HTML content, images, and videos by encoding them in a
way that can be transmitted over the internet.
Usage:
◦ To send emails with attachments, images, HTML, or multimedia.
Example:
◦ A user sends an email with a PDF attachment and an inline image. MIME
ensures the email is formatted to support these attachments.
When to Use Which Protocol:
SMTP: Use for sending email.
POP3: Use when you want to download emails and remove
them from the server (single device access).
IMAP: Use when you want to synchronize emails across
multiple devices.
MIME: Use when you need to send rich email content
(attachments, images, multimedia).