0% found this document useful (0 votes)
20 views31 pages

Data Comms - Lecture Slides

The document provides an overview of computer network topologies, including mesh, star, bus, ring, and hybrid, along with their advantages and disadvantages. It categorizes computer networks by area into Personal Area Network (PAN), Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN), detailing their characteristics. Additionally, it explains communication protocols, focusing on the OSI model and TCP/IP reference suite, highlighting their functions and layers.

Uploaded by

Lawrence
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views31 pages

Data Comms - Lecture Slides

The document provides an overview of computer network topologies, including mesh, star, bus, ring, and hybrid, along with their advantages and disadvantages. It categorizes computer networks by area into Personal Area Network (PAN), Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN), detailing their characteristics. Additionally, it explains communication protocols, focusing on the OSI model and TCP/IP reference suite, highlighting their functions and layers.

Uploaded by

Lawrence
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 31

AIR FORCE INSTITUTE

OF TECHNOLOGY
KADUNA

DATA COMMUNICATION
AND NETWR0KING
ICT 321
Lesson Objectives:
in this lecture you will understand the following:

 Computer network topology:


 Types of topology
 Advantages and disadvantages of each.
 Computer networks categorized by area:
 PAN
 LAN
 MAN
 WAN
 Protocols : OSI MODEL and TCP/IP REFERENCE SUITE.
Computer network topology

 Network Topology refers to the manner in which the links and nodes
of a network are arranged to relate to each other. It consists of nodes
and links. Nodes are the devices while link is the wired medium.
 Types:
 1. mesh topology
 2. star
 3. bus
 4. ring
 5. hybrid
Mesh Network topology
Each device is connected to every other device on the network through a dedicated
point to point link.
No of cables = (n(n-1))/2, for 4 computers, then = (4(4-1))/2= 6 cables

Classwork: now lets calculate for 10 devices…..


Advantages of mesh
1.No data traffic issues.
2.It is very fast.
3. Reliable and robust, failure of one link does not affect the
others.
4.Easy fault detection.
5.Its secure because its point to point.

Disadvantages
1. Wire works can be tedious and costly.
2. Scalability issues
Star topology
Each device is connected to a central device called HUB. hub
acts as a single point of failure in star. When hub fails
connectivity of other devices on the network fails.
Advantages of Star
1. less expensive : i/o ports and links is reduced.
2. Easier to install.
3. Less amount of cable is required.
4. Robust – failure of one link does not shutdown the whole
system.
5. Easy fault detection/ troubleshooting
6. scalability

Disadvantages
1. when Hub goes down everything goes down.
2. Hub requires regular maintenance because it’s the central
system of star topology.
Bus topology
it has a main backbone cable which other devices are connected to.
Advantages
1. easy installation, each cable is connected to a backbone.
2. Less cable required than mesh and ring topology.
3. Less cost
4. Useful in small office.
5. Computers can easily be added or removed without disrupting the whole
system.

Disadvantages.
1. Difficulty in fault detection.
2. When the main cable shuts down network is down.
3. Not scalable :there is a limit of nodes the backbone cable can carry.
Ring topology

Each device is connected with the 2 device on either side of it using


a point to point or dedicated link. Each device has a repeater/token,
if the received data is intended for other devices then the repeater
forwards this data until the intended device receives it
Advantages of Ring
1. Easy to install and manage.
Disadvantages
1. A link failure can fail the entire network as the signal will
not travel forward due to failure.
2. every connection is a point of failure.
3. Data traffic issues, since data is circulating in a ring.
Hybrid topology
A combination of two or more topology is known as hybrid topology.
For example a combination of star and mesh topology is known as
hybrid topology.

Advantages of Hybrid topology


1. We can choose the topology based on the requirement for
example, scalability is our concern then we can further connect other
computer networks with the existing networks with different
topologies

Disadvantages
1. Fault detection is difficult.
2. Installation is difficult.
3. Design is complex so maintenance is high thus
expensive.
COMPUTER NETWORKS
A computer network is a group of computers connected with each other through a
transmission medium.
Transmission medium is the physical path.
It can be guided/wired or unguided.
Example of Guided media are coaxial, twisted pair or fibre optic cable.
While example of unguided media are infrared, radio wave, microwave.

 Computer networks can be categorized into the following:


 Personal Area Network (PAN)
 Local Area network (LAN)
 Metropolitan Area network (MAN)
 Wide Area Network (WAN)
Personal Area Network
Is the smallest network which is very personal to
the user. This may include Bluetooth enabled
device or infrared enabled device.
PAN has connectivity ranging up to 10 meters.
Eg wireless keyboard, wireless mouse, printers,
tv remotes.
LOCAL AREA NETWORK
A computer network spanned inside a building, an organization office,
school, university, hospital, apartment.

 Characteristics
 It is controlled by a single administrative system.
 LAN provides useful ways of sharing resources between end users e.g.
printer, file servers, scanner.
 Lan is secured because there are no outside connections, thus data shared is
safe.
 Lan due to their small size are faster speed ranging from 100mbps – 150
Mbps.
 LANS are not limited to wired connections they can be wireless. (WLAN).
 LANS are composed of inexpensive networking and routing equipment.
 LAN operates under its own local domain and controlled centrally.
 It operates on private IP address does not involve heavy routing.
METROPOLITAN AREA NETWORK
This network covers larger area than LAN.

 Characteristics
 Various LANs can be connected together.
 Service is usually provided by ISP
 Connection of different branches of an organization is possible with
MAN.
 The backbone of MAN is high capacity and high speed fiber optics.
WIDE AREA NETWORK
It covers a wide area which may span across provinces and even countries. It
can provide connectivity between MAN and WAN. The internet is the world
largest WAN.
They are equipped with very high speed backbone.
WAN uses very expensive network equipment.
WAN may be managed by multiple administration.

Advantages
Centralized infrastructure : data can be stored globally.
It can cover a larger are even the whole world. E.g. a video conference
country to country.

Disadvantages
Expensive
Exposure to antivirus and other internet malicious threats. For example, an
infected data may be downloaded unknowingly which can be a threat to our
privacy.
COMMUNICATION PROTOCOLS
they are established set of rules that allows two device
to communicate.
Below is 2 different computers with different O.S
architecture. Without protocol can they communicate?
OSI MODEL
 It was developed by ISO (Internaational Oganization for
Standadization) in 1984.
 Each layer is a package of protocols.
 It has 7 layers (Pls Do Not Throw Sausage Pizza Away)
 Application layer 7
 Presentation 6
 Session 5
 Transport 4
 Network 3
 Datalink 2
 Physical 1
Application layer (7)

 It consists of application layer protocol which allows network


application to work correctly in network.
 This layer does not contain end users application but instead, it
facilitates communication with the lower layers.
 Eg For File transfer FTP(File Transfer Protocol) is used,
 for web surfing HTTP/HTTPS (Hyper Text Transfer Protocol/Hyper Text
Transfer Protocol Secure) is used,
 for Emails SMTP (Simple Mail Transfer Protocol) is used,
 for virtual terminals TELNET(Telecommunication Network) is used.
Presentation Layer (6)
 this layer receives data from application layer (in form of characters and
numbers).
 Then converts those characters and numbers to machine understandable binary
format.(Example: ASCII----101110101).This is called translation.
 Before data is transmitted, the number of bits that are used to represent the
original data is reduced. This is called Data Compression.
 Data compression reduces the amount of space used to store the original file so
that it can be received in destination in very less time.
 To maintain the integrity of data before transmission, Data is encrypted(At
Senders side): Encryption
 and in Receivers side: Data is Decrypted): Decryption
 SSL(Secure Sockets Layer)is used in presentation layer for data encryption and
decryption.
 Thus, Presentation layer performs three functions: 1)Translation 2)Data
Compression 3)Encryption/Decryption
Session layer (5)
 Session layer helps in setting up and managing connections
 by enables sending and receiving of data
 followed by terminations of connections or sessions.
 When 2 devices needs to communicate, session must be created. Eg phone
call.
 NETBIOS (Network Basic Output System) is an example of protocol used which
allows applications on different computer to communicate with eachother.
 before a session/connection is established with a server, Server performs a
function called Authentication(It is the process of verifying : who you
are ?).
 After Authenticating a user, Authorization(It is the process used by server
to determine If you have permission to access or not) is checked. If not then
you will get message "You are not authorized to access this page".
 Session layer also helps in Session Management .
 It does Authentication, Authorization and Session management
Transport layer (4)
 It controls reliability of communication through segmentation, flow control
and error control.
 In segmentation, a big chunk of data is broken down into segments, each data
unit has its own sequence number and port number attached to it.
 In flow control, the amount of data transmitted is balanced.
 For example, server start sending a data at 50mbps but phone can only
download at 10mbps, with the help of flowcontrol, transmission rate is reduced
to 10mbps so as reduce packet loss.
 In Error Control, if some data does not arrive destination, transport layer
resends the missing data.
 It uses two protocols, TCP or UDP.
 TCP –Transmission Control Protocol, UDP –User Datagram Protocol.
 TCP has guarantee/reliable while UDP doesn’t.
 UDP is faster than TCP, because it doesn’t provide feedback.
 TCP is used for file transfer, while UDP is used for voice and video.
Network layer (3)

 Here data segment is broken down into packets.


 Functions: Logical Addressing, Path determination and Routing.
 Logical addressing: every computer has a unique IP address. Network layer assigns IP
to each segment to form Packet.
 It also ensures each data packet arrives at it destination using Routing protocol (eg RIP,
OSPF etc)
Source segmen Destination
IP t IP
 This whole block is a packet.
Data link layer (2)
 It convert packet into frame.
 Physical Addressing is done here.
 By adding physical addressing(mac address) to the logical address
packet received from network layer.
 Each PC on a network has its own Mac Address (12digits) inputed by
the manufacturer on the NIC.

MAC MAC
MAC MAC IP1 IP2 IP1 SEGMENT TAIL
TAIL
1 2 SEGMENT
IP2
1 2
Physical layer (1)
 Physical layer receives binary BIT'S converts into SIGNALS and then
transmit over local media.

At the receiver, Physical Layer receives signal and converts to BIT'S and pass it to Data Link
Layer as a Frame. Frame is further decapsulated as data moves through higher layers.

Finally, data is moved to Application Layer. Application Layer Protocol makes the sender's
message visible in the application in the receiver's computer screen.

 These 7 layers are the one behind the smooth functioning of the internet.
 Although OSI reference MODEL has been succeeded by TCP/IP model, it is
still a primary model used to represent network architecture.
 All networking engineers and network certification still make refrence to it.
OSI and its PDU

OSI Protocol data unit


Application Data

Presentation Data

Session Data

Transport Segment

Network Packets

Datalink Frame

physical Bits
TCP/IP : TRANSMISSION CONTROL
PROTOCOL / INTERNET PROTOCOL

 Developed by the US department of defense in 1980


 Now commonly used.
 Unlike OSI which is 7 layers, TCP/IP has 4 layers.
 They are Application, Transport, Internet and Network layer
 Both OSI and TCP/IP have similar function only difference is the
merging of layers
OSI PROTOCOL DATA
TCP/IP UNIT

7 Application Data
Application
6 Presentation Data

5 Session Data

4 Transport Segment
Transport
3 Network Packets
Internet
2 Datalink Frame
Network
1 physical Access Bits
Summary
today we have learnt about:
 Computer network categorized by arrangement:
 Types of topology
 Advantages and disadvantages of each.
 Computer networks categorized by area:
 PAN
 LAN
 MAN
 WAN
 Protocols : OSI MODEL and TCP/IP REFERENCE SUITE.
THANKS FOR LISTENING….

You might also like