PREL Dc1 LessonQ

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

ACLC COLLEGE OF TACLOBAN

Tacloban City

DATA COMMUNICATION AND NETWORKING I

Chapter 1

DEFINITION OF TERMS

NIC

Short for network interface card, the NIC is also referred to as an Ethernet
card and network adapter. A NIC is a computer expansion card for connecting to a network (e.g.,
home network or Internet) using an Ethernet cable with an RJ-45 connector.

Switch

Switch is a hardware device that filters and forwards network packets, but is often not
capable of much more. A network switch is more advanced than a hub, but not as advanced as
a router.

Router

A router is hardware device designed to receive, analyze and move incoming packets to
another network. It may also be used to convert the packets to another network
interface, drop them, and perform other actions relating to a network.

Network Topology

Topology is the physical configuration of a network that determines how the network's
computers are connected. Common configurations include the bus, mesh topology, ring
topology, star topology, tree topology and hybrid topology.
UTP Configuration

UTP stands for Unshielded Twisted Pair cable. UTP cable is a 100 ohm copper cable that
consists of 2 to 1800 unshielded twisted pairs surrounded by an outer jacket. They have no
metallic shield. This makes the cable small in diameter but unprotected against electrical
interference. The twist helps to improve its immunity to electrical noise and EMI.

Straight-through

Straight-through cables get their name from how they are made. Out of the 8 pins that
exist on both ends of an Ethernet cable, each pin connects to the same pin on the opposite side.

Crossover

Crossover cables are very similar to straight-through cables, except that they have pairs
of wires that crisscross. This allows for two devices to communicate at the same time. Unlike
straight-through cables, we use crossover cables to connect like devices.

Crimping Tool

A crimping tool is a device used to conjoin two pieces of metal by deforming one or both
of them in a way that causes them to hold each other. The result of the tool's work is called
a crimp. A good example of crimping is the process of affixing a connector to the end of a cable.
For instance, network cables and phone cables are created using a crimping tool to join the RJ-
45 and RJ-11 connectors to both ends of either phone or Cat 5 cable.

RJ45 Connector

Short for Registered Jack-45, an RJ-45 is an 8-pin connection used for Ethernet network
adapters. This connector resembles the RJ-11 or 6-pin connector used with telephones in the
United States, but they're completely different.
RJ11 Connector

Short for Registered Jack-11, is a telephone interface that uses a cable of twisted wire
pairs and a modular jack with two, four or six contacts. RJ-11 is the common connector for
plugging a telephone into the wall and the handset into the telephone.

TCP/IP

TCP/IP is the basic communication protocol for two or more computers or electronic
devices (e.g mobile phone) to communicate with one another on a network setup. TCP/IP stands
for Transmission Control Protocol/Internet Protocol. TCP/IP defines how electronic devices (like
computers) should be connected to the Internet, and how data should be transmitted between
them. TCP/IP is the major protocol in communication network that communication can do
without.

Inside the TCP/IP standard there are several protocols for handling data communication
these are: TCP (Transmission Control Protocol) communication between applications; UDP (User
Datagram Protocol) simple communication between applications; IP (Internet Protocol)
communication between computers; ICMP (Internet Control Message Protocol) for errors and
statistics; DHCP (Dynamic Host Configuration Protocol) for dynamic addressing; and TCP Uses a
Fixed Connection.

Subnet Mask

A subnet or subnetworking mask is data used for bitwise operations on a network of IP


addresses that is divided into two or more groups. This process, known as subnetting, divides an
IP network into blocks of logical addresses. Subnetting can improve security and help to balance
overall network traffic.

A common example of a subnet mask for class C IP addresses is 255.255.255.0, the


default subnet mask for many computers and network routers. When applied to subnet, a subnet
mask shows the routing prefix.
Gateway

A gateway is a networked device which serves as an entry point into another network.
For example, a wireless router is commonly the default gateway in a home network.

MAC Address

Short for medium access control, or MAC address. Known as a physical


address and hardware address whose number is uniquely formatted in hexadecimal format and
given to each computer or network device on a computer network. The addresses are usually
assigned by the hardware manufacturer, and these ID's are considered burned into
the firmware of the network access hardware. Because of this process, some vendors use specific
formats in the hardware address.

LINUX OS

Linux is the best-known and most-used open source operating system. As an operating
system, Linux is software that sits underneath all of the other software on a computer, receiving
requests from those programs and relaying these requests to the computer’s hardware.
Chapter 2

NETWORK

A network is a combination of hardware and software that sends data from one location
to another. The hardware consists of the physical equipment that carries signals from one point
of the network to another. The software consists of instruction sets that make possible the
services that we expect from a network.

A. Topologies

Bus Topology

The Bus topology consists of a single cable that runs to every work-station. The bus
topology is also known as linear bus. In other words, all the nodes (computers and servers) are
connected to the single cable (called bus), by the help of interface connectors. This central cable
is the back bone of the network and every workstation communicates with the other device
through this bus.

Ring Topology

The ring topology connects computers on a single circle of cable. There are no terminated
ends. A ring topology connects one host to the next and the last host to the first.
The signal travels around the loop in one direction and pass through each computer.
Unlike the passive bus topology, each computer acts like a repeater to boost the signal and send
it on to the next computer. Because the signal passes through each computer, the failure of one
computer can impact the entire network.

Star Topology

In the star topology, computers are connected by cable segments to centralized


component, called a hub or switch. Signals are transmitted from the sending computer through
the hub or switch to all computers on the network. This topology originated in the early days of
computing with computers connected to a centralized mainframe computer. It is now a common
topology in microcomputer networking. Each device has a dedicated point-to-point link only to a
central controller, usually called a hub. The devices are not directly linked to one another.
Mesh Topology

In this type of topology, a host is connected to one or multiple hosts. This topology has
hosts in point-to-point connection with every other host or may also have hosts which are in
point-to-point connection with few
hosts only.

Hybrid Topology

In this type of topology we integrate two or more different topologies to form a resultant
topology which has good points (as well as weaknesses) of all the constituent basic topologies
rather than having characteristics of one specific topology. This combination of topologies is done
according to the requirements of the organization.
B. Categories

Local Area Network

A local area network (LAN) is usually privately owned and links the devices in
a single office, building, or campus. Depending on the needs of an organization and
the type of technology used, a LAN can be as simple as two PCs and a printer in
someone's home office; or it can extend throughout a company and include audio and
video peripherals.

Metropolitan Area Network

A metropolitan area network (MAN) is a network with a size between a LAN


and a WAN. It normally covers the area inside a town or a city. It is designed for
customers who need a high-speed connectivity, normally to the Internet, and have
endpoints spread over a city or part of city.
Wide Area Network

A wide area network (WAN) provides long-distance transmission of data,


image, audio, and video information over large geographic areas that may comprise a
country, a continent, or even the whole world.
Chapter 3

NETWORK MODELS

Internet Model

Today most end users who want Internet connection use the services of Internet service
providers (lSPs). There are international service providers, national service providers, regional
service providers, and local service providers. The Internet today is run by private companies,
not the government.

Terms:

International Internet Service Providers

- international service providers that connect nations together

National Internet Service Providers

- The national Internet service providers are backbone networks created and
maintained by specialized companies. To provide connectivity between the end
users, these backbone networks are connected by complex switching stations
(normally run by a third party) called network access points (NAPs).

Regional Internet Service Providers

- Regional internet service providers or regional ISPs are smaller ISPs that are
connected to one or more national ISPs. They are at the third level of the
hierarchy with a smaller data rate.

Local Internet Service Providers

- Local Internet service providers provide direct service to the end users. The
local ISPs can be connected to regional ISPs or directly to national ISPs. Most
end users are connected to the local ISPs. a local ISP can be a company that
just provides Internet services, a corporation with a network that supplies
services to its own employees, or a nonprofit organization, such as a college
or a university, that runs its own network.

Conceptual View of the Internet

A protocol is a set of rules that govern data communications. A protocol defines what is
communicated, how it is communicated, and when it is communicated. The key elements of a
protocol are syntax, semantics, and timing

Standards are essential in creating and maintaining an open and competitive market for
equipment manufacturers and in guaranteeing national and international interoperability of data
and telecommunications technology and processes. Standards provide guidelines to
manufacturers, vendors, government agencies, and other service providers to ensure the kind of
interconnectivity necessary in today's marketplace and in international communications.

OSI Model

An ISO standard that covers all aspects of network communications is the Open Systems
Interconnection model. It was first introduced in the late 1970s. An open system is a set of
protocols that allows any two different systems to communicate regardless of their underlying
architecture. The purpose of the OSI model is to show how to facilitate communication between
different systems without requiring changes to the logic of the underlying hardware and software,
a model for understanding and designing a network architecture that is flexible, robust, and
interoperable

PHYSICAL LAYER- Transmission of raw data bits over communication lines.

 How a physical circuit is established between communicating devices.

 How the circuit is terminated when no longer needed.

 The physical form (e.g., voltages, frequencies, timing) in which data bits (binary values 0
and 1) are represented.
 Whether transmission of data can take place in one or both directions over the same
physical connection.

 Characteristics of the physical media that carry the signals (e.g., copper wire, optical fiber,
radio waves)

 Characteristics of the connectors used for connecting the physical media.

 How data from a number of sources should be multiplexed before transmission and
demultiplexed upon arrival, and the type of multiplexing technique to be used.

 The type of modulation to be used for transmitting digital data over analog transmission
lines.

 The physical layer defines mechanical, electrical, functional and procedural properties, in
order to establish, hold and tear down a physical connection between Data Terminal
Equipment (DTE) and Data Circuit-Terminating Equipment (DCE).

 The physical layer hides the above details from the higher layers. To the data link layer,
it appears as a logical communication channel which can send a stream of bits from one
point in the network to another.

DATA LINK LAYER -Reliable transfer of data over the communication channel provided by the
physical layer

 breaks the data into data frames,

 transmits the frames sequentially over the channel, and

 checks for transmission errors by requiring the receiving end to send back
acknowledgment frames.

 The data link layer hides the above details from the higher layers. To the network layer,
it appears as a reliable communication channel which can send and receive data packets
as frames

FUNCTIONS:

 Division of Data into frames


 Delimiting Frames by adding special bit patterns to the beginning and end of each
frame. This allows the receiving end to detect where each frame begins and where it
ends.
 Error Detection
Some form of error check is included in the frame header. This is constructed by the
transmitting end based on the contents of the frame, and checked for integrity by the
receiving end. A change in the frame bits can be detected in this way.
 Error Correction
When a frame arrives corrupted or is for any reason lost in the network, it is
retransmitted. Lost acknowledgment frames may result in duplicate frames, which
need to be detected and corrected as well.
 Flow Control
In general, not all communication devices in a network operate at the same speed.
Flow control provides a means of avoiding a slow receiver from being swamped by
data from a fast transmitter.

NETWORK LAYER

The network layer is responsible for the source-to-destination delivery of a packet,


possibly across multiple networks (links). Whereas the data link layer oversees the delivery of the
packet between two systems on the same network (links), the network layer ensures that each
packet gets from its point of origin to its final destination.

If two systems are connected to the same link, there is usually no need for a network
layer. However, if the two systems are attached to different networks (links) with connecting
devices between the networks (links), there is often a need for the network layer to accomplish
source-to-destination delivery.

TRANSPORT LAYER

The transport layer is responsible for process-to-process delivery of the entire message.
A process is an application program running on a host. Whereas the network layer oversees
source-to-destination delivery of individual packets, it does not recognize any relationship
between those packets. It treats each one independently, as though each piece belonged to a
separate message, whether or not it does. The transport layer, on the other hand, ensures that
the whole message arrives intact and in order, overseeing both error control and flow control at
the source-to-destination level.

SESSION LAYER

The services provided by the first three layers (physical, data link, and network) are not
sufficient for some processes. The session layer is the network dialog controller. It establishes,
maintains, and synchronizes the interaction among communicating systems.

PRESENTATION LAYER

The presentation layer is concerned with the syntax and semantics of the information
exchanged between two systems.

FUNCTIONS:

 Translation. The processes (running programs) in two systems are usually


exchanging information in the form of character strings, numbers, and so on.
The information must be changed to bit streams before being transmitted.
Because different computers use different encoding systems, the presentation
layer is responsible for interoperability between these different encoding
methods
 Encryption. To carry sensitive information, a system must be able to ensure
privacy. Encryption means that the sender transforms the original information
to another form and sends the resulting message out over the network.
Decryption reverses the original process to transform the message back to its
original form.
 Compression. Data compression reduces the number of bits contained in the
information. Data compression becomes particularly important in the
transmission of multimedia such as text, audio, and video.

APPLICATION LAYER

The application layer enables the user, whether human or software, to access the network.
It provides user interfaces and support for services such as electronic mail, remote file access
and transfer, shared database management, and other types of distributed information services.

Summary
QUIZ 1

1. Which devices functions like a hub?

2-4. Enumerate and identify at least 3 network topologies

5. In UTP configuration, this is something needs to be reduced to have a better performance

6-7. Differentiate Straight-through and Crossover

8. This is an open-source system commonly used worldwide

9. What makes an RJ45?

10. What is an NIC?

11. Among the topologies, which one is the most efficient to be used in internet cafe?

12-16. Give 5 topologies and compare it

17. How many kilometers does a LAN expands its connection?

18-20. Differentiate network categories

21-30. Explain and reflect the issue regarding the “Cyber Digital Divide”

QUIZ 2

1. What are the two significant illustrations in network?

2. Show the hierarchal structure of an ISP at source to lowest providers

3. What is a NAPs?

4. How significant is the term NAPs?

5. OSI means?

6-10. What are the seven OSI layers?

11-20. Why is Li-Fi technology being pushed through worldwide?


Instructor: JOSIE DEGORIO
IT Department

You might also like