Professional Documents
Culture Documents
Computer Networks - Week - 11
Computer Networks - Week - 11
Computer Networks - Week - 11
INTRODUCTION TO
COMPUTER NETWORKS &
DATA COMMUNICATION
Provides a general idea about data communication, networking, protocols and standards.
Purpose of the Physical Layer Describe the purpose and functions of the physical layer in the network.
Purpose of the Data Link Layer Describe the purpose and function of the data link layer in preparing communication for
transmission on specific media.
Topologies Compare the characteristics of media access control methods on WAN and LAN topologies.
Number Systems
06/12/2022 3
Binary Number System
Binary and IPv4 Addresses
• Binary numbering system consists of 1s and 0s, called bits
• Decimal numbering system consists of digits 0 through 9
• Hosts, servers, and network equipment using binary addressing to identify each other.
• Each address is made up of a string of 32 bits, divided into four sections called octets.
• Each octet contains 8 bits (or 1 byte) separated by a dot.
• For ease of use by people, this dotted notation is converted to dotted decimal.
Binary Number System
Binary Positional Notation
• Positional notation means that a digit represents different values depending on the
“position” the digit occupies in the sequence of numbers.
• The decimal positional notation system operates as shown in the tables below.
Result 1,234
Binary Number System
Binary Positional Notation (Cont.)
The binary positional notation system operates as shown in the tables below.
Radix 2 2 2 2 2 2 2 2
Position in Number 7 6 5 4 3 2 1 0
Result 192
Binary Number System
Convert Binary to Decimal
Convert 11000000.10101000.00001011.00001010 to decimal.
Positional Value 128 64 32 16 8 4 2 1
168
Add Them Up… 128 +0 + 32 +0 +8 +0 +0 +0
128 64 32 16 8 4 2 1
1 0 1 0 1 0 0 0
Decimal 168 is written as 10101000 in binary
Binary Number System
IPv4 Addresses
• Routers and computers only understand binary, while humans work in
decimal. It is important for you to gain a thorough understanding of these
two numbering systems and how they are used in networking.
Hexadecimal Number System
Hexadecimal and IPv6 Addresses
• To understand IPv6 addresses,
you must be able to convert
hexadecimal to decimal and
vice versa.
• Hexadecimal is a base sixteen
numbering system, using the
digits 0 through 9 and letters A
to F.
• It is easier to express a value
as a single hexadecimal digit
than as four binary bit.
• Hexadecimal is used to
represent IPv6 addresses and
MAC addresses.
Hexadecimal Number System
Hexadecimal and IPv6 Addresses (Cont.)
• IPv6 addresses are 128 bits in
length. Every 4 bits is
represented by a single
hexadecimal digit. That makes
the IPv6 address a total of 32
hexadecimal values.
• The figure shows the preferred
method of writing out an IPv6
address, with each X
representing four hexadecimal
values.
• Each four hexadecimal
character group is referred to
as a hextet.
Hexadecimal Number System
Decimal to Hexadecimal Conversions
For example, 168 converted into hex using the three-step process.
• 168 in binary is 10101000.
• 10101000 in two groups of four binary digits is 1010 and 1000.
• 1010 is hex A and 1000 is hex 8, so 168 is A8 in hexadecimal.
Hexadecimal Number System
Hexadecimal to Decimal Conversions
• Binary is a base two numbering system that consists of the numbers 0 and 1, called
bits.
• Decimal is a base ten numbering system that consists of the numbers 0 through 9.
• Binary is what hosts, servers, and networking equipment uses to identify each other.
• Hexadecimal is a base sixteen numbering system that consists of the numbers 0
through 9 and the letters A to F.
• Hexadecimal is used to represent IPv6 addresses and MAC addresses.
• IPv6 addresses are 128 bits long, and every 4 bits is represented by a hexadecimal
digit for a total of 32 hexadecimal digits.
• To convert hexadecimal to decimal, you must first convert the hexadecimal to
binary, then convert the binary to decimal.
• To convert decimal to hexadecimal, you must first convert the decimal to binary and
then the binary to hexadecimal.
Networks
Affect Our
Lives
•Communication is almost as
important to us as our reliance on air,
water, food, and shelter. In today’s
world, through the use of networks, we
are connected like never before.
Networking Today
No Boundaries
• World without boundaries
• Global communities
• Human network
Network
Components
Safwan Mawlood
Safwan Mawlood
Safwan Mawlood
06/12/2022 Safwan
Safwan Mawlood Hussein Mawlood 22
Safwan
SafwanMawlood
Mawlood
Data Communication System Components
1. Message. The message is the information (data) to be communicated. Popular forms of information include text,
numbers, pictures, audio, and video.
2. Sender. The sender is the device that sends the data message. It can be a computer, workstation, telephone handset,
video camera, and so on.
3. Receiver. The receiver is the device that receives the message. It can be a computer, workstation, telephone handset,
television, and so on.
4. -Transmission medium. The transmission medium is the physical path by which a message travels from sender to
receiver. Some examples of transmission media include twisted-pair wire, coaxial cable, fiber-optic cable, and radio
Safwan Mawlood
waves.
5. Protocol. A protocol is a set of rules that govern data communications. It represents an agreement between the
communicating devices. Without a protocol, two devices may be connected but not communicating, just as a person
06/12/2022
speaking French cannot be understood by a personSafwan
who Mawlood
speaks Hussein
only Japanese. 23
Safwan Mawlood
Network Components
Host Roles
Every computer on a network is
called a host or end device.
Servers are computers that provide
information to end devices:
• email servers
• web servers
Server Description
• file server
Type
Clients are computers that send Email server runs email server software.
requests to the servers to retrieve Email
Clients use client software to access email.
information:
• web page from a web server Web Web server runs web server software.
email from an email server Clients use browser software to access web pages.
Safwan Mawlood
Advantages Disadvantages
Easy to set up No centralized administration
2- Half-duplex transmission is two-way transmission, but you can transmit in only one
direction at a time. A half-duplex communication link is similar to a walkie-talkie link;
only one computer can transmit at a time.
Safwan Mawlood
Safwan Mawlood
Safwan Mawlood
Safwan Mawlood
Point-to-Point :
Multipoint :
Safwan Mawlood
Mesh topology:
Every device has a dedicated point-to-point link to every other devices
Safwan Mawlood
First, the use of dedicated links guarantees that each connection can carry its own data load, thus
eliminating the traffic problems that can occur when links must be shared by multiple devices.
Second, a mesh topology is robust. If one link becomes unusable, it does not incapacitate the entire
system.
Third, there is the advantage of privacy or security. When every message travels along a dedicated line,
only the intended recipient sees it. Physical boundaries prevent other users from gaining access to
messages.
Finally, point-to-point links make fault identification and fault isolation easy. Traffic can be routed to
avoid links with suspected problems. This facility enables the network manager to discover the precise
location of the fault and aids in finding its cause and solution.
Second, the sheer bulk of the wiring can be greater than the available space (in walls, ceilings, or floors)
can accommodate.
Finally, the hardware required to connect each link (I/O ports and cable) can be prohibitively expensive.
For these reasons a mesh topology is usually implemented in a limited fashion, for example, as a
backbone connecting the main computers of a hybrid network that can include several other topologies.
Star topology:
In a star topology, each device has a dedicated point-to-point link only to a central controller, usually
called a hub. The devices are not directly linked to one another.
Safwan Mawlood
2. each device needs only one link and one I/O port to connect it to any number of others
One big disadvantage of a star topology is the dependency of the whole topology on one single point, the
hub. If the hub goes down, the whole system is dead.
Bus topology:
One long cable acts as a backbone to link all the devices in a network. Nodes are connected to the bus
cable by drop lines and taps. A drop line is a connection running between the device and the main cable.
Safwan Mawlood
1. ease of installation. Backbone cable can be laid along the most efficient path, then
2. In this way, a bus uses less cabling than mesh or star topologies
Disadvantages
1. difficult reconnection and fault isolation. A bus is usually designed to be optimally efficient at installation
3. Limited number of devices Adding new devices may therefore require modification or replacement of the
backbone.
Ring Topology
Ring Topology In a ring topology, each device has a dedicated point-to-point connection with only the
two devices on either side of it. A signal is passed along the ring in one direction, from device to device,
until it reaches its destination. Each device in the ring incorporates a repeater. When a device receives a
signal intended for another device, its repeater regenerates the bits and passes them along
A ring is relatively easy to install and reconfigure. Each device is linked to only its immediate neighbors
(either physically or logically). To add or delete a device requires changing only two connections
The only constraints are media and traffic consider- ations (maximum ring length and number of devices).
In addition, fault isolation is sim- plified. Generally in a ring, a signal is circulating at all times.
LAN WAN
Interconnect end devices in a limited area. Interconnect LANs over wide geographical areas.
Administered by a single organization or Typically administered by one or more service
individual. providers.
Provide high-speed bandwidth to internal Typically provide slower speed links between LANs.
devices.
LAN Advantages:
Workstations can share peripheral devices like printers. This is cheaper than buying
a printer for every workstation.
Users can communicate with each other and transfer data between workstations
very easily.
One copy of each application package such as a word processor, spreadsheet etc.
can be loaded onto the file and shared by all users.
Cost. Individually licensed copies of many popular software programs can be costly.
Networkable versions are available at considerable savings.
Shared programs on a network allows for easier upgrading of the program on one
single file server, instead of upgrading individual workstations.
Speed. Sharing and transferring files within Networks are very rapid. Thus saving
time, while maintaining the integrity of the file.
If server develops a fault, users may not be able to run the application programs.
A fault in the network can cause the user to lose the data.
It is difficult to make the system secure from hackers, novices or industrial
espionage.
Decisions on resource planning tend to become centralized.
Networks that have grown with a little thought can be inefficient in the long term.
Safwan Mawlood
Safwan Mawlood
A wide area network (WAN) provides long-distance transmission of data, image, audio, and video
information over large geographic areas that may comprise a country, a continent, or even the whole
world. A WAN can be as complex as the backbones that connect the Internet or as simple as a dial-up line
that connects a home computer to the Internet.
Safwan Mawlood
Performance
Performance can be measured by so many ways, including transit time and response
time.
Reliability
Network security issues include protecting data from unauthorized access, protecting
data from damage and development, and implementing policies and procedures for
recovery from breaches and data losses.
Safwan Mawlood
Safwan Mawlood
06/12/2022 Safwan Mawlood Hussein 58
Safwan Mawlood
Data Carrying Capacity Safwan Mawlood
Different physical media support the transfer of bits at different speeds. Data transfer can
be measured in 3 ways:
- Bandwidth - Digital bandwidth measures the amount of information that can flow
from one place to another in a given amount of time. (Ideal)
- Throughput - Throughput is the measure of the transfer of bits across the media
over a given period of time. (Actual)
- Goodput - It is the measure of usable data transferred over a given period of time,
and is therefore the measure that is of most interest to network users
Safwan Mawlood
Solution :
We can calculate the propagation time as
Protocol is a set of rules that governs data communications. protocol defines what
is communicated, how it is communicated, and when it is communicated.
Safwan Mawlood
1- Syntax: refers to the structure or format of the data, it is the arrangement of data in
particular order.
2- Semantics:
Semantics refers to the meaning of each section of bits. And indicates the interpretation
of each section in addition what action is to be taken based on that interpretation
Timing refers to two characteristics : when data should be sent and how fast they can be
sent.
Safwan Mawlood
06/12/2022 Safwan Mawlood Hussein 67
Common Types of Networks
The Internet
The internet is a worldwide collection of interconnected
LANs and WANs.
• LANs are connected to each other using WANs.
• WANs may use copper wires, fiber optic cables, and
wireless transmissions.
The internet is not owned by any individual or group. The
following groups were developed to help maintain
structure on the internet:
ICANN- Internet Corporation for Assigned Names
and Numbers, a California non-profit corporation.
IANA - Internet Assigned Numbers Authority (a
traditional name, used here to refer to the technical
team making and publishing the assignments of
Internet protocol technical parameters). The IANA
technical team is now part of ICANN.
IETF - the Internet Engineering Task Force, the
unincorporated association operating under such
name that creates Internet Standards and related
documents.
Internet
Connections
• Video calls are made to anyone, regardless of where they are located.
• Video conferencing is a powerful tool for communicating with others.
• Video is becoming a critical requirement for effective collaboration.
• Cisco TelePresence powers is one way of working where everyone,
everywhere.
Network Trends
Cloud Computing
Cloud computing allows us to store personal files or backup our data on servers over the internet.
Applications can also be accessed using the Cloud.
Allows businesses to deliver to any device anywhere in the world.
Internal Threats:
lost or stolen devices
accidental misuse by
employees
malicious employees
Network Security
Security Solutions
Safwan Mawlood
Safwan Mawlood
Safwan Mawlood
Text: In data communications, text is represented as a bit pattern, a sequence of bits (Os or
1s) Different sets of bit patterns have been designed to represent text symbols. Each set is
called a code, and the process of representing symbols is called coding.
Numbers : In data communications, text is represented as a bit pattern, a sequence of bits
(Os or 1s)
Images :mages are also represented by bit patterns. In its simplest form, an image is
composed of a matrix of pixels (picture elements), where each pixel is a small dot. The size of
the image depends on the resolution.
Audio : Audio refers to the recording or broadcasting of sound or music. Audio is by nature
different from text, numbers, or images. It is continuous, not discrete
Video : Video refers to the recording or broadcasting of a picture or movie. Video can either
be produced as a continuous entity (e.g., by a TV camera), or it can be a combination of
images, each a discrete entity, arranged to convey the idea of motion
Safwan Mawlood
Safwan Mawlood
06/12/2022 Safwan Mawlood Hussein Safwan Mawlood 101
Safwan Mawlood
Data Communication
Data Communication is the exchange of data between two devices via some form of
transmission medium such as a wire cable, For data communications to occur, the
communication devices must be part of a communication system made up of a
combination of hardware( Physical equipment) and software(programs).
Safwan Mawlood
Safwan Mawlood
Safwan Mawlood
Safwan Mawlood
Safwan Mawlood
06/12/2022 Safwan
Safwan Mawlood Hussein Mawlood 103
Safwan
SafwanMawlood
Mawlood
Data Communication System Components
Safwan Mawlood
2- Half-duplex transmission is two-way transmission, but you can transmit in only one
direction at a time. A half-duplex communication link is similar to a walkie-talkie link;
only one computer can transmit at a time.
Safwan Mawlood
Safwan Mawlood
Safwan Mawlood
Safwan Mawlood
• Global communities
• Human network
Point-to-Point :
Multipoint :
Safwan Mawlood
2. Peer-to-Peer network: In this type of network all the computers basically operate
equally, the computer share resources such as file and printers but not special
server exist each peer is a client and a server at the same time.
Advantages Disadvantages
Easy to set up No centralized administration
Performance
Performance can be measured by so many ways, including transit time and response
time.
Reliability
Safwan Mawlood
Safwan Mawlood
Mesh topology:
Every device has a dedicated point-to-point link to every other devices
Safwan Mawlood
Star topology:
In a star topology, each device has a dedicated point-to-point link only to a central
controller
Safwan Mawlood
Bus topology:
Multi point, one long cable acts as a backbone to link all the devices in a network.
Safwan Mawlood
Ring Topology
In a ring topology, each device has a dedicated point-to-point connection only with
the two devices on either side of it. A signal is passed along the ring in one
direction, from device to device.
Safwan Mawlood
1. Centralized computing
All processing takes place in the central computer of (Main Frame)
The terminal is connected to the central computer and functions as I/O device .
2. Distributed Computing
Multiple computer is capable of operating independently
The task is completed locally on various computers
The network enables the computers to exchange data and services but don’t provide
processing assistance.
Safwan Mawlood
Safwan Mawlood
06/12/2022 Safwan Mawlood Hussein 125
Network Classification:
Safwan Mawlood
Workstations can share peripheral devices like printers. This is cheaper than buying
a printer for every workstation.
Users can communicate with each other and transfer data between workstations
very easily.
One copy of each application package such as a word processor, spreadsheet etc.
can be loaded onto the file and shared by all users.
Cost. Individually licensed copies of many popular software programs can be costly.
Networkable versions are available at considerable savings.
Shared programs on a network allows for easier upgrading of the program on one
single file server, instead of upgrading individual workstations.
Speed. Sharing and transferring files within Networks are very rapid. Thus saving
time, while maintaining the integrity of the file.
If server develops a fault, users may not be able to run the application programs.
A fault in the network can cause the user to lose the data.
It is difficult to make the system secure from hackers, novices or industrial
espionage.
Decisions on resource planning tend to become centralized.
Networks that have grown with a little thought can be inefficient in the long term.
Safwan Mawlood
Safwan Mawlood
• Interconnects LAN
• Administrated by multiple service providers
• Provide slower speed links between LANS
Safwan Mawlood
Safwan Mawlood
A Personal Area Network or simply PAN, is smallest network which is very personal to a
user. This may include Bluetooth enabled devices or infra-red enabled devices. PAN
has connectivity range up to 10 meters. PAN may include wireless computer keyboard
and mouse, Bluetooth enabled headphones, wireless printers and TV remotes for
example
Safwan Mawlood
A metropolitan area network (MAN) is a network with a size between a LAN and
WAN. It normally covers the area inside a town or a city. It is designed for
customers who need a high-speed connectivity, normally to the Internet, and have
endpoints spread over a city or part of city.
Safwan Mawlood
Safwan Mawlood
Protocol is a set of rules that governs data communications. protocol defines what
is communicated, how it is communicated, and when it is communicated.
Safwan Mawlood
1- Syntax: refers to the structure or format of the data, it is the arrangement of data in
particular order.
2- Semantics:
Semantics refers to the meaning of each section of bits. And indicates the interpretation
of each section in addition what action is to be taken based on that interpretation
Timing refers to two characteristics : when data should be sent and how fast they can be
sent.
Safwan Mawlood
06/12/2022 Safwan Mawlood Hussein 139
Data Carrying Capacity Safwan Mawlood
Different physical media support the transfer of bits at different speeds. Data transfer can
be measured in 3 ways:
- Bandwidth - Digital bandwidth measures the amount of information that can flow
from one place to another in a given amount of time. (Ideal)
- Throughput - Throughput is the measure of the transfer of bits across the media
over a given period of time. (Actual)
- Goodput - It is the measure of usable data transferred over a given period of time,
and is therefore the measure that is of most interest to network users
Safwan Mawlood
Solution :
We can calculate the propagation time as
Safwan Mawlood
Safwan Mawlood
This layer is concerned with all aspects of transmitting and receiving (bits) on the
network.
Functions:
Conversion of bits into electrical or optical signal
Safwan Mawlood
The primary function of data link layer is divided data is received from network layer
into frames, that can be transmitted by physical layer.
Other functions of data link layer :
Error control and flow control
Retransmit the message in same cases
Add source and destination address(MAC)to the transmitted data
Safwan Mawlood
This layer is responsible for providing physical routine of the data determine best
path between machines. Also this layer responsible for addressing and congestion
control.
Ex.- IP
Safwan Mawlood
This layer is responsible for ensuring that data are transferred from point A to point
B reliably in the correct sequence and with out error, other functions of this layer
are
Ex.- TCP,UDP
This layer establish manage and terminate session between applications, and
manage data exchange between presentation layer entities.
Safwan Mawlood
This layer define data format such as ASCII,Binary,JPEG and encryption. This layer
convert data to be transmitted into standard format in this receiving side its
changed to appropriate format so that it can be utilized by receiving computer
The application layer enables the user, whether human or software, to access the
network.
It provides user interfaces and support for services such as electronic mail, remote
file access and transfer, shared database management, and other types of
distributed information services
Safwan Mawlood
The physical layer in the Internet model, as in the OSI model, is the physical
connection between the sender and receiver. Its role is to transfer a series of
electrical, radio, or light signals through the circuit.
The physical layer includes all the hardware devices (e.g., computers, modems,
and switches) and physical media(e.g., cables and satellites). The physical layer
specifies the type of connection and the electrical signals, radio waves, or light
pulses that pass through it
Guided Media
Unguided Media
This cancellation effect also helps avoid interference from internal sources called
crosstalk.
Crosstalk is the interference caused by the magnetic field around the adjacent pairs of
wires in the cable.
STP uses two pairs of wires that are wrapped in an overall metallic braid or foil.
STP provides better noise protection than UTP cabling, however at a significantly higher
price
Over this insulating material is a woven copper braid, or metallic foil, that acts as the
second wire in the circuit and as a shield for the inner conductor.
Fiber-optic cabling uses either glass or plastic fibers to guide light impulses from source
to destination.
Optical fiber cabling is capable of very large raw data bandwidth rates.
Most current transmission standards have yet to approach the potential bandwidth of
this media.
Optical fibers are thin and have relatively low signal loss, they can be operated at much greater
lengths than copper media,
More expensive (usually) than copper media over the same distance (but for a higher capacity)
Different skills and equipment required to terminate and splice the cable infrastructure