Data Communication A/L ICT PDF
Document Details
Uploaded by AffableStrait7229
Tags
Related
- Data Communication and Computer Networks (20ITT301) Syllabus PDF
- Chapter One Data Communication and Computer Networking Basics PDF
- Chapter One: Data Communication and Computer Networking Basics PDF
- CS461 Data Communications and Computer Networks PDF
- ICT (A/L) Unit 6 - Data Communication and Computer Networking PDF
- Introduction to ICT - PDF
Summary
This document provides an introduction to data communication and computer networking. It covers topics such as signals, transmission media, and network topologies. Suitable for a university level ICT course.
Full Transcript
Data Communication A/L ICT –Lesson 06 Computer networking refers to interconnected computing devices that can exchange data and share resources with each other. These networked devices use a system of rules, called communications protocols, to transmit informat...
Data Communication A/L ICT –Lesson 06 Computer networking refers to interconnected computing devices that can exchange data and share resources with each other. These networked devices use a system of rules, called communications protocols, to transmit information over physical or wireless technologies. Data Communication Introduction to data communication Data communication is the process of transmitting data between two or more communicating devices over some transmission media. Establishing such connections between computing devices is called computer networking. Components of a Data Communication 1. Message - Message is the information to be communicated by the sender to the receiver. 2. Sender (Transmitter,Source) - The sender is any device that is capable of sending the data (message). 3. Receiver (Destination) - The receiver is a device that the sender wants to communicate the data (message). 4. Communication Medium (Transmission System) - It is the path by which the message travels from sender to receiver. 5. Protocol - a communication network protocol defines the order and the format of data when the data is exchanged between two networking devices. The protocol defines the rules, syntax, semantics and synchronization of communication and possible error recovery methods. Computer Network: A computer network consists of two or more computers that are linked together using a communication medium in order to share resources. 2 Signals A signal is an electronic voltage or current, which varies with time. It is used to transfer data from one end to another. Analog signal: Analog signals are in continuous wave form in nature and represented by continuous electromagnetic waves. Examples of such signals are sound, light and temperature etc. Digital signal: Digital stands for discrete values and hence it means that they use specific values to represent any information. In digital signal, only two values are used to represent something i-e: 1 and 0 (binary values). Properties of signals Amplitude : The height of the wave measured in meters. Frequency : The number of complete waves that pass a point in one Second, Measured in Hertz (Hz) Wavelength : The distance between adjacent crests, measured in meters. 3 Phase : phase is a position of a point in time (instant) on a waveform cycle. Propagation speed in a media : The speed at which a wave propagates through a given medium.The propagation speed also varies from medium to medium depending on the properties of the medium. 4 Transmission media Transmission media is a communication channel that carries the information from the sender to the receiver. Data is transmitted through the electromagnetic signals.The transmission media is available in the lowest layer of the OSI reference model, i.e., Physical layer. Guided / Wired : If the medium used for data transmission is a physical medium, it is called guided or wired. Wires are often called guided media because they guide the data transfer data from one point to another without altering the frequencies, data impairment are therefore reduced. 1. Twisted Pair Cable - Pairs of twisted copper wire are used for data transmission. There are two types. I. Unshielded Twisted Pair (UTP) : The twisted copper wire pairs used for telephone connections. These are very flexible and low-priced. However, it is difficult to transmit data for a long distance through UTP wires. It is suitable for maximum of 100 meters. II. Shielded Twisted Pair (STP) : STP is a better quality and secure data transmission medium. However it is expensive. 2. Coaxial Cable - This consists of an electronic cable pair. The outer cable which is like a braided copper net produces electromagnetic field around the central cable. These two cables are separated by a plastic shield. These cables are expensive and used for TV antenna and CCTV. 5 3. Fiber Optics cable - Fiber Optics cable consists of a pair of an cables. There is a plastic jacket to separate the two cables. Core is a glass tube and there is glass cladding around it. The data transmission is carried out by while reflecting light. These are used in modern telephone networks. The cable is reletively more expensive. Unguided/Wireless Media : Data is transmitted as signal through the air without using physical medium is called unguided/wireless media. 1. Radio waves - Data transmission is performed using radio waves. Wifi and Bluetooth are examples for radio waves based communication. 2. Microwaves - Microwaves travel in a linear mode. Transmission center is positioned facing each other. The distance between centers are decided based on geographical factor of the area. Microwaves are used in Satellite communication to transmit data as transponders. Satellite centers, which are positioned in the sky above 36000 km, capture data transmitted as microwaves through satellite towers positioned in the Earth and then transmit the data back to the required tower. Using this method, data can be transmitted to any distance. This is also used in internet communication. 3. Infrared - Infrared data transmission is used in TV remote controllers, wireless keyboards and mouse etc. Properties of signal transmission media Latency : Network Latency is an expression of how much time it takes for a unit of data to travel from one point to another. Latency is usually measured in milliseconds. Bandwidth : Bandwidth is a range of frequencies and measured in Hertz. Transmission Impairment in Data Communication In communication system, analog signals travel through transmission media, which tends to deteriorate the quality of analog signal, which means that the signal at the beginning of the medium is not the same as the signal at the end of the medium. The imperfection causes signal impairment. Below are the causes of the impairment. Attenuation – It means loss of energy. The strength of signal decreases with increasing distance which causes loss of energy in overcoming resistance of medium. This is also known as 6 attenuated signal. Amplifiers are used to amplify the attenuated signal which gives the original signal back and compensate for this loss. Distortion – Distortion is alteration (distort) of properties of a transferred signal caused by the capacitance and inductance of the communication medium. Noise – The random or unwanted signal that mixes up with the original signal is called noise. There are several types of noise such as induced noise, crosstalk noise, thermal noise and impulse noise which may corrupt the signal. Induced noise comes from sources such as motors and appliances. These devices act as sending antenna and transmission medium act as receiving antenna. Thermal noise is movement of electrons in wire which creates an extra signal. Crosstalk noise is when one wire affects the other wire. Impulse noise is a signal with high energy that comes from lightning or power lines. 7 Modulation Modulation is the technique used to send information by modifying the basic characteristics such as frequency, amplitude and phase, of an electromagnetic signal (modulating signal) by attaching it to a higher frequency signal (carrier signal), producing a modulated signal. The most commonly used method is the Pulse Code Modulation (PCM). Analog Modulaton 1. Amplitude Modulation (AM) : Amplitude of carrier signal varies according to the amplitude of modulating signal. The frequency or phase of the carrier signal remains unchanged. 2. Frequency Modulation (FM) : The carrier signal frequency changes according to the frequency of the Modulating signal. 3. Phase Modulation (PM) : The phase of a carrier signal is modulated in order to reflect the changes in voltage (amplitude) of an analog data signal. Digital-to-Analog Conversion If the modulating signal is a digital signal, then three modulation schemes can be used. 1. Amplitude Shift Keying (ASK) : In this conversion technique, the amplitude of an analog carrier signal is modified to reflect binary data. When binary data represents digit 1, the amplitude is held at 1, otherwise it is set to 0. Both frequency and phase remain same as in the original carrier signal. 2. Frequency Shift Keying (FSK) : In this conversion technique, the frequency of the analog carrier signal is modified to reflect binary data. 8 3. Phase Shift Keying (PSK) : In this conversion scheme, the phase of the original carrier signal is altered to reflect the binary data. Synchronization : synchronization is used to ensure that the data streams are received and transmitted correctly between two devices. Usually a clock signal is transmitted in sequence with a data stream to maintain proper signal timing. 9 Signal Encoding Schemes Encoding is the conversion of data into digital signals. There are several ways to map digital data to digital signals. Some of them are − Non-return to Zero Level (NRZ-L): is an encoding scheme in which two different voltages for 0 and 1 bits are used to represent data and remain constant during a bit interval. Non-return to Zero Inverted (NRZ-I): in this encoding scheme, in which a “1" is represented by a transition of the physical level, while a "0" has no transition. Manchester encoding: in Manchester encoding voltage changes from low to high or high to low in the middle of the signal. Error Control: During data transmission, sometimes data bits may get flipped due to various reasons. In such situations the data bit received is in error. Error detection is the process of identifying that the data bit has been altered during transmission. Error correction and recovery mechanisms are used to correct the data bits received in error and to recover the actual data bits. 10 Parity Check: is one simple error detection mechanism where an extra bit of data is added and sent along with the original data bits to make number of 1s in the data as either even in the case of even parity, or odd in the case of odd parity. Example – If the source wants to transmit data unit 1100111 using even parity to the destination. The source will have to pass through Even Parity Generator. Parity generator will count number of 1s in data unit and will add parity bit. In the above example, number of 1s in data unit is 5, parity generator appends a parity bit 1 to this data unit making the total number of 1s even i.e 6 which is clear from above figure. Data along with parity bit is then transmitted across the network. In this case, 11001111 will be transmitted. At the destination, This data is passed to parity checker at the destination. The number of 1s in data is counted by parity checker.If the number of 1s count out to be odd, e.g. 5 or 7 then destination will come to know that there is some error in the data. The receiver then rejects such an erroneous data unit. Public Switched Telephone network (PSTN) PSTN provides infrastructure and services for public telecommunication. The PSTN is the aggregate of the world's circuit-switched telephone networks that are operated by national, regional, or local telephony operators. These consist of telephone lines, fiber optic cables, microwave transmission links, cellular networks, communications satellites, and undersea telephone cables, all interconnected by switching centers which allow most telephones to communicate with each other. 11 Modem The modem is used to connect the computers of a computer network or a personal computer at home to the internet. The modem acts as a data translator. Digital signals sent from the computer is translated to analog signals and the analog signals send to the computer from the internet is translated to digital signals. This is called MOdulation and DEModulation. Hence, „MODEM‟ is a combination of these two words. There are different types of MODEMs. Those are internal, external and wireless modems. Todays routers have a modem inbuilt in the device. Different modulation schemes are used to modulate data and Pulse Code Modulation (PCM) is one method in which the samples of an analog signal are taken (called a pulse amplitude modulated signal) and then are shown that the original signal can be constructed at the receive end using these samples. PCM (pulse code modulation) is a digital scheme for transmitting analog data. It converts an analog signal into digital form.The signals in PCM are binary; that is, there are only two possible states, represented by logic 1 (high) and logic 0 (low). This is true no matter how complex the analog waveform happens to be. Using PCM, it is possible to digitize all forms of analog data, including full-motion video, voices, music, telemetry, and virtual reality (VR). Network Topology Network topology is the pattern of connection in designing computer network. There are different types of network topologies. Those are, Bus Topology: A bus topology consists of a main run of cable with terminators at each end. All nodes (file server, workstations, and peripherals) are connected to the linear cable. This cable is called the backbone because any issue with the network affects all the computers in the network. This design is easy in networking and fewer cables are required. However, a limited number of computers can be connected. 12 Star Topology: A star topology is designed with each node is (file server, workstations, and peripherals) connected directly to a central network hub or switch. If hub goes down everything goes down, none of the devices can work without hub. Ring Topology: in a ring topology each station is directly connected only to two of its neighbors. Messages sent between two stations pass through all of the stations in between (clockwise or counterclockwise). The breakdown of one computer or cable can lead to the breakdown of the entire network. Mesh Topology: In this type of topology, a host is connected to one or multiple hosts. This topology has hosts in point-to-point connection with every other host or may also have hosts which are in point-to-point connection with few hosts only. Since this is a complex connection pattern, it is costly and difficult to control. However, a breakdown of one computer does not affect the connections in the network. Mesh networking can be found on internet. Topology Advantages Disadvantages The easiest network topology for Bus topology is not great for large connecting peripherals or computers in networks. If a main cable is damaged, Bus a linear fashion. It is easy to connect or whole network fails or splits into two. remove devices in this network without This network topology is very slow as affecting any other device. compared to other topologies. In this data flows in one direction which Due to the Uni-directional Ring, a data reduces the chance of packet collisions. packet (token) must have to pass Equal access to the resources. Speed to through all the nodes. If one Ring transfer the data is very high. Minimum workstation shuts down, it affects whole collision. It is cheap to install and network or if a node goes down entire expand. network goes down. It is very reliable – if one cable or device Requires more cable than a linear bus. Star fails then all the others will still work.It is If hub goes down everything goes 13 high-performing as no data collisions down, none of the devices can work can occur. Easy fault detection because without hub. Extra hardware is required the link are often easily identified. (hubs or switches) which adds to cost. Failure during a single device won‟t It‟s costly as compared to the opposite break the network. Adding new devices network topologies i.e. star, bus, point won‟t disrupt data transmissions. This to point topology. Installation is Mesh topology provides multiple paths to extremely difficult in the mesh. succeed in the destination and tons of Maintenance needs are challenging with redundancy. a mesh. Switches and hubs: Hubs and switches are common network devices that function as a common connection point for network devices that make up a network. A switch receives data in one of its incoming connections and forwards the data only on the outgoing connection which connects to the destination device. A hub receives data in one of its incoming connections and then shall forward the data to all of its outgoing connection. Differences between the switch and hub - The main difference is the data transmission speed. Hub sends the transmitted data to all computers but switch sends data to the relevant computer only. Here hub may create an unnecessary network data congestion. In this way a switch is a more intelligent device than a hub. In data transmission, hub uses half duplex mode and the switch uses full duplex mode. Local Area Network (LAN): A local area network is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, or a university campus. 14 Media Access Control Address (MAC address) MAC addresses are unique addresses assigned each network interface of a communicating device. MAC addresses are 48 bits long and are divided in to 6 blocks separated by colons. Each block is 8 bits long and is further divided in to two 4 bit blocks. Each four bit address is converted to hexadecimal number and a typical Mac address would look like 4A:8F:3C:4F:9E:3D. When devices send and receive data over a network, MAC addresses enable the unique identification of the device interface and the correct delivery of the data to the receivers interface. Frames : When data is generated at the source to be sent to the receiver over the communication link, at the Data link layer, data are encapsulated in to the Frame, where the data is inserted in to the frame and the MAC addresses of the sending device and the MAC address of the adjacent node are included in the header of the frame. Each frame is made depending on the quality of the link connecting ea pair of devices. Protocol : A communication network protocol defines the order and the format of data when the data is exchanged between two networking devices. Many protocols exist in the networking world and medium access control protocols enable the orderly access to a common shared medium of communication. In bus topology, a common medium is shared by many devices and a medium access control protocol can ensure that the medium is accessed in an orderly manner therefore data collisions are avoided. 15 Multiple Access Control Protocols If there is a dedicated link between the sender and the receiver then data link control layer is sufficient, however if there is no dedicated link present then multiple stations can access the channel simultaneously. Hence multiple access protocols are required to decrease collision and avoid crosstalk. For example, in a classroom full of students, when a teacher asks a question and all the students (or stations) start answering simultaneously (send data at same time) then a lot of chaos is created( data overlap or data lost) then it is the job of the teacher (multiple access protocols) to manage the students and make them answer one at a time. Channelization Protocols Channelization is a multiple-access method in which the available bandwidth of a link is shared in time, frequency, or through code, between different stations. The three channelization protocols are FDMA, TDMA, and CDMA. In frequency-division multiple access (FDMA), the available bandwidth is divided into frequency bands. Each station is allocated a band to send its data. In other words, each band is reserved for a specific station, and it belongs to the station all the time. Each station also uses a bandpass filter to confine the transmitter frequencies. To prevent station interferences, the allocated bands are separated from one another by small guard bands. In time-division multiple access (TDMA), the stations share the bandwidth of the channel in time. Each station is allocated a time slot during which it can send data. Each station transmits its data in is assigned time slot. The following figure shows the idea behind TDMA. 16 Code-Division Multiple Access(CDMA) simply means communication with different codes. CDMA differs from FDMA because only one channel occupies the entire bandwidth of the link. It differs from TDMA because all stations can send data simultaneously; there is no timesharing. ALOHA – It was designed for wireless LAN but is also applicable for shared medium. In this, multiple stations can transmit data at the same time and can hence lead to collision and data being garbled. Pure Aloha: When a station sends data it waits for an acknowledgement. If the acknowledgement doesn‟t come within the allotted time then the station waits for a random amount of time called back-off time (Tb) and re-sends the data. Since different stations wait for different amount of time, the probability of further collision decreases. Slotted Aloha: It is similar to pure aloha, except that we divide time into slots and sending of data is allowed only at the beginning of these slots. If a station misses out the allowed time, it must wait for the next slot. This reduces the probability of collision. CSMA – Carrier Sense Multiple Access ensures fewer collisions as the station is required to first sense the medium (for idle or busy) before transmitting data. If it is idle then it sends data, otherwise it waits till the channel becomes idle. However there is still chance of collision in CSMA due to propagation delay. For example, if station A wants to send data, it will first sense the 17 medium.If it finds the channel idle, it will start sending data. However, by the time the first bit of data is transmitted (delayed due to propagation delay) from station A, if station B requests to send data and senses the medium it will also find it idle and will also send data. This will result in collision of data from station A and B. CSMA/CD – Carrier sense multiple access with collision detection. Stations can terminate transmission of data if collision is detected. CSMA/CA - Carrier-sense multiple access with collision avoidance in computer networking, is a network multiple access method in which carrier sensing is used, but nodes attempt to avoid collisions by beginning transmission only after the channel is sensed to be "idle". Unicast, Broadcast and Multicast Broadcast of messages involves sending a message to larger set of recipients. In Unicast data is sent from one computer to another computer by including the unique address of the recipient in the message itself. A MultiCast communication is from one device on the network to many, but not all, devices on the network. Interconnection of Networks A gateway is basically a device or a hardware which acts like a “gate” among the networks.Thus it can also be defined as a node which acts as an entrance for the other nodes in the network.It is also responsible for enabling the traffic flow within the network.Gateway uses more than one protocol for communication thus its activities are much more complex than a switch or a router. So a gateway is basically a device that is used for the communication among the networks which have 18 a different set of protocols and is responsible for the conversion of one protocol into the other.For any kind of workplace, the gateway is a computer system which is responsible for routing the traffic from the main workstation to outside network. For homes, it is responsible for giving the access to the internet thus acting as an internet service provider. IP addresses are unique addresses assigned to each device On the network. IP Version 4 (IPv4) is 32 bits long and can address up to 4 billion devices. IPv4 has only 232 addresses. IP Version 6 (IPv6) is 128 bits long and is plenty enough to address a huge number of networkable devices. Ipv6 has 2128 addresses. Dotted decimal notation - For human convenience the IP address is written in dotted decimal notation. The 32-bit address is divided into 4 groups of 8 bits (an octet or a byte). Each octet is written as a decimal number ranging from 0 to 255. The decimal numbers are separated by periods, or dots. CLASSES OF IP ADDRESSES Class of an IP address is identified using the first octet. 19 Assignment of IP addresses: All hosts in the same network are assigned the same address prefix. Address prefixes are assigned by central authority and are obtained from ISPs. Within a network each host is assigned a unique suffix locally by the network administrator. Sub-netting is a technique used to overcome the problem of depletion of network address of a 32 bit addressing scheme. In sub-netting each physical network is assigned 32-bit address mask, which is used to identify networks among other networks. All machines in the subnet should have the same subnet mask. Classless Inter Domain Routing (CIDR): instead of full class A, B or C networks, organizations can be allocated any number of addresses using this scheme. This scheme can help reducing the growth of the router tables. 20 With the ever-increasing demand for public IP addresses for Internet accesses, Internet would run out of available IP addresses. IPV6 is proposed to fix the problem of the limited address space of IPV4. Private IPs: Three sets of address ranges are used for private use. 10.0.0.0 – 10.255.255.255 (10.0.0.0/8) – 16M addresses 172.16.0.0 – 172.31.255.255 (172.16.0.0/12) - 1M addresses 192.168.0.0 – 192.168.255.255 (192.168.0.0/16) – 64k addresses Dynamic Host Configuration Protocol (DHCP) server: is a protocol used to assign IP addresses to arriving hosts. Rather than a network administrator manually assigning an IP address to each arriving host, the DHCP will assign IP addresses automatically. Finding path to the Destination: When data leaves the source towards the destination, it needs to be routed through a series of networking devices to reach the destination. Routers take care of the job of routing the data from the source to destinations. Routing is the process of finding an efficient path from a source to a given destination through the network. Routers are special networking devices that are capable of communicating with similar devices over the network, collaborate among themselves and find paths for arriving data. Routers maintain a table of reachable destinations through them and these tables are called routing tables. Routers exchange these routing tables with other routers in the network from time to time to update the route details. Packet Switching: When a message is generated at the source it is broken down into smaller chunks called packets. Each packet is assigned unique information to identify itself, switching information is added in the header of each packet and the transmitted independent of other packets. 21 Role of Transport Protocols Since many network applications may be running on the same machine, computers need something to make sure the correct software application on the destination computer gets the data packets from the source machine and some way to make sure replies get routed to the correct application on the source computer. Each process of a running application communicates to the underlying network through a specially assigned interface called a port. Each port is assigned a unique number called port number and it is used in combination with the IP address of the device to identify each process uniquely that is running on a given host. When processes running on different computers send data to the same destination, the port numbers of different processes and the IP addresses are used to identify the processes correctly. The process of combining the port numbers and the IP addresses and the identifying the correct process is called multiplexing. Multiplexing – Gathering data from multiple application processes of the sender, enveloping that data with a header, and sending them as a whole to the intended receiver is called multiplexing. Demultiplexing – Delivering received segments at the receiver side to the correct application layer processes is called demultiplexing. User Datagram Protocol: UDP is the no frills transport protocol for several wellknown application layer protocols such as DNS and SNMP. UDP is simple and suitable for query based communications and it is not connection oriented. Transmission Control Protocol: TCP provides a reliable in order delivery of data. It is a connection oriented protocol and uses sequenced acknowledgment with retransmission of packets when necessary. TCP is used for applications such as web, and email. TCP vs UDP TCP is a connection-oriented protocol UDP is a connectionless protocol TCP is comparatively slower than UDP UDP is much faster Can guarantee delivery of data Cannot guarantee delivery of data Does not support Broadcasting Does support Broadcasting Packets arrive in order at the receiver. There is no sequencing of data in UDP. Used by HTTPS, HTTP, SMTP, POP, FTP, etc Video conferencing, streaming, DNS, VoIP, etc 22 Applications on the Internet Domain Name System (DNS): DNS provides directory lookup service for given urls and the web addresses. The HTTP protocol uses the services of DNS to identify the matching web addresses of given URLs. Humans, being different from computers, have difficulty in retaining lots of similar numbers in mind. Working with names is much easier for them and cause less errors. That is why we rarely see the numbers as URLs on the Internet. When a URL is entered to the browser to view a website, the request must first be translated from the readable written address into an IP address that can be routed. This translation is done by the Domain Name System (DNS). If a request is made to connect to certain website, for example www.yahoo. coin, the request is first sent to the DNS server to translate into the correct IP address of 209.191.122.70. The actual connection to the website is done with this IP address. This process happens behind the screen quickly that the user does not notice. HTTP - The Hypertext Transfer Protocol is an application layer protocol for distributed, collaborative, and hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Client Server model: The client–server model is a distributed application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients. 23 Servers A server is a device with a particular set of programs or protocols that provide various services, which other machines or clients request, to perform certain tasks. Together, a server and its clients form a client/server network, which provides routing systems and centralized access to information, resources, stored data, etc. FILE SERVER - File Transfer Protocol (FTP) is one of the oldest server types. It is responsible for transferring files from server to a computer and vice versa. PROXY SERVERS can easily be used to increase speeds and save bandwidth on a network by compressing traffic, caching files and web pages accessed by multiple users.By using a proxy, the website you access will not be able to log your real IP address, as it will log the proxy server‟s IP address instead. DHCP SERVER Is a protocol used to assign IP addresses to arriving hosts. Rather than a network administrator manually assigning an IP address to each arriving host, the DHCP will assign IP addresses automatically. WEB SERVER The web server is responsible for hosting website files and serve it up through a web browser. It loads an individual file of a web page and loads it to display in the browser as one complete page. MAIL SERVER The mail server just is as important as a web server is. A mail server is to send/receive and store emails on the corporate networks through LANs and WANs and across the internet. Mail servers send and receive email using standard email protocols. For example, the SMTP protocol sends messages and handles outgoing mail requests. The IMAP and POP3 protocols receive messages and are used to process incoming mail. 24 PROTOCOLS Simply, a protocol is a set of rules. A network protocol is a set of rules followed by the network. Network protocols are formal standards and policies made up of rules, procedures and formats that defines communication between two or more devices over a network. Internet protocol suite is the set of communication protocols that implement the protocol stack on which the internet runs. The Internet protocol suite is sometimes called the TCP/IP protocol suite, after TCP\IP, which refers to the important protocols in it, the Transmission Control Protocol(TCP) and the Internet Protocol(IP). The Internet protocol suite can be described by the analogy with the OSI model, but there are some differences. Also not all of the layers correspond well. The Transmission Control Protocol is the core protocol of the internet protocol suite. It originated in the network implementation in which it complemented the Internet Protocol. Therefore the entire suite is commonly referred to as TCP/IP. TCP provides reliable delivery of a stream of octets over an IP network. Ordering and error-checking are main characteristics of the TCP. All major Internet applications such as World Wide Web, email and file transfer rely on TCP. TCP provides a reliable in order delivery of data. It is a connection oriented protocol and uses sequenced acknowledgment with retransmission of packets when necessary. TCP is used for applications such as web, and email. The Internet Protocol is the principal protocol in the Internet protocol suite for relaying data across networks. Its routing function essentially establishes the internet. Historically it was the connectionless datagram service in the original Transmission Control Program; the other being the connection oriented protocol(TCP). Therefore, the Internet protocol suite is referred as TCP/IP. Hypertext Transfer Protocol (HTTP) is the foundation of data communication for the World Wide Web. The hypertext is structured text that uses hyperlinks between nodes containing texts. The HTTP is the application protocol for distributed and collaborative hypermedia information system. The default port of HTTP is 80 and 443 is the secured port. File Transfer Protocol (FTP) is the most common protocol used in the file transferring in the Internet and within private networks. The default port of FTP is 20/21. Secured Shell (SSH) is the primary method used to manage the network devices securely at the command level. It usually used as the alternative of the Telnet which does not support secure connections. The default port of SSH is 22. 25 Telnet is the primary method used to manage network devices at the command level. Unlike SSH, Telnet does not provide a secure connection, but it provides a basic unsecured connection. The default port of Telnet is 23. Simple Mail Transfer Protocol (SMTP is used for two primary functions. It is used to transfer email from source to destination between mail servers and it is used to transfer email from end users to a mail system. The default port of SMTP is 25 and secured (SMTPS) is 465 (Not standard). Domain Name System (DNS) is used to convert the domain name to IP address. There are root servers, TLDs and authoritative servers in the DNS hierarchy. The default port of DNS is 53. The Post Office Protocol version 3(pop3) is one of the two main protocols used to retrieve mail from the internet. It is very simple as it allows the client to retrieve complete content from the server mail box and deletes contents from the server. The default port of POP3 is 110 and secured is 995. Internet Message Access Protocol (IMAP) version 3 is another main protocol that used to retrieve mail from a server. IMAP does not delete the content from the mail box of the server. The default port of IMAP is 143 and secured is 993. The Simple Network Management Protocol is used to manage networks. It has abilities to monitor, configure and control network devices. SNMP traps can also be configured on network devices to notify a central server when specific action are occurring. The default port of SNMP is 161/162. Hypertext Transfer Protocol over SSL/TLS (HTTPS) is used with HTTP to provide same services, but with a secured connection which is provided by SSL or TLS. The default port of HTTPS is 443. User Datagram Protocol( UDP) is the no frills transport protocol for several wellknown application layer protocols such as DNS and SNMP. UDP does not guarantee ordered delivery of data. TCP/IP Model Application Layer- Consists of applications and processes that uses the network. Host- Host Transport Layer- Provides end to end data delivery services Internet layer –Defines the datagram and handles the routing of data 26 Network Access Layer – consists of routing for accessing physical network Network Access Layer lowest layer in TCP/IP hierarchy provides the means to deliver data to the other devices on the network defines how to use the network to transmit IP datagram encapsulates IP datagram into frames maps IP addresses to physical addresses in Ethernet Internet Layer manages connections across the network and isolates the upper layer protocols handles addressing and delivery of data Internet Protocol (IP) does all these functions Transport layer This layer is concerned with the transmission of the data. The two main protocols that operate at this layer are, Transport Control Protocol (TCP), User Datagram Protocol (UDP) 27 Application layer The application layer is concerned with providing network services to applications. There are many application network processes and protocols that work at this layer, including HTTP, SMTP and FTP. OSI model The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software. Using the OSI model, the communications between computing systems are done through seven abstraction layers; it's easy to remember the sequence of OSI Model 7 Layers using this simple sentence: "All people seem to need data processing." All = Application Layer, People = Presentation Layer, Seem = Session Layer, To = Transport Layer, Need = Network Layer, Data = Data Link Layer, Processing = Physical Layer 28 Application Layer The application layer provides an interface between end-users and software applications. It receives data from end-users, and displays received data for them. This layer does not contain the end-user applications; instead, it facilitates communications with the lower layers. Some protocols found within this layer include HTTP, HTTPS, FTP, TFTP, Telnet, SNMP, DNS, Rlogin, SMTP, POP3, IMAP, and LDAP. Presentation Layer This layer facilitates the presentation of Data to the upper layer. Mainly, it provides the encoding scheme and encryption/decryption for secure transmission. For instance, it translates applications format to network format and vice-versa. Protocols of this layer: JPEG, BMP, GIF, TIF, PNG, MP3, MIDI, ASCII & ANSI, etc. Session Layer When two computing devices need to communicate, a session must be created, which happens at this layer. Some of this layer's functions are the establishment, management (coordination), and termination of sessions. A good example of how this layer function is a telephone call where you first establish the connection, exchange a message, and finally terminate the session. Some of the protocols of this layer are SIP, NFS, SQL, ASP, and RDBMS. Transport Layer This layer, often considered the heart of the OSI model, is responsible for controlling data flow between two devices. For example, this layer determines the amount of data needed to send and the location where it should be sent. This layer is also responsible for data flow and error control. For instance, the flow control determines the optimal speed of sending data to avoid flooding the receiver with data if the connection speed is different between the two communicating parties. Simultaneously, error control ensures retransmitting the data again if some packets were lost on the receiver side. This layer's best-known example protocol is the TCP protocol, which resides as part of the TCP/IP protocol suite. Some other protocols on this layer are TCP, UDP, and SPX. Network Layer The network layer is responsible for data packet forwarding and routing data between routers. It facilitates data transfer between two devices residing in two different networks. For example, if you want to send a message from your computer in New York to a server in San Francisco, there are thousands of routers and –maybe- millions of paths between these two points. However, the routers at this layer help you do this efficiently by automatically selecting the nearest way. The network layer is also responsible for translating the logical addresses into physical addresses and is responsible for data fragmentation. Hence, it breaks segments of data into smaller units called packets before sending them to other networks. 29 Data Link Layer This layer provides a connection between two devices residing on the same physical network, for example, between two devices in the same LAN. This layer receives packets from the network layer and breaks them into small units called frames. The data link layer also performs data flow and error control within intranets. It contains two other sub-layers: the Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. Most ordinarily, networking switches operate at this layer. Some protocols within this layer are PPP, HDLC, ATM, Frame Relay, SLIP, and Ethernet. Physical Layer This layer exists at the bottom of the OSI layer. It represents the OSI model's physical component, including cable type, radio frequencies (when using a Wireless connection), the layout of pins, and voltages. This layer is responsible for delivering the raw data from the sending device's physical layer to the receiving device's physical layer. Popular devices found at this layer include network hubs, cabling, repeaters, and modems. The advantages of the OSI model are, It is a generic model and acts as a guidance tool to develop any network model. It is a layered model. Changes are one layer do not affect other layers, provided that the interfaces between the layers do not change drastically. It distinctly separates services, interfaces, and protocols. Hence, it is flexible in nature. Protocols in each layer can be replaced very conveniently depending upon the nature of the network. It supports both connection-oriented services and connectionless services. Network Security Encryption is a technique used in cryptography which provides confidentiality of transmitting data.There are two types of encryption: Symmetric Key Encryption - The encryption process where same keys are used for encrypting and decrypting the information is known as Symmetric Key Encryption. When using symmetric key encryption users must share a common key prior to exchange of information. 30 Asymmetric Key Encryption - The encryption process where different keys are used for encrypting and decrypting the information is known as Asymmetric Key Encryption. Every user in this system needs to have a pair of dissimilar keys, private key and public key. These keys are mathematically related − when one key is used for encryption, the other can decrypt the cipher text back to the original plaintext. Digital signature - Usually a validity document contains a signature under it and which makes the receiver to trust the content in it. Similar to usual documents, digital documents should also have a signature. Thus digital signatures help to authenticate the sources of messages. Digital signatures allow us to verify the author, date and time of signatures, authenticate the message contents. Threats Viruses - A program which enters into the system, runs and performs malicious activities unknowingly. Trojans - Any malicious computer program used to invade into a computer by misleading users Malware- The software that is written for malicious purposes 31 Phishing – An attempt to obtain sensitive information such as usernames, passwords, and credit card details by pretending as a trustworthy person. Protection against unauthorized malicious accesses Firewalls: a network security device that monitors and filters incoming and outgoing network traffic. A firewall is essentially the barrier that sits between a private internal network and the public Internet. Antivirus software: are software that detect and quarantine the malicious software that tries to harm a computer. Computer users must be properly educated to protect the network devices against malicious attacks and unauthorized accesses. Passwords must be chosen with utmost care and antivirus software must be periodically updated to protect the system from attacks. A DMZ (demilitarized zone) Network is a perimeter network that protects and adds an extra layer of security to an organization‟s internal local-area network from untrusted traffic. A common DMZ is a subnetwork that sits between the public internet and private networks. The role of ISPs and technologies used for connecting Home Networks ISPs: An Internet service provider (ISP) is an organization that provides services to accessing and using the Internet services. Internet service providers may be organized in various forms. Use of MODEMs DSL: Refers collectively to all types of digital subscriber lines and ADSL is the asymmetric digital subscriber line, ADSL is a type of DSL broadband communications technology used for connecting to the Internet. ADSL allows more data to be sent over existing copper telephone lines, when compared to traditional modem lines. Advantages of DSL Independent services: Loss of high speed data does not mean you lose your telephone service. Imagine your telephone, television, and Internet access going out when a cable company amplifier/repeater dies. 32 Security: Unlike cable modems, each subscriber can be configured so that it will not be on the same network. In some cable modem networks, other computers on the cable modem network are left visibly vulnerable and are easily susceptible to break ins as well as data destruction. Integration: DSL will easily interface with ATM, Nx64, and WAN technology. Telecommuting may get even easier. Advantages ADSL Cheaper rates: Internet service providers (ISPs) provide a simple ADSL connection to the Internet, using the highest possible speed with usually a static IP address. Fully configurable: WAN engineers have total control over the VPN tunnel created between sites. They are able to perform on-the-fly configuration changes to compensate for any network problems or help rectify any problem that might arise. High-speed access which enables easy net surfing and fast streaming contents access: ADSL is a broadband service. It offers data transmission at much greater speeds and capacity than narrowband services like ISDN and dialup analog modems. ADSL enables you to download high-volume data files effortlessly. A home LAN that uses private Ips A public IP address is an IP address that can be accessed over the Internet. Like postal address used to deliver a postal mail to your home, a public IP address is the globally unique IP address assigned to a computing device. Your public IP address can be found at What is my IP Address page. Private IP address, on the other hand, is used to assign computers within your private space without letting them directly expose to the Internet. For example, if you have multiple computers within your home you may want to use private IP addresses to address each computer within your home. In this scenario, your router gets the public IP address, and each of the computers, tablets and smartphones connected to your router (via wired or wifi) gets a private IP address from your router via DHCP protocol. Network Address Translation /Proxies Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in Internet Protocol (IP) datagram packet headers while they are in transit across a traffic routing device. The technique was originally used for ease of rerouting traffic in IP networks without readdressing every host. 33 A proxy server is a computer that acts as an intermediary between the user's computer and the Internet. It allows client computers to make indirect network connections to other network services. A Proxy server solves the IP address issues when connecting a large corporation to the internet. Useful links https://www.youtube.com/playlist?list=PLSNNzog5eydvsPPMwn-6waomQXOOxZew4 https://www.youtube.com/playlist?list=PL7zRJGi6nMRzg0LdsR7F3olyLGoBcIvvg 34