0% found this document useful (0 votes)
14 views146 pages

Chapter 5

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1/ 146

Chapter 5

Network Communication and Protocols


SLO 5.1.1 define a computer
network
SLO 5.1.2
 differentiate among different types of
networks depending upon coverage area
and use:
*Nano Network:*
 Operates at the nanoscale, involving devices
and components with dimensions on the
order of nanometers.
 *Nano Network:* Often associated with
nanotechnology, with applications in fields
such as medicine, sensing, and computing at
an extremely small scale.
 Nano Network:* Typically has a very localized
coverage area, often within a specific
environment or targeted location (e.g., inside
the body)
BAN (Body Area Network):

 A BAN, or Body Area Network, is like a tiny


network that works really close to your
body. It's used for talking to things you wear
on your body or have inside you, like a
fitness tracker or a medical implant. Think
of it as a special network just for your body
and the things in or on it.
Difference between BAN and
Nano Networks
 nano networks operate at the incredibly
small nanoscale, BANs operate at the scale
of the human body and are focused on
applications related to health monitoring
and wearable technologies.
PAN (Personal Area Network):

 Coverage: Covers a small area, typically


within a few meters.
 Use: Used for connecting personal devices

like smartphones, tablets, and laptops to


peripherals such as Bluetooth headsets,
wireless keyboards, and mice.
 An example is connecting your smartphone

to wireless earbuds using Bluetooth.


NAN (Nearby Area
Network):
 Coverage: Similar to PAN, covering a small
area. Use: It's not a widely recognized term,
but it could refer to networks used in close
proximity for specific purposes, such as ad-hoc
wireless connections between devices at a
conference.
 Near-me Area Network (NAN) connects wireless
devices like smartphones and PDAs in close
proximity, even if they use different networks.
For instance, two nearby smartphone users
can communicate, even with different carriers.
 Examples:
 Satya shares an extra movie ticket with nearby friends.

 Saurav checks if any friends are available for shopping.

 Notable NAN Applications:

 Handshake (Apple devices) - Share contact info nearby.

 WhosHere - Connect with people of similar interests.

 WhozThat - Get info about people nearby.


LAN (Local Area Network):

 Coverage: Covers a building or a campus,


usually up to a few kilometers.
 Use: Used within homes, offices, or schools

to connect multiple devices and share


resources like printers and files. Ethernet
and Wi-Fi networks are common examples.
Example:
 Imagine your home Wi-Fi network. All the
devices in your house, like your computer,
smartphone, and smart TV, are part of a
LAN. They can share files and access the
internet through your router, but it's limited
to your home or a small physical location.
WAN (Wide Area Network):

 Coverage: Spans a large geographical


area, potentially worldwide.
 Use: Used to connect LANs across different

cities or countries. The internet is the most


significant example of a WAN.
MAN (Metropolitan Area Network):

 Coverage: Covers a city or a large campus.


 Use: Often used by universities, businesses,

or city administrations to interconnect LANs


in different parts of a city.
IAN (Internet Area Network):

 An IAN securely connects endpoints through


the public Internet, so that they can
communicate and exchange information
and data without being tied to a physical
location.
 The IAN eliminates a geographic profile for

the network entirely because the


applications and communications services
have become virtualized. Endpoints need to
be connected only over
a broadband connection across the Internet.
Example:
Interplanetary Network
 The Interplanetary Network (IPN) is a concept
that extends the principles of computer
networking beyond Earth, enabling
communication and data exchange between
spacecraft, satellites, and other celestial bodies.
It's designed to overcome the challenges of vast
distances, signal delays, and celestial object
motion in space.
 Example: Deep space missions, like the
Voyager probes, use the IPN to send data back
to Earth. They communicate with NASA's Deep
Space Network, which is part of the IPN.
5.1.3 describe basic network
components
SLO 5.1.4 discuss the role of the
four data communication devices.
5.1.5 differentiate between
guided and unguided media
and their types
STP
UTP
5.1.6 compare three modes of data
transmission, i.e. simplex, half-duplex and full-
duplex
Simplex
Half-Duplex
Full-Duplex
5.1.7 differentiate between two types
of transmission, i.e. serial and parallel;

 Definition: Sending data one bit at a time,


sequentially, over a single communication
line.
 Example: Like sending a text message on

your phone; each character is sent one after


the other.
Parallel Transmission:

 Definition: Sending multiple bits


simultaneously over multiple
communication lines.
 Example: Imagine you're decorating a

cake. With serial transmission, you add one


sprinkle at a time. With parallel
transmission, you have many hands and
can add several sprinkles all at once.
Difference:

 Serial: Slower but simpler; used for longer


distances or when simplicity is more
important.
 Parallel: Faster but more complex; used for

shorter distances when speed is crucial, like


inside a computer.
5.1.8 differentiate between synchronous
and asynchronous transmission of data
5.1.9 compare the types of network
topologies, (i.e. star, ring, bus, mesh
and tree) with the help of diagrams;
Tree Topology
 Tree topologies have a root node, and all
other nodes are connected which form a
hierarchy. So it is also known as hierarchical
topology. This topology integrates various
star topologies together in a single bus, so
it is known as a Star Bus topology.
Features
 Failure of one node never affects the rest of
the network.
 Node expansion is fast and easy.
 Detection of error is an easy process
 It is easy to manage and maintain
Limitations
 It is heavily cabled topology
 If more nodes are added, then its

maintenance is difficult
 If the hub or concentrator fails, attached

nodes are also disabled.


5.2.1 differentiate among seven layers
of Open System Interconnection (OSI)
model
Layer 7- Application Layer
Layer 6- Presentation
Layer
Layer 5 – Session Layer
Layer 4- Transport Layer
Layer 3 – Network Layer
Layer 2- Data Link Layer
Layer 1-Physical Layer
5.2.2 identify protocols and devices
used on every layer of OSI model;
5.3.1 define Transmission Control Protocol/
Internet Protocol (TCP/ IP) architecture;
 The OSI Model we just looked at is just a
reference/logical model. It was designed to
describe the functions of the
communication system by dividing the
communication procedure into smaller and
simpler components.
 TCP/IP was designed and developed by the
Department of Defense (DoD) in the 1960s
and is based on standard protocols. It
stands for Transmission Control
Protocol/Internet Protocol.
What Does TCP/IP Do?

 The main work of TCP/IP is to transfer the data


of a computer from one device to another. The
main condition of this process is to make data
reliable and accurate so that the receiver will
receive the same information which is sent by
the sender. To ensure that, each message
reaches its final destination accurately, the
TCP/IP model divides its data into packets and
combines them at the other end, which helps
in maintaining the accuracy of the data while
transferring from one end to another end.
What is the Difference between TCP and IP?

 TCP and IP are different protocols of


Computer Networks. The basic difference
between TCP (Transmission Control Protocol)
and IP (Internet Protocol) is in the
transmission of data. In simple words, IP
finds the destination of the mail and TCP
has the work to send and receive the mail.
5.3.2 describe function of each layer
of TCP/ IP protocol architecture;
Application Layer

 The application layer is the highest


abstraction layer of the TCP/IP model that
provides the interfaces and protocols
needed by the users. It combines the
functionalities of the session layer, the
presentation layer and the application layer
of the OSI model.
Transport Layer

 transport layer protocols exchange data


receipt acknowledgments and retransmit
missing packets to ensure that packets
arrive in order and without error.
 The transport layer is responsible for

maintaining end-to-end communications


across the network. TCP handles
communications between hosts and
provides flow control and reliability
Network Layer
 It defines the protocols which are
responsible for the logical transmission of
data over the entire network.
 IP stands for Internet Protocol and it is

responsible for delivering packets from the


source host to the destination host by
looking at the IP addresses in the packet
headers.
Network Access Layer
 The Network Access Layer is the lowest
layer of the TCP/IP protocol hierarchy. The
protocols in this layer provide the means for
the system to deliver data to the other
devices on a directly attached network. It
defines how to use the network to transmit
an IP datagram.
5.3.3 compare the TCP/ IP
model with the OSI model
 TCP/IP VS OSI
 Number of Layers:
 TCP/IP has 4 layers.
 OSI has 7 layers.
 Real-World Examples:
 TCP/IP is used in the actual internet, so it's

more practical.
 OSI is more theoretical and less commonly

implemented.
 Developed Origin:
 TCP/IP was developed by the U.S.

Department of Defense.
 OSI was developed by the International

Organization for Standardization (ISO).


 Market Dominance:
 TCP/IP is the dominant model used in

practice and is the foundation of the


modern internet.
 OSI, while informative, didn't gain

widespread adoption in the industry and is


not used as the basis for the internet.
5.3.4 differentiate between circuits switching
and packet switching with examples;

 Circuit Switching:
 Circuit switching is like making a dedicated

phone call. When you use circuit switching,


a continuous path is established for your
entire conversation.
 Real-Life Example: Think of circuit switching
like an old-school landline phone call. When
you dial a number, the line is dedicated to
your call until you hang up. No one else can
use it
 Packet Switching:
 Packet switching is like sending letters in

the mail. Your message is divided into small


pieces (packets), and each piece finds its
own way to the destination. These pieces
are reassembled at the other end.
 Real-Life Example: Consider sending an
email. Your message is broken into smaller
parts, like separate envelopes for each
paragraph, and these envelopes take
different routes to reach the recipient. Once
they arrive, the recipient puts the
paragraphs together to read the complete
message.
5.3.5 differentiate between Internet Protocol
version 4 (IPv4) and Internet Protocol version
6 (IPv6);
 Internet Protocol version 4 (IPv4) is an older
network protocol used to identify and
communicate with devices on the internet.
It uses a 32-bit address format, expressed
as four sets of numbers from 0 to 255,
separated by periods (e.g., 192.168.1.1).
 Address Length:
 IPv4 uses 32-bit addresses, allowing for

approximately 4.3 billion unique addresses.


 Example: 192.168.1.1
 Address Exhaustion:
 IPv4 addresses are running out due to the

limited address space.


 IPv6 was introduced to address this issue

with its 128-bit address space.


 Notation:
 IPv4 addresses are written in decimal

format.
 IPv6 uses hexadecimal notation with colons

to separate blocks.
 Address Configuration:
 IPv4 addresses can be manually configured

or assigned via DHCP (Dynamic Host


Configuration Protocol).
 IPv6 addresses are often automatically

configured using Stateless Address


Autoconfiguration (SLAAC).
 Header Length:
 IPv4 headers are variable in length, typically

20 to 60 bytes.
 IPv6 headers are fixed at 40 bytes.
 Security and NAT:
 IPv4 relies on additional mechanisms like

NAT (Network Address Translation) and VPNs


for security.
 IPv6 has built-in security features, such as

IPsec.
 IPv4 is still widely used but is gradually
being supplemented by IPv6 to address
address exhaustion and improve security.
 In summary, IPv4 is an older internet
protocol with limited addresses and less
built-in security, while IPv6 is its successor,
designed to address these limitations with a
larger address space and enhanced
features.
 Internet Protocol version 6 (IPv6) is a modern
network protocol designed to improve upon
the limitations of its predecessor, IPv4. Here's
a simple explanation in steps:

 1. **Larger Address Space**:


 - IPv6 uses 128-bit addresses, which allows
for an incredibly vast number of unique
addresses.
 - Example:
2001:0db8:85a3:0000:0000:8a2e:0370:7334
 2. **Address Notation**:
 - IPv6 addresses are written in hexadecimal
format and separated by colons.
 - Example:
2001:0db8:85a3:0000:0000:8a2e:0370:7334

 3. **No More Address Exhaustion**:


 - IPv6 ensures we won't run out of unique IP
addresses, a problem faced by IPv4.
 4. **Simplified Header**:
 - IPv6 has a fixed 40-byte header, making
it more efficient than the variable-length
header in IPv4.

 5. **Improved Security**:
 - IPv6 includes built-in security features
through IPsec, enhancing network
communication security.
 6. **Automatic Configuration**:
 - Devices often configure their IPv6 addresses
automatically using Stateless Address Auto
configuration (SLAAC).

 In essence, IPv6 is an upgraded version of the


internet's addressing system, offering more
addresses, better security, and simplified
network management. It's designed to meet the
demands of our increasingly connected world.
Let's clarify how to identify the class of an IPv4 address with detailed
explanations and examples:

 1. **First Octet Value**:


 - Start by looking at the first octet (the first 8 bits) of the IPv4
address. It is expressed in decimal.

 2. **Binary Representation**:
 - Convert the decimal value of the first octet into binary (8 bits).
This will help you understand the bit pattern.

 3. **Identify the Class**:


 - Based on the binary bit pattern, you can determine the class as
follows:


 In IPv4, the class of an IP address is determined
by the range of the first octet (the first 8 bits) of
the address. Here's how the classes are identified
based on IP range:

 1. **Class A (1.0.0.0 to 126.0.0.0):** Class A


addresses have the first bit set to 0. These
addresses are designed for large networks, as
they can accommodate a very large number of
hosts.

 .
 2. **Class B (128.0.0.0 to 191.255.0.0):**
Class B addresses have the first two bits set
to 10. They are typically used for medium-
sized networks and offer a balance between
network and host capacity.
 3. **Class C (192.0.0.0 to 223.255.255.0):**
Class C addresses have the first three bits
set to 110. These are used for smaller
networks, as they have a limited number of
host addresses but offer more network
addresses.
 4. **Class D (224.0.0.0 to 239.0.0.0):**
Class D addresses are reserved for multicast
groups. Multicast allows data to be sent
from one source and received by multiple
hosts simultaneously.
 5. **Class E (240.0.0.0 to
255.255.255.255):** Class E addresses are
reserved for experimental and research
purposes and are not typically used for
standard network communication.

You might also like