尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
Data Communication &
Computer Networking
Md. Mahbub Alam
Scientific Officer
Institute of Electronics
Atomic Energy Research Establishment
Bangladesh Atomic Energy Commission
1.2
1-1 DATA COMMUNICATIONS
The term telecommunication means communication at a
distance. The word data refers to information presented in
whatever form is agreed upon by the parties creating and
using the data. Data communications are the exchange of
data between two devices via some form of transmission
medium such as a wire cable.
 Components of a data communications system
 Data Flow
Topics discussed in this section:
1.3
Figure 1.1 Components of a data communication system
1.4
Figure 1.2 Data flow (simplex, half-duplex, and full-duplex)
1.5
1-2 NETWORKS
A network is a set of devices (often referred to as nodes)
connected by communication links. A node can be a
computer, printer, or any other device capable of sending
and/or receiving data generated by other nodes on the
network. A link can be a cable, air, optical fiber, or any
medium which can transport a signal carrying
information.
 Network Criteria
 Physical Structures
 Categories of Networks
Topics discussed in this section:
1.6
Figure 1.4 Categories of topology
1.7
Figure 1.5 A fully connected mesh topology (five devices)
1.8
Figure 1.6 A star topology connecting four stations
1.9
Figure 1.7 A bus topology connecting three stations
1.10
Figure 1.8 A ring topology connecting six stations
1.11
Figure 1.9 A hybrid topology: a star backbone with three bus networks
• Local Area Networks (LANs)
– Short distances
– Designed to provide local interconnectivity
• Wide Area Networks (WANs)
– Long distances
– Provide connectivity over large areas
• Metropolitan Area Networks (MANs)
– Provide connectivity over areas such as a city, a campus
1.12
Categories of Networks
Broadcast Networks (2)
2.14
Figure 2.1 Tasks involved in sending a letter
2.15
2-2 THE OSI MODEL
Established in 1947, the International Standards
Organization (ISO) is a multinational body dedicated to
worldwide agreement on international standards. An ISO
standard that covers all aspects of network
communications is the Open Systems Interconnection (OSI)
model. It was first introduced in the late 1970s.
Layered Architecture
Peer-to-Peer Processes
Encapsulation
Topics discussed in this section:
2.16
Figure 2.2 Seven layers of the OSI model
2.17
Figure 2.15 Summary of layers
Guided Transmission Data
• Magnetic Media
• Twisted Pair
• Coaxial Cable
• Fiber Optics
Twisted Pair
(a) Category 3 UTP.
(b) Category 5 UTP.
Coaxial Cable
A coaxial cable.
Fiber Optics
(a) Three examples of a light ray from inside a silica fiber
impinging on the air/silica boundary at different angles.
(b) Light trapped by total internal reflection.
Fiber Cables
(a) Side view of a single fiber.
(b) End view of a sheath with three fibers.
Wireless Transmission
• The Electromagnetic Spectrum
• Radio Transmission
• Microwave Transmission
• Infrared and Millimeter Waves
• Lightwave Transmission
Radio Transmission
(a) In the VLF, LF, and MF bands, radio waves follow the
curvature of the earth.
(b) In the HF band, they bounce off the ionosphere.
Communication Satellites
• Geostationary Satellites
• Medium-Earth Orbit Satellites
• Low-Earth Orbit Satellites
• Satellites versus Fiber
Communication Satellites
Communication satellites and some of their properties, including
altitude above the earth, round-trip delay time and number of
satellites needed for global coverage.
IP Addresses
IP address formats.
DNS – The Domain Name System
• The DNS Name Space
• Resource Records
• Name Servers
The DNS Name Space
A portion of the Internet domain name space.
Network Security
• Computer Security - generic name for the collection of tools
designed to protect data and to thwart hackers.
• Network Security - measures to protect data during their
transmission.
Security Goals
Information needs to be hidden from
• Unauthorized access (Confidentiality)
• Protected from unauthorized change
(integrity)
• Available to an authorized entity when it is
needed (availability)
Security Goals
Confidentiality Availability Integrity
Security Attack
• any action that compromises the security of
information owned by an organization
• information security is about how to prevent
attacks, or failing that, to detect attacks on
information-based systems
• often threat & attack used to mean same
thing
• have a wide range of attacks
• can focus of generic types of attacks
– passive
– active
Passive Attacks
Active Attacks
Cryptography
 Cryptography is the study of
 Secret (crypto-) writing (-graphy)
 Concerned with developing algorithms:
 Conceal the context of some message
from all except the sender and recipient
(privacy or secrecy), and/or
 Verify the correctness of a message to
the recipient (authentication)
 Form the basis of many technological
solutions to computer and
communications security problems
Cryptography
• Basic idea: convert clear text (also
called plain text – the original message)
to ciphertext (the encrypted message)
ciphertext = encrypt(plaintext,
KE)
plaintext = decrypt(ciphertext,
KC)
• Can either make the encryption process
hidden, so that an intruder cannot know
it
• Or, can use a known technique and use
a hidden key
Some Basic Terminology
 plaintext - original message
 ciphertext - coded message
 cipher - algorithm for transforming plaintext to
ciphertext
 key - info used in cipher known only to
sender/receiver
 encipher (encrypt) - converting plaintext to
ciphertext
 decipher (decrypt) - recovering ciphertext from
plaintext
 cryptography - study of encryption
principles/methods
Type of encryption operations used
Substitution Technique
Caesar Cipher
 replaces each letter by 3rd letter on
 can define transformation as:
a b c d e f g h i j k l m n o p q r s t u v w x
y z
D E F G H I J K L M N O P Q R S T U V W X Y Z A
B C
 mathematically give each letter a number
a b c d e f g h i j k l m n o p q r s t u v w x y
z
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
25
 then have Caesar cipher as:
c = E(p) = (p + k) mod (26)
p = D(c) = (c – k) mod (26)
Thanks for your Patience

More Related Content

What's hot

Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networking
Sisir Ghosh
 
Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
Shafaan Khaliq Bhatti
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
Rajet Veshin
 
Data Communication Networks
Data Communication NetworksData Communication Networks
Data Communication Networks
Yash Gupta
 
Optical network architecture
Optical network architectureOptical network architecture
Optical network architecture
Siddharth Singh
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
Wayne Jones Jnr
 
Network architecture
Network architectureNetwork architecture
Network architecture
Dr. Shalini Pandey
 
X.25
X.25X.25
HDLC
HDLCHDLC
Frame relay
Frame relayFrame relay
Frame relay
Ayesha Maqsood
 
Data transmission
Data transmissionData transmission
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer mode
aniston0108
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
ArunChokkalingam
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
pavan kumar Thatikonda
 
Guided and unguided media
Guided and unguided mediaGuided and unguided media
Guided and unguided media
Hassan Osama
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
Steven Cahill
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
Faisal Mehmood
 
Osi model
Osi modelOsi model
Osi model
dhawal mehta
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
Rajesh Sadhukha
 
Propagation mechanisms
Propagation mechanismsPropagation mechanisms
Propagation mechanisms
METHODIST COLLEGE OF ENGG & TECH
 

What's hot (20)

Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networking
 
Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Data Communication Networks
Data Communication NetworksData Communication Networks
Data Communication Networks
 
Optical network architecture
Optical network architectureOptical network architecture
Optical network architecture
 
Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
X.25
X.25X.25
X.25
 
HDLC
HDLCHDLC
HDLC
 
Frame relay
Frame relayFrame relay
Frame relay
 
Data transmission
Data transmissionData transmission
Data transmission
 
Asynchronous transfer mode
Asynchronous transfer modeAsynchronous transfer mode
Asynchronous transfer mode
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
Guided and unguided media
Guided and unguided mediaGuided and unguided media
Guided and unguided media
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Osi model
Osi modelOsi model
Osi model
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Propagation mechanisms
Propagation mechanismsPropagation mechanisms
Propagation mechanisms
 

Similar to Data Communication & Networking Basics

DATA COMMUNICATION PPT
DATA COMMUNICATION PPTDATA COMMUNICATION PPT
DATA COMMUNICATION PPT
Majane Padua
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Ishant Tiwari
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Gaurav Mehndiratta
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
Deepak John
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
skknowledge
 
Note1
Note1Note1
IJET-V3I1P19
IJET-V3I1P19IJET-V3I1P19
ppt_dcn.pdf
ppt_dcn.pdfppt_dcn.pdf
ppt_dcn.pdf
MouDhara1
 
introduction to data comunication
introduction to data comunicationintroduction to data comunication
introduction to data comunication
Ravi Patel
 
CCNA ppt Day 2
CCNA ppt Day 2CCNA ppt Day 2
CCNA ppt Day 2
VISHNU N
 
Basics concept of network and internet mansi
Basics concept of network and internet   mansiBasics concept of network and internet   mansi
Basics concept of network and internet mansi
MansiGupta298
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
DeepVala5
 
lab_1_NW.pptx
lab_1_NW.pptxlab_1_NW.pptx
lab_1_NW.pptx
ssuserfdf196
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network security
Manish Tiwari
 
Ch 1 network
Ch 1  networkCh 1  network
Ch 1 network
MohamedAbdELhamed35
 
Network internet
Network internetNetwork internet
Network internet
Kumar
 
Networks internet
Networks internetNetworks internet
Networks internet
Kumar
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
Gulrez Khan
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
The Avi Sharma
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
shahinaz Altabbakh
 

Similar to Data Communication & Networking Basics (20)

DATA COMMUNICATION PPT
DATA COMMUNICATION PPTDATA COMMUNICATION PPT
DATA COMMUNICATION PPT
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
 
CN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdfCN-OSI-TCP-Models-001.pdf
CN-OSI-TCP-Models-001.pdf
 
Note1
Note1Note1
Note1
 
IJET-V3I1P19
IJET-V3I1P19IJET-V3I1P19
IJET-V3I1P19
 
ppt_dcn.pdf
ppt_dcn.pdfppt_dcn.pdf
ppt_dcn.pdf
 
introduction to data comunication
introduction to data comunicationintroduction to data comunication
introduction to data comunication
 
CCNA ppt Day 2
CCNA ppt Day 2CCNA ppt Day 2
CCNA ppt Day 2
 
Basics concept of network and internet mansi
Basics concept of network and internet   mansiBasics concept of network and internet   mansi
Basics concept of network and internet mansi
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
 
lab_1_NW.pptx
lab_1_NW.pptxlab_1_NW.pptx
lab_1_NW.pptx
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network security
 
Ch 1 network
Ch 1  networkCh 1  network
Ch 1 network
 
Network internet
Network internetNetwork internet
Network internet
 
Networks internet
Networks internetNetworks internet
Networks internet
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 

Recently uploaded

How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17
Celine George
 
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
yarusun
 
How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...
Infosec
 
Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...
Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...
Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...
biruktesfaye27
 
Diversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT KanpurDiversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
 
(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"
MJDuyan
 
Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024
Friends of African Village Libraries
 
IoT (Internet of Things) introduction Notes.pdf
IoT (Internet of Things) introduction Notes.pdfIoT (Internet of Things) introduction Notes.pdf
IoT (Internet of Things) introduction Notes.pdf
roshanranjit222
 
Creativity for Innovation and Speechmaking
Creativity for Innovation and SpeechmakingCreativity for Innovation and Speechmaking
Creativity for Innovation and Speechmaking
MattVassar1
 
Keynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse CityKeynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse City
PJ Caposey
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
Kalna College
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapitolTechU
 
managing Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptxmanaging Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptx
nabaegha
 
A Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by QuizzitoA Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by Quizzito
Quizzito The Quiz Society of Gargi College
 
Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024
khabri85
 
Decolonizing Universal Design for Learning
Decolonizing Universal Design for LearningDecolonizing Universal Design for Learning
Decolonizing Universal Design for Learning
Frederic Fovet
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
Kalna College
 
Opportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive themOpportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive them
EducationNC
 
nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...
chaudharyreet2244
 

Recently uploaded (20)

How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17
 
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
 
How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...
 
Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...
Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...
Ethiopia and Eritrea Eritrea's journey has been marked by resilience and dete...
 
Diversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT KanpurDiversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT Kanpur
 
(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"(T.L.E.) Agriculture: "Ornamental Plants"
(T.L.E.) Agriculture: "Ornamental Plants"
 
Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024Library news letter Kitengesa Uganda June 2024
Library news letter Kitengesa Uganda June 2024
 
IoT (Internet of Things) introduction Notes.pdf
IoT (Internet of Things) introduction Notes.pdfIoT (Internet of Things) introduction Notes.pdf
IoT (Internet of Things) introduction Notes.pdf
 
Creativity for Innovation and Speechmaking
Creativity for Innovation and SpeechmakingCreativity for Innovation and Speechmaking
Creativity for Innovation and Speechmaking
 
Keynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse CityKeynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse City
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science220711130082 Srabanti Bag Internet Resources For Natural Science
220711130082 Srabanti Bag Internet Resources For Natural Science
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
 
managing Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptxmanaging Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptx
 
A Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by QuizzitoA Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by Quizzito
 
Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024
 
Decolonizing Universal Design for Learning
Decolonizing Universal Design for LearningDecolonizing Universal Design for Learning
Decolonizing Universal Design for Learning
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
 
Opportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive themOpportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive them
 
nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...nutrition in plants chapter 1 class 7...
nutrition in plants chapter 1 class 7...
 

Data Communication & Networking Basics

  • 1. Data Communication & Computer Networking Md. Mahbub Alam Scientific Officer Institute of Electronics Atomic Energy Research Establishment Bangladesh Atomic Energy Commission
  • 2. 1.2 1-1 DATA COMMUNICATIONS The term telecommunication means communication at a distance. The word data refers to information presented in whatever form is agreed upon by the parties creating and using the data. Data communications are the exchange of data between two devices via some form of transmission medium such as a wire cable.  Components of a data communications system  Data Flow Topics discussed in this section:
  • 3. 1.3 Figure 1.1 Components of a data communication system
  • 4. 1.4 Figure 1.2 Data flow (simplex, half-duplex, and full-duplex)
  • 5. 1.5 1-2 NETWORKS A network is a set of devices (often referred to as nodes) connected by communication links. A node can be a computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the network. A link can be a cable, air, optical fiber, or any medium which can transport a signal carrying information.  Network Criteria  Physical Structures  Categories of Networks Topics discussed in this section:
  • 7. 1.7 Figure 1.5 A fully connected mesh topology (five devices)
  • 8. 1.8 Figure 1.6 A star topology connecting four stations
  • 9. 1.9 Figure 1.7 A bus topology connecting three stations
  • 10. 1.10 Figure 1.8 A ring topology connecting six stations
  • 11. 1.11 Figure 1.9 A hybrid topology: a star backbone with three bus networks
  • 12. • Local Area Networks (LANs) – Short distances – Designed to provide local interconnectivity • Wide Area Networks (WANs) – Long distances – Provide connectivity over large areas • Metropolitan Area Networks (MANs) – Provide connectivity over areas such as a city, a campus 1.12 Categories of Networks
  • 14. 2.14 Figure 2.1 Tasks involved in sending a letter
  • 15. 2.15 2-2 THE OSI MODEL Established in 1947, the International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards. An ISO standard that covers all aspects of network communications is the Open Systems Interconnection (OSI) model. It was first introduced in the late 1970s. Layered Architecture Peer-to-Peer Processes Encapsulation Topics discussed in this section:
  • 16. 2.16 Figure 2.2 Seven layers of the OSI model
  • 18. Guided Transmission Data • Magnetic Media • Twisted Pair • Coaxial Cable • Fiber Optics
  • 19. Twisted Pair (a) Category 3 UTP. (b) Category 5 UTP.
  • 21. Fiber Optics (a) Three examples of a light ray from inside a silica fiber impinging on the air/silica boundary at different angles. (b) Light trapped by total internal reflection.
  • 22. Fiber Cables (a) Side view of a single fiber. (b) End view of a sheath with three fibers.
  • 23. Wireless Transmission • The Electromagnetic Spectrum • Radio Transmission • Microwave Transmission • Infrared and Millimeter Waves • Lightwave Transmission
  • 24. Radio Transmission (a) In the VLF, LF, and MF bands, radio waves follow the curvature of the earth. (b) In the HF band, they bounce off the ionosphere.
  • 25. Communication Satellites • Geostationary Satellites • Medium-Earth Orbit Satellites • Low-Earth Orbit Satellites • Satellites versus Fiber
  • 26. Communication Satellites Communication satellites and some of their properties, including altitude above the earth, round-trip delay time and number of satellites needed for global coverage.
  • 28. DNS – The Domain Name System • The DNS Name Space • Resource Records • Name Servers
  • 29. The DNS Name Space A portion of the Internet domain name space.
  • 30. Network Security • Computer Security - generic name for the collection of tools designed to protect data and to thwart hackers. • Network Security - measures to protect data during their transmission.
  • 31. Security Goals Information needs to be hidden from • Unauthorized access (Confidentiality) • Protected from unauthorized change (integrity) • Available to an authorized entity when it is needed (availability) Security Goals Confidentiality Availability Integrity
  • 32. Security Attack • any action that compromises the security of information owned by an organization • information security is about how to prevent attacks, or failing that, to detect attacks on information-based systems • often threat & attack used to mean same thing • have a wide range of attacks • can focus of generic types of attacks – passive – active
  • 35. Cryptography  Cryptography is the study of  Secret (crypto-) writing (-graphy)  Concerned with developing algorithms:  Conceal the context of some message from all except the sender and recipient (privacy or secrecy), and/or  Verify the correctness of a message to the recipient (authentication)  Form the basis of many technological solutions to computer and communications security problems
  • 36. Cryptography • Basic idea: convert clear text (also called plain text – the original message) to ciphertext (the encrypted message) ciphertext = encrypt(plaintext, KE) plaintext = decrypt(ciphertext, KC) • Can either make the encryption process hidden, so that an intruder cannot know it • Or, can use a known technique and use a hidden key
  • 37. Some Basic Terminology  plaintext - original message  ciphertext - coded message  cipher - algorithm for transforming plaintext to ciphertext  key - info used in cipher known only to sender/receiver  encipher (encrypt) - converting plaintext to ciphertext  decipher (decrypt) - recovering ciphertext from plaintext  cryptography - study of encryption principles/methods
  • 38. Type of encryption operations used Substitution Technique Caesar Cipher  replaces each letter by 3rd letter on  can define transformation as: a b c d e f g h i j k l m n o p q r s t u v w x y z D E F G H I J K L M N O P Q R S T U V W X Y Z A B C  mathematically give each letter a number a b c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25  then have Caesar cipher as: c = E(p) = (p + k) mod (26) p = D(c) = (c – k) mod (26)
  • 39. Thanks for your Patience
  翻译: