SlideShare a Scribd company logo
1 of 36
Download to read offline
COM 526 – Data
Communication Systems
Lecture 1- Introduction to the Internet:
Architecture and Protocols
Dr. Nermin Salem
nfawzy@fue.edu.eg
Faculty of Engineering and Technology
Electrical Engineering Department
What is the new trends in Data Communications ?
Dr. Nermin Salem COM 526 - L1 2
What is new in Data Communications ?
• Without a doubt, the biggest networking technology development of the 2020s is one
that’s going to be all around us very soon → The deployment of next-generation
wireless networks.
• In the mobile networking area: 5G is characterized by increased speed, reduced latency,
and improved flexibility of the wireless services, 5G would solve the issue of many
wireless devices connected at once – and IoT makes it worse by slowing wireless
network performance. Wi Fi 6 infrastructure is ready to go however Wi Fi 6 capable
devices such as computers and mobile phones manufacturers need to adopt new
standards.
• In Artificial Intelligence (AI) and Machine Learning (ML): ML can make predictions
based on network data and AI can take intelligent actions based on those prophecies.
Advanced analytics into automation systems will bring in self-operating networks.
Dr. Nermin Salem COM 526 - L1 3
What is new in Data Communications ?
• Augmented reality (AR) and virtual reality (VR) technologies empower the applications and
customer experiences.
• Cloud computing: Cloud allows faster transition to remote work and help to organize remote
workplace more efficiently and this contributed to business continuity during any crisis.
Maintaining consistent network and security policies across multiple clouds using multi cloud
policy management.
• DevOps is tied up to software development and IT. DevOps improve relationship between
network service designers and engineers to make operational changes to the services.
• Digital transformation: It enables adoption of digital technology to transform services or
businesses, by replacing on digital or manual processes with digital processes. Process of
digitization transforms into digital forms that are processed, stored, and transmitted via digital
devices and networks.
• Intent-based networking (IBN): The creation of secure zones called Microsegments which will
allow IoT devices to operate on same corporate network and reducing the risks to other parts of
the network.
Dr. Nermin Salem COM 526 - L1 4
What is new in Data Communications ?
• Internet of Things (IoT): IoT is all about connecting the unconnected. Majority of objects
are unconnected however with IoT devices are acquiring capabilities to communicate and
connect with other devices and people changing the way we work.
• Data Security: usability and integrity of network is crucial to security. Effective network
security manages network access effectively and stops a variety of threats entering or
spreading within the network
• SD-WAN: is a software-based approach to manage Wide Area networks (WANs). This
technology lowers operational costs and improvement in resource usage in multisite
deployments. Network administrator using this SD-WAN technology can use bandwidth
more efficiently and help to ensure enhanced performance for business-critical
applications without compromising data security and privacy.
Dr. Nermin Salem COM 526 - L1 5
Course Outline
The CCNAv7.02 curriculum is presented in three courses:
• Introduction to Networks (ITN)
• Switching, Routing and Wireless Essentials (SRWE)
• Enterprise Networking, Security, and Automation (ENSA)
Dr. Nermin Salem COM 526 - L1 6
Course Outline
Introduction to Networks (ITN)
➢ The Introduction to Networks (ITN) course introduces students to networking architectures,
models, protocols, and components.
➢ These components facilitate the connection of users, devices, applications and data through the
internet and across modern computer networks.
➢ By the end of the course, students can perform basic configurations for routers and switches to
build simple local area networks (LANs) that integrate IP addressing schemes and foundational
network security.
Dr. Nermin Salem COM 526 - L1 7
Course Outline – Network Essentials
• Introduction to The Internet: Architecture and Protocols.
• Protocol Architecture.
• Digital Data Communications Techniques.
• Physical Layer Protocol of the OSI (Open-Source interconnection) Reference Model.
• Data Link Control Protocol.
• Ethernet Switching.
• Network Layer.
• Address Resolution.
• Basic Router Configuration.
• IPv4 Addressing.
• IPv6 Addressing.
• ICMP (Internet Control Message Protocol).
• Transport Layer.
• Application Layer.
• Network Security Fundamentals.
• Build a Small Network.
Dr. Nermin Salem COM 526 - L1 8
Teaching Staff
• Instructor:
Dr. Nermin Salem, PhD
Email: nfawzy@fue.edu.eg
Office hours: B4.6 (From Sunday to Wednesday) otherwise by email
appointment.
• Assistant:
Eng. Ahmed Hegazy
Email:
Office hours: As agreed
Dr. Nermin Salem COM 526 - L1 9
Grading
Dr. Nermin Salem COM 526 - L1 10
▪ Quizzes (2) 10 %
▪ Lab work:
10 %
▪ Lab Exam:
10 %
▪ Midterm: 20 %
10 %
▪ Participation &
Assignments
▪ Final Exam:
2 Hours 40 %
Textbook
Dr. Nermin Salem COM 526 - L1 11
• Essential Textbook • Behrouz Forouzan, “Data communication and
networking”, 5th Ed., McGrawHill, 2013
• CCNA v7.02 Materials
Extra Recommended Book
W. Stallings, “Data and computer
communications” 10th Edition, Pearson, 2014
Lab Work
Dr. Nermin Salem COM 526 - L1 12
▪ Practice and Lab
assignments are
performed using Packet
Tracer.
▪ Packet Tracer v. 8.02 is
a powerful network
simulation tool built by
Cisco.
What is a Network?
• It is a group of components or devices which are connected to give the user
a certain service (application).
Dr. Nermin Salem COM 526 - L1 13
Network Components
Host Roles
Every computer on a network is called
a host or end device.
Servers are computers that provide
information to end devices:
• email servers
• web servers
• file server
Clients are computers that send
requests to the servers to retrieve
information:
• web page from a web server
• email from an email server
Dr. Nermin Salem COM 526 - L1 14
time Description
Email Email server runs email server software.
Clients use client software to access email.
Web Web server runs web server software.
Clients use browser software to access web pages.
File File server stores corporate and user files.
The client devices access these files.
Network Components
Peer-to-Peer
It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of network
design is only recommended for very small networks.
Dr. Nermin Salem COM 526 - L1 15
Advantages Disadvantages
Easy to set up No centralized administration
Less complex Not as secure
Lower cost Not scalable
Used for simple tasks: transferring files and
sharing printers
Slower performance
Network Components
Intermediary Network Devices
An intermediary device interconnects end devices. Examples include switches, wireless
access points, routers, and firewalls.
Management of data as it flows through a network is also the role of an intermediary
device, including:
• Regenerate and retransmit data signals.
• Maintain information about what pathways exist in the network.
• Notify other devices of errors and communication failures.
Dr. Nermin Salem COM 526 - L1 16
17
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Components
Network Media
Communication across a network is carried through a medium which allows a message to
travel from source to destination.
Media Types Description
Metal wires within
cables
Uses electrical impulses
Glass or plastic fibers
within cables (fiber-optic
cable)
Uses pulses of light.
Wireless transmission Uses modulation of
specific frequencies of
electromagnetic waves.
17
18
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Representations and Topologies
Network Representations
Network diagrams, often called topology
diagrams, use symbols to represent
devices within the network.
Important terms to know include:
• Network Interface Card (NIC)
• Physical Port
• Interface
Note: Often, the terms port and
interface are used interchangeably
18
19
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Representations and Topologies
Topology Diagrams
Physical topology diagrams illustrate the
physical location of intermediary devices and
cable installation.
Logical topology diagrams illustrate devices,
ports, and the addressing scheme of the
network.
19
20
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Common Types of Networks
Networks of Many Sizes
• Small Home Networks – connect a few
computers to each other and the Internet
• Small Office/Home Office – enables
computer within a home or remote office
to connect to a corporate network
• Medium to Large Networks – many
locations with hundreds or thousands of
interconnected computers
• World Wide Networks – connects
hundreds of millions of computers world-
wide – such as the internet
Small Home SOHO
Medium/Large World Wide
20
21
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Common Types of Networks
LANs and WANs
Network infrastructures vary greatly in
terms of:
• Size of the area covered
• Number of users connected
• Number and types of services
available
• Area of responsibility
Two most common types of networks:
• Local Area Network (LAN)
• Wide Area Network (WAN).
21
22
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Common Types of Networks
LANs and WANs (cont.)
A LAN is a network infrastructure that spans
a small geographical area.
A WAN is a network infrastructure that spans
a wide geographical area.
LAN WAN
Interconnect end devices in a limited area. Interconnect LANs over wide geographical areas.
Administered by a single organization or
individual.
Typically administered by one or more service
providers.
Provide high-speed bandwidth to internal
devices.
Typically provide slower speed links between LANs.
22
23
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Common Types of Networks
The Internet
The internet is a worldwide collection of
interconnected LANs and WANs.
• LANs are connected to each other using
WANs.
• WANs may use copper wires, fiber optic
cables, and wireless transmissions.
The internet is not owned by any individual
or group. The following groups were
developed to help maintain structure on the
internet:
• IETF
• ICANN
• IAB
23
24
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Common Types of Networks
Intranets and Extranets
An intranet is a private collection of LANs
and WANs internal to an organization that
is meant to be accessible only to the
organizations members or others with
authorization.
An organization might use an extranet to
provide secure access to their network for
individuals who work for a different
organization that need access to their data
on their network.
24
25
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet Connections
Internet Access Technologies There are many ways to connect users
and organizations to the internet:
• Popular services for home users
and small offices include broadband
cable, broadband digital subscriber
line (DSL), wireless WANs, and
mobile services.
• Organizations need faster
connections to support IP phones,
video conferencing and data center
storage.
• Business-class interconnections are
usually provided by service
providers (SP) and may include:
business DSL, leased lines, and
Metro Ethernet.
25
26
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet Connections
Businesses Internet Connections
Corporate business connections may
require:
• higher bandwidth
• dedicated connections
• managed services
26
27
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet Connections
The Converging Network
Before converged networks, an
organization would have been
separately cabled for telephone, video,
and data. Each of these networks would
use different technologies to carry the
signal.
Each of these technologies would use a
different set of rules and standards.
27
28
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Internet Connections
The Converging Network (Cont.)
Converged data networks carry
multiple services on one link including:
• data
• voice
• video
Converged networks can deliver data,
voice, and video over the same
network infrastructure. The network
infrastructure uses the same set of
rules and standards.
28
29
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Reliable Network
Network Architecture
Network Architecture refers to the
technologies that support the infrastructure
that moves data across the network.
There are four basic characteristics that the
underlying architectures need to address to
meet user expectations:
• Fault Tolerance
• Scalability
• Quality of Service (QoS)
• Security
29
30
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Reliable Network
Fault Tolerance
A fault tolerant network limits the impact of a
failure by limiting the number of affected
devices. Multiple paths are required for fault
tolerance.
Reliable networks provide redundancy by
implementing a packet switched network:
• Packet switching splits traffic into
packets that are routed over a network.
• Each packet could theoretically take a
different path to the destination.
This is not possible with circuit-switched
networks which establish dedicated circuits.
30
31
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Reliable Network
Scalability
A scalable network can expand
quickly and easily to support
new users and applications
without impacting the
performance of services to
existing users.
Network designers follow
accepted standards and
protocols in order to make the
networks scalable.
31
32
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Reliable Network
Quality of Service
Voice and live video transmissions require
higher expectations for those services
being delivered.
Have you ever watched a live video with
constant breaks and pauses? This is
caused when there is a higher demand for
bandwidth than available – and QoS isn’t
configured.
• Quality of Service (QoS) is the primary
mechanism used to ensure reliable
delivery of content for all users.
• With a QoS policy in place, the router
can more easily manage the flow of data
and voice traffic.
32
33
© 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Reliable Network
Network Security
There are two main types of network
security that must be addressed:
• Network infrastructure security
• Physical security of network devices
• Preventing unauthorized access to the
devices
• Information Security
• Protection of the information or data
transmitted over the network
Three goals of network security:
• Confidentiality – only intended
recipients can read the data
• Integrity – assurance that the data has
not be altered with during transmission
• Availability – assurance of timely and
reliable access to data for authorized
users
33
Protocol
• A specification of the messages that communicating entities exchange.
• Very much like conversational conventions … determining who should talk next and
how they should respond.
• Designing a good protocol is harder than it first seems!
➢A Protocol is a set of rules that govern data communications.
➢ It determines what is communicated.
➢ How it is communicated.
➢ When it is communicated.
The key elements of a protocol are syntax, semantics and timing.
Dr. Nermin Salem COM 526 - L1 34
Protocol
1. Syntax
• Structure or format of the data
• Indicates how to read the bits - field delineation
2. Semantics
• Interprets the meaning of the bits
• Knows which fields define what action
3. Timing
• When data should be sent and what
• Speed at which data should be sent or speed at which it is being received.
Dr. Nermin Salem COM 526 - L1 35
References
1. Forouzan, Behrouz A, Catherine A. Coombs, and Sophia C. Fegan, “Data
Communications and Networking”, 5th Edition, Boston: McGraw-Hill, 2001.
2. CNNA v7.02 Materials.
3. W. Stallings, “Data and computer communications”, 10th Edition, Pearson,
2014.
Dr. Nermin Salem COM 526 - L1 36

More Related Content

Similar to COM526_Lecture 1.pdf

ITN_Module_1.pptx
ITN_Module_1.pptxITN_Module_1.pptx
ITN_Module_1.pptxAshiruMUmar
 
ITN_Module_1-Networking Today.pptx
ITN_Module_1-Networking Today.pptxITN_Module_1-Networking Today.pptx
ITN_Module_1-Networking Today.pptxcongbach3
 
Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdffreddysarabia1
 
ch2-What are Connections?
ch2-What are Connections?ch2-What are Connections?
ch2-What are Connections?ssuser06ea42
 
15827 sr no01
15827 sr no0115827 sr no01
15827 sr no01pratiklpu
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdfRupesh930637
 
This course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docxThis course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docxchristalgrieg
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2wilfredo dela cerna
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer networkTrinity Dwarka
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyaravindhawan
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkammulu99
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialRodel Morales
 
Fiber Optic Network Topologies Ring Star and Mesh.pptx
Fiber Optic Network Topologies Ring Star and Mesh.pptxFiber Optic Network Topologies Ring Star and Mesh.pptx
Fiber Optic Network Topologies Ring Star and Mesh.pptxVERSITRONINC
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorialajaymane22
 

Similar to COM526_Lecture 1.pdf (20)

Itn module 1
Itn module 1Itn module 1
Itn module 1
 
ITN_Module_1.pptx
ITN_Module_1.pptxITN_Module_1.pptx
ITN_Module_1.pptx
 
ITN_Module_1.pptx
ITN_Module_1.pptxITN_Module_1.pptx
ITN_Module_1.pptx
 
ITN_Module_1-Networking Today.pptx
ITN_Module_1-Networking Today.pptxITN_Module_1-Networking Today.pptx
ITN_Module_1-Networking Today.pptx
 
ITN_Module_1.pdf
ITN_Module_1.pdfITN_Module_1.pdf
ITN_Module_1.pdf
 
Module name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdfModule name is Networks 512 As the demand for faster and .pdf
Module name is Networks 512 As the demand for faster and .pdf
 
ch2-What are Connections?
ch2-What are Connections?ch2-What are Connections?
ch2-What are Connections?
 
15827 sr no01
15827 sr no0115827 sr no01
15827 sr no01
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
This course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docxThis course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docx
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
Week2
Week2Week2
Week2
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
 
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technologyA study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
A study-and-analysis-of-access-to-high-speed-connection-in-wireless-technology
 
Cn
CnCn
Cn
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Fiber Optic Network Topologies Ring Star and Mesh.pptx
Fiber Optic Network Topologies Ring Star and Mesh.pptxFiber Optic Network Topologies Ring Star and Mesh.pptx
Fiber Optic Network Topologies Ring Star and Mesh.pptx
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 

COM526_Lecture 1.pdf

  • 1. COM 526 – Data Communication Systems Lecture 1- Introduction to the Internet: Architecture and Protocols Dr. Nermin Salem nfawzy@fue.edu.eg Faculty of Engineering and Technology Electrical Engineering Department
  • 2. What is the new trends in Data Communications ? Dr. Nermin Salem COM 526 - L1 2
  • 3. What is new in Data Communications ? • Without a doubt, the biggest networking technology development of the 2020s is one that’s going to be all around us very soon → The deployment of next-generation wireless networks. • In the mobile networking area: 5G is characterized by increased speed, reduced latency, and improved flexibility of the wireless services, 5G would solve the issue of many wireless devices connected at once – and IoT makes it worse by slowing wireless network performance. Wi Fi 6 infrastructure is ready to go however Wi Fi 6 capable devices such as computers and mobile phones manufacturers need to adopt new standards. • In Artificial Intelligence (AI) and Machine Learning (ML): ML can make predictions based on network data and AI can take intelligent actions based on those prophecies. Advanced analytics into automation systems will bring in self-operating networks. Dr. Nermin Salem COM 526 - L1 3
  • 4. What is new in Data Communications ? • Augmented reality (AR) and virtual reality (VR) technologies empower the applications and customer experiences. • Cloud computing: Cloud allows faster transition to remote work and help to organize remote workplace more efficiently and this contributed to business continuity during any crisis. Maintaining consistent network and security policies across multiple clouds using multi cloud policy management. • DevOps is tied up to software development and IT. DevOps improve relationship between network service designers and engineers to make operational changes to the services. • Digital transformation: It enables adoption of digital technology to transform services or businesses, by replacing on digital or manual processes with digital processes. Process of digitization transforms into digital forms that are processed, stored, and transmitted via digital devices and networks. • Intent-based networking (IBN): The creation of secure zones called Microsegments which will allow IoT devices to operate on same corporate network and reducing the risks to other parts of the network. Dr. Nermin Salem COM 526 - L1 4
  • 5. What is new in Data Communications ? • Internet of Things (IoT): IoT is all about connecting the unconnected. Majority of objects are unconnected however with IoT devices are acquiring capabilities to communicate and connect with other devices and people changing the way we work. • Data Security: usability and integrity of network is crucial to security. Effective network security manages network access effectively and stops a variety of threats entering or spreading within the network • SD-WAN: is a software-based approach to manage Wide Area networks (WANs). This technology lowers operational costs and improvement in resource usage in multisite deployments. Network administrator using this SD-WAN technology can use bandwidth more efficiently and help to ensure enhanced performance for business-critical applications without compromising data security and privacy. Dr. Nermin Salem COM 526 - L1 5
  • 6. Course Outline The CCNAv7.02 curriculum is presented in three courses: • Introduction to Networks (ITN) • Switching, Routing and Wireless Essentials (SRWE) • Enterprise Networking, Security, and Automation (ENSA) Dr. Nermin Salem COM 526 - L1 6
  • 7. Course Outline Introduction to Networks (ITN) ➢ The Introduction to Networks (ITN) course introduces students to networking architectures, models, protocols, and components. ➢ These components facilitate the connection of users, devices, applications and data through the internet and across modern computer networks. ➢ By the end of the course, students can perform basic configurations for routers and switches to build simple local area networks (LANs) that integrate IP addressing schemes and foundational network security. Dr. Nermin Salem COM 526 - L1 7
  • 8. Course Outline – Network Essentials • Introduction to The Internet: Architecture and Protocols. • Protocol Architecture. • Digital Data Communications Techniques. • Physical Layer Protocol of the OSI (Open-Source interconnection) Reference Model. • Data Link Control Protocol. • Ethernet Switching. • Network Layer. • Address Resolution. • Basic Router Configuration. • IPv4 Addressing. • IPv6 Addressing. • ICMP (Internet Control Message Protocol). • Transport Layer. • Application Layer. • Network Security Fundamentals. • Build a Small Network. Dr. Nermin Salem COM 526 - L1 8
  • 9. Teaching Staff • Instructor: Dr. Nermin Salem, PhD Email: nfawzy@fue.edu.eg Office hours: B4.6 (From Sunday to Wednesday) otherwise by email appointment. • Assistant: Eng. Ahmed Hegazy Email: Office hours: As agreed Dr. Nermin Salem COM 526 - L1 9
  • 10. Grading Dr. Nermin Salem COM 526 - L1 10 ▪ Quizzes (2) 10 % ▪ Lab work: 10 % ▪ Lab Exam: 10 % ▪ Midterm: 20 % 10 % ▪ Participation & Assignments ▪ Final Exam: 2 Hours 40 %
  • 11. Textbook Dr. Nermin Salem COM 526 - L1 11 • Essential Textbook • Behrouz Forouzan, “Data communication and networking”, 5th Ed., McGrawHill, 2013 • CCNA v7.02 Materials Extra Recommended Book W. Stallings, “Data and computer communications” 10th Edition, Pearson, 2014
  • 12. Lab Work Dr. Nermin Salem COM 526 - L1 12 ▪ Practice and Lab assignments are performed using Packet Tracer. ▪ Packet Tracer v. 8.02 is a powerful network simulation tool built by Cisco.
  • 13. What is a Network? • It is a group of components or devices which are connected to give the user a certain service (application). Dr. Nermin Salem COM 526 - L1 13
  • 14. Network Components Host Roles Every computer on a network is called a host or end device. Servers are computers that provide information to end devices: • email servers • web servers • file server Clients are computers that send requests to the servers to retrieve information: • web page from a web server • email from an email server Dr. Nermin Salem COM 526 - L1 14 time Description Email Email server runs email server software. Clients use client software to access email. Web Web server runs web server software. Clients use browser software to access web pages. File File server stores corporate and user files. The client devices access these files.
  • 15. Network Components Peer-to-Peer It is possible to have a device be a client and a server in a Peer-to-Peer Network. This type of network design is only recommended for very small networks. Dr. Nermin Salem COM 526 - L1 15 Advantages Disadvantages Easy to set up No centralized administration Less complex Not as secure Lower cost Not scalable Used for simple tasks: transferring files and sharing printers Slower performance
  • 16. Network Components Intermediary Network Devices An intermediary device interconnects end devices. Examples include switches, wireless access points, routers, and firewalls. Management of data as it flows through a network is also the role of an intermediary device, including: • Regenerate and retransmit data signals. • Maintain information about what pathways exist in the network. • Notify other devices of errors and communication failures. Dr. Nermin Salem COM 526 - L1 16
  • 17. 17 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Components Network Media Communication across a network is carried through a medium which allows a message to travel from source to destination. Media Types Description Metal wires within cables Uses electrical impulses Glass or plastic fibers within cables (fiber-optic cable) Uses pulses of light. Wireless transmission Uses modulation of specific frequencies of electromagnetic waves. 17
  • 18. 18 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Representations and Topologies Network Representations Network diagrams, often called topology diagrams, use symbols to represent devices within the network. Important terms to know include: • Network Interface Card (NIC) • Physical Port • Interface Note: Often, the terms port and interface are used interchangeably 18
  • 19. 19 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Network Representations and Topologies Topology Diagrams Physical topology diagrams illustrate the physical location of intermediary devices and cable installation. Logical topology diagrams illustrate devices, ports, and the addressing scheme of the network. 19
  • 20. 20 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Common Types of Networks Networks of Many Sizes • Small Home Networks – connect a few computers to each other and the Internet • Small Office/Home Office – enables computer within a home or remote office to connect to a corporate network • Medium to Large Networks – many locations with hundreds or thousands of interconnected computers • World Wide Networks – connects hundreds of millions of computers world- wide – such as the internet Small Home SOHO Medium/Large World Wide 20
  • 21. 21 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Common Types of Networks LANs and WANs Network infrastructures vary greatly in terms of: • Size of the area covered • Number of users connected • Number and types of services available • Area of responsibility Two most common types of networks: • Local Area Network (LAN) • Wide Area Network (WAN). 21
  • 22. 22 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Common Types of Networks LANs and WANs (cont.) A LAN is a network infrastructure that spans a small geographical area. A WAN is a network infrastructure that spans a wide geographical area. LAN WAN Interconnect end devices in a limited area. Interconnect LANs over wide geographical areas. Administered by a single organization or individual. Typically administered by one or more service providers. Provide high-speed bandwidth to internal devices. Typically provide slower speed links between LANs. 22
  • 23. 23 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Common Types of Networks The Internet The internet is a worldwide collection of interconnected LANs and WANs. • LANs are connected to each other using WANs. • WANs may use copper wires, fiber optic cables, and wireless transmissions. The internet is not owned by any individual or group. The following groups were developed to help maintain structure on the internet: • IETF • ICANN • IAB 23
  • 24. 24 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Common Types of Networks Intranets and Extranets An intranet is a private collection of LANs and WANs internal to an organization that is meant to be accessible only to the organizations members or others with authorization. An organization might use an extranet to provide secure access to their network for individuals who work for a different organization that need access to their data on their network. 24
  • 25. 25 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet Connections Internet Access Technologies There are many ways to connect users and organizations to the internet: • Popular services for home users and small offices include broadband cable, broadband digital subscriber line (DSL), wireless WANs, and mobile services. • Organizations need faster connections to support IP phones, video conferencing and data center storage. • Business-class interconnections are usually provided by service providers (SP) and may include: business DSL, leased lines, and Metro Ethernet. 25
  • 26. 26 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet Connections Businesses Internet Connections Corporate business connections may require: • higher bandwidth • dedicated connections • managed services 26
  • 27. 27 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet Connections The Converging Network Before converged networks, an organization would have been separately cabled for telephone, video, and data. Each of these networks would use different technologies to carry the signal. Each of these technologies would use a different set of rules and standards. 27
  • 28. 28 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Internet Connections The Converging Network (Cont.) Converged data networks carry multiple services on one link including: • data • voice • video Converged networks can deliver data, voice, and video over the same network infrastructure. The network infrastructure uses the same set of rules and standards. 28
  • 29. 29 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Reliable Network Network Architecture Network Architecture refers to the technologies that support the infrastructure that moves data across the network. There are four basic characteristics that the underlying architectures need to address to meet user expectations: • Fault Tolerance • Scalability • Quality of Service (QoS) • Security 29
  • 30. 30 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Reliable Network Fault Tolerance A fault tolerant network limits the impact of a failure by limiting the number of affected devices. Multiple paths are required for fault tolerance. Reliable networks provide redundancy by implementing a packet switched network: • Packet switching splits traffic into packets that are routed over a network. • Each packet could theoretically take a different path to the destination. This is not possible with circuit-switched networks which establish dedicated circuits. 30
  • 31. 31 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Reliable Network Scalability A scalable network can expand quickly and easily to support new users and applications without impacting the performance of services to existing users. Network designers follow accepted standards and protocols in order to make the networks scalable. 31
  • 32. 32 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Reliable Network Quality of Service Voice and live video transmissions require higher expectations for those services being delivered. Have you ever watched a live video with constant breaks and pauses? This is caused when there is a higher demand for bandwidth than available – and QoS isn’t configured. • Quality of Service (QoS) is the primary mechanism used to ensure reliable delivery of content for all users. • With a QoS policy in place, the router can more easily manage the flow of data and voice traffic. 32
  • 33. 33 © 2019, 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Reliable Network Network Security There are two main types of network security that must be addressed: • Network infrastructure security • Physical security of network devices • Preventing unauthorized access to the devices • Information Security • Protection of the information or data transmitted over the network Three goals of network security: • Confidentiality – only intended recipients can read the data • Integrity – assurance that the data has not be altered with during transmission • Availability – assurance of timely and reliable access to data for authorized users 33
  • 34. Protocol • A specification of the messages that communicating entities exchange. • Very much like conversational conventions … determining who should talk next and how they should respond. • Designing a good protocol is harder than it first seems! ➢A Protocol is a set of rules that govern data communications. ➢ It determines what is communicated. ➢ How it is communicated. ➢ When it is communicated. The key elements of a protocol are syntax, semantics and timing. Dr. Nermin Salem COM 526 - L1 34
  • 35. Protocol 1. Syntax • Structure or format of the data • Indicates how to read the bits - field delineation 2. Semantics • Interprets the meaning of the bits • Knows which fields define what action 3. Timing • When data should be sent and what • Speed at which data should be sent or speed at which it is being received. Dr. Nermin Salem COM 526 - L1 35
  • 36. References 1. Forouzan, Behrouz A, Catherine A. Coombs, and Sophia C. Fegan, “Data Communications and Networking”, 5th Edition, Boston: McGraw-Hill, 2001. 2. CNNA v7.02 Materials. 3. W. Stallings, “Data and computer communications”, 10th Edition, Pearson, 2014. Dr. Nermin Salem COM 526 - L1 36