Download presentation
Presentation is loading. Please wait.
Published byEarl Doyle Modified over 8 years ago
1
Chapter 6 Data Communications
2
Network Collection of computers Communicate with one another over transmission line Major types of network topologies What Is a Computer Network? 6-2 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
3
Categories of computer networks 6-3 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
4
1-4 What Are the Components of a LAN? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 6-4
5
Network interface card (NIC) Transmission media – wired or wireless Network components 6-5 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
6
1-6 Network Components Transmission Media UTP cable: Most popular for wired Ethernet networks Types of UTP cable ―Cat 5E: Cheapest, designed for 100 Mbps ―Cat 6: Designed to support gigabit Ethernet network ―Cat 6a: Designed for ultra-fast Ethernet networks 6
7
UTP & RJ45 6-7 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
8
Wireless Router 6-8 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
9
Home Network 6-9 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
10
Network Components 10 Routers and switches facilitate and control the flow of data ―Router: Transfers packets of data between two or more networks ―Switch: Receives data packets and sends them to intended nodes on the same network
11
LAN Protocol 6-11 IEEE 802.11 Protocol Wired LAN 10/100/1000 Mbps EthernetEthernet Protocol specifies hardware characteristics, cables, and how messages are packaged and processed Wireless LAN Most popular 802.11g (2010) Bluetooth Common wireless protocol for transmitting data over short distances—wireless mice and keyboards, cell phones Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall IEEE 802.3 Protocol
12
Connecting to the Internet Wireless Internet Access Mobile broadband: Connect to Internet through cellular network to get 3G or 4G access. Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 12
13
TCP/IP Architecture 6-13 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
14
Hyper Text Transport Protocol (HTTP) Protocol used between browsers and web servers. Simple Mail Transfer Protocol (SMTP) Used for email transmissions. File Transfer Protocol (FTP) Used to move files over Internet. Web-Internet-based network of browsers and servers that process http or https. When you use ftp or smtp, you are using Internet, not web. Application Layer Protocols 6-14 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
15
TCP or Transmission Control Protocol Breaks traffic up into pieces and send each piece along its way IP (Internet Protocol) Specifies routing of pieces of data communication through networks that comprise any Internet Packet is a piece of a message that is handled by programs that implement IP Router is a special purpose computer that moves packet traffic according to rules of IP protocol TCP and IP Protocols 6-15 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
16
Public IP Addresses Identify a particular device on public Internet Public IP Addresses must be unique, worldwide Assignment controlled by ICANN (Internet Corporation for Assigned Names and Numbers)ICANN Private IP Addresses Identify a particular device on a private network, usually on a LAN IP Addressing 6-16 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
17
IPv4IPv4 Supports (2 32 ) or 4,294,967,296 addresses Four decimal dotted notation like 165.193.123.253 IPv6IPv6 - Supports 2 128 addresses Public IP Addresses and Domain Names 6-17 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall Domain name Unique name affiliated with public IP address URL (Uniform Resource Locator)
18
Virtual private network Uses Internet or private network to create appearance of point-to-point connections Uses public Internet to create appearance of private network How Do Organizations Benefit From Virtual Private Networks (VPNs) 6-18 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
19
IIUM VPN 6-19 Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.