Professional Documents
Culture Documents
1.6 Transmission Medium: When choosing the transmission media, what are the factors to be
considered?
Transmission Rate
Distance
Cost and Ease of Installation
Resistance to Environmental Conditions
There are two types of transmissions media:
A. Unguided Media: They are not protected or bound to a channel to follow. Following are unguided
media used for data communication, examples are
Radio Transmission
Microwave
Satellite Communication
B. Guided Media: Guided transmission media, as the name implies are the transmission media that
contains a solid material that is protected. Examples are
1. Unshielded Twisted Pair (UTP): UTP is the copper media, inherited from telephony, which is
being used for increasingly higher data rates A Twisted Pair is a pair of copper wires, with
diameters of 0.4 – 0.8 mm, twisted together and wrapped with a plastic coasting. The twisting
increases the electrical noise immunity, and reduces the bit error rate (BER) of the data
transmission. A UTP cable contains from 2 to 4200 twisted pairs.
UTP is a very flexible, low cost media, and can be used for either voice or data communications.
Its greatest disadvantage is the limited bandwidth, which restricts long distance transmission with
low error rates.
2. Shielded Twisted Pair (STP): STP is heavier and more difficult to manufacture, but it can
greatly improve the signaling rate in a given transmission scheme Twisting provides cancellation
of magnetically induced fields and currents on pair of conductors. Grade 5 copper, appropriate for
use in 100 – Mbps applications, has more twists per inch than lower grades. More twists per inch
games more linear feet of copper wire used to make up a cable run, and more copper means more
money. Shielding provides a means to reflect.
3. Coaxial Cable: Coaxial cable is a two-conductor cable in which one conductor forms an
electromagnetic shield around the other. The two conductors are separated by simulation. It is a
constant impedance cable. This media is used in base band and broadband transmission. Coaxial
cables do not produce extra electronic and magnetic fields and are not affected by them. This
makes them ideally suited, although more expensive, for transmitting signals.
4. Optical Fiber: Optical fiber consists of thin glass fibers that can carry information at frequencies
in the visible light spectrum and beyond. The typical optical fiber consists of a very narrow strand
of glass called the core. Around the core is a concentric layer of glass called the cladding. A
typical core diameter is 62.5 microns. Typically cladding has a diameter of 125 microns. Coating
the cladding is a protective coating consisting of plastic, it is called the Jacket. An important
characteristic of fiber optic is refraction. Refraction is the characteristics of a material to either
pass or reflect light. When light pass through a medium, it “bends as it passes from one medium
to the other”. An example of this is when we look into a pond of water. If the angle of incident is
great, light passes through the media but is bent or reflected. Optical fibers work on the principle
that the core refracts the light and the cladding reflects any light back into the core and stops light
from escaping through it – it bounds the medium.
1.7 Transmission Modes in Computer Networks
Transmission mode refers to the mechanism of transferring of data between two devices connected over a
network. It is also called Communication Mode. These modes direct the direction of flow of
information. There are three types of transmission modes. They are:
In full duplex system there can be two lines one for sending the data and the other for receiving data.
CHAPTER TWO
2.1 Introduction to Computer Network
Computer Network is a group of computer systems and other computing hardware devices that are
linked together through communication channels to facilitate communication and resource-sharing
among a wide range of users. Where at least one process in one device is able to send/receive data
to/from at least one process residing in a remote device, then the two devices are said to be a network.
Computer Network may be classified into a wide variety of characteristics, such as the medium used to
transport the data, communications protocol used, scale, topology, benefit and organizational scope.
2.1.1 Properties of Computer Network
1. Facilitate communications
Using a network, people can communicate effectively and easily via mail, instant messaging, chat
room, telephone, video telephone calls and video confessing.
2. Permit sharing of files, data and other types of information.
In a network environment, authorized users may access data and information stored on other
computers on the network. The capacity of providing access to data and information on shared
storage devices is an important feature of many networks.
3. Share network and computing resources
In a network environment, each computer on a network may access and use resources provided by
devices on the network, such as orienting a document on a shared network printer. Distributed
computing uses computing resources across a network to accomplish tasks.
4. May be insecure
A computer network may be sued by computer hackers to deploy computer viruses or computer
worms on devices connected to the network, or to prevent these devices from normally accessing
the network (denial of services)
5. Many interface with other technologies
Power line communication strongly disturbs certain forms of radio communication, e.g., amateur
radio
6. May be difficult to set up
A complex network may be difficult to set up. It may also be very costly to set up an effective
computer network in a large organization or company.
2.1.2 Components of Computer Network
At least two computers, that is, a server and a client workstation
Network Interface Cards (NIC), LAN port or Ethernet port.
Network switch
MODEM or Router
A connection medium, usually a wire or cable, although wireless connection between networked
computers and peripherals is also possible.
Network operating system software, such as Microsoft Windows, Novell NetWare, UNIX and
Linux.
2.2 Types of Networks
2.2.1 LAN (Local Area Networks)
A network is any collection of independent computers that communicate with one another over a shared
network medium. LANs are network usually confined to a geographical area, such as a single building or
a college campus. LANs can be small, linking as few as two computers, but often link hundreds of
computers used by thousands of people. The development of standard networking protocols and media
has resulted in worldwide proliferation of LANs throughout business and educational organizations. LAN
is of two categories
1. Peer-to-peer network
Peer-to-peer networking there are no dedicated servers or hierarchy among the computers. All of the
computers are equal and therefore knows as peers. Normally, each computer serves as Client/Server and
there is no one assigned to be an administrator responsible for the entire network. Peer-to-peer networks
are good choices for needs of small organization and the network will have limited growth within the
foreseeable future.
2. The Client/Server Network
It is a distributed application structure that partitions tasks or workloads between the providers of a
resource or service, called servers, and service requesters, called clients. Often clients and servers
communicate over a computer network on separate hardware, but both client and server may reside in the
same system. A server host runs one or more server programs which share their resources with clients. A
client does not share any of its resources, but requests a server's content or service function. Clients
therefore initiate communication sessions with servers which await incoming requests. Examples of
computer applications that use the client–server model are Email, network printing, and the World Wide
Web (www). Benefit of client/server network is management and centralized file storage.
2.4.2. Bus Network Topology or Linear Bus topology is a local area networks where a single bus
network cable is used and each computer or server is connected to the single bus cable. A signal from the
source travels in both directions to all machines connected on the bus cable until it finds the intended
recipient. If the machine address does not match the intended address of the data, the machine ignores the
data. Alternatively, if the data address matches the machine address, the data is accepted. Since the bus
topology consists of only one wire, it is rather implement when compared to other topologies.
CHAPTER THREE
3.1 Internet Services
Internet service is provided to playing customers for access to the World Wide Web. It is provided by an
Internet Service Provider (ISP), and is offered by several types. There are various types of internet
services like E-mail, file transfer protocol (FTP) etc.
1. E-commerce: Electronic commerce, commonly known as e-commerce, is the buying and selling of
product or services over electronic systems as the Internet and other computer network. Electronic
commerce draws on such technologies as electronic funds transfer, supply chain, management, internet
marketing, online transaction processing, electronic data interchange (EDI), inventory management
systems, and automated data collection systems.
2. Electronic mail, commonly referred to as email or e-mail, is a method of exchange digital messages
from an author to one or more recipients. Modern email operates across the Internet or other computer
networks.
3. File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host or to
another host over a network. There are lots of transfer protocols (HFTP) (Hybrid Fiber-Twisted Pair),
Hypertext Transfer Protocol (HTTP), Simple Asynchronous File Transfer (SAFT), Secure copy Protocol
(SCP), Simple File Transfer Protocol (SFTP), Simple Mail Transfer Protocol (SMPT) etc.
4. Bulletin Board System or BBS: is a computer system running software that allows users to connect
and log in to the system using a terminal program. Once logged in, a user can perform functions such as
uploading and downloading software and data, reading news and bulletins, and exchanging messages
with other user other users, either through email, public message board, and sometimes via direct
chatting. Many BBSes also offer on-line games, in which users can compete with each other, and BBSes
with multiple phone lines often provide chat rooms, allowing users to interact with each other.
5. Videoconferencing: is the conduct of a videoconference (also known as video conference or video
teleconference) by a set of telecommunication technologies allow two or more locations to communicate
by simultaneous two-way video and audio transmission.
6. World Wide Web (abbreviated as www or commonly known as the web): is a system of interlinked
hypertext documents accessed via the Internet. With a web browser, one can view web pages that may
contain text, images, videos and other multimedia and navigate between them via hyperlinks.
7. Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional
interactive text-oriented communication facility using a virtual terminal connection.
3.2 Cyber Cafe or Internet Cafe
Internet cafe or cyber cafe is a place where people can get connected to the Internet while eating or
having a cup of tea using publicly accessible computer. While the main activities in the cyber cafe is the
Internet, such as email, newsgroup and web site surfing, other applications usually available are office
suite to type document, spreadsheet, games, such as inline games and other utilities such as printing
service, scanning and digital photo services. Some internet cafes also sell computer accessories and
computer related stuffs. People may have their food and drink at the computer table or at separate table
provide by the cafe. Modern cyber cafe also have wireless connection in their local area network (LAN)
where people can bring their own lap top and get connected to the Internet by paying a small fee.
3.3 Cyber Center or Internet Center
Cyber center or internet center is almost the same with cyber cafe or internet cafe. People can browse the
internet, playing games and typing document. The only difference is cyber center or internet center do not
sell food or beverages. They only concentrate in computers, not cafe. Other services usually available are
printing, scanning, digital photo, CD and DVD burning. They also sell computer accessories. Because of
the nature of their business, sometimes cyber center also sell computer and provide repair services.
3.4 Cyber Café
3.4.1 How to start a cyber café as a career and procedure for opening a cyber cafe
STEP 1. Collecting Information
Which category or style of cyber cafe do you consider?
Mainly serving coffee? (E.g the pacific Cofree)
Focusing on online games? (E.g Network Game Centers)
Setting budgets: It depends on the scale on your business.
Location assessment: The accessibility of your business district, such as transportation and pedestrian
flow and your potential trade area (which relates to the land use and the demographic profile) are some of
the factors you have to consider. On ground or upper floor must be considered. The size and rent also
have to be considered.
Target customers: If your business target for families, white collars or students?
Infrastructure setting: What kind of infrastructure does your cyber cafe need? You have to check both the
hardware (E.g Computer, Cables and electricity, etc) and the software (e.g Human resources and
technicians) Menu design, price setting and opening hours setting (24 hrs)
STEP 2. Making decisions and setting plans
During information gathering, you have to prepare to actualize your plan.
STEP 3. Taking Actions
Licenses Application
You can check what licenses you need to apply at
Here are some examples
All kind of food, except Tobacco and Alcoholic Drinks, Retail
Business/Branch Registration Certificate
Food Factory License and Provisional Food Factory License
Light Refreshment Restaurant – Coffee Shop/Cafe Serving only Drink and Cakes.
Renovation and decoration of your shop
Applying water and electricity supply, setting telecommunication and the Internet services.
Establishing network with source suppliers
Need good connections with food, computer and software suppliers for technological update.
Making purchases like furniture, hardware and software etc.
Setting up: Testing computers, checking connection and catering operator.
Recruitment: Both full-time and part-time helpers. Part-time is more preferable than full-time helpers for
their flexibility and lower labor cost.
STEP 4. Promotion and Advertising.
Media for promotion: E.g poster, leaflet, magazine or even on TV, radio and the Internet or you can offer
discount to customers as a portion strategy.
THE FINAL STEP (5): Opening of your cyber cafe
3.4.2 Café Management
Use of Cyber Cafe Management software, more than 20,000 Cafes software all over the World.
User: create permanent accounts for regular Customers and Store information of all Users accessing Café
Terminals.
Membership Packages: Setup Membership packages for regular Café Users who pay in advance for bulk
surfing time.
Rate Plan: Setup Rate Plans for occasional Café Users who pay at the end of every surfing session.
Print Manager: Monitor & manage multiple Printers and charge customers for printouts.
Lockdown Screen: Allows only authorized Users to login to Terminals in your Cafe.
Inventory Management: Maintain inventory of CDs, Coffee, Soft Drinks, and Snacks, Computer
Peripherals or for Services like Printing, CD Writing & Scanning, offered in your Cafe.
Client Desktop: Provides standardized Desktop environment to Café Users with Google Search, News,
Movies, Cricket Scores, popular site link and exciting offers.
Ticket: Prevent losses, simply accounting and eliminate user account creation.
Remote Viewer: Manage all Café Terminal sittings at the server.
Bandwidth Monitor: Monitor all Cafe Terminals sitting at the Server
Block Website: Prevent Users from surfing unwanted website in your Cafe.
Report: Analyze & optimize every aspect of your business with extensive reports.
Lock server: Prevent un-authorized access of the café Management Server by using the Lock feature
available in the Café Manager.
Setting: For advantage application settings of café Manager, use the options provided in the settings
screen
Add Sale: Café Manager enables you to manage and sell different Products and Services in your cafe.
3.5 MODEM
A modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital
information, and also demodulates such a carrier signal to decode the transmitted information. The goal is
to produce a signal that can be transmitted easily and decoded to reproduce the original digital data.
Modems are generally classified by the amount of data they can send in a given unit of time, usually
expressed in bits per second (bit/s or bps).
3.9 Very Small Aperture Terminal (VSAT), is two-way satellite ground station or a stabilized maritime
VSAT antenna with a dish antenna that is smaller than 3 meters. The majority of VSAT antenna range
from 75cm to 1.2m. Data rates typically range from 56kbit/s up to 4 Mbit/s. VSATs are most commonly
used to transmit narrowband data (point of sale terminals such as credit card, polling or locations, VoIP
or video). VSATs are also used for transportable, one-the-move (utilizing phrased array antennas) or
mobile maritime communications.
3.10 Radio Waves is the wireless transmission of signals through free space by electromagnetic radiation
of a frequency significantly below that of visible light, in the frequency range, from about 30kHz to
300GHz. Electromagnetic radiation travels by means of oscillating electromagnetic fields that pass
through the air and vacuum of space. Information, such as sound, is carried by systematically changing
(modulating) some property of the radiated waves, such as their amplitude, frequency, phrase or pulse
width. When radio waves strike an electrical conductor, the oscillating fields induce an alternating current
in the conductor. The information in the waves can be extracted and transformed back into its original
form.
CHAPTER FOUR
4.1 COMPUTER PROTOCOLS
In order for computers to communicate with one another, standard methods of information transfer and
processing have been devised. These are referred to as "PROTOCOLS" and some of the more common
ones such as TCP, IP, UDP, POP, SMTP, HTTP, and FTP are discussed here.
4.2 What are Protocols?
Computers have everything explicitly defined and structured needed for communication. Computers
communicate with one another, having the knowledge in advance exactly how information is to be
exchanged and precisely what the format will be. PROTOCOLS are standard programs developed to
enhance the methods of transmitting and processing various kinds of information from one device to
another either through wired or wireless media. Protocols are established by international agreement and
ensure that computers everywhere can communicate to one another. There are varieties of protocols for
different kinds of information and functions.
4.3 Types of Protocols
1. TCP/IP
TCP (Transmission Control Protocol) and IP (Internet Protocol) are two different procedures that are
often linked together. The linking of several protocols is common since the functions of different
protocols can be complementary so that together they carry out some complete task. The combination of
several protocols to carry out a particular task is often called a "Stack" because it has layers of
operations. In fact, the term "TCP/IP" is normally used to refer to a whole suite of protocols, each with
different functions. This suite of protocols is what carries out the basic operations of the Web. TCP/IP is
also used on many local area networks. The details of how the Web works are beyond the scope of this
course but brief explanations are as follow.
When information is sent over the Internet, it is generally broken up into smaller pieces called "Packets".
The use of packets facilitates speedy transmission since different parts of a message can be sent by
different routes and then reassembled at the destination. It is also a safety measure to minimize the
chances of losing information in the transmission process. TCP is the means for creating the packets,
putting them back together in the correct order at the end, and checking to make sure that no packets got
lost in transmission. If necessary, TCP will request that a packet be resent.
Internet Protocol (IP) is the method used to route information to the proper address. Every computer on
the Internet has to have its own unique address known as the IP address. Every packet sent will contain
an IP address showing where it is supposed to go. A packet may go through a number of computer
routers before arriving at its final destination and IP controls the process of getting everything to the
designated computer. Note that IP does not make physical connections between computers but relies on
TCP for this function. IP is also used in conjunction with other protocols that create connections.
2. UDP and ICMP
Another member of the TCP/IP suite is User Datagram Protocol (UDP). (A datagram is almost the same
as a packet except that sometimes a packet will contain more than one datagram.) This protocol is used
together with IP when small amounts of information are involved. It is simpler than TCP and lacks the
flow-control and error-recovery functions of TCP. Thus, it uses fewer system resources.
A different type of protocol is Internet Control Message Protocol (ICMP). It defines a small number of
messages used for diagnostic and management purposes. It is also used by Ping and Trace route.
3. POP3 and SMTP: These are Mail Protocols
Email requires its own set of protocols and there are varieties, both for sending and for receiving mail.
The most common protocol for sending mail is Simple Mail Transfer Protocol (SMTP). When
configuring email clients, an Internet address for a SMTP server must be entered. The most common
protocol used by PCs for receiving mail is Post Office Protocol (POP). It is now in version 3 so it is
called POP3. Email clients require an address for a POP3 server before they can read mail. The SMTP
and POP3 servers may or may not be the same address. Both SMTP and POP3 use TCP for managing the
transmission and delivery of mail across the Internet.
4. IMAP
A more powerful protocol for reading mail is Interactive Mail Access Protocol (IMAP). This protocol
allows for the reading of individual mailboxes at a single account and is more common in business
environments. IMAP also uses TCP to manage the actual transmission of mail.
5. Hypertext Transfer Protocol (HTTP)
Web pages are constructed according to a standard method called Hypertext Markup Language (HTML).
An HTML page is transmitted over the Web in a standard way and format known as Hypertext Transfer
Protocol (HTTP). This protocol uses TCP/IP to manage the Web transmission.
A related protocol is "Hypertext Transfer Protocol over Secure Socket Layer" (HTTPS), provides for the
transmission in encrypted form to provide security for sensitive data. A Web page using this protocol will
have https: at the front of its URL.
6. File Transfer Protocol
File Transfer Protocol (FTP) lives up to its name and provides a method for copying files over a network
from one computer to another. More generally, it provides for some simple file management on the
contents of a remote computer. It is an old protocol and is used less than it was before the World Wide
Web came along. Today, it is primarily used for uploading files to a Website. It is often used for
downloading from the Web but downloading is done via HTTP. Sites that have a lot of downloading
(software sites, for example) will often have an FTP server to handle the traffic. If FTP is involved, the
URL will have ftp: at the front.
7. Uniform Resource Locator (URL), colloquially termed a Web Address.
It is a reference to a web resource that specifies its location on a computer network and a mechanism for
retrieving it. A URL is a specific type of Uniform Resource Identifier (URI), although many people use
the two terms interchangeably. URLs occur most commonly to reference web pages (http), but are also
used for file transfer (ftp), email (mailto), database access (JDBC), and many other applications. Most
web browsers display the URL of a web page above the page in an address bar. A typical URL is of the
form “http://www.example.com/index.html”, which indicates a protocol (http), a hostname
(www.example.com), and a file name (index.html).
4.6 DOMAIN NAME SYSTEM (or SERVICE or SERVER) is an internet service that translates
domain names which are alphabetic into IP addresses that are numbers. This is because domain names
are alphabetic; they're easier to remember than numbers. That means internet is really based on IP
addresses. Every time a domain name is entered, therefore, a DNS service must translate the name into
the corresponding IP address. For example, the domain name www.example.com might translate to
198.105.232.4.
This also means that every website has an Internet Protocol (IP) address made up of numbers. However a
domain name such as www.facebook.com is something people can recognize and remember. DNS syncs
up domain names with IP addresses enabling humans to use memorable domain names while computers
on the Internet can use IP addresses.
A Domain Name System (DNS) is a database that stores all of the domain names and corresponding IP
numbers for a particular top-level domain (TLD) such as .com or .net. The DNS identifies and locates
computer systems and resources on the Internet. For instance, when you type in a Web address, or URL,
the DNS will match the typed name with the IP address for that location, and connect you to that site.
CHAPTER FIVE
5.1 SUBNET MASKS
A Subnet Mask is a 32-bit value that allows the recipient of IP packets to distinguish the network ID
portion of the IP address from the host ID portion of the IP address. The network administrator creates a
32-bit subnet mask composed of 1s and 0s. The 1s in the subnet mask represent the positions that refer to
the network or subnet addresses. Not all networks need subnets, meaning they use the default subnet
mask. This is basically the same as saying that a network doesn’t have a subnet address. Table below
shows the default subnet masks for Classes A, B, and C. These default masks cannot change. In other
words, you can’t make a Class B subnet mask read 255.0.0.0. If you try, the host will read that address as
invalid and usually won’t even let you type it in. For a Class A network, you can’t change the first byte in
a subnet mask; it must read 255.0.0.0 at a minimum. Similarly, you cannot assign 255.255.255.255, as
this is all 1s—a broadcast address. Class A address must start with 255.0.0.0, Class B address must start
with 255.255.0.0 and a Class C has to start with 255.255.255.0.
When a possible subnet mask for a network has been choose, next step is to determine the number of
subnets, valid hosts, and broadcast addresses of a subnet that the mask provides. There are five simple
questions to answer:
1. How many subnets does the chosen subnet mask produce?
2. How many valid hosts per subnet are available?
3. What is/are the block size(s)?
4. Write out the subnet address of each subnet.
5. Write out the broadcast address in each subnet.
Steps to solutions
1. How many subnets? 2x = number of subnets. x is the number of bits turned on, or the 1s. For example,
in 11000000, the number of 1s gives us 22 subnets = 4 subnets.
2. How many valid hosts per subnet? 2y – 2 = number of hosts per subnet. y is the number of bits turned
off, or the 0s. For example, in 11000000, the number of 0s gives us 26 – 2 = 62 valid hosts per subnet.
3. What block is the size? 256 – Subnet mask = block size, or increment number. An example would be
256 – 192 = 64. The block size of a 192 mask is 64. Start counting at zero in blocks of 64 until you reach
the subnet mask value and these are your subnets.
Subnet address: 0 64 128 192.
The broadcast address is always the number right before the next subnet. For example, the 0 subnet has a
broadcast address of 63 because the next subnet is 64. The 64 subnet has a broadcast address of 127
because the next subnet is 128. And so on. And remember, the broadcast address of the last subnet is
always 255.
Broadcast address: 63 127 191 255
Note: Valid hosts are the numbers between the subnets address and the broadcast address, that is, 1 – 62
is the valid host in the first subnet, 65 – 126 is the valid host second subnet and so on.
Subnet 0.0 0.128 1.0 1.128 2.0 2.128 3.0 3.128 ... 255.0 255.128
1st host 0.1 0.129 1.1 1.129 2.1 2.129 3.1 3.129 ... 255.1 255.129
Lasthost0.126 0.254 1.126 1.254 2.126 2.254 3.126 3.254 ... 255.126 255.254
Broadcast0.127 0.255 1.127 1.255 2.127 2.255 3.127 3.255 ... 255.127 255.255
Last host 0.62 0.126 0.190 0.254 1.62 1.126 1.190 1.254…..
Broadcast 0.63 0.127 0.191 0.255 1.63 1.127 1.191 1.255…..
Last host 255.30 255.62 255.94 255.126 255.158 255.190 255.222 255.254
Broadcast 255.31 255.63 255.95 255.127 255.159 255.191 255.223 255.255