Professional Documents
Culture Documents
Message - It is the information to be communicated. Popular forms of information include text, pictures, audio, video etc.
Sender - It is the device which sends the data messages. It can be a computer, workstation, telephone handset etc.
Receiver - It is the device which receives the data messages. It can be a computer, workstation, telephone handset etc.
Transmission Medium - It is the physical path by which a message travels from sender to receiver. Some examples include
twisted-pair wire, coaxial cable, radio waves etc.
Protocol - It is a set of rules that governs the data communications. It represents an agreement between the communicating
devices. Without a protocol, two devices may be connected but not communicating.
Transmission Media
The means through which data is transformed from one place to another is called transmission or communication media.
1. Coaxial cable
Coaxial cable gets its name because it contains two conductors that are parallel to each other. The center conductor in the
cable is usually copper. The copper can be either a solid wire or stranded martial. Outside this central Conductor is a non-
conductive material. It is usually white, plastic material used to separate the inner Conductor form the outer Conductor. The
other Conductor is a fine mesh made from Copper.
2. Fiber optic cable Fiber optic cable uses electrical signals to transmit data. It uses light. In fiber optic cable light only moves
in one direction for two way communication to take place a second connection must be made between the two devices. It is
actually two stands of cable. Each stand is responsible for one direction of communication. A laser at one device sends pulse
of light through this cable to other device. These pulses translated into “1’s” and “0’s” at the other end.
3. Twisted Pair Cable It is light weight, easy to install, inexpensive and support many different types of network. It also
supports the speed of 100 mps.Twisted pair cabling is made of pairs of solid or stranded copper twisted along each other.
Wireless media
a. Radio signal Radio waves are a type of electromagnetic radiation with wavelengths in the electromagnetic spectrum longer
than infrared light. Radio waves have frequencies as high as 300 GHz to as low as 3 kHz, though some definitions describe
waves above 1 or 3 GHz as microwaves, or include waves of any lower frequency.
b. The microwave band is well suited for wireless transmission of signals having large bandwidth. This portion of the RF
electromagnetic radiation spectrum encompasses many thousands of megahertz.
c. Satellites communicate by using radio waves to send signals to the antennas on the Earth. The antennas then capture those
signals and process the information coming from those signals
d. Infra-red is a wavelength just greater than that of the red end of the visible light spectrum but less than that of microwaves.
Infrared radiation has a wavelength from about 800 nm to 1 mm, and is emitted particularly by heated objects
e. Bluetooth is a standard for the short-range wireless interconnection of mobile phones, computers, and other electronic
devices.
f. Wifi is a name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and
network connections. A common misconception is that the term Wi-Fi is short for "wireless fidelity,"
A Network Topology is the arrangement with which computer systems or network devices are connected to each other. Topologies
may define both physical and logical aspect of the network. Both logical and physical topologies could be same or different in a same
network.
Bus topology, all devices share single communication line or cable. Bus topology may have problem while multiple hosts
sending data at the same time.
Star topology are connected to a central device, known as hub device, using a point-to-point connection. That is, there exists
a point to point connection between hosts and hub.
Ring topology, each host machine connects to exactly two other machines, creating a circular network structure. When one
host tries to communicate or send message to a host which is not adjacent to it, the data travels through all intermediate hosts.
Hierarchical Topology/tree, this is the most common form of network topology in use presently. This topology imitates as
extended Star topology and inherits properties of Bus topology.
Hybrid is a network structure whose design contains more than one topology that inherits merits and demerits of all the
incorporating topologies.
Network security
All security threats are intentional i.e. they occur only if intentionally triggered. Security threats can be divided into the following
categories:
Interruption
Interruption is a security threat in which availability of resources is attacked. For example, a user is unable to access its
web-server or the web-server is hijacked.
Privacy-Breach
In this threat, the privacy of a user is compromised. Someone, who is not the authorized person is accessing or
intercepting data sent or received by the original authenticated user.
Integrity
This type of threat includes any alteration or modification in the original context of communication. The attacker
intercepts and receives the data sent by the sender and the attacker then either modifies or generates false data and sends
to the receiver. The receiver receives the data assuming that it is being sent by the original Sender.
Authenticity
This threat occurs when an attacker or a security violator poses as a genuine person and accesses the resources or
communicates with other genuine users.
Terms
History of Internet
Browser – a software that enable the user to find and access various parts of the web
Web site – a unique web address
Web page – a document on the web that includes text and images
Home page – first page that contains link to other pages
a. Web protocol
b. Domain name
c. Directory on the server
d. File
1. gov
2. edu
3. com
4. net
5. mil
6. org
blind carbon copy(bcc)- sending to a group, the recipients of the message is unknown to others.
Computer Virus – a block of program which attachés itself to or otherwise replaces another program in order to reproduce itself
without the knowledge of the user.
History of a virus
Viruses are use to lock a personal computer that was used by the experts
Viruses are use for computer bulleting boards, specially download files that led to Trojan Horse Viruses
Infections of floppy disk.
Fred Cohen – writer of the first computer virus, the main purpose of the virus is for computer security
Brain- the first computer virus that escape to the laboratory and has been detected and treated after a year
Virus Mischief
Propagation Trick
Slower operation
Decrease memory
Lighting up for no apparent reason
7 kinds of viruses
3. multi-partite virus
stealth – make special effort to hide itself to an anti virus
polymorphic – change its appearance each time it infect a file
armored – protect itself against snit virus disassemble
4. macro virus – it hides in little program embedded in a applications
5. email virus- e-mail attachments
6. denial of service attack virus – attacks programs that slow down the operations
7. hoax – emails that contain scary rumors and warn to pass the message to your friends
Anti Viruses Measures
Hardware
Software
Data
Procedures
People
Functions of Database
Data Storage, Retrieval, and Update.
A User-Accessible Catalog.
Transaction Support.
Concurrency Control Services.
Recovery Services
Authorization Services.
Support for Data Communication.
Integrity Services.
Services to Promote Data Independence.
Utility Services.
Advantage of Database
Control of data redundancy
Data consistency
Sharing of data
Improved data integrity
Improved maintenance through data independence.
Disadvantage
Complexity
Cost of DBMS
Cost of conversion
Performance
Higher impact of a failure