Professional Documents
Culture Documents
DATA COMMUNICATIONS
The term communication can be defined as the process of transferring messages between
entities. Based on what these two entities are, there are three basic types of
communication:
Human-to-Human
Computer-to-computer
Human-to-Computer
A message should first be encoded in such a way that it can be transmitted through a
channel (medium), it is then transmitted, and finally, it is decoded into a form that can be
understood by the destination at the other end. This holds true for voice communication,
or data communication.
Data communication involves transporting data from one point to another. This is an
instance of computer-to-computer communication, i.e., both the source and the
destination are computer devices, and the transmission media may be telephone lines,
satellite links, microwave links, etc.
1
Information is transmitted in the form of analog or digital. Most communication lines are
designed to carry analog signals. Digital transmission a rarely used for telecommunications.
Data transmission is the process of conveying data between two points by way of
Bounded media confine the data to specific physical pathways. Common examples
of bounded media are wire and optical fiber cables. Cable TV uses bounded media.
NOTE: Electrical cable types are frequently referred to as "copper" because that
metal is the most frequently used conductor. You may hear fiber optic cables called
The sender and receiver in data communications are usually computer, , terminals,
Simplex
2
Sender Receiver
(Receiver) Half-duplex (Sender)
Sender Receiver
Full-duplex
and and
Receiver Sender
SIMPLEX: Communication can take place in only one direction like one-way traffic.
Devices connected to such a circuit are either a send-only or a receive only device
e.g. a line printer. This is very inadequate because the sender needs an
HALF-DUPLEX: transmits data in both directions but only in one direction at a time.
It can alternatively send and receive data. It requires two wires. It is good for voice
the transmission path. It is an advantage over half-duplex which requires the lines
Activity:
Select any communication mechanism. Can you classify them as Simplex, half-
duplex or full-duplex
When a computer system is processing data all by itself, without any interaction or
interconnection with any other computer system, it is called a stand-alone computer
system. A Network System is a system of two or more computers that are connected
to each other for the purpose of data communication and sharing of resources.
Hardware
The hardware components of a network consist of the following five items
Server
Workstation
Cabling
Network Interface Cards (NIC)
Other Networking Devices
The Server
High capacity computers that function as the central repository of
resources/services the network provides.
4
Usually the server is also responsible for controlling which users on which
computers in the network are granted access to a service.
Workstations
A place where the services of the server are used (This is where the user is
working)
Any computer where the user will be working at. It does not have to be a high
capacity computer
Cabling
Cables that interconnect the different devices on the network.
There are various types of cables, including coaxial cable, twisted-pair cable
and fiber-optic cables.
Wireless networks do not require physical cables
2. Switches: have the same function as hubs. But they are faster and
more expensive than Hubs. They are used in large networks
3. Routers: These devices are used to interconnect different networks.
If a company has different networks at different sites, routers
are used to interconnect these networks.
4. Firewall: devices used to protect a network from unauthorized
access from a different site.
Software
5
The Network Operating System
The network operating system is the software that resides on the server.
The network operating system, or NOS, controls virtually all the activity on
the network.
The NOS manages access to the resource on the server and handles security
of the resource on the server.
It provides true multi-user capabilities and is probably the most important
part of the network.
TYPE OF NETWORKS
Characteristics include:
computers.
6. Usually one computer serves as the file server which stores the software
that controls the network and the software that can be shared by the
To share software and data we have to decide where to put the software and the
data in the networked computers. There are two methodologies in deciding where
to put files for common access. These are peer-to-peer networking and server-
based networking.
Peer-to-peer networking
Under this networking all computers on the network belong to users and are equal
as far as the network is concerned. Two computers in the network are peers
(equal). A data in computer is available for another computer users (sharing hard
disk)
It is accomplished by connecting cables between computers and installing software
that will let the various computers share data.
university can link LAN in the various campuses together to form MAN. An example
is the MAN network at Addis Ababa University (AAU) which networked the
7
WIDE AREA NETWORK (WAN)
Network Topology
The way in which devices on the network are connected is called the topology of the
network. Network topology specifically refers to the physical layout of the network,
especially the locations of the devices and how the cable is run between them. It is
important to select the right topology for how the network will be used. Each topology
has its own strengths and weaknesses.
computer networking:
other data processing devices together within a small geographic area such as a
connectivity.
In a star topology all stations are wired to a central wiring concentrator called a
hub. Similar to a bus topology, packets sent from one station to another are
repeated to all ports on the hub. This allows all stations to see each packet sent on
the network, but only the station a packet is addressed to pays attention to it.
The diagram illustrates a star topology LAN -- which is a more robust topology
than the bus topology. In a star topology, each station is connected to a central
wiring concentrator, or hub, by an individual length of twisted pair cable. The cable
is connected to the station's NIC at one end and to a port on the hub at the other.
Most modern cabling systems are designed in a star physical topology. The
All data goes through the central point, which can be equipped with
diagnostic devices that make it easy to trouble shoot and manage the
network.
9
Hierarchical organization allows isolation of traffic on the channel.
required.
Bus Topology
In a bus topology, all devices attach to the same transmission medium. The
medium has a physical beginning and end. All buses are implemented using
electrical cable, usually coax, and the ends of the cable must be terminated with a
terminating resistor that matches the impedance of the cable. The terminating
resistor prevents data reflections from coming across as data corruption. The bus is
considered a multipoint system because all devices tap into the same backbone
cable.
are broadcast throughout the bus structure. In the following diagram, if node B
sends a signal to node C, the signal propagates for the length of the cable and is
that each node understands which messages it is to receive and which to ignore.
1
Cable breaks can disable the entire segment because they remove the
Ring Topology
The ring topology is a physical, closed loop consisting of point-to-point links. In the
diagram, you can see how each node on the ring acts as a repeater. It receives a
transmission from the previous node and amplifies it before passing it on.
Each repeater duplicates the data signals so that very little signal
degradation occurs.
A break in the ring can disable the entire network. Many ring designs
1
Hybrid Topology
The hybrid topology scheme combines multiple topologies into one large topology.
topology has its own strengths and weaknesses, several different types can be
topologies.
The Internet
The Internet is a term used to describe a worldwide network of computer networks
connecting millions of computers around the world.
The Internet is one of the largest, most widely used networks (in fact, a network of
networks) that has evolved and grown overtime. It is a group of two or more
networks that are
o Interconnected physically
o Capable of communicating and sharing data with each other
o Able to act together as a single network.
The Internet connects millions of computers globally and provides worldwide
communications to businesses, homes, schools, and governments.
1
a wealth of information and entertainment. As such it is often described as the prototype
for a world wide information "superhighway".
To provide information
Most of what you want to provide could be considered global advertising. The best and
most inexpensive way to let people know who you are, what you are doing/have done,
and how
Publishing: including full test articles, reports, abstracts, computer programs, and
demonstrations
Teaching: The possibilities here include both distance learning and assistance for
students
Sharing/ exchanging information with the outside world.
Ability to communicate
The Internet gives people the ability to communicate with other connected
computer users through electronic mail and real time typed conversations (bulletin
boards, databases, and discussion groups). Users will be able to use electronic
mails to transmit messages, announcements and document/file attachments to
other users within the Intranet or over the Internet.
Applications and Services on the Internet
The Internet is actually very boring since it is nothing more than hardware connections. It
is the Internet applications and services that make the Internet come alive.
Internet applications include
World Wide Web (WWW),
Electronic mail,
Discussion Groups
Internet Chat,
Search Engines
Electronic commerce
E-Mail
E-Mail is the ability to write a message to someone, using a mail program, and use the
Internet as a means of delivering that message. Email is not a free service. The cost of
your email is covered in your service charge to your provider.
E-mail is the most popular application of computer communication system. For the
purpose of our discussion, we shall adopt the simplest definition of E-mail as follows:
Email (Electronic mail) refers to a computer-based system allowing two or more people
to communicate through the transmission of character coded or graphic information by
electronic means. Electronic mail, or e-mail, allows computer users locally and
worldwide to exchange messages. Each user of e-mail has a mailbox address to which
messages are sent. Messages sent through e-mail can arrive within a matter of seconds.
1
Search Engine
A search engine is a web site that collects and organizes content from all over the
internet. Those wishing to locate something would enter a query about what they'd like to
find and the engine provides links to content that matches what they want. Examples of
search engines are google.com, yahoo.com, Ask.com….
E-commerce
It stands for electronic commerce and refers to the buying and selling of products or
services over electronic systems such as the Internet and other computer networks.
Internet Connectivity
You can connect to the Internet in one of two basic ways
Dial-up connection - is type of Internet connection that is made by connecting a
plain old telephone line to the phone jack at the back of a computer which, in turn
connects to the internal modem of the computer, and allows the user to dial a
phone number of a service provider and connect to the Internet.
Direct (Broadband) Connection: is a permanent connection between your computer
system and the Internet. This refers to a connection that has capacity to transmit
large amount of data at high speed.
1
Chapter Six
Computer Security and Ethics
What is Computer Security?
It is the concept of attaining a secure computing environment by detecting the
vulnerabilities associated with computer use.
It is a general term relating to measures designed to protect computer assets in all
configurations.
The protection of information assets can be handled using technology, processes and
training.
Computer Security is technique developed to safeguard information and information
systems stored on computers.
Computer Threats
A computer threat is a term that relates to the security of a computer system being
compromised. This threat can lead to cyber-attacks and data being stolen, lost or edited.
Potential threats include the destruction of computer hardware and software and the loss,
modification, theft, unauthorized use, observation, or disclosure of computer data.
Cyber-crimes are criminal acts conducted through the use of computers by Cyber-
criminals.
Computer virus
What is a Virus?
A computer virus is a small software program that spreads from one computer to
another computer and that interferes with computer operation.
A computer virus may corrupt or delete data on a computer, use an e-mail
program to spread the virus to other computers, or even delete everything on the
hard disk. it’s just like a human virus, it can be very dangerous and destructive
A virus is just a computer program. Like any other program, it contains
instructions that tell your computer what to do. But unlike an application, a virus
usually tells your computer to do something you don't want it to do, and it can
usually spread itself to other files on your computer -- and other people's
computers.
Characteristics of Computer Viruses:
1. Cannot exist in a viable form, apart from another (usually legitimate) program.
2. Propagates when the host program is executed.
3. Has an incubation period, during which no damage is done.
4. After incubation period, begins to manifest its behavior.
Different Malware Types
What is the difference between viruses, worms and Trojan horses?
Some people distinguish between general viruses, worms and Trojan horses. A worm is a
special type of malware programs that can replicate itself and use memory, but cannot
attach itself to other programs, and a Trojan horse is a file that appears harmless until
executed.
Worms:
A worm is a computer program that has the ability to copy itself from machine to
machine. Worms normally move around and infect other machines through computer
networks. Worms eat up storage space and slow down the computer. But worms don't
alter or delete files.
Trojan horses:
A Trojan horse is simply a computer program that claims to do one thing (it may claim
to be a game) but instead does damage when you run it (it may erase your hard disk).
1
When loaded onto your machine, a Trojan horse can capture information from your
system -- such as user names and passwords or could allow a malicious hacker to
remotely control your computer. Trojan horses have no way to replicate automatically.
Origins of Viruses:
People create viruses. A person has to write the code, test it to make sure it spreads
properly and then release the virus. A person also designs the virus's attack phase,
whether it's a silly message or destruction of a hard disk.
In most of the cases people create viruses just for the thrill or fun.
1
1