You are on page 1of 17

Presentation

Name
Professor
Course Title
Date
Introduction
 Content of the presentation:

 Difference between digital and analog data and the purpose of a modem.

 Network architectures

 Benefits of networks and types, components, and variations in networks.

 Types of wired and wireless communications.

 Cyber threats, hackers, and safeguards.

 Summary
Digital and Analog Data
 Digital data; information stored in computer systems in a binary language in series of 0’s and 1’s.

 Analog data; conventional signals stored in physical media such as cassettes, vinyl record, and other

non digital media.

 Digital data-denoted by square waves; analog data denoted by sine waves

 Digital data-stored in binary units; analog data stored in form of wave signals

 Digital data has an impedance of high order of 100 megaohm; analog data has low impedance.

 Digital data is immune to noise; analog data is prone to noise disruption that reduces accuracy.

 Digital data stored in hardware that is flexible in implementation; analog hardware is rigid.
Modem
 A hardware device

 Converts digital data into transmissible format for transmission from computer to computer.

 Modulates carrier waves to encode digital data for transmission.

 Demodulates the wave signals for decoding of the transmitted information.

 Facilitate internet access, computer networking, and telecommuting, among other services.

 Simply, the device provides point-to-point communication between two digital devices using analog

circuits.
Network Architectures
 Network architecture; logical and physical design of hardware, software, command protocol, and

media in the transmission of data.

 Two types; peer to peer, client / server network.

 Peer to peer network; all computers are linked with equal responsibilities and privileges in data

processing.

 Appropriate for a maximum of 10 computers.

 Each computer is assigned a special permission for sharing resources.


Network architectures Cont…
 Client / server network; designed for the end users, the clients; to access resources such as videos, songs

from a central computer server.

 The central control computer is the server while the other computers in the network are for the clients.

 Server conducts all the major operations; security and network management.

 Clients communicate to each other through the server.

 Allows for data backup since client’s data is in the server computer.

 Security is guaranteed; the server is the single administrator of the shared resources.

 The network has a better speed of sharing resources than the peer to peer network.
Networks and their Benefits

 Network; collection of servers, computers, mainframes, or other devices connected to one another and

allowed to share data.

 Numerous benefits from the networks; sharing files, resource sharing, sharing a single internet

connection, increasing storage capacity.

 Three fundamental types of networks

I. Local Area Network (LAN)

II. Metropolitan Area Network (MAN)

III. Wide Area Network (WAN)


Networks and their Benefits Cont…

LAN consists of computer networks at a single site; typically in an individual building.

LAN is common for sharing resources such as data storages and printers.

Typically inexpensive; use cheap hardware such as hubs, network adapters, and Ethernet cables.

MAN consists of a network within an entire city, college, or a particular region.

Larger than LAN and connects several LANs

WAN occupies a much larger area than the previous two such as an entire country or entire world.
Types of Wired Communications Media
 Transmission of data over a wire-based communication technology.

 Three types: fiber optic cables, coaxial cables, and twisted pair wires.

 Fiber optic cables; transmit data in form of light pulses; fast

 Two types of fiber optic cables; multimode fiber and single mode fiber.

 Multimode fiber is used of short and intermediate distance transmissions;

 Single mode is used for long distance transmission

 Coaxial cables are primarily used for transferring TV signals and Ethernet to carry data.

 Twisted cables connect personal computers to the telephone lines


Types of Wireless Communication Media
 Information is transmitted through the air.

 Cables and wires are unnecessary.

 Include : satellite communication, broadcast radio, and Mobile Communication Systems, among

others.

 Satellite communication; uses modulated microwave signals that is amplified by the satellite dish and

sent to the receiver antenna; two components- space segment and ground segment.

 Broadcast radio; uses radio waves to transfer data from transmitter antenna to receiver antenna.

 Mobile Communication Systems; use a single frequency band; use of satellites signals.
Satellite Communication Broadcast Radio

Mobile Communication Systems


Cyber-threats, Hackers, and Safeguards
 Inception of the internet brought with it new threats of data security.

 Cyber threat; possible malicious attempt to damage or disrupt a computer network.

 Ransomware; biggest threat; takes an organization’s data hostage with demand to pay large sums of

money.

 Trojan horse, worms, rootkits, blended threats, zombies and bots, spyware, key loggers, and email

bombs.

 Safeguards; antivirus software, firewalls, passwords, biometric authentication, and encryption.


Summary
 Digital data is the new flexible way of information transmission while analog data is still in spatial use.

 A modem allows modulation of digital data for transmission in analog circuits

 The data is transmitted through two fundamental network architectures i.e. peer to peer and client server networks; one lack

a centralized system of data management and backup

 The various networks used in data transfer include LAN, MAN, and WAN, with the difference coming from the area covered.

 Wired communications involve use of twisted cables, coaxial cables, and fiber optic cables.

 Wireless communications involve use of waves; satellite, broadcast radio, and mobile transmissions.

 Cyber threats include ransomware, and several others with the safeguards being encryption, passwords, antivirus, and

firewalls among others.


References
 Adámek, M., Matýsek, M., & Bařinová, M. (2017). Computer networks in education. In MATEC Web of

Conferences. EDP Sciences.

 Bar-Niv, A., & Bublil, B. (2015). U.S. Patent No. 9,137,485. Washington, DC: U.S. Patent and Trademark Office.

 Hillan, J., Kirby, M. A., Ozaki, E. T., Heilsberg, S. A., Mangan, M. J., & Frankland, S. (2016). U.S. Patent No. 9,240,824.

Washington, DC: U.S. Patent and Trademark Office.

 McDermott, D. S., Kamerer, J. L., & Birk, A. T. (2019). Electronic Health Records: A Literature Review of Cyber Threats

and Security Measures. International Journal of Cyber Research and Education (IJCRE), 1(2), 42-49.

 Wang, T. H., & Tsai, J. W. (2017). U.S. Patent No. 9,577,658. Washington, DC: U.S. Patent and Trademark Office.

 Young, P., & Heaton, A. J. (2018). U.S. Patent No. 10,044,402. Washington, DC: U.S. Patent and Trademark Office.

You might also like