You are on page 1of 23

Chapter 6

Data Communications and Networks


Data Communication
• Data communication is concerned with the process of
exchanging data electronically between two
communication devices.
• There are two types of signals that are widely used for
transmission
• Analog signal
In an analog signal, transmission of data is done in the form of
continuous wave forms. Information is first converted into an
electronic signal known as base band electrical signal. Then,
transmission is done by sending this base band signal directly.
• Digital signal
It is the transmission of discrete data using two distinct electric
states. The ‘1’ for “on” & ‘0’ for “off” represents the two electrical
states.
Mode of transmission

• Simplex transmission: - In this transmission signals are


transmitted in only one direction: One station is transmitter and
the other is receiver
A B

• Half-duplex transmission: - In this transmission signals are


transmitted in both direction, both stations may transmit, but
only one at aA time. B

• Full-duplex transmission: - In this transmission signals


transmitted in both direction, and both stations may transmit
simultaneously. The medium carries signals in both directions
at the same time.
A B
Data Transmission Channels
• A channel is a medium that carries a signal from the
transmitter to the receiver.
• The range of frequencies that can be transmitted over a
transmission medium is called Band Width of a channel
width.
• The rate of data transmission is directly proportional to
the bandwidth.
• There are three types of data transmission channels:
• Narrowband
• Voice band
• Broadband
Computer Networks
• Computer Network is a collection of computers and
terminal devices connected by a communication
system in order to share resources such as data, a
printer, an Internet connection, applications, or a
combination of these.
• The interconnection of computers is known as
computer networks.
Computer network cont..

• A network has three layer components


– Application software
– Network software
– Network hardware
• The network users are able:
– To share files, printers, & other resources
– Send electronic messages(communication)
– Run programs on other computers
Types of networks
• Local Area Network (LAN)
LAN refers to connection of computers & peripherals device within
a limited geographical area, such as within a building or within a
university campus.

Wide Area Network (WAN)


• WAN refers to connection computers within a larger geographical
area; such as between countries or between provinces.
• This can be done using the telephone lines & a MODEM.
MODEM, an abbreviation of MODulator & DEModulator. So every
computer which is part of a WAN must have a MODEM.
– MODulator: - is used to convert analog signal to digital form
– DEModulator: - is used to convert digital signal to analog form
Network architecture
Basically there are two network architecture:
• Peer-ot-peer
• Client /server architecture

Peer-to-Peer Networks
• Peer-to-peer network is also called workgroup
• No hierarchy among computers  all are equal
• No administrator responsible for the network
Peer-to-peer

8
Peer-to-peer network architecture
• Advantages of peer-to-peer networks:
• Low cost
• Simple to configure
• User has full accessibility of the computer
• Disadvantages of peer-to-peer networks:
• May have duplication in resources
• Difficult to uphold security policy
• Where peer-to-peer network is appropriate:
• 10 or less users
• No specialized services required
• Security is not an issue
• Only limited growth in the foreseeable future
9
Clients and Servers
• Network Clients (Workstation)
• Computers that request network resources or services
• Network Servers
• Computers that manage and provide network resources and
services to clients
• Usually have more processing power, memory and hard
disk space than clients
• Run Network Operating System that can manage not
only data, but also users, groups, security, and
applications on the network

10
Client/Server cont..
• Advantages of client/server networks
• Facilitate resource sharing – centrally administrate and
control
• Facilitate system backup and improve fault tolerance
• Enhance security – only administrator can have access to
Server
• Support more users – difficult to achieve with peer-to-peer
networks

• Disadvantages of client/server networks


• High cost for Servers
• Need expert to configure the network
• Introduce a single point of failure to the system
11
Equipments for Networking
(Cables)

• Fiber optic- An optical fiber (fibre) is a transparent thin


fiber usually made of glass or plastic, for transmitting
light.
• Unshielded twisted pair (UTP) cabling is the most
common cable used in computer networking. It is the
most commonly used type of networking cable. Can
transmit data with out deterioration up to 100ms.
• Coaxial cable is an electrical cable consisting of a round
conducting wire, surrounded by an insulating spacer. The
cable is designed to carry a high-frequency or broadband
signal, as a high-frequency transmission line.
Equipments for Networking cont..
• Network Card - It (also called network adapter, network interface card,
NIC, etc.) is a piece of computer hardware designed to allow computers to
communicate over a computer network.

• Modem - (constructed from a word modulator and demodulator) is a device


that modulates a carrier signal to encode digital information, and also
demodulates such a carrier signal to decode the transmitted information.
• Network operating system (NOS): Software that controls a network and its
message (e.g. packet) traffic
• Controls access by multiple users to network resources such as files and
provides for certain administrative functions, including security
• Example:
– Windows NT /2000 Server/Server 2003
– UNIX
Equipments for Networking central device

• Repeaters- it is an electronic device that receives a weak or low-


level signal and retransmits it at a higher level or higher power, so
that the signal can cover longer distances without degradation.
• Hubs- (concentrator) is a device for connecting multiple twisted
pair or fiber optic Ethernet devices together, making them act as a
single segment.
• Switches - is a computer networking device that connects
network segments. It uses the logic of a Network bridge but
allows a physical and logical star topology.
• Bridge is a network device that logically separates a single
network into two segments. The primary use for a bridge is to
reduce network traffic .
• Router is a network device that connects multiple, often
dissimilar, network segments into an internet.
Network topology
• Topology refers to the way in which multiple devices are
interconnected via communication links.
• There are four major types of network topologies.

• Bus topology - is a network architecture in which a set of


clients are connected via a shared communications line, called a
bus. Each computer connected to central cable.
• Star topology - is one of the most common computer network
topologies. Each computer in a star topology is connected to a
central device (hub) by a separate cable..
• Ring topology - Each computer is connected directly to two
other computers in the network.
• Mesh topology - Each computer is directly connected to every
other computer.
Bus star

Ring Mesh
Computer viruses
• A computer virus is a program that tries to alter
the behavior of the computer without the user's
permission.
• The virus might attempt to overwrite data, change
the way another program operates, or damage the
system by altering key operating system files.
Symptoms of Computer Viruses
• Runs consistently slower than normal
• Stops responding or locks up often
• Crashes and restarts every few minutes
• Restarts on its own and then fails to run normally
• Applications don't work properly
• Disks or disk drives are inaccessible
• Printing doesn't work correctly
• You see unusual error messages
• You see distorted menus and dialog boxes
How to Protect your computer against viruses
• Protect your computer current with the latest
updates.
• Use an Internet firewall
• Subscribe to industry standard antivirus software
and keep it current(updated).
• Never open an e-mail attachment from someone
you don't know.
• If you use Microsoft Office applications, it's a
good idea to keep them updated too.
Virus
• Program that is designed to replicate itself and
spread from file to file, usually attaching itself to
applications.
• When this application is run, it can infect other
files on a user's disk.
• Human interaction is necessary for a virus to
spread to another user's files.
– Downloading files
– Trading diskettes with others
– Copying files to/from file servers
– Sending e-mail attachments
Worm
• Infects Computers, but it is spread to other
computers on a network automatically and without
the action of humans.
• A worm doesn't alter or delete files but instead
they reside in memory, eat up system resources,
and slow down your computer.
• To protect against a worm, networked users must
keep up with operating system patches and
updates and be aware of any suspicious traffic.
Trojan Horse
• Program that initially appears useful or benign and
fools a user into running it. But while it runs, it
could be allowing "back door" access to your
computer by hackers or destroying files on your
hard disk.
• For protection against a Trojan Horse, users must
be suspicious of any unknown program and be
sure it is safe before running it.

You might also like