Chapter 6
Chapter 6
CHAPTER- 6
DATA COMMUNICATION AND COMPUTER NETWORKING
Transmission Medium is the physical path between transmitter and receiver in a data
communication system. The characteristics and quality of data transmission are determined both
by the characteristics of the medium and characteristics of the signal.
1) Guided Transmission media- Data transmission is through solid medium (wired system).
Twisted pair
Coaxial cable
Optical fiber
6.4 Network
What is a Computer Network?
Computer Network is a communication system where a group of Computers and other
devices like printers, scanners, etc are connected by cables and other hardware for the
purpose of sharing resources like hardware, software and exchanging data or information
from one computer to another.
Connection devices: hubs, routers, switches, gateways, bridge etc.
The advantages /importance of this Networking may be:
Networks allow efficient management of resources.
Networks help keep information reliable and update.
Networks help speed up data sharing.
Networks facilitate efficient communication etc.
Disadvantages of networks
Viruses transmission
Insecurity of information
Types of Networks
Networks are placed under three categories:
Local Area Network (LAN)
Wide Area Network (WAN)
Metropolitan Area Network (MAN)
Local Area Network (LAN)
It is a network that is confined to a single location or limited geographical areas
be it a building or building complex. The maximum distance from one end of the
network to another is usually limited by signal strength or the network system
built in time limit for sending and receiving messages through a physical
connection such as cable.
Examples: Two computers connected by a cable in an office 100s of computers in a corporation
Examples:
o A corporation with offices in London & New York
o The Internet
To provide information
Most of what you want to provide could be considered global advertising.
The best and most inexpensive way to let people know who you are, what you are doing/have
done, and how
Publishing: including full test articles, reports, abstracts, computer programs, and
demonstrations
Extension: in which some of the delays associated with the printed media, may be
reduced.
Teaching: The possibilities here include both distance learning and assistance for students
Sharing or exchanging information with the outside world.
Ability to communicate
The Internet gives people the ability to communicate with other connected computer
users through electronic mail and real time typed conversations (bulletin boards, databases,
and discussion groups). Users will be able to use electronic mails to transmit messages,
announcements and document/file attachments to other users within the Intranet or over the
Internet.
Computer Security - generic name for the collection of tools designed to protect data and
to
frustrate hackers
The classification of security services are as follows:
Confidentiality: Ensures that the information in a computer system and transmitted information
are accessible only for reading by authorized parties.
E.g. Printing, displaying and other forms of disclosure.
Authentication: Ensures that the origin of a message or electronic document is correctly
identified, with an assurance that the identity is not false.
Integrity: Ensures that only authorized parties are able to modify computer system assets and
transmitted information. Modification includes writing, changing status, deleting, creating and
delaying or replaying of transmitted messages.
Non repudiation: Requires that neither the sender nor the receiver of a message be able to deny
the transmission.
Access control: Requires that access to information resources may be controlled by or the target
system.
Availability: Requires that computer system assets be available to authorized parties when
needed
Encipher (encrypt) - converting plaintext to cipher text
decipher (decrypt) - recovering cipher text from plaintext
A virus is a piece of software that can "infect" other programs by modifying them; the
modification includes a copy of the virus program, which can then go on to infect other
programs. A virus can do anything that other programs do. The only difference is that it attaches
itself to another program and executes secretly when the host program is run. Once a virus is
executing, it can perform any function, such as erasing files and programs
A worm is a program that can replicate itself and send copies from computer to computer across
network connections. Upon arrival, the worm may be activated to replicate and propagate again.
Network worm programs use network connections to spread from system to system. Once active
within a system, a network worm can behave as a computer virus or bacteria,