IT1707
Communication
Computer communication is the process of sharing data, programs, and information between two (2) or more computers.
The communication systems are electronic systems that transmit data from one (1) location to another. Communication
systems support various applications, including e-mail, telephone calls, videoconferencing, electronic commerce, etc.
Whether wired or wireless, every communication system has four (4) basic elements:
• Sending and receiving devices – these are often a computer or specialized communication device. They originate
(send) as well as accept (receive) messages in the form of data, information, and instructions.
• Connection devices – these devices act as an interface between the sending and receiving devices and
communication channel. They convert outgoing messages into packets that can travel across the communication
channels. They also reverse the process for incoming messages.
Almost all computer communications used telephone lines. However, telephones typically send and receive
analog signals, which are continuous electronic waves. Computers, in contrast, send and receive digital signals.
These represent the presence or absence of an electronic pulse (the on/off binary signals). The modem is used to
convert the digital signals to analog signals and vice versa.
• Data transmission specifications – these are rules and procedures that coordinate the sending and receiving devices
by precisely defining how the message will be sent across the communication channel. Several factors are
considered in how data is transmitted. These factors include bandwidth and protocols.
o Bandwidth – the measurement of the capacity of the communication channel. This specifies how much
information can move across the communication channel in a given amount of time.
o Protocols – these are a set of communication rules for exchanging data between computers. For data
transmission to be successful, sending and receiving devices must follow protocols for the exchange of
information.
• Communication channel – this is the actual connecting or transmission medium that carries the message from one
(1) computer to another. There are two (2) categories of communication channels:
o Physical connections – these use a solid medium to connect sending and receiving devices. These
connections include twisted-pair, coaxial, and fiber-optic cable.
o Wireless connections – most wireless connections use radio waves to communicate. Primary technologies
used for wireless connections are Bluetooth, Wi-Fi, microwave, WiMax, cellular, and satellite connections.
For example, if you wanted to send an e-mail to a friend, you could create and send the message using your computer, the
sending device. Your modem, a connection device, would modify and format the message into packets so that it could travel
efficiently across communication channels, such as telephone lines and Wi-Fi. The specifics describing how the message is
modified, reformatted, and sent would be described in the data transmission specifications. After your message traveled
across the channel, the receiver’s modem, a connection device, would reformat it so that it could be displayed on your
friend’s computer, the receiving device.
Networks
A computer network is a communication system that connects two (2) or more computers so that they can exchange
information and share resources. The connection between computers can be done via cabling, most commonly the Ethernet
cable or wirelessly through radio waves.
The following are specialized terms used to describe computer networks:
• Node – any device that is connected to a network. It could be a computer, printer, data storage device, etc.
• Client – a node that requests and uses resources available from other nodes. Typically, a client is a user’s personal
computer.
• Server – a node that shares resources with other nodes. Dedicated servers specialize in performing specific tasks.
Depending on the specific task, they may be called an application server, communication server, database server,
file server, printer server, or web server.
• Directory server – a specialized server that manages resources, such as user accounts, for an entire network.
• Host – any computer system connected to a network that provides access to its resources.
• Router – a node that forwards or routes data packets from one (1) network to their destination in another network.
For example, there are two (2) separate groups of computers, and each group is connected to its own switch. These
two (2) groups of computers will be able to communicate with each other using a router instead of a switch. The
routers will be able to transfer data packets that belong to the other group.
06 Handout 1 *Property of STI
Page 1 of 4
IT1707
• Switch – central node that coordinates the flow of data by sending messages directly between sender and receiver
nodes.
• Network interface cards (NIC) – these are expansion cards located within the system unit that connect the computer
to a network.
• Network operating system (NOS) – control and coordinate the activities of all computers and other devices on a
network. These activities include electronic communication and the sharing of information and resources.
• Network administrator – a computer specialist responsible for efficient network operations and implementation of
new networks.
A network may consist only of personal computers, or it may integrate personal computers or other devices with
larger computers. Networks can be controlled by all nodes working together equally or by specialized nodes coordinating
and supplying all resources.
Network Types
There are different types of computer networks. These networks can be characterized by their geographic range as well as
their purpose. Each may have various combinations of hardware, such as personal computers, mainframes, various
peripheral devices, etc.
The following are different network types:
• Local Area Networks (LANs)
A local area network (LAN) consists of nodes that are located within the same physical location, such as a
single room or rooms within the same building. LAN connects nodes in the same area for the purpose of sharing
information. There are various different standards or ways in which nodes can be connected to one (1) another and
ways in which their communications are controlled in a LAN. The most common standard is Ethernet. LANs are
widely used by universities, colleges, and other types of organizations to link personal computers and to share
printers and other resources.
• Home Networks
These networks allow different computers to share resources, including a common Internet connection.
Computers can be connected in a variety of ways, including electrical wiring, telephone wiring, special cables, and
wireless.
• Wireless LAN (WLANs)
A wireless local area network (WLAN) uses radio frequencies to connect computers and other devices.
WLAN often consists of a wireless router or wireless access point, that interprets incoming radio frequencies and
routes communications to the appropriate devices. These access points are known as hotspots and typically use Wi-
Fi technology.
• Personal Area Networks (PANs)
A personal area network (PAN) is a computer network organized around an individual person within a single
building. This could be inside a small office or residence. PANs make it possible for wireless devices to interact with
each other. The most popular PAN technology is Bluetooth, with a maximum range of around 33 feet.
• Metropolitan Area Networks (MANs)
These networks span distances up to 100 miles. These networks are frequently used as links between office
buildings that are located throughout a city. A MAN is typically owned either by a group of organizations or by a
single network service provider. For example, a city might invest in a network infrastructure, then businesses and
individuals within that area might sign up to use the network.
• Wide Area Networks (WANs)
These are countrywide and worldwide networks. These networks provide access to regional service (MAN)
providers and typically span distances greater than 100 miles. They use microwave relays and satellites to reach
users over long distances. The widest of all WANs is the Internet, which spans the entire globe.
Network Architecture
A network architecture describes how a network is arranged and how resources are coordinated and shared. It encompasses
a variety of different network specifics, including network topologies and strategies. Network topology describes the
physical arrangement of the network. Network strategies define how information and resources are shared.
• Topologies
A network can be arranged or configured in several different ways. This arrangement is called the network’s
06 Handout 1 *Property of STI
Page 2 of 4
IT1707
topology. The following are the most common used topologies:
o Bus network – in this topology, each device is connected to one (1) main cable called a bus or backbone,
and all communications travel along this bus.
o Ring network – each device is connected to two (2) other devices, forming a ring. When a message or data
is sent, it is passed around the ring until it reaches the intended destination.
o Star network - the devices are connected directly to a central network switch. Whenever a node sends a
message, it is routed to the switch which then passes the message along to the intended recipient. The star
network is the most widely used network topology today. It is applied to a broad range of applications, from
small networks in the home to very large networks in major corporations.
o Tree network – each device is connected to a central node, either directly or through one (1) or more other
devices. This network is set up as a hierarchy of nodes forming a tree-like structure. This is often used to
share corporate-wide data.
o Mesh network – this topology requires each node to have more than one (1) connection to the other nodes.
The resulting pattern forms the appearance of a mesh. If a path between two (2) nodes is somehow
disrupted, data can be automatically rerouted around the failure using another path. Wireless technologies
are frequently used to build mesh networks.
• Strategies
Every network has a strategy or way of coordinating the sharing of information and resources. Two (2) of
the most common network strategies are the following:
o Client/server networks – these use central servers to coordinate and supply services to other nodes on the
network. The server provides access to resources such as web pages, databases, application software, and
hardware. This strategy is based on specialization. Server nodes request the services. Client/server networks
are widely used on the Internet. For example, each time a user opens a browser, his computer, the client,
sends out a request for a specific web page. This request is routed over the Internet to a server. This server
locates and sends the requested material back to the client’s computer.
o Peer-to-peer (P2P) network – in this strategy, the nodes have equal authority and can act as both clients
and servers. The most common way to share games, movies, and music over the Internet is to use a P2P
network. For example, special file-sharing software can be used to obtain files located on another personal
computer and can provide files to other personal computers.
Organizational Networks
Computer networks in an organization use different technologies to support effective communication within their networks
and to ensure network security. The following are some technologies used by organizations in communications and network
security:
• Internet Technologies
Many organizations today employ Internet technologies to support effective communication within and
between organizations using the following:
o Intranet – is a private network within an organization that resembles the Internet. Like the public Internet,
intranets use browsers, websites, and web pages. Typical applications include electronic telephone
directories, e-mail addresses, employee benefit information, internal job openings, and much more.
Employees find surfing their organizational intranets to be as easy and as natural as surfing the Internet.
o Extranet – is a private network that connects more than one (1) organization. Many organizations use
Internet technologies to allow suppliers and others limited access to their networks. The purpose is to
increase efficiency and reduce costs.
For example, an automobile manufacturer has hundreds of suppliers for the parts that go into
making a car. By having access to the car production schedules, suppliers can schedule and deliver parts as
they are needed at the assembly plants. In this way, operational efficiency is maintained by both the
manufacturer and the suppliers.
• Network Security
Large organizations face the challenge of ensuring that only authorized users have access to network resources,
sometimes from multiple geographic locations or across the Internet. Securing large computer networks requires
specialized technology. The following are the technologies commonly used to ensure network security:
o Firewall – consists of hardware and software that control access to a company’s intranet and other internal
networks. All communications between the company’s internal networks and the outside world pass
06 Handout 1 *Property of STI
Page 3 of 4
IT1707
through a special computer called a proxy server. By evaluating the source and the content of each
communication, the proxy server decides whether it is safe to let a particular message or file pass into or
out of the organization’s network.
o Intrusion detection systems (IDS) – these work with firewalls to protect an organization’s network. These
systems use statistical techniques to analyze all incoming and outgoing network traffic. Using advanced
pattern matching and heuristics, an IDS can recognize signs of a network attack and disable access before
an intruder can do damage.
o Virtual private networks (VPN) – create a secure private connection between a remote user and an
organization’s network. Special VPN protocols create the equivalent of a dedicated line between a user’s
home or laptop computer and a company server. The connection is heavily encrypted, and from the
perspective of the user, it appears that the workstation is actually located on the corporate network.
REFERENCES:
O’Leary, T., O’Leary L., and O’Leary D. (2017). Computing essentials 2017. USA: McGraw-Hill Education.
Wempen, F. (2014). Computing fundamentals digital literacy edition. United Kingdom: John Wiley & Sons, Ltd.
06 Handout 1 *Property of STI
Page 4 of 4