Chapter 5 Data Communication Computer Network Internet and Computer
Chapter 5 Data Communication Computer Network Internet and Computer
DATA COMMUNICATION,
COMPUTER NETWORK and
the Internet
Data Communication
An electronic transmission of information that has
been encoded digitally for storage and processing
by computers.
Transmission Medium
The means through which data is sent from
one location to another is called transmission
medium.
Wired transmission media
Wireless transmission media
Protocols
Are rules under which data transmission takes
place between sender and receiver.
The data communication follows some
communication protocols to communicate and
exchange data.
Examples
HTTP Hypertext Transfer Protocol
FTP File Transfer Protocol
DHCP---dynamic host configuration protocol
DNS domain name system
Simplified Communications Model - Diagram
Modes of Data Communication
The manner in which data is transmitted
from one location to another location is
called data transmission mode.
There are three modes for transmitting
data from one location to another. These
are:
Simplex
Half duplex
Full duplex
Simplex
In simplex mode, data is transmitted in only
one direction. A terminal can only send data
and cannot receive it or it can only receive data
but cannot send it. It is not possible to confirm
successful transmission of data in simplex
mode.
Examples
Speaker, radio and television broadcasting
There is no return signal.
Merits
Works well for small networks
Relatively inexpensive to implement
Easy to add to it
Demerits
Management costs can be high
Potential for congestion with network traffic
Terminators must be there at every end
Not scalable
Difficult to troubleshoot, not fault-tolerant
Ring Topology
Ring topology
Each node is connected to the two nearest nodes so
the entire network forms a circle
One method for passing data on ring networks is
token passing
Active topology
Each workstation transmits data
Merits and Demerits of Ring Topology
Merits
Easier to manage; easier to locate a defective node or cable
problem
Well-suited for transmitting signals over long distances on a LAN
Handles high-volume network traffic
Enables reliable communication
Equal access
Demerits
Expensive
Requires more cable and network equipment at
the start
Not used as widely as bus topology
Fewer equipment options
Fewer options for expansion to high-speed
communication
Star
Any single cable connects only two devices
Cabling problems affect two nodes at most
Requires more cabling than ring or bus
networks
More fault-tolerant
Easily moved, isolated, or interconnected with
other networks
Scalable
Every node on the network is connected through a
central device is called switch/hub
Merits and Demerits of Star Topology
Merits
Good option for modern networks
Low startup costs
Easy to manage
Scalable
Most popular topology in use
wide variety of equipment available
Demerits
Switch/Hub is a single point of failure
Requires more cable than the bus
Mesh Topology
Not common on LANs
Most often used in WANs to interconnect LANS
Each node is connected to every other node
Allows communication to continue in the event of a
break in any one connection
Provides redundant paths through the new work
Merits and Demerits of Star Topology
Merits
Improves Fault Tolerance
Demerits
▪ The most Expensive
▪ Difficult to install
▪ Difficult to manage
▪ Difficult to troubleshoot
Hybrid Topology Types
Hybrid Physical Topologies:
10 Mbps to
STP
10 Mbps to
but more interference than other application (Thinnet);
100 Mbps
costly than types of copper media damage to cable can
UTP bring down entire
network
Cannot be tapped, so
security is better; can
100 Mb to 100
Fiber-Optic
http://www.aau.edu.et
Electronic Mail
Email is the most frequently used application of the
Internet which this is used for sending a message
electronically over the internet, from the sender to
the receiver.
• To create, send, and receive e-mail messages, you
need an e-mail account and program on an Internet
mail server with a domain name.
E.g [email protected]
[email protected]
File Transfer Protocol (FTP)
Using FTP programs, we can upload or download files.
But to do this there should be an admission from the
remote computer.
There are two computers involved in an FTP transfer: a
server and a client.
The FTP server, running FTP server software, listens on
the network for connection requests from other
computers. The client computer, running FTP client
software, initiates a connection to the server
Internet Telephony (Voice over IP)
Voice over Internet Protocol (VoIP) is a
methodology and group of technologies for the delivery
of Voice communications and Multimedia sessions
over Internet Protocol (IP) networks, such as the
Internet.
Other terms commonly associated with VoIP are IP
telephony, Internet telephony.
E.g. Skype,VIBER
Telnet (Remote Login)
Telnet:- It is a program that allows you log in from your
own computer to a remote computer directly through the
Internet and you can work on that computer.
The term "telnet" is a mashing together of "telephone"
and "network”
For example, if I travelled abroad and had use of machine
with Internet access, I could use telnet to login to my
account on csserver at AAU provided I have an account on
the machine.
Internet Relay Chat-IRC
Internet Relay Chat is one of the most popular and
most interactive services on the Internet.
Using an IRC client (program) you can exchange
text messages interactively with other people all
over the world
Computer Security
Computer security, also known as cyber security or IT
security, is the protection of computer systems from the theft
or damage to the hardware, software or the information on
them, as well as from disruption or misdirection of the services
they provide.
Security goals
▪ Data Confidentiality
▪ System Availability
▪ Data Integrity
Security is thus based:
Privacy, Trust, Authenticity, Integrity
Computer Security …
Why security???
computer systems are vulnerable to many
threats
Security Threats
any person, act, or object that poses a danger to
computer security
Human, Physical, Software
Computer Security …
Threats:
Fraud and Theft
Loss of Physical and Infrastructure Support
Malicious Hackers
Threats to Personal Privacy
Denial of Service/DoS
Malicious Code
Viruses …
Is a malicious program that invades a computer system
without the knowledge of the owner.
Viruses:
corrupt or destroy data
increase file size
format the hard disk
degrade system performance
manipulate the directory contents
rename all files with different name
Viruses …
Many kinds of Viruses
Multipartite
Companion
Macro
Trojan horse
Worms
Boot sector/ MBR
spyware
Stealth
Time/ Logic bomb
Viruses …
Viruses get transmitted:
Removable storage devices
Network
Email
Viruses …
Protection:
Backups/ Redundancy
Encryption
Isolate the Machine
Installing an antivirus SW
Installing a virus resistant operating systems
Scanning removable devices before use
Avoiding programs from unknown sources
Disabling floppy disk booting
Viruses …
What do antiviruses do?
Identification of known viruses
Detection of suspected viruses
Blocking of possible viruses
Disinfection of infected objects
Deletion and overwriting of infected objects
Viruses …
Anti-viruses
Norton Antivirus
McAfee Antivirus
AVG Antivirus
Avira Antivirus
Kaspersky Antivirus
…