Handout (I.t.)
Handout (I.t.)
Data communication is the process of transferring information from one place to another using
transmission channel.
Transmission channel- are the media used to transfer data.
Network- is a group of computers linked together to share resources.
TYPES OF NETWORK
Local Area Network (LAN): is a network of computers within the same area, although they do
not have to be in the same building. They are connected through cables.
Metropolitan Area Network (MAN): spans several buildings. MANs are used by all small
companies, universities and stores that occupy large areas of land.
Wide Area Network (WAN): consists of several LANs and can connect computers across cities,
towns and even countries.
Mobile Network: A mobile phone network or cellular phone network as it is also known, is
made up of a large number of signal areas called cells. These cells join or overlap each other to
form a large coverage area. Users on the network can cross into different cells without losing
connection. Within each cell you will find a base station or mobile phone tower, which sends
and receives the mobile transmissions. Different wireless service providers use different mobile
network technology.
Types of mobile network include:
Global System for Mobile, or GSM, is the most-employed mobile standard in
the world.
Code Division Multiple Access, or CDMA, is a newer technology and offers
higher data.
Long Term Evolution, or LTE, is the next generation of cellular technology
known as 4g. GTT is now using 4G LTE as opposed to previous GSM
technology.
WiMAX is the other competing 4g technology. It is the first 4g network to enter
operation.
Radio common carrier means any corporation, company, association, joint stock association,
partnership and person, their lessees, trustees or receivers and any town making available facilities to
provide radio communications service, radio paging or cellular communications service for hire.
GENERATIONS OF MOBILE NETWORK
1G: It supported analog voice bandwidths and did not support GPRS data.
2G: first introduced in 1992, is the second-generation of cellular telephone technology and the
first to use digital encryption of conversations. 2G networks were the first to offer data services
and SMS text messaging, but their data transfer rates are lower than those of their successors.
3G: networks succeed 2G ones, offering faster data transfer rates and are the first to enable
video calls. This makes them especially suitable for use in modern smartphones, which require
constant high-speed internet connection for many of their applications.
4G and LTE: provides ultra-broadband internet access for mobile devices. The high data
transfer rates make 4G networks suitable for use in USB wireless modems for laptops and even
home internet access.
WIRELESS NETWORK TECHNOLOGIES
Bluetooth: technology allows devices to connect to each other automatically. Bluetooth enabled
devices can transmit radio signals within a range of addresses. Bluetooth can be used to transmit
data if the devices are in the same room or even the same building.
Wireless Fidelity (Wi-Fi): is protocol for radio signals between wireless devices. Wi-Fi is often
used to set up LANs because:
It can transmit data quickly.
No cables are needed to add a service to the network.
The range is high.
Services do not need direct line of sight with each other
Hotspots: is a physical location where people may obtain Internet access, typically using Wi-Fi
technology, via a wireless local area network (WLAN) using a router connected to an internet
service provider.
TYPES OF TRANSMISSION MEDIA
Cabled/wired
Twisted pair: is a cheap cabling use to connect computers and peripherals. It is made
from a pair of insulated copper wires twisted around each other. Twisted pair cabling
does not allow very fast transmission, so it is not suitable for sending large amounts of
data. It is used in small LANs for offices and homes.
Coaxial: is more expensive than twisted pair. It is a copper wire covered in a very thick
layer of insulation. It provides faster transmission speeds than twisted pairs, so it is
suitable for medium sized LANs. It can also be used to transmit sound, voice, and video
across a network.
Fiber-optic cable: is the most robust and efficient cable. It is best for large WANs and
MANs. The data is transmitted as light pulses along clear glass fibers instead of as
electrical signals along copper wires. Fiber-optic cables can be used over long distances
and can carry data at high speeds. Tele-communication companies use fiber-optic cables
to transmit data
Wireless media
Satellite: can be defined as any object, either manmade or naturally occurring, that orbits
around something else. The main purpose of the satellite is to relay microwave signals
back to earth. There are several artificial communication devices that are orbiting in
space. The primary purpose of these devices is to communicate with other devices on
earth.
Microwave Signal: is a way of transmitting information. These are high-frequency radio
signals that travel through the atmosphere. They are used for high-volume, long
distance, point-to-point communication. Microwave signals, however, can only travel in
straight lines. They have a frequency higher than 1 GHz (billions of cycles per second).
Infrared: also referred to as an electromagnetic radiation spectrum, which has a
wavelength longer than those of visible light, but shorter than those of radio waves.
Infrared communications span very short distances. This network signals cannot
penetrate walls or other obstructions and work only in the direct “line of sight”.
Wireless network technology
Bluetooth: is a short range technology that lets you connect computers, mobile phones
and hand-held devices to each other and to the Internet. Bluetooth technology removes
the need for the cables that connect devices together. Bluetooth-enabled devices connect
wirelessly within a short 10m or 30 ft range.
Wi-Fi: acronym for Wireless Fidelity. It is a popular wireless networking equipment that
uses radio waves to provide wireless high-speed Internet and network connections. Wi-
Fi is primarily used to setup a LAN and can be considered as WLAN (Wi-Fi Local Area
Network).
Hotspot: is a site or location that offers Internet access over a WLAN through the
use of a router connected to an Internet service provider, Hotspots typically use
Wi-Fi technology.
COMPONENTS OF A NETWORK
Switch: Switch is a telecommunication device grouped as one of computer network
components. Switch is like a Hub but built in with advanced features. It uses physical device
addresses in each incoming messages so that it can deliver the message to the right destination
or port. Unlike a hub, switch doesn't broadcast the received message to entire network, rather
before sending it checks to which system or port should the message be sent. In other words,
switch connects the source and destination directly which increases the speed of the network.
Both switch and hub have common features: Multiple RJ-45 ports, power supply and
connection lights
Router: When we talk about computer network components, the other device that used to
connect a LAN with an internet connection is called Router. When you have two distinct
networks (LANs) or want to share a single internet connection to multiple computers, we use a
Router. In most cases, recent routers also include a switch which in other words can be used as
a switch. You don’t need to buy both switch and router, particularly if you are installing small
business and home networks. There are two types of Router: wired and wireless. The choice
depends on your physical office/home setting, speed and cost.
Modem (modulator-demodulator): is a network device that both modulates and demodulates
analog carrier signals (called sine waves) for encoding and decoding digital information for
processing. Modems accomplish both of these tasks simultaneously and for this reason, the term
modem is a combination of modulate and demodulate.
Network interface card/ network adapter: Each computer in a network has a special expansion
card called a network interface card (NIC). The NIC prepares (formats) and sends data, receives
data, and controls data flow between the computer and the network. On the transmit side, the
NIC passes frames of data on to the physical layer, which transmits the data to the physical link.
On the receiver's side, the NIC processes bits received from the physical layer and processes the
message based on its contents.
Education: Computers are used to aid student learning through
Computer Aided Instruction (CAI)
Computer Assisted Learning (CAL). CAI takes the form of drills, tutorials, and
simulations.
Reference information (online encyclopedias)
Distance learning.
Journalism: Journalist use computers in many ways. Some of which are:
Word processing software is used for writing articles.
Photos, texts and graphics are integrated using desktop publishing and graphics programs.
Edit and publish items for newspaper websites, etc.
Carry out research through the internet.
Commerce: is the activity of buying and selling. The use of computers is needed because:
The product/services can be advertised on the internet hence making consumers know that
product/service is available.
The company can set up an online sector where they sell their goods/services through the
internet (E-commerce).
A computer makes it easier to keep records of the business transactions, profits, losses, etc.
It also helps to gain easier access to the records.
Backup and Recovery Measures: backup data regularly stored a second copy of data files and
programs away from the computer. If your computer gets damaged, is a virus corrupts your data
or if you accidentally delete or modify data that you were not supposed to, your backup copy
will allow you to restore that data. Flash drives, CDs and external hard drives are popular
choices for backing up data. Keep these storage devices in a safe place so they do not get
damaged or corrupted.
Biometrics: is a type of input device. For example fingerprint scanner. It reads a person’s
finger for security reasons. A building can be accessed by storing the fingerprints of authorized
persons on a central system.
Hardware Firewalls: this sits between your local network of computers and the Internet. The
firewall will inspect all the data that comes in from the Internet, passing along the safe data
packets while blocking the potentially dangerous packets. In order to properly protect a network
without hindering performance.
Intrusion Detection System: is a device that monitors a network/system for malicious activity
or policy violations. Any intrusion activity or violations is typically reported either to an
administrator or collected centrally using a security information and event management (SIEM)
system. A SEIM system combines outputs from multiple sources and uses alarm filtering
techniques to distinguish between malicious activities from false alarms.
Software Measures
Effective Passwords and Authentication Systems: a password is used to control the access to
data. A password is a combination of characters (letters, numbers, and symbols) that can be
entered before you can access, view and edit data. PCs can be set up so that you have to enter a
username and password before you can access the contents of the computer. Documents and
other kinds of files and media can also be protected by a password so they cannot be opened or
used until the password is entered.
Encryption of data: In spy movies, spy agencies and government encrypt their information.
They write their data using an encryption code so it cannot be understood just by reading it. The
data must be decrypted using a key.
Antivirus and Malware Detection: antivirus software protects against viruses. Located known
viruses on a computer or looks for software that acts like a virus. Antivirus software will delete
any virus it finds. New viruses are created all the time, so keep your antivirus software up-to-
date.
Worms and Trojan horses are not viruses but they are malicious software.
A worm is a piece of software that attaches to a computer memory, whereas a virus
attaches to a program. Worms are usually spread by e-mail. They eventually cripple a
computer by using up all its resources.
A Trojan horse does not replicate itself like a virus. It looks and behaves like a genuine
program but once it is running it allows hackers to gain access to the computer system
by accessing and saving the password.
Firewalls: some people deliberately create viruses that can harm computers. Hackers try to gain
access to personal information on that computer, or to cause mischief or damage. A
FIREWALL is a software that defends the weak points in a computer to prevent hackers from
gaining entry.