0% found this document useful (0 votes)
28 views17 pages

Chapter 8 - Print

This document discusses key aspects of computer communications and networks. It covers communication systems, channels, wireless technologies, connection devices, data transmission factors like bandwidth and protocols, network architectures like star, ring and bus, network strategies like client-server and peer-to-peer, organizational networks like intranet and extranet, and network security technologies like firewalls, IDS, and VPNs. The document provides an overview of fundamental concepts in computer communications and networking.

Uploaded by

rani alias
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views17 pages

Chapter 8 - Print

This document discusses key aspects of computer communications and networks. It covers communication systems, channels, wireless technologies, connection devices, data transmission factors like bandwidth and protocols, network architectures like star, ring and bus, network strategies like client-server and peer-to-peer, organizational networks like intranet and extranet, and network security technologies like firewalls, IDS, and VPNs. The document provides an overview of fundamental concepts in computer communications and networking.

Uploaded by

rani alias
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Chapter

© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or
posted on a website, in whole or part.
Communications
• Computer communications is the process of sharing data,
programs, and information between two or more computers
• Numerous applications depend on communication systems,
including
• E-mail – sending and receiving electronic documents
• Texting – short electronic messages
• Video Conferencing – low cost alternative to long distance
• Electronic commerce – buying and selling goods electronically
Communication Systems

• Communication systems are electronic systems that transmit data from


one location to another
• Communication systems can be wired or wireless
Communication Channels
• Communication channels carry the data from one computer
to another; essential element of every communication system
• Two categories of communication channels
i. Physical Connections using wire or cable
ii. Wireless Connections
Physical Connections
Physical connection between sending and
receiving device include
i. Twisted pair cable: two pairs of copper wire
twisted together
• Telephone lines
• Ethernet cables
ii. Coaxial cable: single solid copper core
• Cable TV
iii. Fiber-optic cable: tiny glass tubes
• Faster and more reliable than coax
• Rapidly twisted pair
Primary Wireless Technology

Bluetooth (short-range) Wi-Fi (wireless fidelity) Microwave WiMax (extends Wi-Fi)


• short range radio communication • wireless Fidelity • Uses high frequency radio • New standard that uses
standard, 33 ft, wireless headsets,
printer connections, hand held communicates over short wave signals microwave to extend WiFi
devices distances. range
• Radio communication standard • Uses high frequency radio

Cellular Satellite Infrared GPS (Global


•Use infrared light wants to
• Use multiple antennae to • Uses satellites as microwave relay
communication over short distances
Positioning system)
stations
communication •Sometimes called line of sight • Determine geographic
• Uplink (key term) sending data communications
to a satellite location of the devices
•Sending and receiving devices must
• Downlink (key term) receiving be in clear view of one another
data from a satellite
Connection Devices
Devices need to convert digital signal to analog
i. Modem – modulator-demodulator
• Modulation is the process of converting from digital to analog
• Demodulation is the process of converting from analog to digital
ii. Transfer rate
• Speed in which modems transfer data
• Usually measured in megabits per second (Mbps)
Data Transmission
Factors that affect data transmission include bandwidth and protocols.
• Bandwidth is how much information can move across the communication
channel in a given amount of time
• Measurement of the width or capacity of the communication channel
• Categories of bandwidth
i. Voiceband (or low bandwidth) – also known as low bandwidth; standard phone line;
too slow for many types of transmissions – especially high-quality video; typical
speeds are 56 to 96 kbps
ii. Medium band – with special leased lines to connect minicomputers and mainframes
as well as to transmit data over long distances (for larger computer systems); not
typically used by individuals
iii. Broadband - used for high-capacity transmissions (DSL, cable, satellite connections);
specialized high-speed devices; effectively transmits high-quality video and other
communication needs; typically 1.5 mbps; higher speeds possible
• Broadband for DSL, cable, satellite connections to the Internet
• Baseband for individual connections for computers in close range
Protocols

• Protocols are communication rules for exchanging


data between computers
• Types:
1. HTTPS – Hypertext Transfer Protocol Secure
• Widely used to protect the transfer of sensitive data

2. TCP/IP (Transmission control protocol/Internet


protocol)
Networks
A communication system that
connects two or more computers
so they can exchange information
and share resources
Network Architecture
• How the network is arranged and resources are shared
1. Network Topology
• Physical arrangement of the network
• Bus network
• Ring Network
• Star Network

2. Network Strategy
• How the information and resources are shared
Star Network

• Topology where each device


connected directly to a central
network switch.
• All communications pass
through the switch; each
connecting device is asked
(“polled”) whether it has a
message to send and then each
device is in turn allowed to send
its message
• The switch sends the message to
the intended recipient.
• Most widely used network
topography today
Ring Network

• Topology where each device


connected directly to a central
network switch.
• Each device is connected to
two other devices forming a
ring
• When a message is sent it
passes through each device until
it reaches its destination
Bus Network

• Nodes are connected via a


“backbone” called “bus”.
• If one node breaks down, the
network still functioning.
• Need additional software to
control because there is no
central computer.
Network Strategies
• Client/Server Network
• Central computers coordinate and supply services to other nodes on the network
• Server provides access
• Advantages:
• handle large networks efficiently
• availability of powerful network management software to monitor and control network
activities
• Disadvantages
• Cost of installation and maintenance
• Commonly used server operating systems:
• Windows Server
• Mac OS X Server
• Linux
• Solaris
• Peer-to-Peer (P2P) Network
• All nodes have equal authority
• Can act as both client and server
• BitTorrent – file sharing software
• Lack of security
Organizational Networks
Internet technologies support effective communication within
and between organizations
• Intranet
• Private network within an organization
• Works like the Internet
• Extranet
• Private network that connects more than one organization
• Works like the Internet, but provides suppliers and other trusted
partners with limited access to the organization’s networks
Network Security
• Commonly used technologies to ensure network security
1. Firewall
• Hardware and software that controls access to network
• Proxy server provides pass-through access
• Protects against external threats
2. Intrusion detection system (IDS)
• Works with firewall to protect organization's network
• Analyzes all incoming and outgoing network traffic
3. Virtual private network (VPN)
• Creates a secure private network connection between your computer and the
organization

You might also like