CH 2 Communication
CH 2 Communication
• File Sharing
Using a Network
Advantages
• File Sharing
• Hardware Sharing
Using a Network
Advantages
• File Sharing
• Hardware Sharing
• Software Sharing
Using a Network
Advantages
• File Sharing
• Hardware Sharing
• Software Sharing
• Communication
Using a Network
Advantages Disadvantages
• File Sharing
• Hardware Sharing
• Software Sharing
• Communication
Using a Network
Advantages Disadvantages
Organizations
Examples
Bank
⚬ Server holds acc details
⚬ Customer(Client) performs a transaction -> requests the server to
perform an operation
⚬ Server serves and returns the results to client (Eg. Money transferred
successfully)
Organizations
⚬ Employees are the clients that access the same shared file stored
on server
Examples
Bank
⚬ Server holds acc details
⚬ Customer(Client) performs a transaction -> requests the server to
perform an operation
⚬ Server serves and returns the results to client (Eg. Money transferred
successfully)
Organizations
⚬ Employees are the clients that access the same shared file stored
on server
⚬ Several employees can be working on the same file simultaneously
Examples
Bank
⚬ Server holds acc details
⚬ Customer(Client) performs a transaction -> requests the server to
perform an operation
⚬ Server serves and returns the results to client (Eg. Money transferred
successfully)
Organizations
⚬ Employees are the clients that access the same shared file stored
on server
⚬ Several employees can be working on the same file simultaneously
⚬ Sharing resources like printers etc
Peer to Peer
Relies on connection to the server in order Can run some of the features of the software
to work locally
Pros Cons
More robust since can continue Less secure since client is expected to ensure
functioning without connection to server security
Clients have more - store their own Clients need to obtain data and software
programs and data individually inorder to be able to sun it locally
Pros Cons
Bu
s• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
• If main cable is compromised, the network dies
• Very difficult to isolate a malfunctioning computer
• Highly congestion prone
• Least secure since signal passes through all computers
⚬ The packet has recipient address on it, as it passes through the bus, the
system compares address with every computer
• Used where high speeds are not requires and data is tranferred in small
amounts and is not sensitive. Eg: schools, offices
Bus
• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
• If main cable is compromised, the network dies
• Very difficult to isolate a malfunctioning computer
• Highly congestion prone
• Least secure since signal passes through all computers
⚬ The packet has recipient address on it, as it passes through the bus, the
system compares address with every computer
• Used where high speeds are not requires and data is tranferred in small
amounts and is not sensitive. Eg: schools, offices
Bus
• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
• If main cable is compromised, the network dies
• Very difficult to isolate a malfunctioning computer
• Highly congestion prone
• Least secure since signal passes through all computers
⚬ The packet has recipient address on it, as it passes through the bus, the
system compares address with every computer
• Used where high speeds are not requires and data is tranferred in small
amounts and is not sensitive. Eg: schools, offices
Bus
Bus
• All devices connected using a single cable
Bus
• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
Bus
• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
• If main cable is compromised, the network dies
Bus
• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
• If main cable is compromised, the network dies
• Very difficult to isolate a malfunctioning computer
Bus
• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
• If main cable is compromised, the network dies
• Very difficult to isolate a malfunctioning computer
• Highly congestion prone
Bus
• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
• If main cable is compromised, the network dies
• Very difficult to isolate a malfunctioning computer
• Highly congestion prone
• Least secure since signal passes through all computers
Bus
• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
• If main cable is compromised, the network dies
• Very difficult to isolate a malfunctioning computer
• Highly congestion prone
• Least secure since signal passes through all computers
⚬ The packet has recipient address on it, as it passes through the bus, the
system compares address with every computer
• a is tranferred in small amounts and is not sensitive. Eg: schools, offices
Bus
• All devices connected using a single cable
• Easy to set up and extend - Uses less cable
• If main cable is compromised, the network dies
• Very difficult to isolate a malfunctioning computer
• Highly congestion prone
• Least secure since signal passes through all computers
⚬ The packet has recipient address on it, as it passes through the bus, the
system compares address with every computer
• Used where high speeds are not requires and data is tranferred in small
amounts and is not sensitive. Eg: schools, offices
Star
• Every computer is connected to a central switch/server/router
• Easy to connect / remove computers
• Network is centralised, therefore easily monitored and signal travels
uniterrupted
• Lower possibility of congestion
• Single link failure does not impact the network
• However, if central device fails, the network goes down - single point of
failure
Star
• The main server can get overwhelmed with requests - performance of
network depends on the central switch / server
• Here, message sare sent directly from center ot recipient
• Used in large organisations where performance if of the highest priority
• In homes, route acts as the center of star topology
Mesh
Mesh
• All devices are connected to each other
Mesh
• All devices are connected to each other
• No broken link impacts another device
Mesh
• All devices are connected to each other
• No broken link impacts another device
• Packet is sent directly to the recipient
Mesh
• All devices are connected to each other
• No broken link impacts another device
• Packet is sent directly to the recipient
• It is extremely costly to set up, and equally hard to maintain
Mesh
• All devices are connected to each other
• No broken link impacts another device
• Packet is sent directly to the recipient
• It is extremely costly to set up, and equally hard to maintain
• Used in high security places like military establishments
Mesh
• All devices are connected to each other
• No broken link impacts another device
• Packet is sent directly to the recipient
• It is extremely costly to set up, and equally hard to maintain
• Used in high security places like military establishments
Hybrid
Mesh
• All devices are connected to each other
• No broken link impacts another device
• Packet is sent directly to the recipient
• It is extremely costly to set up, and equally hard to maintain
• Used in high security places like military establishments
Hybrid
• Combination of two or more topologies
Mesh
• All devices are connected to each other
• No broken link impacts another device
• Packet is sent directly to the recipient
• It is extremely costly to set up, and equally hard to maintain
• Used in high security places like military establishments
Hybrid
• Combination of two or more topologies
• Highly reliable in case of failures since several sub-networks
Mesh
• All devices are connected to each other
• No broken link impacts another device
• Packet is sent directly to the recipient
• It is extremely costly to set up, and equally hard to maintain
• Used in high security places like military establishments
Hybrid
• Combination of two or more topologies
• Highly reliable in case of failures since several sub-networks
• Easy to troubleshoot or fix errors
Mesh
• All devices are connected to each other
• No broken link impacts another device
• Packet is sent directly to the recipient
• It is extremely costly to set up, and equally hard to maintain
• Used in high security places like military establishments
Hybrid
• Combination of two or more topologies
• Highly reliable in case of failures since several sub-networks
• Easy to troubleshoot or fix errors
• Very complex network, therefore difficult to set up or manage
Cloud
Cloud
• The Cloud is just an offsite building dedicated to servers
Cloud
• The Cloud is just an offsite building dedicated to servers
• Cloud computing is the storage and processing of data on the
cloud to reduce pressure on local resources
Cloud
• The Cloud is just an offsite building dedicated to servers
• Cloud computing is the storage and processing of data on the
cloud to reduce pressure on local resources
• Files can be accessed anytime, from anywhere
Cloud
• The Cloud is just an offsite building dedicated to servers
• Cloud computing is the storage and processing of data on the
cloud to reduce pressure on local resources
• Files can be accessed anytime, from anywhere
• Easy to share and back-up data
Cloud
• The Cloud is just an offsite building dedicated to servers
• Cloud computing is the storage and processing of data on the
cloud to reduce pressure on local resources
• Files can be accessed anytime, from anywhere
• Easy to share and back-up data
• Variable pricing plans that suit everyone and can be altered
seamlessly
Cloud
• Benefits of wireless
Transmission Media
• Benefits of wireless
⚬ Devices can be more mobile and easier to set up and add devices
as no cable needed
Transmission Media
• Benefits of wireless
⚬ Devices can be more mobile and easier to set up and add devices
as no cable needed
⚬ Many different types of devices can be connected
Transmission Media
• Benefits of wireless
⚬ Devices can be more mobile and easier to set up and add devices
as no cable needed
⚬ Many different types of devices can be connected
• Drawbacks of wireless
Transmission Media
• Benefits of wireless
⚬ Devices can be more mobile and easier to set up and add devices
as no cable needed
⚬ Many different types of devices can be connected
• Drawbacks of wireless
⚬ Easier to hack / prone to interference
Transmission Media
• Benefits of wireless
⚬ Devices can be more mobile and easier to set up and add devices
as no cable needed
⚬ Many different types of devices can be connected
• Drawbacks of wireless
⚬ Easier to hack / prone to interference
⚬ Signal degradation is a problem
Transmission Media
• Benefits of wireless
⚬ Devices can be more mobile and easier to set up and add devices
as no cable needed
⚬ Many different types of devices can be connected
• Drawbacks of wireless
⚬ Easier to hack / prone to interference
⚬ Signal degradation is a problem
• Radio Waves are Electromagnetic waves used in WiFi, their frequency
ranges from 3kHz - 3GHz. They carry data back and forth from wireless
adapter and router Earth’s curvature
Transmission Media
• Microwaves are also EM, between 3GHz-300GHz. Used in TVs and MRIs
• Infrared are also EMWs between 300GHz-300THz
• Satellites are used as boosters between 2 towers that can’t
communicate directly due to Earth’s curvature
Transmission Media
• Microwaves are also EM, between 3GHz-300GHz. Used in TVs and MRIs
Transmission Media
• Microwaves are also EM, between 3GHz-300GHz. Used in TVs and MRIs
• Infrared are also EMWs between 300GHz-300THz
Transmission Media
• Microwaves are also EM, between 3GHz-300GHz. Used in TVs and MRIs
• Infrared are also EMWs between 300GHz-300THz
• Satellites are used as boosters between 2 towers that can’t
communicate directly due to Earth’s curvature
Wired
Wired
Similarity
Router vs Gateway
Similarity
Similarity
Similarity
Similarity
Difference
Router vs Gateway
Similarity
Difference
• Gateways connect two dissimilar networks, whereas router connects
similar networks
Bit Streaming - Video Transmission
The Mechanism
Bit Streaming - Video Transmission
The Mechanism
• Data is compressed before transmitting
Bit Streaming - Video Transmission
The Mechanism
• Data is compressed before transmitting
• Vid is transmitted continuously as a series of bits
Bit Streaming - Video Transmission
The Mechanism
• Data is compressed before transmitting
• Vid is transmitted continuously as a series of bits
• Vid is hosted on server, and sent to client computer’s buffer
Bit Streaming - Video Transmission
The Mechanism
• Data is compressed before transmitting
• Vid is transmitted continuously as a series of bits
• Vid is hosted on server, and sent to client computer’s buffer
• Streaming software receives bit-stream from buffer
Bit Streaming - Video Transmission
The Mechanism
• Data is compressed before transmitting
• Vid is transmitted continuously as a series of bits
• Vid is hosted on server, and sent to client computer’s buffer
• Streaming software receives bit-stream from buffer
• Vid is encoded into bit-stream and uploaded on server
On Demand
Bit Streaming - Video Transmission
The Mechanism
• Data is compressed before transmitting
• Vid is transmitted continuously as a series of bits
• Vid is hosted on server, and sent to client computer’s buffer
• Streaming software receives bit-stream from buffer
• Vid is encoded into bit-stream and uploaded on server
On Demand
• Tape converted to bit-streaming format (encoding)
Bit Streaming - Video Transmission
The Mechanism
• Data is compressed before transmitting
• Vid is transmitted continuously as a series of bits
• Vid is hosted on server, and sent to client computer’s buffer
• Streaming software receives bit-stream from buffer
• Vid is encoded into bit-stream and uploaded on server
On Demand
• Tape converted to bit-streaming format (encoding)
• Encoded videos uploaded to dedicated servers
Bit Streaming - Video Transmission
The Mechanism
• Data is compressed before transmitting
• Vid is transmitted continuously as a series of bits
• Vid is hosted on server, and sent to client computer’s buffer
• Streaming software receives bit-stream from buffer
• Vid is encoded into bit-stream and uploaded on server
On Demand
• Tape converted to bit-streaming format (encoding)
• Encoded videos uploaded to dedicated servers
• Link for video on website
Bit Streaming - Video Transmission
The Mechanism
• Data is compressed before transmitting
• Vid is transmitted continuously as a series of bits
• Vid is hosted on server, and sent to client computer’s buffer
• Streaming software receives bit-stream from buffer
• Vid is encoded into bit-stream and uploaded on server
On Demand
• Tape converted to bit-streaming format (encoding)
• Encoded videos uploaded to dedicated servers
• Link for video on website
• User clicks link to (temporarily) download video, can be paused /
forwarded / rewinded etc
Real Time
• A live event is captured with a camera connected to a computer (internet)
Real Time
• A live event is captured with a camera connected to a computer (internet)
• Video is encoded in live-time and uploaded to a streaming server
Real Time
• A live event is captured with a camera connected to a computer (internet)
• Video is encoded in live-time and uploaded to a streaming server
• Link placed on Website
Real Time
• A live event is captured with a camera connected to a computer (internet)
• Video is encoded in live-time and uploaded to a streaming server
• Link placed on Website
• Since server sends frames to users in ;live time, can not be paused
Real Time
• A live event is captured with a camera connected to a computer (internet)
• Video is encoded in live-time and uploaded to a streaming server
• Link placed on Website
• Since server sends frames to users in ;live time, can not be paused
Cons
Bit Streaming
Pros
• No need to wait for the whole file to download
• No need to store large files
• On-demand playback
• Plays in browser, non software required
Cons
Cons
Cons
• Internet Protocol
IP Addressing
• Internet Protocol
• IP address is used to locate a device on a network
IP Addressing
• Internet Protocol
• IP address is used to locate a device on a network
• Each address is unique within a network
IP Addressing
• Internet Protocol
• IP address is used to locate a device on a network
• Each address is unique within a network
• Allows devices to send data to correct destinations
IP Addressing
• Internet Protocol
• IP address is used to locate a device on a network
• Each address is unique within a network
• Allows devices to send data to correct destinations
• Public IP Addresses are registered on the internet
IP Addressing
• Internet Protocol
• IP address is used to locate a device on a network
• Each address is unique within a network
• Allows devices to send data to correct destinations
• Public IP Addresses are registered on the internet
⚬ assigned by ISP
IP Addressing
• Internet Protocol
• IP address is used to locate a device on a network
• Each address is unique within a network
• Allows devices to send data to correct destinations
• Public IP Addresses are registered on the internet
⚬ assigned by ISP
⚬ Unique throughout the ISP
IP Addressing
URL
DNS
• Domain Name Service - resolves names of websites to numbers
⚬ Eg: zainematics.com = 243.15.657.1
• DNS looks for IP address stored against a name and returns it
URL
URL
URL
URL
URL