Data Communication Networking U1
Data Communication Networking U1
Data Communication
and Networking
Unit 1
Introduction
to Data
Communication
and Networking
Contents
Course overview 1
Unit overview 4
Unit objectives 5
Objectives 6
Introduction 6
Objectives 36
Introduction 36
OSI model 36
TCP/IP model 52
TCP/IP protocols 54
Objectives 65
Introduction 65
Summary of Unit 1 99
References 107
Glossary 108
Course Overview
You must have witnessed the use of computer networks in many forms,
from browsers in your handphone to cafes with Wi-Fi or public wireless
Internet access, from home networks with high speed wireless or wired
broadband access to offices with a networked PC on every desk. You
can say that computer networks have become ubiquitous, allowing you to
send email to your friends, browse the web to find information, or make
online purchases over the Internet. By now, you will feel that computer
network is present everywhere.
The first unit introduces the basic concepts used in data communication
and networking. The first section focuses on the protocols and standards
which play an important role. Protocols are rules governing communication
between devices or applications. A standard is an agreed-upon way of
doing something or measuring something. The second section covers the
network models. Open system interconnection (OSI) of ISO (International
Standards Organisation) and TCP/IP are standard models which are
very useful in describing the operations required while communicating
from one computer at one end with other computers at the other end.
The different types of transmission media which are used in computer
networks are discussed in the last section.
The second unit provides the best introduction on data transmission. The
first section explains the data transmission in digital form. The second
section explains the data transmission in analog form. The third section
covers the synchronous and multiplexing that are used to integrate
multiple analog or digital signals into a signal transmitted over a shared
medium. The fourth section includes error detection which means
the detection of errors caused by noise or other impairments during
transmission, and error correction which means detection of errors and
reconstruction of the original data. The fifth section explores the framing,
flow and error control.
In the fourth unit, the first section describes the TCP/IP functionality
and a number of Internet-based applications such as HTTP, FTP, DNS
and SMTP. The second section explores the physical architecture with
services such as Integrated Services Digital Network (ISDN) and Digital
Subscriber Line (DSL). The third section on Internet protocol describes
basic functions of IP such as encapsulation, fragmentation, connection
control, etc., and IP addressing. The last section covers the transport
protocol that includes connection-oriented mechanism of the transport
protocol, header of TCP and user datagram protocol.
The fifth unit elaborates network management and security. The first
section provides the basic information about network management
and why network management is required in a company. The second
section explains the two types of network management protocols
which are Simple Network Management Protocol (SNMP) and Common
Management Information Protocol (CMIP). The third section describes
the basic network management functions such as traffic routing,
authorisation, configuration, fault management and security and
accounting management. The last section covers network security.
First of all, you will explore trends and technology that influence the
development of data communication and computer networking. It
illustrates data communication models and its relationships to the
world of data communication. Once you have understood the basic
concepts, you will be able to identify the types of networks that are most
commonly implemented in organisations. It also explores the standards
The subsequent section of this unit covers the OSI model and TCP/
IP model and its protocols. In the last section, the data, signals and
transmission media describe the most important and basic components
in data communication. This section introduces types of signals in data
communication and computer networks. The methods used for signal
encoding are discussed as well. The transmission media is also another
building block of data communication and it is discussed in detail.
Unit Objectives
By the end of this unit, you should be able to:
Introduction
Data communication and networking have become part of our daily lives.
For example, emailing to friends, chatting online with friends across
countries and surfing the Internet for information are our daily activities.
In the last few years, the computing and communication areas have
merged. The mobile phone which was used to send and receive calls
is now capable of word processing, advanced calculations, listening
to music, storing photographs or even movies. More and more people
have started using mobile phones which have processing capabilities.
This section introduces the basic terms used in data communication
and computer networks. You will be exposed to trends that influence the
development of data communications and the basic data communication
model. Transmission media used in data communication such as types
The above mentioned that two (2) factors have altered the development
of LAN. Hence, the development of LANs comes just in time to
accommodate the increased needs of the organisation.
With all of the changes mentioned above, it is expected that more and
more data travel across geographically-distant areas. A network which
is spread over a large area is called wide area network (WAN). With the
high demand and high volume of traffic that flows over WANs, higher
speed WANs are required to cater for the demands of corporate business.
Activity 1.1
Communication model
Destination: The data sent by the source is received here. The destination
could be a workstation or a personal computer.
Source Destination
Transmitter Receiver
Transmission system
1. List the essential elements that form the basic model of data
communications.
Data communications
Modem Modem
Activity 1.3
There are four (4) categories of networks known as personal area network
(PAN), local area network (LAN), metropolitan area network (MAN)
and wide area network (WAN). LAN, MAN and WAN can make use of
wireless communication and these are known as wireless LAN, MAN
and WAN respectively. At present, PAN refers exclusively to wireless
communications.
Figure 1.3 (b) shows an example of a LAN. The workstations one (1) to
four (4) are located within the same building but they could be at different
floors. These workstations are accessing files from the server and they
are connected via UTP cables and a switch. You will get more information
on LAN in Unit 2.
Workstation 1
Workstation 2
7x 8x 9x 10x 11x 12x 7x 8x 9x 10x 11x 12x
C
E thernet
7 8 9 101112
A 12 34 56 1x 2x 3x 4x 5x 6x 1x 2x 3x 4x 5x 6x
A B
Switch
Workstation 3
Server
Workstation 4
JH
Router 3 Router 1
Workstation Server
Workstation
Workstation WAN
Workstation PG KN Workstation
Router 4 Router 2
Server
Switch
Switch
Workstation Workstation
Workstation Server
The Internet
The Internet evolved from the ARPANET, which was developed in 1969 by
the Advanced Research Project Agency (ARPA) of the U.S. Department
of Defense. Many hosts which comprise PCs, workstations, servers and
mainframes are connected together to form the Internet. These hosts
that use the Internet are connected to a network such as LAN. These
networks in turns are connected by routers. Each router is attached to
two (2) or more networks. When a host sends data to other hosts through
the Internet, it generates a series of packets. Packets are data unit for
transmission. Each packet includes the destination’s address. These
packets travel through a series of routers and networks from source to
destination. Figure 1.3 (e) shows the important elements of the Internet
such as hosts, networks and routers.
LAN
WAN
Router
Router
Ethernet
switch LAN
WAN
Ethernet
Router switch
Activity 1.4
Alice Bob
TCP
conn
Hello ectio
n req
uest
eply
t ion r
Hello c o nnec
TCP
http:
Wha //ww GET
t tim w.go
e are o gle.c
you om
free?
<file>
8.00
Figure 1.4 (a) Human protocol Figure 1.4 (b) Network protocol
There are three (3) key features of protocols. These are syntax, semantics
and timing. Syntax is the format of the data blocks being transmitted.
Semantics is the control information for coordination and error handling.
Timing includes speed matching and sequencing.
Activity 1.5
Summary
In this section, you learnt about the basic terms and concepts
related to networking. You must have observed the recent
trend that more and more people are now using information
and communication technologies. This trend is affecting the
development of data communications and computer networks.
The basic model for data communication is important. You
also learnt the components involved in data communications
such as the transmission medium, source, transmitter, receiver
Self-test 1.1
A. source
B. destination
C. transmission system
D. transmitter
A. Digital signal
B. Analog signal
C. Analog and digital signals
D. All of the above
A. WAN
B. the Internet
C. LAN
D. transmission medium
A. WAN
B. the Internet
C. LAN
D. transmission medium
A. Connection
B. Transmission
C. Topology
D. Network
A. Circuit switching
B. Path switching
C. Network switching
D. Packet switching
A. Terminal-to-computer
B. Telephone conversation
C. Computer-to-terminal
D. Paging
A. Intranet
B. LAN
C. Internet
D. WAN
A. security
B. distributed database
C. redundancy
D. collaborative processing
A. Frequency of failure
B. Number of users
C. Transmission medium
D. Hardware
A. Performance
B. Security
C. Installation
D. Reliability
A. performance
B. reliability
C. security
D. feasibility
A. security
B. performance
C. reliability
D. feasibility
17. Give your own example of how the number of users can affect
the performance of a network.
19. Give your own example of how hardware can affect the
performance of a network.
20. Give your own example of how software can affect the
performance of a network.
c. Ali, Bob and Jane are not able to meet due to time and
distance problems. Hence, they decided to use their
mobile phones to conduct a meeting to discuss their
holiday plans.
Feedback
Activity 1.1
5. Fibre-optic cables:
Wireless transmission:
Activity 1.4
Introduction
Layered architecture is the basic building block of standards adopted
in data communications; hence, this section explains and illustrates the
layered approach of data communications. The most important part of
this section is the details of the seven (7) layers of OSI with their functions.
The TCP/IP protocol architecture and its applications are also described
in detail.
OSI model
The layered architecture organises and divides functions of a network
into seven (7) layers as shown in Figure 1.5 (a). The figure shows how a
message is passed through those layers from one end to the other end.
Message from the device A is being transferred to device B starting from
Device A Device B
Intermediate node
Link Link
7 Application Application 7
6 Presentation Presentation 6
5 Session Session 5
4 Transport Transport 4
3 Network Network Network 3
2 Data link Data link Data link Data link 2
1 Physical Physical Physical Physical 1
With reference to Figure 1.5 (b), device A’s layer 7 (application layer) calls
upon the services provided by layer 6 (presentation layer), and layer 6
calls upon services provided by layer 5 (session layer). Hence, you can
say that in the layered approach, the lower layer provides services to
higher layers and the higher layer is using services provided by the lower
layers. Layer n on device A communicates with layer n on device B and
such communication is governed by an agreed-upon series of rules
and conventions called protocols. The processes on each machine that
communicates at a given layer are called peer-to-peer processes.
Each layer on device A adds its own information to the message it receives
from the layer just above it and passes the whole package (message +
own information) to the layer just below it. The information that is added in
the form of headers and trailers is the control data added to the beginning
or end. Headers are added to the message at layers 6, 5, 4, 3 and 2. A
trailer is added at layer 2. The entire package is transported from device
A to device B at layer 1. Layer 1 converts the package into a series of bit
streams and transmits through the communication medium. At the other
end of device B, when the package is received, it is unwrapped layer by
layer, with each process receiving and removing the data meant for that
particular layer. For example, layer 2 removes the data meant for layer 2
only and passes the remaining package to layer 3. Layer 3 removes the
data meant for it and passes the message to layer 4 and so forth.
L6 Data H5 5 5 L6 Data H5
L5 Data H4 4 4 L5 Data H4
L4 Data H3 3 3 L4 Data H3
T2 L3 Data H2 2 2 T2 L3 Data H2
1 1 01010101 010101010000010000
01010101 010101010000010000
Transmission medium
Activity 1.6
In this section, you will learn about the functions of each layer in the OSI
model in detail. To facilitate your understanding and optimise the learning
process, each layer’s explanation is accompanied with appropriate
diagrams and examples. Have fun reading the following seven (7) parts
of this section starting from the lowest layer to the highest layer.
Physical layer
Physical Physical
10101000000010 10101000000010
layer layer
Transmission medium
The data link layer works for the physical layer by transforming data sent
by the physical layer. It performs node-to-node delivery to ensure that
raw transmission is transformed into reliable data message by adding
trailers and headers. This data message at this layer is called frame. It
oversees the delivery of the frame between two (2) systems on the same
network (link). The error-free frame is then passed to the network layer.
The address of each node at this layer is called the physical address or
media access control (MAC) address. The format of the address varies
depending on the protocol used. We use a generic physical address to
explain the process involved. Figure 1.6 (b) shows an example of the data
10 28 53 65 87
T2 Data 28 65
1. Framing: The data link layer groups the stream of bits received
from the physical layer into manageable data units called
frames at the receiving end and does the vice versa at the
sending end.
3. Flow control: The data link layer ensures that the communication
link’s traffic is properly controlled by imposing a flow control
mechanism to prevent overloading at the receiver side.
Network layer
Let’s say a node with network address A and physical address 10 wants
to send data to a node with network address P and physical address 95.
As you can see, these nodes are located in different networks. Therefore,
the packets would pass through the router (represented as R in the figure)
which is a device used to connect two different networks. A LAN can be
connected to WAN using routers. The packets with network address A
(using a generic format) and physical address 10 pass through the routers
and reach a node with network address P and physical address 95.
10 87 Bus
F 20
T2 Data A P 10 20
R
99
WAN T2 Data A P 99 33
N
33
R
66 Z
T2 Data A P 66 95
P M
95 77 Bus
Transport layer
A P
Transport Transport
Data j k Data j k
layer layer
T2 Data-1 j k A P H2 T2 Data-2 j k A P H2
Internet
Session layer
Session Session
H5
H5 H5
layer layer
syn syn syn syn syn syn
L5 data L5 data
To transport layer From transport layer
L7 data L7 data
Presentation Presentation
layer Encoded, encrypted and layer Encoded, encrypted and
compressed data H6 compressed data
H6
L6 data L6 data
To session layer From session layer
Application layer
The application layer provides user interfaces and support for services
such as electronic mail, remote file access and transfer, shared database
management, and other types of distributed information services.
Figure 1.6 (g) shows the relationship of the application layer to the user
and the presentation layer. There are many services available such as
X.400 (a message-handling service), X.500 (a directory service) and file
transfer, access, and management (FTAM). The example shows a user
using X.400 to send an email message. There are no headers or trailers
added at this layer.
User User
Application Application
layer layer
x.500 FTAM x.400 x.500 FTAM x.400
L7 data L7 data
Web Reference
1. http://www.networkcableonline.com/osi.htm
2. http://www.webopedia.com/DidYouKnow/Computer_
Science/2006/understanding_layers.asp
TCP/IP model
TCP/IP model is a set of rules that is used for data communication.
It is simply called IP model. It is also called Internet protocol model.
Nowadays this model dominates data communication and networking.
The TCP/IP protocol has five layers:
1. Physical Layer
3. Network layer
4. Transport layer
5. Application layer
Function of layers
3. The Internet layer — this is the layer that defines standards in data
exchange for devices connected to different types of network.
Internet Protocol (IP) is the standard protocol found in this layer
that defines the standard routing function across multiple networks.
This protocol is implemented not only in the end systems but also in
routers. A router is a communication device that connects one
network to another and performs routing of packets from one end
to the other end of the system.
The coordination among these layers is such that the lower layer provides
services to the higher layer during data communication. Each layer adds
control information into data to be transmitted.
Activity 1.8
TCP/IP protocols
The Advanced Research Projects Agency (ARPA) researched and
developed the first operational packet-switching network known as
ARPANET in 1969. The Transmission Control Protocol/Internet Protocol
(TCP/IP) was defined as the standard adopted in the Internet. It is also
known as TCP/IP protocol suite. The TCP/IP is a group of hierarchical
Activity 1.9
Summary
A. physical
B. data link
C. network
D. transport
A. physical
B. data link
C. presentation
D. session
A. transport
B. session
C. presentation
D. application
A. data link
B. session
C. transport
D. application
A. physical
B. data link
C. transport
D. network
6. As the data packet moves from the lower to the upper layers,
headers are ____________.
A. added
B. removed
C. rearranged
D. modified
A. added
B. removed
C. rearranged
D. modified
A. physical
B. data link
C. transport
D. presentation
A. network
B. data link
C. transport
D. presentation
A. physical
B. transport
C. session
D. presentation
a. Route determination.
b. Flow control.
c. Access to media.
e. Change of codes.
g. Network selection.
14. The ____________ layer can use the trailer of the frame for
error detection.
Feedback
Activity 1.5
Activity 1.6
4. Each layer calls upon the services of the layer just below it
using interfaces between each pair of adjacent layers.
6. OSI
7. Physical
8. Transport
Activity 1.8
The Internet layer: This is the layer that defines standards in data
exchange for devices connected to different types of network.
Internet Protocol (IP) is the standard protocol found in this layer
that defines the standard routing function across multiple networks.
This protocol is implemented not only in the end systems but also
in routers. A router is a communication device that connects one
network to another and performs routing of packets from one end
to the other end of the system.
Activity 1.9
Introduction
In the previous section, you have learnt about different types of networks
and the protocols used in these networks. This section introduces the
difference between data and signal. Data are raw facts that are to be
processed by computers. Data need to be converted into appropriate
form known as signal in order to send it from one computer to a far-off
computer. This section discusses the representation method for data and
its relationship with signals. You will also be exposed to how data and
signals are represented in analog and digital form. Analog representation
is in continuous wave form and digital representation is discrete and
precise. Additionally, transmission impairment such as electrical
interferences that affect the quality of the signal will also be discussed.
Last but not least, the signal encoding methods and transmission media
will be discussed in detail.
The physical layer which is the lowest layer in the OSI model is the
underlying layer that is closest to the transmission. The physical layer
handles the signal and signal-related functions such as converting signals
to a much more suitable form for transmission. A medium that carries
transmission signals from one place to another works based on the type
of signal it receives. Transmissions occur in daily lives, for example,
when you are collecting statistics from another computer, sending videos
from a workstation, or causing a bell to ring in a distant control centre.
The data or information transmitted can be voice, image, numeric data,
character or code.
The bit streams of 1s and 0s must be further converted into a form that
transmission media can accept. The process of converting data into
another suitable form in data communication and networking is known
as encoding. Transmission media works by conducting energy along a
physical path. So a data stream of 1s and 0s must be turned into energy
in the form of electromagnetic signals.
Transmission media used to deliver signals from one end to another end
could be in physical form known as guided media, or in wireless form
known as unguided media. For guided media, signals travel across some
kind of path and have predetermined directions for travel. Examples of
guided media are twisted-pair cables, coaxial cables and fibre-optic
There are three (3) types of transmission mode when signals travel from
one end to another. These modes are known as simplex, half-duplex
and duplex (also known as full-duplex). In simplex mode of transmission,
signals travel in one direction only, for example, paging services. A pager
can be used to receive information only and cannot be used to send
information. As for half-duplex transmission, signals travel bidirectionally
but only in one direction at a time. An example of half-duplex transmission
is walkie-talkie, where one end sends information and the other end
receives information and vice versa. The last mode is duplex or full duplex,
whereby signals travel bidirectionally at the same time. An example of
duplex transmission is telephone conversation where both sender and
receiver can send and receive information at the same time.
Activity 1.10
a. Guided media
b. Unguided media
c. Direct link
e. Multipoint
Signals
Data are raw facts which are understood by human beings. Data are
in various formats such as text message, voice message, video clip
and audio clip. These data are stored and manipulated by computers
in the format of a series of bit streams of 1s and 0s. The data are also
categorised as digital data that is in discrete format, or analog data
that is in continuous wave form. During transmission, the transmission
media works by conducting energy along a physical path. Hence, the
data stream of 0s and 1s must be turned into energy in the form of
electromagnetic format known as signals. There are two (2) types of
signals named digital signal and analog signal. The following sections
discuss digital and analog data, and the types of signals in detail.
Value Value
Time Time
As discussed in the above section, data can be in two (2) forms — digital
or analog, and signalling can also be either in digital or analog form.
There are four possible combinations of transferring analog or digital
data through analog or digital signalling. These are shown in Figure 1.7 (b)
and (c). Analog data that is captured by a telephone can be transmitted
directly to the destination without going through the encoding process.
Telephone
As discussed in the above sections, both the analog and digital data
may be represented by analog or digital signals. Analog data such as
voice and digital data such as text messages can be transmitted via
analog signals. If the transmission distance between two (2) ends is large,
the analog signal may lose its strength. It is known as attenuation. To
overcome the attenuation problem, amplifiers could be used to strengthen
the signal. However, the adverse effect of using amplifiers is that the
noise component is also boosted. Noise is unwanted signals that are
mixed with the original signals. Details about noise are discussed in the
following section. Similarly, a digital signal also faces the same problem
Transmission impairments
Transmission medium
Point 1 Point 2
Activity 1.11
A simple signal by itself does not carry information any more than a
straight line. The signal must be manipulated so that it contains identifiable
changes that are recognisable to the sender and receiver as representing
the information intended. Data are stored in a computer in the form of
0s and 1s. To carry from one place to another, digital data are usually
converted to digital signals. This is known as digital-to-digital conversion
or encoding digital data into a digital signal as shown in Figure 1.8 (a).
Digital-to-
01110010 digital
encoding
Digital data Digital signal
Amplitude
0 1 0 0 1 1 1 0
Time
Amplitude
0 1 0 0 0 1 1 0
Time
Amplitude
0 1 0 0 0 1 1 0
Time
Polar
Polar encoding uses two (2) voltage levels, one positive and one negative.
By using two (2) levels in most polar encoding methods, the average
voltage level on the line is reduced and the D.C. component problem seen
in unipolar encoding is alleviated. Some of the popular polar encoding
methods are:
Polar
NRZ RZ Biphase
• NRZ-L • Manchester
• NRZ-I • Differential
Manchester
0 1 0 0 1 1 1 0
NRZ-L Time
NRZ-I
Time
Return to Zero uses three (3) values: Positive, negative and zero. A 1 bit
is represented by positive-to-zero and a 0 bit by negative-to-zero. RZ
encoding can ensure synchronisation via a signal change for each bit.
The receiver can use these changes to build up, update, and synchronise
its clock. The main disadvantage of RZ is that it requires two (2) signal
changes to encode one bit and therefore occupies more bandwidth.
But, it is still much more effective as compared to NRZ-L and NRZ-I.
Figure 1.8 (f) shows the RZ encoding; there is transition in each bit which
is used for synchronisation purposes.
0 1 0 0 1 1 1 0
Time
Biphase
Manchester
Manchester encoding uses the inversion at the middle of each bit interval
for both synchronisation and bit representation. A negative-to-positive
transition represents binary 1 and a positive-to-negative transition
represents binary 0. By using a single transition for dual purposes,
Manchester encoding achieves the same level of synchronisation as RZ
with only two (2) levels of amplitude. Figure 1.8 (g) shows the Manchester
encoding for the same bit pattern as polar encoding methods described
in the earlier sections.
Value
0 1 0 0 1 1 1 0
Manchester Time
Differential
Time
Manchester
Zero is
Presence of transition at the
beginning of bit time means zero One is
1. http://www.rhyshaden.com/encoding.htm
2. http://www.learntcpip.com
Activity 1.12
Transmission media
As mentioned earlier, computers use signals to transmit data.
Signals are transmitted from one device to another in the form of
electromagnetic energy, which are propagated through transmission
media. Electromagnetic energy is a combination of electrical and
magnetic fields vibrating in relation to each other. Examples include
power, radio waves, infrared light, visible light, ultraviolet light and X,
gamma, and cosmic rays.
Twisted-pair cable
Twister-pair cable consists of two (2) copper conductors, each with its
own plastic insulation but twisted together. You must have seen this
type of cable in your fixed telephone connection in your home. One of
the wires is used to carry signal to the receiver and the other is used as
ground reference. By twisting the pair of wires, the crosstalk is decreased
between adjacent pairs of cables. The number of twists per unit length
in the twisted-pair cable determines the quality of the cable. More twists
mean better quality. Generally, there are two (2) types of twisted-pair
cables known as shielded twisted-pair and unshielded twisted-pair. The
following section describes each of them in detail.
Digital/
Category Bandwith Data rate Use
analog
Voice only —
1 Very low < 100 Kbps Analog
Telephone
Data —
2 < 2 MHz 2 Mbps Analog/digital
T-1 Lines / Localtalk
3 16 MHz 10 Mbps Digital LANs — Ethernet
LANs —
4 20 MHz 20 Mbps Digital
16 Mbps Token ring
LANs —
5 100 MHz 100 Mbps Digital
Fast Ethernet
LANs —
6 200 MHz 200 Mbps Digital
Gigabit Ethernet
7 600 MHz 600 Mbps Digital LANs
Table 1.1 Categories of UTP cables
Coaxial cable
Fibre-optic cable
Cladding
Outside
Core jacket
In multimode, multiple beams from a light source move through the core
in different directions. There are two (2) types of directions in multimode,
known as step-index and graded-index. The word index refers to the
index of refraction which is related to density. The step-index is the
density of the core which remains constant from the centre of the edges.
A beam of light moves through this constant density in a straight line until
it reaches the interface of the code and the cladding. At the interface,
there is an abrupt change to a lower density that alters the angle of the
beam’s motion. The term step-index refers to the suddenness of this
change. Figure 1.9 (f) shows the diagram for multimode step-index mode.
Single mode
Single mode uses step-index fibre and highly focused source of light
that limits beams to a small range of angles, all close to the horizontal.
It has smaller diameter than that of multimode fibre, with substantially
lower density. The decrease in density results in a critical angle that is
close enough to 90° to make propagation of beams almost horizontal.
Figure 1.9 (f) also shows the single mode fibre.
Source Destination
Multimode graded-index fibre
Source Destination
Single-mode fibre
Radio waves
Infrared
Infrared signals with frequencies ranging from 300 GHz to 400 THz (Tera
Hertz), can be used for short-range communication. Infrared signals
have high frequencies and cannot penetrate walls. Infrared cannot be
used outside a building because the sun rays containing infrared waves
can interfere with the communication. Infrared is used for short distance
communications such as keyboard, mouse and remote control for
electrical appliances such as TV, radio, fans, etc.
Web Reference
1. http://www.techbooksforfree.com/intro_to_data_com/page
37. html
2. http://www.webopedia.com/TERM/m/media.html
Self-test 1.3
Feedback
Activity 1.10
Activity 1.11
Activity 1.12
Summary
Feedback
Self-test 1.1
1. B
2. A
3. D
4. A
5. C
6. A
7. C
8. D
10. C
11. D
12. A
13. C
14. B
15. A
c. Sending email.
b. Financial services
c. Teleconferencing
d. Directory services
e. Manufacturing
Self-test 1.2
1. B
2. C
4. D
5. B
6. B
7. A
8. C
9. A
10. C
11. a. Network
b. Transport
d. Application
e. Presentation
f. Transport layer
i. Application layer
12. presentation
13. physical
Self-test 1.3
2. Digital signal.
0 1 0 0 1 1 0 0 0 1 1
NRZ-L Time
NRZ-I Time
RZ Time
Manchester Time
Differential Time
Manchester
Telephone Telephone
Telephone line
10 a.
French Chinese
PM (French) PM (Chinese)
Staff (English) Staff (English)
Telephone Telephone
Telephone line
b.
French Chinese
PM (French) PM (Chinese)
Staff (German) Staff (Japanese)
Telephone Telephone
Telephone line
Telephone
Translator
(Japanese German) Germany
COURSE COORDINATOR
En. Muhammad Norhadri Bin Mohd Hilmi
PRODUCTION
In-house Editors: Ms. Jeanne Chow and Mr. Khoo Chiew Keen
Graphic Designer: Ms. Leong Yin Ling
Wawasan Open University is Malaysia’s first private not-for-profit tertiary institution dedicated to
adult learners. It is funded by the Wawasan Education Foundation, a tax-exempt entity established
by the Malaysian People’s Movement Party (Gerakan) and supported by the Yeap Chor Ee Charitable
and Endowment Trusts, other charities, corporations, members of the public and occasional grants
from the Government of Malaysia.
The course material development of the university is funded by Yeap Chor Ee Charitable and
Endowment Trusts.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or
transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or
otherwise, without prior written permission from WOU.