Lecture Notes 1
Lecture Notes 1
2 Home Applications
peer-to-peer communication
person-to-person communication
electronic commerce
entertainment. (game playing,)
3 Mobile Users
Text messaging or texting
Smart phones,
GPS (Global Positioning System)
m-commerce
NFC (Near Field Communication)
4 Social Issues
With the good comes the bad, as this new-found freedom brings with it many
unsolved social, political, and ethical issues.
Social networks, message boards, content sharing sites, and a host of other
applications allow people to share their views with like-mindedindividuals. As long
as the subjects are restricted to technical topics or hobbies like gardening, not too
many problems will arise.
The trouble comes with topics that people actually care about, like politics,
religion, or sex. Views that are publicly posted may be deeply offensive to some
people. Worse yet, they may not be politically correct. Furthermore, opinions
need not be limited to text; high-resolution color photographs and video clips
are easily shared over computer networks. Some people take a live-and-let-live
view, but others feel that posting certain material (e.g., verbal attacks on
particular countries or religions, pornography, etc.) is simply unacceptable and
that such content must be censored. Different countries have different and
conflicting laws in this area. Thus, the debate rages.
Computer networks make it very easy to communicate. They also make it
easy for the people who run the network to snoop on the traffic. This sets up
conflicts over issues such as employee rights versus employer rights. Many
people read and write email at work. Many employers have claimed the right to
read and possibly censor employee messages, including messages sent from a
home computer outside working hours. Not all employees agree withthis,
especially the latter part.
Another conflict is centered around government versus citizen’s rights.
A new twist with mobile devices is location privacy. As part of the process of
providing service to your mobile device the network operators learn where you are
at different times of day. This allows them to track your movements. They may
know which nightclub you frequent and which medical center you visit.
Data Representation
Text
Numbers
Images
Audio
Video
Data Flow
Communication between two devices can be simplex, half-duplex, or full-duplex
as shown in Figure.
MESH:
A mesh topology is the one where every node is connected to every other node
in the network.
A star network, star topology is one of the most common network setups. In this
configuration, every node connects to a central network device, likea hub,
switch, or computer. The central network device acts as a server and the
peripheral devices act as clients. Depending on the type of network card used
in each computer of the star topology, a coaxial cable or a RJ-45 network cable
is used to connect computers together.
Advantages of star topology
Centralized management of the network, through the use of the central
computer, hub, or switch.
Easy to add another computer to the network.
If one computer on the network fails, the rest of the network continues to
function normally.
The star topology is used in local-area networks (LANs), High-speed LANs
often use a star topology with a central hub.
Disadvantages of star topology
Can have a higher cost to implement, especially
when using a switch orrouter as the central network
device.
The central network device determines the performance
and number ofnodes the network can handle.
If the central computer, hub, or switch fails, the entire
network goes downand all computers are disconnected
from the network
BUS: