2011 Chapter3 Handout
2011 Chapter3 Handout
Section objectives
After completing this section the learner should be able to:
define data communication
describe data transmission modes
identify data communication media
discuss different cable types and their importance
The term communication can be defined as the process of transferring messages between
entities. Based on what these two entities are, there are three basic types of communication:
Human-to-Human
Computer-to-computer
Human-to-Computer
For exchange of information the information should be transmitted from the source to the
destination through a transmission media called a channel.
The following figure shows the different components and processes of data communication.
A message should first be encoded in such a way that it can be transmitted through a channel
(medium), it is then transmitted, and finally, it is decoded into a form that can be understood by
the destination at the other end. This holds true for voice communication, or data
communication.
1
Introduction to ICT Chapter 3
Data communication involves transporting data from one point to another. This is an instance
of computer-to-computer communication, i.e., both the source and the destination are
computer devices, and the transmission media may be telephone lines, satellite links,
microwave links, etc.
Information is transmitted in the form of analog or digital. Most communication lines are
designed to carry analog signals. Digital transmission is rarely used for telecommunications.
There is a need of converting between analog and digital signals. So a technique must be used
to represent a digital signal or an analog carrier
Modulation: Converting digital signals into analog signals.
Demodulation: Converting analog signals back into digital signals.
Modem: Short for modulator/demodulator: A communications device that converts one
form of a signal to another that is suitable for transmission over communication circuits,
typically from digital to analog and then from analog to digital.
Simplex
In this mode, transmission can take place only in one direction. The device at either end is
either a send-only or receive-only device.
Half-Duplex
In this mode, data can be transmitted in both directions, but only in one direction at a time. This
is good for transmissions in which case the receiver has to acknowledge that it has received the
message back to the sender. Thus, half-duplex line can alternately send and receive data. Two
wires are usually required. Voice communication (telephone) is normally an instance of half-
duplex mode of transmission.
Half Duplex
Sender Receiver
(receiver) (Sender)
2
Introduction to ICT Chapter 3
Full-Duplex
Full-duplex transmission mode allows simultaneous transmission in both directions. When high-
speed transmission is required, full-duplex transmission is the ideal choice. This transmission
mode requires four wires.
Full Duplex
Sender Receiver
(receiver) (Sender)
Activity:
Select any communication mechanism. Can you classify them as Simplex, Half-Duplex or
Full-Duplex
The measurement of the quantity of data that can be passed down (transmitted) a
communication link in a given time is done in terms of bandwidth. Generally, bandwidth refers
to the maximum volume of information that can be transferred over any communication
medium. In digital circuits, bandwidth is measured in bits per second (bps). The rate of data
transmission is directly proportional to the bandwidth.
There are two broad categories of transmission media, guided and unguided.
1) Guided transmission media: - uses a cabling system that guides the data signals along a
specific path. The data signals are bound by the cabling system. Guided media is also
known as bound media.
Example: twisted pair, optical fiber, coaxial cable, etc.
3
Introduction to ICT Chapter 3
Section Objectives
After completing this section the learner should be able to:
define computer networks
identify networking devices
classify networks based on their size
define network topology
identify the advantages and disadvantages of different topologies
When a computer system is processing data all by itself, without any interaction or
interconnection with any other computer system, it is called a Stand-Alone Computer System. A
Network System is where two or more computers are connected to each other for the purpose
of data communication and sharing of resources.
3.2.1.Network Devices
Server(s)
High capacity computers that function as the central repository of resources/services
the network provides.
Usually the server is also responsible for controlling which users on which computers in
the network are granted access to a service.
4
Introduction to ICT Chapter 3
Workstations
A place where the services of the server are used (This is where the user is working)
Any computer where user is working; does not have to be high capacity computer
Cabling
Cables that interconnect the different devices on the network
Various types of cables are used, including coaxial cable, twisted-pair cable and fiber-
optic cables
Wireless networks do not require physical cables
3.2.2.Types of Networks
Based on the geographic span of coverage, computer networks are broadly classified into three
major categories.
Local Area Network
Metropolitan Network
Wide Area Network
5
Introduction to ICT Chapter 3
Since all equipment is located within a single establishment, LAN’s are normally
installed and maintained by an organization; also called private data networks
Example: computer network installed in Hawassa University
3.2.3.Network Topology
The way in which devices on the network are connected is called the topology of the network.
Network topology specifically refers to the physical layout of the network, especially the
locations of the devices and how the cable is run between them. It is important to select the
right topology for how the network will be used. Each topology has its own strengths and
weaknesses. Four of the most common topologies are bus, ring, star and mesh.
6
Introduction to ICT Chapter 3
Advantages:
Uses the least amount of cable
Wiring layout is simple
Has a resilient architecture; its simplicity makes it very reliable
Very easy to extend
Disadvantages:
Fault diagnosis and isolation is difficult
The token ring technology creates opportunity for acknowledging receipt of messages by the
receivers.
Advantages
The overall cable length is short
The shorter cable means lower cabling costs
No wiring closet space is required
7
Introduction to ICT Chapter 3
Disadvantages
A single node failure causes network failure
It is more difficult to diagnose faults
Network modifications/recognition is more difficult and disrupts network operation
Advantages
Cable layouts are easy to modify
Workstations can be added to the network easily
Centralized control/problem diagnosis resulting from defective communication lines
is easily identified.
Disadvantages
Large amounts of cable are required
More cable means greater expense
A centralized hub means a single point for potential for network failure
8
Introduction to ICT Chapter 3
By modifying and combining some of the characteristics of these “pure” network topologies,
“hybrid” topologies result that can often provide greater efficiency.
Section objectives
After completing this section learners should be able to:
define the Internet
discuss the use of Internet
identify services provided over the Internet
define Internet protocols and addressing
The Internet is a term used to describe a worldwide network of computer networks connecting
millions of computers around the world.
It is a "network of networks" that consists of millions of smaller domestic, academic,
business, and government networks, which together carry various information and
services.
It is a group of two or more networks that are
o Interconnected physically
o Capable of communicating and sharing data with each other
o Able to act together as a single network
The Internet connects millions of computers globally and provides worldwide
communications to businesses, homes, schools, and governments.
Individuals and organizations make information available through the Internet for a variety of
reasons. Some of this information is freely available to the general public, while some of it is
restricted to a particular user community.
9
Introduction to ICT Chapter 3
The following are some of the people who put information on the Internet, and the types of
information they make freely available.
Governments often have a mandate to make information freely available to their
citizens, and are publishing a wealth of statistical and other information on the web.
University researchers, educators and students make available various types of
academic information, including “unpublished” articles.
Non-profit organizations post information on various topics.
provide useful supplementary information on their commercial web sites, Commercial
companies sometimes providing the general public with limited access to databases.
Publishers provide excerpts of their print publications, usually periodical issues. There
are also a growing number of free e-zines and e-journals.
are digitizing publications for which copyright has expired and making them Archives
and Libraries available on the web.
Libraries also often make catalogues of their holdings freely available.
Individuals post information about topics of personal interest.
To Provide Information
Most of what you want to provide could be considered global advertising. Using the internet is one
of the best and most inexpensive ways to let people know who you are, what you are doing or
have done and how to reach/find you.
Publishing: including full test articles, reports, abstracts, computer programs, and
demonstrations
Teaching: The possibilities here include both distance learning and assistance for
students
Sharing/exchanging information with the outside world
Ability to Communicate
The Internet gives people the ability to communicate with other connected computer
users through electronic mail and real time typed conversations (bulletin boards,
databases, and discussion groups).
Users will be able to use electronic mails to transmit messages, announcements and
document/file attachments to other users within the Intranet or over the Internet.
10
Introduction to ICT Chapter 3
3.3.2.Internet Connectivity
You can connect to the Internet in one of two basic ways, dialing into an Internet service
provider’s (ISP) computer, or with a direct connection to an Internet service provider. The
difference is mainly in the speed and cost. In most cases, you connect to your ISP using a
telephone line modem. This type of connection is called the Dial-up connection. Sometimes
you go in for a direct connection.
Dial-up Connection: is type of Internet connection that is made by connecting a plain old
telephone line to the phone jack at the back of a computer which, in turn connects to the
internal modem of the computer, and allows the user to dial a phone number of a service
provider and connect to the Internet.
Direct Connection: is a permanent connection between your computer system and the
Internet. This is sometimes referred to as a leased-line connection because the line is leased
from the telephone company.
You can also get a direct connection to your ISP, where you have a fixed cable or a dedicated
phone line to the ISP. Often the dedicated line is an ISDN (Integrated Services Digital Network)
line that is a higher speed version of the standard phone line.
The WWW is an Internet service that provides a network of interactive documents and the
software to access them. It is based on documents called web pages that combine text,
pictures, forms, sound, animation and hypertext links called hyperlinks. To navigate the WWW,
users “surf” from one page to another by pointing and clicking on the hyperlinks in text or
graphics.
11
Introduction to ICT Chapter 3
Usenet
Usenet is internet-based bulletin board that allows reading and posting of "news" in various
"newsgroups." There are thousands of newsgroups covering a myriad of topics.
FTP
FTP stands for File Transfer Protocol. This is both a program and the method used to transfer
files between computers. Anonymous FTP is an option that allows users to transfer files from
thousands of host computers on the Internet to their personal computer account. FTP sites
contain books, articles, software, games, images, sounds, multimedia, course work, data sets,
and more.
12
Introduction to ICT Chapter 3
graphics must be downloaded from a remote server onto the user’s computer, before
viewing the web site. Upload is just the opposite of download. In case of uploading, the
user moves or copies a document, program or other data from his/her computer to the
Internet.
Online and Offline: The term online is commonly referred to as “connected to the
WWW via Internet”. When you connect to the Internet, you are online. Offline is just
the opposite of online. Offline means that the user is no longer connected to the remote
computer (Internet).
3.3.5.Internet Protocols
Internet protocols are sets of rules that allow for inter-machine communication on the Internet.
One of the few requirements of a computer connected to the Internet is that it must speak a
common language (or protocol). This protocol, called Transmission Control Protocol / Internet
Protocol (TCP/IP), is what enables small desktop personal computers to converse with huge
super-computers across this entanglement of network connections.
All computers on the Internet communicate with one another using the Transmission Control
Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use
client/server architecture. This means that the remote server machine provides files and
services to the user's local client machine. Software can be installed on a client computer to
take advantage of the latest access technology.
3.3.6.Internet Addressing
Very similar to the postal address system, Internet addressing is a systematic way to identify
people, computer and the Internet resources. On the Internet, the term “address” is used
loosely. Address can mean many different things from an electronic mail address to a URL
(universal resource locator).
When a new site is put online it has a specific network address that looks something like
207.70.128.240. In order to make the site easier to remember, a unique name is correlated
with the number.
13
Introduction to ICT Chapter 3
A domain name always contains two or more components separated by periods, called “dots”.
Some examples of domain names are: ibm.com, nasa.gov, ju.edu.et etc. Once a domain name
has been established, “sub-domains” can be created within the domain. For example, the
domain name for a large company could be “vni.com” and within this domain, sub-domains can
be created for each of the company’s regional offices.
The portion of a domain name after the dot describes the type of organization holding that
name. The major categories are:
Com – commercial entities
Edu – educational institutions
Net – organizations directly involved in the Internet operations, such as network
providers and network information centers.
Org – miscellaneous organizations that do not fit any other category, such as non-profit
groups
Gov – united states federal government entities
Mil – united states military
Country codes: Two-letter abbreviation for a particular country, et for Ethiopia, uk for united
kingdom, fr for france, etc. No country code abbreviation is used for USA.
For example: http://www.google.com/et is the URL for Google Ethiopia.
Exercise
1. What are the three modes of data transmission? Give an example from each
2. What do we mean by guided media?
3. Compare and contrast guided and unguided media
4. Compare and contrast the different network topologies.
14
Introduction to ICT Chapter 3
Section Objectives
After completing this section the learner should be able to:
Describe computer security objectives
Define the key words used to discuss computer security
Explain the primary mechanisms used to protect computers and their contents
Define computer viruses & identify some of the most common types
Identify some ways to prevent or recover from a virus infection
Availability refers to protecting against accidental actions that cause information resources
to be unavailable to users when needed (Removal of data).
15
Introduction to ICT Chapter 3
Threat describes the source of probable trouble or attack to a system that could cause
losses. While threats can take on many forms, they generally fall into three broad
categories: person, thing or event a person is the one who uses the system. Because of
careless oversight, poor training, intend to harm or criminal intent it could be a threat to the
system. Sometimes the problems could be the result of the things used in the system such
as faulty equipment, virus, and software failure. The last category of threat is an event.
This includes interruption of electricity, fire, and flood, and network failure. A threat is
possible only because the system is vulnerable to that particular threat. Vulnerability
means errors or problems or other conditions that make a system open to threats.
Safeguard is a technique for protecting against a threat. Thus, computer security is that
part of information resources management which is concerned with applying safeguards
(both technical and administrative) to minimize vulnerabilities with the goal of avoiding or
reducing potential threats.
3.4.2.Protecting Computers
Computer-based information systems are much more exposed to different problems such as
abuse, human errors, and crime etc than the manual system. Organizations, institutions etc
contain very vital information on employees, customers, vendors, etc., and this information
must be protected from being accessed by unauthorized individuals. Many security
mechanisms are used to protect computers and their contents. Some examples include:
Common Security Mechanisms
Physical Security
Passwords
Firewalls
Codes (encryption)
Audits
Backup
Physical security has two main areas of concern. The first is the computer installation,
(central hardware, peripheral and secondary equipment and the functions associated with
it). The second is the necessity of back-up in case the system does fail.
16
Introduction to ICT Chapter 3
equipment. Physical security includes door and windows locks, keyboard locks, and so on.
It provides controls over the access and use of computer facilities and equipment and
controls for the prevention of theft. It also includes controls that reduce or eliminate
certain environmental threats such as power fluctuation, humidity, dust, varying
temperature and fire.
Passwords are a confidential sequence of characters that give approved users access to
computers. To be effective, passwords must be difficult to guess. Effective passwords
contain a mixture of characters and symbols that are not real words. If you want even more
protection purchase a special security program for you entire computer. With these
programs, anyone can turn on your computer but they can’t use it until they enter the
correct password.
Firewalls
Keep internal networks secure while allowing communication with the rest of the
Internet
Guard against unauthorized access to an internal network.\
Acts as a gateway with a lock
Audit control Software is used to monitor and record computer transactions as they
happen so auditors can trace and identify suspicious computer activity.
Back ups
Protection of data by keeping copies of sensitive data in several different locations
Data recovery insurance is a system of making regular backups
Destructive computer programs, sabotage, human errors, power losses, machine failure,
fire, flood, lightning and earthquakes can damage or destroy computer data along with
hardware
3.4.3.Computer Viruses
Computer viruses are specific type of programs written deliberately to cause harm to
someone’s computer or to use that computer in unauthorized way.
Virus Program
Malicious (destructive) program/software that damages computer
Needs a host to infect; the host is an innocent program
Reproduces its own code by copying itself onto the host program
Executes when infected program is executed
Spreads from program to program or from disk to disk
17
Introduction to ICT Chapter 3
Trojan Horse
Program that appears to have a useful function but really does not
Delivery vehicle for some code (logic bomb or virus) on to a computer
Program Viruses
Contaminates files that contain computer code specially “.exe” and “.com” files
Can be spread through any medium used to transport software
18