0% found this document useful (0 votes)
17 views36 pages

Basic Computer Skill Ch-3

The document provides an overview of computer networking and the Internet, detailing the communication process, types of data transmission, and various transmission media including cables and wireless systems. It also discusses network topologies, the structure of the Internet, common uses, and the impact of computer viruses along with prevention and removal strategies. Key concepts include the classification of networks by geographical area and the advantages and disadvantages of different transmission methods.

Uploaded by

GETACHEW
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views36 pages

Basic Computer Skill Ch-3

The document provides an overview of computer networking and the Internet, detailing the communication process, types of data transmission, and various transmission media including cables and wireless systems. It also discusses network topologies, the structure of the Internet, common uses, and the impact of computer viruses along with prevention and removal strategies. Key concepts include the classification of networks by geographical area and the advantages and disadvantages of different transmission methods.

Uploaded by

GETACHEW
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

CHAPTER

three
Computer Networking and The Internet

1
Communication
 The need of information has increased from time to time.
 It is a process of transferring ideas, information and message b/n entities.
 Data communication is the exchange of information between two agents.
 For exchange of information the information should be transmitted from one point to
another through a transmission media called Channel.
 Input information
 Input data or signal
 Transmitted signal
 Received signal
 Output data or signal
 Out put information
 We do have three kinds of communication
These are: 1. Human to human
2. Human to computer
2
3. Computer to computer
There are three basic elements of communication
1. Source(Sender): - a device to send data.
2. Media(channel): a communication medium over which data is sent.
3. Destination(receiver): a device to receive the sent data.
There are two types of transmission
 Analog Transmission:-continuous sine wave.
 Digital transmission:- discrete/discontinuous on
& off electronic pulses.
It is digital computer communication with digital signal.(the “on” pulse is
represented as 1 bit and the “off” pulse is represented as o bit)
 Data is transmitted as a series of character or block of character.(asynchronous
& Synchronous)

Transmission Decoder Destination


sender Encoder /channel

3
Data Transmission
There are three types of data transmission channels:
A/Narrowband: It is the smaller band and has slow data transmission
rate Ex Telegraph line.
 B/Voice band: It is the wider band and has better data transmission
rate than the narrow band. Ex telephone lines are used for voice band
channel
C/Broadband: It is the widest band has used to transmit large volume
of data with high speed, Ex. (Oxide cable such as TV aerial lead),
circuits, communications sate bites and optical fibers are used for
broadband channels.
Modes of Data Transmission
Their are three types of communication channels/ modes of
communication.
a. Simplex
b. Half-duplex
c. full-duplex 4
A. Simplex :- In this transmission signals are transmitted in only one
direction: One station is transmitter and the other is receiver It is takes
place in only one direction.
Sender Receiver
E.g. Radio, TV broadcasting.
 The device at either end is ether send only or receive only.
B. Half-Duplex: it is a transmission of data in both direction but only in one
direction at a time.
This is a good for transmissions in which case the receiver has to acknowledge
that it has received the message back to the sender.
E.g. A talk-back radio Sender Receiver
 Full-Duplex: it allow transmission of data both direction simultaneously. . The
medium carries signals in both directions at the same time.
E.g. Mobil, telephone Receiver
Sender

5
Speed of Data Transmission
 Bits per second (band) is the standard measure used to
express the speed of transmission in a given medium.
 Bandwidth:- is the difference b/n the highest and the lowest
frequencies that can be transmitted down a single line.
 Various media of communication can be described in terms
of bandwidth.
 The greater the bandwidth the higher the capacity of the
medium expressed in bits per second.

6
Transmission Media
 It is the physical pathway of data b/n sender and receiver.
Cable Transmission
The three major categories of cables or guided transmission medium that connect most
networks are:
 Coaxial cable
 Twisted-pair cable
 Fiber-optic cable
1. Twisted pair cable: Twisted-pair cable consists of two insulated strands of copper
wire twisted around each other.
 Two wires are twisted together to form the wire type known as twisted pair.
There are two types of twisted pair cables.
A. Unshielded Twisted Pair(UTP)
 It has low cable cost.
 It has low installation cost
 it is high sensitivity to EMI(electro
magnetic interference)
7
Advantages UTP
It has a large installed base and is a familiar technology.
It is relatively inexpensive and easy to install.
Most LAN systems are readily capable of running over UTP.
It does not require bonding and grounding.
Easy to install
Disadvantages of UTP
 High-quality UTP systems require specialized installation procedures.
 UTP is potentially more sensitive to external electromagnetic
interference, crosstalk, and attenuation than other media.
 Not recommended for LAN that requires a high level of security and
you must be absolutely sure of data integrity.
 Not suitable for transmitting data over long distances at high speeds.
8
9
B. Shielded Twisted Pair(STP)
 It has medium cable cost.
 It has moderate installation cost.
 It low EMI sensitivity.
 It has high band width than UTP.

10
Advantage of STP
 Provides better performance than UTP in environments
with high noise levels—high levels of unwanted
electrical signals.
Disadvantages STP
It is more labor-intensive than UTP to install.
Not all LAN systems work readily over STP.
Susceptible to ground faults through the shield.

11
2. Coaxial cable
It has a single copper conductor at its center. A plastic layer provides
insulation b/n the copper & the braided metal shield.
It has a medium cable cost.
It has a moderate installation cost.
It has low EMI sensitivity.
It has high bandwidth than twisted pair.

12
Types of Coaxial Cable
There are two types of coaxial cable:
- Thin (thin net) cable
- Thick (thick net) cable
 Thin net Cable :- Thin net cable is a flexible coaxial cable
about 0.64 centimeters thick. Because this type of coaxial cable
is flexible and easy to work with, it can be used in almost any
type of network installation.
Thin net coaxial cable can carry a signal for a distance of up to
approximately 185 meters before the signal starts to suffer from
attenuation.
Thick net Cable - Thick net cable is a relatively rigid coaxial
cable about 1.27 centimeters in diameter. Figure 2.3 shows the
difference between thin net and thick net cable. Thick net cable's
copper core is thicker than a thin net cable core.

13
3.Fiber optics cable
 It transmit in the form light wave instead of electrical signals through
a thin glass.
 It offer very high bandwidth.
 It has high cable cost.
 It has high installation cost.
 It has no EMI sensitivity.
 Fiber optic transmissions are extremely secure.

14
• Advantages of Coaxial Cable
 It is less susceptible to interference than twisted-pair cable.
 Transmit data for greater distances than is possible with less
expensive cabling.
 Transmit voice, video, and data
 Offer a familiar technology with reasonable data security.
Disadvantages of Coaxial Cable
There are many types of coaxial cables, each suited for one,
or at most, a small number of LAN systems.
Due to its high metallic content, coaxial cable is usually
more expensive than other cable types.

15
Summary of Cable Characteristics

Cable Cable Installation EMI Data


Type Cost Cost Sensitivity Bandwidth

UTP Lowest Lowest Highest Lowest

STP Medium Moderate Low Moderate

Coax Medium Moderate Low High

Fiber Optic Highest Highest None Very high

16
Wireless Transmission
I. Microwave systems
 Use of a high-frequency electromagnetic wave to transmit
information.
 Fixed rigidly with a focused beam along line of sight to receiving
antenna.
 It uses repeaters at interval of about 25 to 30kms to overcome
problem of line-of-site & for power amplification of weak signal.
 Electromagnetic wave can not bend or pass obstacles.

17
II. Communications satellite
 Communication satellite is a micro wave relay station b/n two or
more ground Stations(earth stations)
 Transmit and receive b/n two randomly chosen points with in a very
large area.
 Data transmission costs an independent of the distance b/n two
points within the covered area.
 It has enormous data communication capacity.
 It has Good error detection mechanism.
 Special security measures required to prevent unauthorized
tampering during broadcast.
 It needs high initial cost.

18
Fundamentals of Computer Networking

What is networking?
A computer network is a collection of computers and other devices that
communicate to share data, hardware, software, and other resources.
Benefits of Network Computing
 Sharing Information (Or Data)
 Sharing Hardware(Peripheral Devices)
 Sharing Programs/Software
 Centralizing Administration And Support

19
Based on geographical area we will classify the Network in to three:
1. Local Area Network(LAN):
 Limited geographical area less than two kilometers.
 Inexpensive transition media(coaxial or twisted pairs)
 Good for resource sharing.
E.g. University campus, office, school or a building.
2. Metropolitan Area Network(MAN):
 It covers larger geographical areas such as cities or school districts.
 Multi-campuses of the university can link their LAN in the various campuses
together to form MAN..
3. Wide Area Network(WAN):
 It covers wider geographical area
 Communication is established through telephone lines, microwave links,
fiber optics or satellite links.
Interconnection b/n one country to other country.
20
Network Topology
Topology is the physical arrangements of computers in a network.
 Frequently used topologies are:
1. Bus Topology
2. Star Topology
3. Ring Topology
4. Hybrid Topology
1. Bus Topology: is a simplest of all Topology.
All device on the network are connected to each other though a central
cable called BUS.

21
Advantages of Bus topology
 It is easy to implement.
 Use small amount of cabling.
It is easy to connect a computer or peripheral to the BUS.
Disadvantages of Bus topology
A fault on the main highway stops the whole network.

22
2. Star Topology
All the network device are connected each other through a central
concentrator called HUB.
Advantages of Star Topology
Easy to add new work stations.
Centralized management.
Adding new nodes doesn’t increase transmissions delay.
Failure of one computer does not affect the entire network.

23
Disadvantages of Star Topology
 Hub failure affects the whole work station.
 Require more cabling length to connect to the central HUB from
each office.
3. Ring Topology:
The ring topology is a physically closed loop consisting of point-to-
point links.

24
Advantages of Ring Topology
 Simple design requires less cable.
 More reliable than star because communication is not depend on a
single host computer.
Each computer act as a Repeater.
Disadvantages of Ring Topology
A break in the ring can disable the entire network.
Failure on one computer impact the rest of the network.
Difficult to trouble shoot.

25
4. Hybrid Topology
Hybrid topology scheme combines multiple topologies into one
large topology.
The hybrid network is common in large wide-area networks.
 Because each topology has its own strengths and weaknesses,
several different types can be combined for maximum efficiency.

26
Advantages of Hybrid Topology
One company can combine the benefits of several different types of
topologies.
Workgroup efficiency and traffic can be customized.
Disadvantages of Hybrid Topology
Devices on one topology cannot be placed into another topology
without some hardware changes.

27
The Internet
Internet is a huge computer network linking together with millions of
smaller networks in all over the world.
It is a "network of networks" that consists of millions of smaller
domestic, academic, business, and government networks, which
together carry various information and services, such as:-
 Electronic mail,
 Online chat,
 File transfer,
 The interlinked Web pages and
Other documents of the World Wide Web.

28
Common uses of the Internet
1. E-mail
The concept of sending electronic text messages between parties.
World wide web (WWW) usually called Web.
Globally connected network contains a number of interactive web
pages.
 Through keyword-driven Internet search using search engines, like
Google, millions of web pages have easy & instant access to a vast
and diverse amount of online information.
2. USENET
It is an electronic discussion forum.

29
3. Remote access
The Internet allows computer users to connect to other
computers and information stores easily, wherever they
may be across the world.
They may do this with or without the use of security,
authentication and encryption technologies, depending
on the requirements.
4. File transfer protocol (FTP)
It helps to transfer files and programs from one
system to another.
Using FTP programs we can upload or download
files. But to do this there should be an admission
30
from the remote computer.
5. File sharing
A computer file can be E-mailed to customers, colleagues and friends
as an attachment.
 It can be uploaded to a Web site, FTP server or Shared location for
easily download by the others.
6. Video Conferencing
 Video conferencing means making a conference on the Internet by
individuals who live in different locations.
 This takes place at the same time in different location.
 It is similar to conference in a hall except they are at distant.

31
7.Search Engine (E.g. Yahoo, Google… )
 It is an information retrieval system designed to help find
information stored on different computer through the World Wide
Web.
 The search engine allows one to ask for content meeting specific
criteria.
8. E-commerce
 It is a large Internet marketing.
 some of the biggest companies today have grown by taking
advantage of the efficient nature of low-cost advertising and
commerce through the Internet.

32
Computer Virus
 It is a computer program that can copy itself and infect a computer
without permission or knowledge of the user.
 They are deliberately created by programmers, or by people who use
virus creation software.
 A virus can only spread from one computer to another when:-
A user sends it over the network,
A user carry it on a removable medium such as a floppy disk, CD,
or USB drive.
 viruses can spread to other computers by infecting files on a
network file system.

33
• There are different kinds of viruses like:
 Warms,
Trojan horses,
Boot sector viruses,
Email viruses,
Memory resident viruses and
Micro viruses.
• Each of them has their own characteristics such as:
A worm can spread itself to other computers without needing to be
transferred as part of a host. and
A Trojan horse is a file that appears harmless until executed.

34
Virus prevention

 Purchase an anti virus program that runs as you boot or work your
computer and update it frequently.
 Execute only programs of which you are familiar as to their origin.
 Load only software from original disks or CD’s. Pirated or Copied
software is always a risk for a virus.
 Programs sent by email should always be suspicious.
Virus removal
 One possibility on Windows XP is a tool known as System Restore,
which restores the registry and critical system files to a previous
checkpoint.
 There are so many anti-virus software in the computer market that we
can use to remove virus from an infected file.
 MacAfee,
Dr. Solomon, Norton
 Operating system re-installation. 35
The end
thank you!!!

36

You might also like