Basic Computer Skill Ch-3
Basic Computer Skill Ch-3
three
Computer Networking and The Internet
1
Communication
The need of information has increased from time to time.
It is a process of transferring ideas, information and message b/n entities.
Data communication is the exchange of information between two agents.
For exchange of information the information should be transmitted from one point to
another through a transmission media called Channel.
Input information
Input data or signal
Transmitted signal
Received signal
Output data or signal
Out put information
We do have three kinds of communication
These are: 1. Human to human
2. Human to computer
2
3. Computer to computer
There are three basic elements of communication
1. Source(Sender): - a device to send data.
2. Media(channel): a communication medium over which data is sent.
3. Destination(receiver): a device to receive the sent data.
There are two types of transmission
Analog Transmission:-continuous sine wave.
Digital transmission:- discrete/discontinuous on
& off electronic pulses.
It is digital computer communication with digital signal.(the “on” pulse is
represented as 1 bit and the “off” pulse is represented as o bit)
Data is transmitted as a series of character or block of character.(asynchronous
& Synchronous)
3
Data Transmission
There are three types of data transmission channels:
A/Narrowband: It is the smaller band and has slow data transmission
rate Ex Telegraph line.
B/Voice band: It is the wider band and has better data transmission
rate than the narrow band. Ex telephone lines are used for voice band
channel
C/Broadband: It is the widest band has used to transmit large volume
of data with high speed, Ex. (Oxide cable such as TV aerial lead),
circuits, communications sate bites and optical fibers are used for
broadband channels.
Modes of Data Transmission
Their are three types of communication channels/ modes of
communication.
a. Simplex
b. Half-duplex
c. full-duplex 4
A. Simplex :- In this transmission signals are transmitted in only one
direction: One station is transmitter and the other is receiver It is takes
place in only one direction.
Sender Receiver
E.g. Radio, TV broadcasting.
The device at either end is ether send only or receive only.
B. Half-Duplex: it is a transmission of data in both direction but only in one
direction at a time.
This is a good for transmissions in which case the receiver has to acknowledge
that it has received the message back to the sender.
E.g. A talk-back radio Sender Receiver
Full-Duplex: it allow transmission of data both direction simultaneously. . The
medium carries signals in both directions at the same time.
E.g. Mobil, telephone Receiver
Sender
5
Speed of Data Transmission
Bits per second (band) is the standard measure used to
express the speed of transmission in a given medium.
Bandwidth:- is the difference b/n the highest and the lowest
frequencies that can be transmitted down a single line.
Various media of communication can be described in terms
of bandwidth.
The greater the bandwidth the higher the capacity of the
medium expressed in bits per second.
6
Transmission Media
It is the physical pathway of data b/n sender and receiver.
Cable Transmission
The three major categories of cables or guided transmission medium that connect most
networks are:
Coaxial cable
Twisted-pair cable
Fiber-optic cable
1. Twisted pair cable: Twisted-pair cable consists of two insulated strands of copper
wire twisted around each other.
Two wires are twisted together to form the wire type known as twisted pair.
There are two types of twisted pair cables.
A. Unshielded Twisted Pair(UTP)
It has low cable cost.
It has low installation cost
it is high sensitivity to EMI(electro
magnetic interference)
7
Advantages UTP
It has a large installed base and is a familiar technology.
It is relatively inexpensive and easy to install.
Most LAN systems are readily capable of running over UTP.
It does not require bonding and grounding.
Easy to install
Disadvantages of UTP
High-quality UTP systems require specialized installation procedures.
UTP is potentially more sensitive to external electromagnetic
interference, crosstalk, and attenuation than other media.
Not recommended for LAN that requires a high level of security and
you must be absolutely sure of data integrity.
Not suitable for transmitting data over long distances at high speeds.
8
9
B. Shielded Twisted Pair(STP)
It has medium cable cost.
It has moderate installation cost.
It low EMI sensitivity.
It has high band width than UTP.
10
Advantage of STP
Provides better performance than UTP in environments
with high noise levels—high levels of unwanted
electrical signals.
Disadvantages STP
It is more labor-intensive than UTP to install.
Not all LAN systems work readily over STP.
Susceptible to ground faults through the shield.
11
2. Coaxial cable
It has a single copper conductor at its center. A plastic layer provides
insulation b/n the copper & the braided metal shield.
It has a medium cable cost.
It has a moderate installation cost.
It has low EMI sensitivity.
It has high bandwidth than twisted pair.
12
Types of Coaxial Cable
There are two types of coaxial cable:
- Thin (thin net) cable
- Thick (thick net) cable
Thin net Cable :- Thin net cable is a flexible coaxial cable
about 0.64 centimeters thick. Because this type of coaxial cable
is flexible and easy to work with, it can be used in almost any
type of network installation.
Thin net coaxial cable can carry a signal for a distance of up to
approximately 185 meters before the signal starts to suffer from
attenuation.
Thick net Cable - Thick net cable is a relatively rigid coaxial
cable about 1.27 centimeters in diameter. Figure 2.3 shows the
difference between thin net and thick net cable. Thick net cable's
copper core is thicker than a thin net cable core.
13
3.Fiber optics cable
It transmit in the form light wave instead of electrical signals through
a thin glass.
It offer very high bandwidth.
It has high cable cost.
It has high installation cost.
It has no EMI sensitivity.
Fiber optic transmissions are extremely secure.
14
• Advantages of Coaxial Cable
It is less susceptible to interference than twisted-pair cable.
Transmit data for greater distances than is possible with less
expensive cabling.
Transmit voice, video, and data
Offer a familiar technology with reasonable data security.
Disadvantages of Coaxial Cable
There are many types of coaxial cables, each suited for one,
or at most, a small number of LAN systems.
Due to its high metallic content, coaxial cable is usually
more expensive than other cable types.
15
Summary of Cable Characteristics
16
Wireless Transmission
I. Microwave systems
Use of a high-frequency electromagnetic wave to transmit
information.
Fixed rigidly with a focused beam along line of sight to receiving
antenna.
It uses repeaters at interval of about 25 to 30kms to overcome
problem of line-of-site & for power amplification of weak signal.
Electromagnetic wave can not bend or pass obstacles.
17
II. Communications satellite
Communication satellite is a micro wave relay station b/n two or
more ground Stations(earth stations)
Transmit and receive b/n two randomly chosen points with in a very
large area.
Data transmission costs an independent of the distance b/n two
points within the covered area.
It has enormous data communication capacity.
It has Good error detection mechanism.
Special security measures required to prevent unauthorized
tampering during broadcast.
It needs high initial cost.
18
Fundamentals of Computer Networking
What is networking?
A computer network is a collection of computers and other devices that
communicate to share data, hardware, software, and other resources.
Benefits of Network Computing
Sharing Information (Or Data)
Sharing Hardware(Peripheral Devices)
Sharing Programs/Software
Centralizing Administration And Support
19
Based on geographical area we will classify the Network in to three:
1. Local Area Network(LAN):
Limited geographical area less than two kilometers.
Inexpensive transition media(coaxial or twisted pairs)
Good for resource sharing.
E.g. University campus, office, school or a building.
2. Metropolitan Area Network(MAN):
It covers larger geographical areas such as cities or school districts.
Multi-campuses of the university can link their LAN in the various campuses
together to form MAN..
3. Wide Area Network(WAN):
It covers wider geographical area
Communication is established through telephone lines, microwave links,
fiber optics or satellite links.
Interconnection b/n one country to other country.
20
Network Topology
Topology is the physical arrangements of computers in a network.
Frequently used topologies are:
1. Bus Topology
2. Star Topology
3. Ring Topology
4. Hybrid Topology
1. Bus Topology: is a simplest of all Topology.
All device on the network are connected to each other though a central
cable called BUS.
21
Advantages of Bus topology
It is easy to implement.
Use small amount of cabling.
It is easy to connect a computer or peripheral to the BUS.
Disadvantages of Bus topology
A fault on the main highway stops the whole network.
22
2. Star Topology
All the network device are connected each other through a central
concentrator called HUB.
Advantages of Star Topology
Easy to add new work stations.
Centralized management.
Adding new nodes doesn’t increase transmissions delay.
Failure of one computer does not affect the entire network.
23
Disadvantages of Star Topology
Hub failure affects the whole work station.
Require more cabling length to connect to the central HUB from
each office.
3. Ring Topology:
The ring topology is a physically closed loop consisting of point-to-
point links.
24
Advantages of Ring Topology
Simple design requires less cable.
More reliable than star because communication is not depend on a
single host computer.
Each computer act as a Repeater.
Disadvantages of Ring Topology
A break in the ring can disable the entire network.
Failure on one computer impact the rest of the network.
Difficult to trouble shoot.
25
4. Hybrid Topology
Hybrid topology scheme combines multiple topologies into one
large topology.
The hybrid network is common in large wide-area networks.
Because each topology has its own strengths and weaknesses,
several different types can be combined for maximum efficiency.
26
Advantages of Hybrid Topology
One company can combine the benefits of several different types of
topologies.
Workgroup efficiency and traffic can be customized.
Disadvantages of Hybrid Topology
Devices on one topology cannot be placed into another topology
without some hardware changes.
27
The Internet
Internet is a huge computer network linking together with millions of
smaller networks in all over the world.
It is a "network of networks" that consists of millions of smaller
domestic, academic, business, and government networks, which
together carry various information and services, such as:-
Electronic mail,
Online chat,
File transfer,
The interlinked Web pages and
Other documents of the World Wide Web.
28
Common uses of the Internet
1. E-mail
The concept of sending electronic text messages between parties.
World wide web (WWW) usually called Web.
Globally connected network contains a number of interactive web
pages.
Through keyword-driven Internet search using search engines, like
Google, millions of web pages have easy & instant access to a vast
and diverse amount of online information.
2. USENET
It is an electronic discussion forum.
29
3. Remote access
The Internet allows computer users to connect to other
computers and information stores easily, wherever they
may be across the world.
They may do this with or without the use of security,
authentication and encryption technologies, depending
on the requirements.
4. File transfer protocol (FTP)
It helps to transfer files and programs from one
system to another.
Using FTP programs we can upload or download
files. But to do this there should be an admission
30
from the remote computer.
5. File sharing
A computer file can be E-mailed to customers, colleagues and friends
as an attachment.
It can be uploaded to a Web site, FTP server or Shared location for
easily download by the others.
6. Video Conferencing
Video conferencing means making a conference on the Internet by
individuals who live in different locations.
This takes place at the same time in different location.
It is similar to conference in a hall except they are at distant.
31
7.Search Engine (E.g. Yahoo, Google… )
It is an information retrieval system designed to help find
information stored on different computer through the World Wide
Web.
The search engine allows one to ask for content meeting specific
criteria.
8. E-commerce
It is a large Internet marketing.
some of the biggest companies today have grown by taking
advantage of the efficient nature of low-cost advertising and
commerce through the Internet.
32
Computer Virus
It is a computer program that can copy itself and infect a computer
without permission or knowledge of the user.
They are deliberately created by programmers, or by people who use
virus creation software.
A virus can only spread from one computer to another when:-
A user sends it over the network,
A user carry it on a removable medium such as a floppy disk, CD,
or USB drive.
viruses can spread to other computers by infecting files on a
network file system.
33
• There are different kinds of viruses like:
Warms,
Trojan horses,
Boot sector viruses,
Email viruses,
Memory resident viruses and
Micro viruses.
• Each of them has their own characteristics such as:
A worm can spread itself to other computers without needing to be
transferred as part of a host. and
A Trojan horse is a file that appears harmless until executed.
34
Virus prevention
Purchase an anti virus program that runs as you boot or work your
computer and update it frequently.
Execute only programs of which you are familiar as to their origin.
Load only software from original disks or CD’s. Pirated or Copied
software is always a risk for a virus.
Programs sent by email should always be suspicious.
Virus removal
One possibility on Windows XP is a tool known as System Restore,
which restores the registry and critical system files to a previous
checkpoint.
There are so many anti-virus software in the computer market that we
can use to remove virus from an infected file.
MacAfee,
Dr. Solomon, Norton
Operating system re-installation. 35
The end
thank you!!!
36