Computer Communication
Computer Communication
This is the transmission of data and information over a channel between two or more
computers.
Data communication.
This is the transmission of data in form of data signals from one computer to another.
Encoding; this is the process through which information from the sending device is
converted into signals which the communication medium can carry.
Decoding; this is the process through which signals are converted back into information in its
original form from the receiving device.
Transmission; this is the process through which signals are sent out through the medium to
the receiving device.
Digital divide; this is the difference between people who know how to access and use the
computers and internet and those who don’t know.
Instant messaging: This is where an individual chats privately with another using a mixture
of e-mail and mobile phone messages.
Telnet. Is an internet feature that allows micro computer users to connect (logon) to remote
computers as if they were directly connected to those computers.
Modem short for modulator demodulator: A device that converts the data signal from one
form to another. The process of converting digital signal into analog form for transmission
over phone lines is called Modulation. A receiving modem converts the analog signal back
to digital signal in a process known as Demodulation
Band width is the amount of data that can be transmitted by a transmission media.
Throughput refers to the rate of how much data is moved during a certain amount of time.
1|Page
Elements of data communication.
Sender
Receiver
Messages
Protocol
File transmission
Data.
Sender Receiver
Transmission medium
Digital signals; these represent a discontinuous movement of signals expressed as 1s and 0s.
Modes of transmission.
Asynchronous transmission; this is where data is sent one byte/ character at a time.
Synchronous transmission; this is where data is sent in blocks or groups at the same time.
Direction of transmission.
Simplex; this is the transmission of data in one direction only e.g. radios, televisions.
SENDER RECEIVER
Half duplex; this allows data transmission in either direction but only one direction at a time
e.g. radio calls, walkie talkie.
RECEIVER
SENDER
Full duplex; this is where data flows in all directions at the same time e.g. mobile phones.
SENDER RECEIVER
2|Page
Transmission medium (channel)
These are devices used to carry signals or data from one computer to another. They are
divided into two categories;
This is where communication devices are directly connected with each other by using some
physical media like cables.
Coaxial cables.
Twisted pair cables.
Fiber optic cables.
Twisted pair cables; this is a pair of copper wires twisted together and wrapped with a
plastic coating. Twisted pair cables are of two types namely;
Disadvantages.
Coaxial cables; they consist of a single copper wire surrounded by 3 layers which include;
insulating material, woven material, plastic outer material.
3|Page
Advantages of coaxial material.
Disadvantages.
Disadvantages.
These are communication devices that transmit data by sending electromagnetic signals
through free space.
Microwave.
Bluetooth
Infrared
Use of the satellite.
Radio waves etc.
COMPUTER NETWORK
A computer network is a connection of two or more computers for the purpose of sharing
data and other resources.
Types of networks.
4|Page
Local area network (LAN).
This is a type of network that covers a small geographical area e g. computer lab, office etc. it
is divided into two;
Client/ server network; this is a computer that requests and receives data on a network.
Client/server network consists of a requesting computer called client computer and supplying
computers that provide data and information called servers.
Peer to Peer network; it allows every computer to communicate directly with each other on
a network without relying on a server.
Does not scale well to large network and administration became unmanageable
Each user must be trained to perform administrative tasks
Less secure
All machines sharing the resources negatively impact the performance.
5|Page
Wide area network.
This is type of network that covers a wide geographical area e.g. a country.
It always uses physical wires to connect It may have no physical connection between
computers and other network resources various computers
This is a network that connects two or more local area networks that work together but cannot
extend beyond the boundaries of the immediate town.
This connects two or more area networks together with limited specific geographical area e.g.
campus, military base.
1. Computers.
2. Network interface card.
3. Network operating system (NOS)
4. Cabling system (Ethernet cables)
6|Page
NETWORK OPERATING SYSTEM (NOS)
NETWORK HARDWARE.
These are devices that facilitate the use of computer network by enhancing data transmission
and sharing of resources on a network.
NETWORK PROTOCOL.
These are set rules and procedures that govern communication between two different
computers or devices on a network. They include;
NETWORK TOPOLOGY.
Or
Types of topologies.
1. Bus topology.
2. Star topology.
3. Ring topology.
4. Mesh topology.
5. Tree topology.
This is a type of network technology where each of the computer and network devices are
connected to a single cable or backbone.
It is easy to install.
It is easy to implement.
It is cheaper than other topologies.
Easy identification of faults.
8|Page
Disadvantages.
STAR TOPOLOGY.
This is a type of network topology where all computers and other communication devices are
connected to a central server/hub.
Advantages.
It is easy to install.
Easy to detect faults and remove parts.
The fault on one of the computers or communication devices will not affect other
computers or communication device.
Disadvantages.
RING TOPOLOGY.
This is a type of network topology where each node is connected to one another in form of a
closed rope. There is no central server/hub in this topology.
9|Page
Advantages
Disadvantages
TREE TOPOLOGY.
This is a network topology that integrates multiple star network topologies on a bus.
Advantages.
10 | P a g e
Disadvantages
It is difficult to configure.
If the backbone line breaks, the entire network shuts down.
MESH TOPOLOGY.
This is a network topology whereby each node or computer has a direct connection with the
rest of other computers on the network.
Advantages.
Disadvantages.
INTERNETWORKING.
This is the connection of two or more separate computer networks via a common routing
technology. There are at least 3 different forms of internetworks which include;
1. Intranet.
2. Extranet.
3. Internet.
Intranet; this is a corporate network that uses the infrastructure and the standards of the
internet and World Wide Web (www).
11 | P a g e
Extranet; this is an extended internet connectivity, connecting not only inter-personal but
also selected customers, suppliers and other strategic offices.
NOTE:
Packet switching; this is a technique of dividing electronic messages into packets for
transmission over a wide area network to their destination through the best route.
A packet; is a unit of data that is routed between an origin and a destination on the
internet.
INTERNET
Or
Or
Dial up connection; this is a connection that requires users to link their phone line to a
computer in order to access the internet.
Dedicated connection; this refers to the permanent connection of internet services at all
times.
Wireless connection; this refers to use radio frequency bands instead of telephone/cable
networks.
12 | P a g e
Mobile connection; this is the using of mobile broad band technology to provide wireless
high speed internet access through portable devices.
It is used for electronic commerce. (e-commerce) i.e. buying and selling of goods
online.
It is used for e- learning (electronic learning) i.e. gathering of information about
various topics from the internet.
It eases communication i.e. people from different parts of the world can send and
receive messages through the internet e.g. using e-mails, social media platforms etc.
It provides online employment opportunities.
It has helped in mass media i.e. a person can get the latest news from the internet.
It is a tool of entertainment through online games and video clips.
It is used for online payments.
It helps in file transfer i.e. data can be transferred across the internet from one side to
your personal computer.
The distance that data travels; the shorter the cables of computers to the routers, the
faster the connection speed and vice versa.
Natural conditions/ hazards; like strong winds lead to instability in connection speed.
Modem speed; if the modem speed is sub-standard/ non compatible with your internet
service provider, the internet speed will be slow.
Computer viruses; when computer viruses attack your computer, they also affect the
internet speed slowing it down.
Heavy traffic on the network; the greater the number of computers of the network, the
more the internet speed reduces and vice versa.
Examples include;
MTN
13 | P a g e
Airtel
Africell
UTL
Vodafone
Safaricometc
Time in service; how long has the internet service provider been in business.
Speed of the modem; check whether the speed of the modem matches with that of
your computer.
Cost of the internet service provider; in terms of mobile data and setup charges.
Compatibility; make sure the software of the inter service provider is compatible with
that of your computer system.
This refers to the sending and receiving of messages via the internet.
Email Address; this directs the computer on the internet to the destination of the e-mail
message.
An e-mail address consists of two parts i.e.
Username
Domain name; is a unique name that identifies an internet resource such as a website.
Elements of an email
1. Password
2. Username
3. Domain name/address
4. An extension e.g. com, ug
5. Separator (@)
For example;
kapata –username
@ --separator
gmail.com –domain name
.com –top level domain
gmail –second level domain
14 | P a g e
Basic email features/ components
Outbox; it keeps messages that have been composed but not yet sent.
Carbon Copy (CC); this enables copies of the e-mail to be sent to third parties while
notifying/acknowledging other recipients.
Blind carbon copy (BCC); this enables copies of an e-mail to be sent to the third party
without notifying/acknowledging any other recipients.
Advantages of an e-mail
Pressure to reply; there is pressure to reply while using e-mail for the messages being
sent to your inbox.
Viruses; an email leads to spread of viruses which tend to destroy and corrupt the
email messages which were kept for future reference.
Hacking; while using an e-mail in communication, one can access your messages
illegally by using hacking cards hence limiting privacy.
It’s time wasting when it comes to reading a lengthy mail.
Information overload; when too many people send too much information.
15 | P a g e
Benefits for sending documents using ordinary post
1. Good for sending physical items
2. Good for sending legally binding documents
3. Good for sending bulky/large documents
4. Cheaper method of sending documents
5. Convenient for all categories of people
6. Safer delivery of sent documents
7. Legal documents with original signatures can be sent
8. No loss of mail due to viruses
9. Lower chances of eavesdropping
10. Documents can be traced while in transit
11. Possibility of checking documents before sending, during transit and at the destination for
security purposes
NETIQUETTES
This is a code of acceptable behaviors users should follow while on the internet.
Or
It is a collection of host computers that deliver documents, multimedia and graphics to users
via the internet.
Or
Is an information space where documents and web resources are identified by Uniform
Resource Locators and accessible via the internet.
Terminologies;
16 | P a g e
Website; this is a collection of web pages.
Webpage; this is an online document designed by Hyper Text Markup Language (HTML)
and viewed by a web browser.
Web browser; this is a software program used to access and view web pages. Examples
include; internet explorer, Mozilla Firefox, Google chrome etc.
Web master; this is an individual responsible for developing Webpages and monitoring a
website.
Web portal; this is a special well designed web page at a website which brings information
together from a diverse source to a uniform way.
Web aggregator; this refers to a website that combines a specific type of information from
multiple online sources.
Search engine; this is a software program that can be used to find websites, web pages and
files on the internet. Examples include; Google, Ask.com, Bing
Wiki; this is a web application that allows people to add, modify and delete content in
collaboration with others.
Hyper link; this is the reference of data that a user can link to as linked documents/ webpage.
Multimedia; refers to an application that integrates test with one of the following documents;
sound, graphics, video etc.
Content aggregator; refers to a website or computer software that combines a separate type
of information from multiple online sources.
OR
Parts of a uniform resource locator
"http://www.webopedia.com/browser.html"
These are online platforms which people use to build social relationships with other people
who share similar personal or career interests, activities, backgrounds or real life connections.
Common examples of social networking sites include; facebook, whatsApp, instagram ,
twitter, skype, viber, snapchat, telegram, youTube, wechat, myspace, skyrock, tiktok, reddit,
badoo, kiwibox etc
Social networking is a recent invention that has the Internet still at the edge of its seat due to
its popularity with people. This is mostly because it really is for the people. Bringing every
kind of social group together in one place and letting them interact is really a big thing
indeed.
Advantages
• Opportunity to connect with family and friends via a different medium
• Create new friendships with people around the globe and learn more about life in
other countries. An alternative source of entertainment as well
• Facilitates open communication, leading to enhanced information discovery and
delivery.
• Allows employees to discuss ideas, post news, ask questions and share links.
• Provides an opportunity to widen business contacts.
• Targets a wide audience, making it a useful and effective recruitment tool.
• Improves business reputation and client base with minimal use of advertising
• Expands market research, implements marketing campaigns, delivers communications
and directs interested people to specific web sites.
• Free Business Promotion - This is probably the biggest advantage for business
owners using social networking sites. Facebook, Twitter, and
many others are great forums for you to talk about your business, your services and
even exhibit your industry expertise.
18 | P a g e
• Low Cost Advertising - Some social networking sites provide a business owner with
the opportunity to advertise to a very specific demographic for very little money. So
you can advertise to exactly the customer that you want to attract and save money
versus other forms of advertising.
• Build your credibility - By consistently interacting and posting a person can build trust
and credibility amongst their audience which in turn can lead to more business.
• Ease of Communication - Social networking sites allows you a fast and free resource
for communicating with your customers and potential customers. Announce sales,
promotions, special events and more by simply typing your message and posting it to your
page or profile.
Disadvantages
• A compromise of privacy
• Opens up the possibility for hackers to commit fraud and launch spam and virus
attacks.
• Increases the risk of people falling prey to online scams that seem genuine, resulting in
data or identity theft
• May result in negative comments from employees about the company or potential legal
consequences if employees use these sites to view objectionable, illicit or offensive
material
• Potentially results in lost productivity, especially if employees are busy updating
profiles, etc.
• Everything Is Public - The nature of social networking sites is that they are 'well' social,
so things get shared. And one small mistake can morph into a public relations nightmare.
• Negative Publicity - People really like to use social networking sites as a place to express
their frustration and disapproval of a business that, they feel has wronged them in some
way. Being on the receiving end of this negative publicity can have dire consequences.
• Time Consuming - Social networking sites can suck you in and before you know it you've
spent hours looking at pictures, videos, and reading clever, posts.
EMERGING TECHNOLOGIES
Are new technologies that are currently developing, which will substantially alter the
business and social environment.
Examples include;
Digital forensics,
Virtualization,
Quantum computing,
Biometrics
Robotics
Quantum cryptography
Computer assisted translation
3 D and holographic imaging
Virtual reality
Digital forensics
19 | P a g e
Artificial Intelligence: Is the process of building computer systems that simulate human
thought process and actions, which include reasoning and learning from past mistakes.
Cloud computing is a type of computing that relies on sharing computing resources rather
than having local servers or personal devices to handle applications.
1. Cloud computing is probably the most cost effective method to use, maintain and upgrade
information systems.
2. Almost unlimited storage for information in the cloud gives you unlimited storage
capacity.
3. Because all the data is stored in the cloud, backing it up and restoring the same is
relatively much easier that storing the same on a physical device.
4. Software integration is usually something that occurs automatically so you do not need to
take additional efforts to customize your applications.
5. Once you register yourself in the cloud, you can access the information from anywhere
where there is an internet connection.
20 | P a g e
6. Cloud computing is easily scalable so companies can add or subtract resources based on
their needs.
1. Storing information on the cloud can render the data and information vulnerable to
external hack attacks and threats.
2. Long term dependency on the cloud host for maintenance of your information is another
short coming of cloud computing.
3. Dependency on the third party to ensure confidentiality of data and information is another
limitation of cloud computing.
4. There is less control that comes when handing over all your data and information to the
cloud providers.
Copyright is the exclusive legal right that prohibits copying of one’s original property/work/
material without his/her permission.
Intellectual property rights refer to protection to which creators are entitled for their work.
4. Encourage authorship.
5. Encourage creativity by ensuring that creative people receive financial benefits from their
work.
6. Ensure good international relations and image since a country without copyright protection
is viewed as one which encourages stealing.
7. Ensure good quality computer products as producers try to guard their copyrights
jealously.
ERGONOMICS
Ergonomics refers to incorporating comfort, efficiency and safety into the design of hardware
in a work place.
22 | P a g e
Five aspects of ergonomics
1. Safety
2. Comfort
3. Ease of use
4. performance
5. Aesthetics (beauty)
Some keyboards have built-in wrist rests.
Most display devices have a tilt and swivel base and controls to adjust the brightness,
contrast, positioning, height and width of images.
Most cathode ray tube monitors today also adhere to the MPR II standard which defines
acceptable levels of electromagnetic radiation.
DIGITAL FORENSICS
Digital forensics (also called Computer forensics or cyber forensics) is the process of
uncovering and interpreting electronic data for use in a court of law. It involves application
of computer investigations and analysis techniques to gather evidence suitable for
presentation in a court of law.
OR
Digital forensics is a branch of forensic science concerned with the use of digital information
(produced, stored and transmitted by computers) as source of evidence in investigations and
legal proceedings.
OR
Is the use of scientifically derived and proven methods towards the preservation, validation,
identification, analysis, interpretation, documentation and presentation of digital evidence
derived from digital sources for the purpose of facilitating or furthering the reconstruction of
events found to be criminal, or helping to anticipate unauthorized actions shown to be
disruptive to planned operations.
Mobile forensic
Network forensic
Computer forensic
The goal of the process is to preserve any evidence in its most original form while performing
a structured investigation by collecting, identifying and validating the digital information for
the purpose of reconstructing past events.
23 | P a g e
END
24 | P a g e