Computer Studies
Computer Studies
Data communication
Data communication refers to the process of transmitting data signal from one point to another
through the network.
1. Data signal: A data signal is a voltage level in the circuit which represents the flow
of data. In data communication, data signals can either be analog or digital in nature.
3. Multiplexing: Multiplexing is the process of sending multiple data signals over the same
medium.
Demultiplexing is the process of separating the multiplexed signals at the receiving end. The
different frequencies create what is called different logical channels in the medium. .
4. A bandwidth is the maximum amount of data that a transmission medium can carry at
anyone time. For example, a certain cable may have a bandwidth of 100 Mbps (Mega bits per
second).
5. Baseband signal: Baseband signal is a digital signal that is generated and applied to the
transmission medium directly without modulation.
- The baseband signal utilizes the full capacity of the transmission medium, hence at
anyone time; only one signal can be sent.
- Several data signals can simultaneously be sent through the same medium but at different
frequencies. Frequency bands between these data signals prevent them from overlapping.
b) Half duplex refers to communication in both directions but one direction at a time. A
sender must send the data before the recipient can reply. For example, communicating using a
'walkie talkie' radio, one has to say "over" to mark the end of every statement in order for the
other to respond.
Computer networks can be classified using several aspects but the most common classification is
according to size. The 3 common types of networks but the three most common are:
1. Local area network (LAN)
2. Metropolitan area network (MAN)
3. Wide area network (WAN)
Local area network (LAN)
Local area network is a computer network that spans a relatively small geographical area like in
one building or a school. One local area network can be connected to other local area network
over any distance via data transmission lines or wireless media.
Most local area networks connect personal computers and server computers on a small network.
- A server computer is a computer dedicated to servicing requests for resources from
other computers (workstations) on a network.
- Workstation/client computer is other computer on the network that sends requests to
the server
Local area networks are capable of transmitting data at very fast rates, much faster than data
transmitted over telephone lines. .
Resource sharing
A resource in the network environment means data/information, files, printers, modems,
communication links, storage devices, fax machines, application programs and any other
component that can' be attached to the network for access by users.
Computer network helps users share their files, exchange mail, send, Faxes, schedule meetings
and print documents from any point on the network.
Advantage: leads to less waste of time and resources and hence greater productivity.
- Network servers run a special program called the server software which controls
computers on the network and listens to client requests to service them over the network. For
example, a print server will give permission for a particular client to print documents on the
network printer
Remote communications
Remote communication refers to the transmission of data signals between two communication
devices located at different geographical locations.
- A computer that tries to access resources from another computer on the network is called a
remote client
-The computer being accessed and one with resources is called a remote host.
Remote communication has been made possible by use of wireless transmission media such as
radio waves, microwave and satellite.
It is through remote communications that people can be able to share ideas and pass messages
over the Internet.
Advantage: gives a lot of freedom to the network users which translates to more productivity.
Imagine continuing to work from home just as if you were in your office.
1. The failure of the central computer does not affect the operations of the other terminals.
2. Processing load is shared equally hence no time wastage.
Cost effectiveness
- Although the initial purchase and lying down of network components may be expensive,
it has greatly increased experience in value addition and the efficient use of scarce resources
- For example company executives may not need to travel across continents to hold
meetings. They can hold electronic video conferences instead and save the fare.
Reliability
A computer network is reliable in two ways especially when communicating or accessing
information:
1. Data can be transferred with minimum error from source to destination.
2. In case one computer breaks down, a user can still access data and information from the other
computers using another computer on the network.
Limitations of networking
Some of the limitations and disadvantages of networking include security issues, high initial
installation cost, moral and cultural effects, spread of terrorism and drug trafficking and over
reliance on networks
Security issues
Data and information held on a network is prone to more illegal access threats than if the
computer was not on the network.
One of the common methods of data protection in a networked environment is encryption. This
is the reconstruction of original data in a form that can only be understood by the sender or
receiver. Encrypted data cannot be understood by people who illegally access it unless they have
the decryption key.
Over-reliance on networks
All business processes and the society today depend on computer networks. This means that if by
any chance the network fails or goes down, then many systems in the society can be brought to a
halt!
Elements of networking
A computer network is made up of several standard elements (components) which can be
classified into three major categories namely:
1. Data communication media.
2. Communication devices.
3. Networking software.
Twisted pair cables are categorised into five groups according to the type of data transmitted and
maximum rate of transmission, as shown below.
Table 1.1
Suitable for Speed (max. limit)
Category transmitting
1 Voice Less than 1Mbps
2 Data 1 Mbps
3 Data 16 Mbps
4 Data 20 Mbps
5 Data 100 Mbps
Coaxial cables
A coaxial cable resembles the cable that is used to connect television antenna to a television set.
This cable has:
Central copper core, surrounded by a dielectric material (insulator).
There are two types of coaxial cables:
1. Thin coaxial cable (Thinnet). It has one dielectric insulator
2. Thick coaxial cable (Thicknet). It has two dielectric insulators around the core and is
thicker than the thinnet
2. Coaxial cables are relatively expensive to buy and to install as compared to twisted pair.
The fiber optic cable is made up of the core, cladding, buffer, strength members and the jacket. .
The core: is the central part of the cable and is made of a hollow transparent plastic or glass.
Cladding: This is a single protective layer surrounding the core. It is redirected light back to the
core.
Buffer: surrounds the cladding and its main function is to strengthen the cable.
The jacket: It is the outer covering of the cable.
Satellite communication
A satellite is a microwave relay station. The microwave earth stations have parabolic dishes with
an antenna fixed on them in order to focus a narrow beam towards the satellite in space. A
satellite transmission system has three main components:
1. Transmitter earth station that would set up an uplink to the satellite in order to transmit data.
The uplink will have a unique frequency.
2. A satellite that is somewhere in an orbit that receives, amplifies and retransmits the signal to a
receiving earth station via a downlink frequency that is different from that of the uplink so as to
avoid interference with the uplink signal.
3. Receiving earth station that would receive the sent signal on the other side of the globe
Radio communication
− Radio waves are omnidirectional. This means that they start from a central point and
spread outwards in all directions.
− Radio waves are used in radio and television broadcasts. Data can also be transmitted
over radio waves communication channels.
− Radio waves can be of high frequency, very high frequency or ultra-high frequency.
One of the latest radio transmission technologies is called Bluetooth technology. Bluetooth is a
worldwide and short-range radio technology that enables people to use hand held communication
devices such as cell phones and personal digital assistants to access the Internet.
The main component in Bluetooth is a small low power two-way radio transceiver, small enough
to be inserted in small devices.
A network of bluetooth-enabled devices is called a wireless personal area network (WPAN) or
piconet.
Infrared transmission
Infrared waves are not visible to the human eye. Communication through this medium is
achieved by having infrared transmitters and receivers (transceivers). Transceivers of infrared
signals must be within a line of sight in the same room. This is because unlike radio signals,
infrared signals cannot penetrate obstacles like walls. However, the signal can be reflected off
surfaces like walls and ceiling until they reach their destination.
d) Bridges
Determines the appropriate network segment for which a message is meant for delivery through
address filtering.
Hence a bridge can divide a busy network into segments to reduce network traffic. The purpose
of using a bridge therefore is to:
1. Extend the length and number of stations that a segment can support.
2. Reduce overall traffic flow by allowing broadcasts only in the destination segment of the
network.
e) Repeaters
A repeater receives a signal from one segment of a network, cleans it to remove any distortion,
boosts it and then sends it to another segment.
The repeater enables the network to eliminate attenuation problems.
f) Routers
The router interconnects different networks and directs the transfer of data packets from source
to destination. Routing depends on network addresses called Internet protocol (IP) address.
Some modem routing devices combine the functionality of a bridge and router. Such a device is
called a brouter.
g) Gateways
A gateway is any device that can be configured to provide access to wide area networks or
Internet. One such device is the router.
h) Switches
A switch, unlike a hub forwards a packet directly to the address node without broadcasting.
A node refers to data terminal equipment such as a workstation or computer on the network.
The switch does this by connecting two nodes point to point as if they were linked by a direct
cable between them. This reduces the broadcast problems on the networks. It is important to note
that some hubs also incorporate the switching mechanisms. Such a hub is referred to as a
switching hub.
Wireless antennae
The access point needs to have antennas in order to detect signals in the surrounding. The waves
may be radio waves, microwave or infrared waves in nature. In most cases, access points will
have two antennas so that the one that receives the best signal at any particular time can be used.
Network software
These software can be classified into two main groups namely:
1. Network operating systems.
2. Network protocols.
Examples of network operating systems are Windows NT/2000/2003, UNIX, Linux and Novell
Netware.
Protocols
Protocols are the rules and technical procedures that govern communication between
different computers on a network
The work of these protocols must be coordinated so that there are no conflicts or incomplete
operations. This co-ordination is achieved through protocol layering. Network protocols are
designed after the open systems interconnection (OSI) model or ISO standing for International
organization of Standardization.
The open systems interconnection model is not a protocol as such but is meant to help designers
to come up with high quality layered protocols. It has seven layers, each performing distinct
functions as shown in Table 1.2.
Table 1.2
Layer Function
User applications run here and generate requests for data transmission or
7. Application layer
open received Information.
5. Session layer Sets up data transmission sessions between two communicating devices.
4. Transport layer Manages data transfer over the network to ensure reliability.
Application protocols work at the highest layer of the OSI model. They provide services to
application programs. An example of an application program is an e-mail editor program that
enables composing or reading of e-mail messages. Examples of protocols at the application layer
include:
1. Simple mail transfer protocol (SMTP) - An Internet protocol for transferring e-mails.
2. File transfer protocol (FTP) - An Internet protocol for file transfer.
3. Apple talk and apple share - Apple computers networking protocol suit.
Transport protocols ensure that data is passed between computers more reliably. Some examples
include:
1. Transmission control protocol (TCP): This is responsible for delivery of sequenced data over
the network.
2. Sequential packet exchange (SPX): This part of the Novell's internet work
packet exchange/sequential packet exchange (IPX/SPX) for sequenced data.
3. NetBEUI: A local area network protocol for Microsoft and 1MB networks that establishes
communication sessions between computers.
Network protocols provide link services. They handle addressing and routing information, error
checking and retransmission of requests. Some examples of network layer protocols include:
Logical topology
Logical topology also called signal topology deals with the way data passes from one device to
the next on the network. Examples of logical topologies are Ethernet and token ring.
a) Ethernet topology
In Ethernet topology, all computers listen to the network media and can only send data when
none of the others is sending.
Physical topology
Physical topology refers to the physical layout or arrangement of components on the network.
Examples of physical topologies include star, bus, ring, mesh and tree/hierarchical topology.
a) Star topology
In star topology, all devices are connected to a central hub. Nodes communicate across the network
by passing data through the
hub. When the hub
receives data from a
transmitting computer, it
broadcasts the message to
all the other nodes on the
network
The advantages of star topology include:
b) Bus topology
All devices are connected to a central cable called the bus or backbone
A terminator is attached to each end of the cable to avoid signals from bouncing back and forth
on the cable causing signal distortion. As the data passes along the cable, each station checks
whether the data is addressed to it. If the address matches the machines address, it receives the
data otherwise it rejects it. The network addresses of computers on a network are called the
medium access control (MAC) address.
2. Troubleshooting a cable fault is difficult because the fault could be anywhere on the cable.
3. It limits the number of computers that can be connected to the cable because each computer is
listening to the cable in order to transmit.
c) Ring topology
In a ring topology, all devices are connected to one another in the shape of a closed loop each
station is responsible for regenerating and retransmitting signals around the network to its
neighbour. A token is used to exchange data from one station to another.
1. Modification may be difficult because adding or removing a device can disrupt the
entire network.
2. Troubleshooting can be difficult.
3. One device or media breakdown may affect the entire network.
d) Mesh topology
This is the most common type of topology used in wide area network where there are many paths
between different locations. Devices are connected with many redundant interconnections
between the nodes. In a true mesh topology every node has a connection to every other node in
the network. This is a hybrid topology. Groups of star-configured networks are connected to a
linear bus backbone
Network security
In networking there are several ways of enforcing security one of them is share level and the
other is the user level security.
User-level security
User level security model is used on server based networks. A network administrator assigns
accounts to users. This means that each user is provided with a unique name and password which
he or she can use to access network resources.