Communication
Communication
Show understanding of the characteristics of a LAN (local area network) and a WAN (wide area
network)
Explain the client-server and peer-to-peer models of networked computers
Show understanding of thin-client and thick-client and the differences between them
Show understanding of the bus, star, mesh and hybrid topologies
Show understanding of cloud computing
Show understanding of the differences between and implications of the use of wireless and
wired networks
Describe the hardware that is used to support a LAN
Describe the role and function of a router in a network
Show understanding of Ethernet and how collisions are detected and avoided
Show understanding of bit streaming
Show understanding of the differences between the World Wide Web (WWW) and the internet
Describe the hardware that is used to support the internet
WHAT IS A NETWORK?
You can share hardware
Software is allocated out to each computer from a central
position. Making the installation process much faster
Work can be backed up centrally by the network manager,
meaning users don’t need to do it
Passwords make sure that other people cannot access your work
Email facilities are available for users on a network, making
communication much easier
Users can access central stored data
PROPERTIES OF LAN
Covers a wide geographical area
In lots of different buildings and cities, countries
Uses more expensive telecommunication links that are supplied
by telecommunication companies
More expensive to build as sophisticated communication systems
are used.
PROPERTIES OF WAN
The devices in a network may be arranged in different ways.
Each is called a topology
NETWORK TOPOLOGIES
Bus
Star
Ring
Hybrid
Mesh
TYPES OF TOPOLOGIES
BUS TOPOLOGY
All the devices connected to the network are connected to a
common shared cable called the backbone
Advantages
Lower cost because less cabling is needed
Simple cable runs makes them easy to install
It is easy to add extra devices to the network
If on e cable breaks then only that PC is affected
BUS TOPOLOGY
Disadvantages
If more than 12 devices are connected to the network then the
performance of the network is poor
If there is a break in the backbone. Then the whole network fails
BUS TOPOLOGY
HUB OR SWITCH
STAR TOPOLOGY
The star topology uses a central connection(hub/switch) for all
the devices on the network.
Advantages
Faults in network cable will not affect the whole network
Easy to add more computers
Disadvantages
Higher cost
Dependence on the central hub/switch, if it fails then the whole
network fails
STAR TOPOLOGY
RING TOPOLOGY
A ring topology is a network topology where each node (device
on the network) connects to two other nodes. This forms a
continuous path for the signal through each device.
This works because data travels from node to node (device to
device). In a ring topology (also called a ring network), each
node handles the data packets itself, then passes it to the next
node, which also handles the packets.
RING TOPOLOGY
It is a very organized network topology
it performs well under a hefty network load
It can also be used to create a larger Token Ring network
HYBRID TOPOLOGY
HYBRID TOPOLOGY
A star-bus topology supports future expandability of the network
much better than a bus or a star topology.
Failure of one device or network element does not affect the
whole network. E.g. if a single hub fails, only the computers
connected to that hub will be affected.
ADVANTAGES OF HYBRID
It is expensive to implement. This is because of the cost of extra
cable length and additional hubs
DISADVANTAGES OF HYBRID
This is a network topology whereby every device is connected to
all other devices in the network (full mesh). In this type of network,
there will be more than one communication path between any
two computers therefore if one communication channel goes
down, data can still flow through a different communication
path.
MESH TOPOLOGY
MESH TOPOLOGY
MESH TOPOLOGY
Malfunction of a network device does not affect the network.
Breakage of a network cable does not have any effect on the
network because data can flow through a different path to get
to its destination.
ADVANTAGES OF MESH
It is difficult to add components to the network
It is a very complex network that requires complicated
configurations to implement.
DISADVANTAGES OF MESH
A network within the range of an individual person e.g. Bluetooth
connection which have a range of 10m
PRIVATE NETWORK
Public networks are owned by a communications carrier company
(such as a telecoms company);
many organisations will use the network and there are usually no specific
password requirements to enter the network –
but subnetworks maybe under security management.
PUBLIC NETWORK
The Public Switched Telephone Network (PSTN)
dedicated lines
cell phone network
COMMUNICATION SYSTEMS
PSTN stands for Public Switched Telephone Network, or the traditional
circuit-switched telephone network
Using underground copper wires, this legacy platform has provided
businesses and households alike with a reliable means to
communicate with anyone around the world for generations.
PSTN phones are widely used and generally still accepted as a
standard form of communication. However, they have seen a steady
decline over the last decade.
as a combination of telephone networks used worldwide, including
telephone lines, fiber optic cables, switching centers, cellular
networks, as well as satellites and cable systems.
CELLULAR NETWORK
https://www.youtube.com/watch?v=9OrNuAf6C3I
PACKET
Another name for a packet is a datagram.
Data transferred over the Internet is sent as one or more packets. The most
common packet sent is the TCP((Transmission Control Protocol) packet.
The size of a packet is limited, so most data sent over a network is broken up into
multiple packets before being sent out and then put back together when
received.
When a packet is transmitted over a network, network routers and switches
examine the packet and its source to help direct it to the correct location.
During its transmission, network packets can be dropped. If a packet is not
received or an error occurs, it is sent again(ARQ).
TYPES OF SWITCHES
Circuit Switching
In circuit switching there are 3 phases: Packet switching
i) Connection Establishment. In Packet switching directly data transfer takes
ii) Data Transfer. place .
iii) Connection Released.
DATA TRANSFER
Circuit Switching
Packet switching
In circuit switching, each data unit know
the entire path address which is In Packet switching, each data unit just
provided by the source. know the final destination address
intermediate path is decided by the routers.
PATH
A set of rules for data transmission which are agreed by sender
and receiver
PROTOCOLS
• Every computer, mobile phone, and any other device connected to the Internet needs a
numerical IP address in order to communicate with other devices.
• IPv6 is the sixth revision to the Internet Protocol and the successor to IPv4. It functions similarly to IPv4 in
that it provides the unique, numerical IP addresses necessary for Internet-enabled devices to
communicate.
• IPv6 utilizes 128-bit addresses.
• IPv4 uses 32 bits for its Internet addresses.
IPV6 VS IPV4
The Domain Name System (DNS) is the phonebook of the Internet.
Humans access information online through domain names, like nytimes.com or espn.com.
DNS translates domain names to IP addresses so browsers can load Internet resources.
Each device connected to the Internet has a unique IP address which other machines use
to find the device.
EXAMPLE 1-TCP/IP
Public IP address
Private IP address
TYPES OF IP ADDRESSES
Internet Assigned Numbers Authority (IANA) is the organization
responsible for registering IP address ranges to organizations and
Internet Service Providers (ISPs).
IANA
A public IP address is an IP address that can be accessed over
the Internet.
Like postal address used to deliver a postal mail to your home, a
public IP address is the globally unique IP address assigned to a
computing device.
PUBLIC IP ADDRESS
EXAMPLE OF PUBLIC IP ADDRESS
Private IP address, on the other hand, is used to assign computers within
your private space without letting them directly expose to the Internet.
PRIVATE IP ADDRESS
This
part specifies the unique number assigned to your
network.
It also identifies the class of network assigned.
the network part takes up two bytes of the IPv4 address.
NETWORK PART
This is the part of the IPv4 address that you assign to each host. It
uniquely identifies this machine on your network.
Note that for each host on your network, the network part of the
address will be the same, but the host part must be different.
HOST PART
Port number:
A software-generated number that specifies an application or a
process communication endpoint attached to an IP address.
PORT NUMBER
IP can be dynamic or static
Static IP does not change whereas a dynamic IP address does
change
Web server will always use static IP address
Nodes connecting to Private networks will always use dynamic
IP address
IP ADDRESS
IPV6
Uses Hexadecimal notation Uses Hexadecimal notation
Use 128 Bits Uses 32 bits
Has Eight parts Has Fours parts
From 0 to 65535 From 0 to 255
IPV6 VS IPV4
HTTP - Used between a web client and a web server, for non-secure data transmissions. A
web client (i.e. Internet browser on a computer) sends a request to a web server to view a
web page. The web server receives that request and sends the web page information
back to the web client.
HTTPS - Used between a web client and a web server, for secure data transmissions. Often
used for sending credit card transaction data or other private data from a web client (i.e.
Internet browser on a computer) to a web server.
FTP - Used between two or more computers. One computer sends data to or receives data
from another computer directly.
INTERNET PROTOCOL
www.google.com
www.yahoo.com
www.polytechnic.edu.na
en.wikipedia.org
ETHERNET PROTOCOL
Methods of sending and receiving email
EMAIL PROTOCOLS
Client server architecture
Peer to peer architecture
CLIENT SERVER
CLIENT SERVER APPLICATION
Increased cost: due to the technical complexity of the server
A weak link: if the server goes down then the whole network is
affected as the service will not be available to the whole
network.
TYPES OF SERVERS
A file server is a dedicated computer in a network that is used to
store the files such as word processing documents, spreadsheets,
financial data and other useful information. Typically a file server
has a large memory and additional hard disks. Server itself and all
the client computers stores data on the file server and access it
again when required.
FILE SERVER
A web server is a computer that is used to respond the client’s
HTTP requests (usually web browsers) and return the response in
the form of the web pages, images, voice files, graphics, video
clips and others. A single web server is capable to host many
websites.
WEB SERVER
WEB SERVER
WEB SERVER
A powerful computer that provides software application services
to other workstations in the network. All processing is done by the
application server, none of the terminals connected to the server
does any processing.
APPLICATION SERVER
This is a computer on the network that
provides print services to other computers
on the network.
PRINT SERVER
A powerful computer where email accounts are held i.e.
provides hard disk space for email account holders e.g. hotmail,
gmail, iway e.t.c.
MAIL SERVER
A peer-to-peer architecture is whereby all workstations in the
network have the same capabilities i.e. they all have their own
resources and run their own programs. They do not depend on
other computers for any service.
PEER-TO-PEER ARCHITECTURE
It is easy to install.
Configuration of computers is easy.
Users can control their shared resources.
The cost and operation of this network is less.
It is ideal for small businesses having ten or fewer computers.
It needs an operating system and a few cables to get
connected.
A full time network administrator is not required.
ADVANTAGES OF PEER-TO-PEER
A computer can be accessed anytime.
Network security has to be applied to each computer separately.
Backup has to be performed on each computer separately.
No centralized server is available to manage and control the
access of data.
Users have to use separate passwords on each computer in the
network.
Step 2:
Type in the following command to ensure that your network interface supports Hosted Networkfeature:
Step 3:
Now, we need to configure Ad Hoc Wireless connection. Type in CMD this command:
netsh wlan set hostednetwork mode=allow ssid=<your desired network name> key=<your password>
keyUsage=<persistent> or <temporary>
WINDOWS 8 PEER-2-PEER
Step 4:
Next, you need to start it. Type in CMD the command below:
Step 5:
Navigate to Control Panel > Network and Sharing Center. Click on “Change adapter
settings”
Head to “Sharing” tab > check the box Allow other network users to connect through this
computer's Internet connection > finally click on OK button.
WINDOWS 8 PEER-2-PEER
Youtube link:
https://www.youtube.com/watch?v=Az3KhnoBXKQ
WHAT IS BANDWIDTH?
In networking and digital
WHAT IS BANDWIDTH?
Bit streaming is a contiguous sequence of digital bits sent over the internet or a
network that requires a high speed data communication link (such as fast broadband)
A bit stream is a continuous flow of bits over a communication path
Bit streaming can be either on demand or real time.
BIT STREAMING
Digital files stored on a server are converted to a bit streaming format (encoding takes place
and the encoded files are uploaded to a server).
A link to the encoded video/music file is placed on the web server to be downloaded.
The user clicks on the link and the video/music file is downloaded in a contiguous bit stream.
Because it is on demand, the streamed video/music is broadcast to the user as and when
required.
It is possible to pause, rewind and fast forward the video/music if required.
ON DEMAND
An event is captured by camera and microphone and is sent to a computer.
The video signal is converted (encoded) to a streaming media file.
The encoded file is uploaded from the computer to the dedicated video streaming
server.
The server sends the encoded live video to the user’s device.
Since the video footage is live it is not possible to pause, rewind or fast forward.
REAL TIME
PROS AND CONS OF BIT STREAMING
An intranet is a network that is used inside an organisation and
makes use of web pages, browsers and other technology
Schools and Universities use intranets and they can hold all sorts
of information from teaching resources, information about
courses , adverts to student personal records and attendance
details.
INTRANET
DIFFERENCE BETWEEN REAL-TIME AND
ON-DEMAND BIT STREAMING.
Internet stands for INTERnational NETwork, and Intranet stands for
INTERnal Restricted Access NETwork
An intranet contains information concerning a particular
organization, whereas the internet contains information about
everything
Intranets are usually only used by employees of a particular
organization, where as the internet can be used by anyone
Intranets are based on an internal network, whereas the internet
spans countries around the world.
With intranet you can block sites which are outside the internal
network using a proxy server
ADVANTAGES OF INTRANET
Computers used to supply an internet connection for other
computers are called web servers.
Most people connect to the internet via an organization called
Internet Service Provider
SERVICES PROVIDED
These are programs that allow web pages stored on the internet
to be viewed.
Web browsers read the instructions on how to display the items
on a web page which are written in a form called HTML
It allows the user to find information on the web sites and web
pages quickly.
WEB BROWSERS
By entering a web address(URL)
By internet portals
By Links
By Menus
BRIDGES
BRIDGE BETWEEN NETWORKS
WLAN
Network devices
HUB/Switch
routers
Unshielded and Shielded Twisted pair cables
Fibre optics cables
Smart and Dumb Terminals
Modem
Satellite links
microwaves
WHAT IS A PACKET?
Each computer linked to the Internet is given a number which is
called IP address.
This address is like this 198.168.0.10 and it is unique for each
device whilst linked to the internet.
When data is transferred from one network to another the data is
put into packets.
The packets contain details of the destination address of the
network it is intended for
ROUTERS
Computers on the same network all have the same first part of
the IP address and this is used to locate a particular network
Routers are hardware devices that read the address information
to determine the final destination of the packet.
Each router has a table stored to indicate where each packet
should go, it will be bounced from router to router until it reaches
its final destination
Routers can be used to connect wired/wireless networks together
It also allow computers in the home to share an internet
connection
ROUTERS
A hub is a simple device that does not manage any of the data
traffic through
It is used in a network to enable computers on the network to
share files and hardware such as scanners and printers
Data is transferred through networks in packets
A hub contains multiple ports(connection points)
When a packet arrives at one port, it is transferred to the other
ports so that all network devices of the LAN can see all the
packets and inspect it to see if it is relevant
HUB
HUB
Like a hub, switches are used to join computers and others
devices together in a network but they work in a more intelligent
way compared to a hub
Switches inspect the packets and forward them to appropriate
computer
Uses MAC adresses
SWITCHES
SWITCH
It is a server that takes client computer requests and forwards
them to other servers
The proxy server is able to modify requests and responses.
A proxy server can be a major component of a firewall
PROXY SERVER
PROXY SERVER AS SOFTWARE
PROXY SERVER AS HARDWARE
Wi-Fi
Bluetooth
Mobile hot spots
Router
WI-FI-WIRELESS FIDELITY
WIRELESS MODEM
This device allows a wireless connection to a wired network using Wi-Fi
standard(transmission medium=air) Radio waves.
A WAP may be standalone and connected to a router or be part of a router
itself
WIRELESS ADAPTOR
WIRELESS ROUTER
A wireless modem provides a way to connect to the internet
through an Internet Service Provider (ISP).
A wireless router is a way for you to share one internet
connection, usually at a home or small office, with multiple
computers
ADVANTAGES OF WIRELESS
COMMUNICATION
The danger of hackers reading messages
There are areas where you cannot get a wireless network. Which
areas do you think we are talking about?
There is some evidence that they may be a danger to health
Limited signal range
DISADVANTAGES OF WIRELESS
COMMUNICATION
Bluetooth is a wireless technology used to exchange data over a
short distance and it makes use of radio waves
The range is typically 5m to 100m
Bluetooth wireless uses radio waves on a particular frequency (2.4
gigaHertz) for data transmission from device to device.
BLUETOOTH
Wireless connection between input and output devices
Communication between hands-free headset and mobile phone
Creating small wireless network where the computers are near
Transferring appointments, contacts.
Communication using gaming controller.
USE OF BLUETOOTH
WIRELESS CONNECTION BETWEEN INPUT
AND OUTPUT DEVICES
Smartphones make use of Bluetooth to
communicate with other devices
They may use wireless technology as well
They can produce mobile hotspots for other
wireless devices to connect to the internet
Smart phones are also capable of screen
mirroring(ability to project what is on the
phone onto a smart TV)
Smartphone can make use of applications
like “Unified Remote” which provides the
phone with the capability of acting as a
mouse and keyboard through Bluetooth or
Wireless adaptors
BLUETOOTH DEVICES
Mini Bluetooth Dongle Wireless USB Bluetooth Dongle Adapter
BLUETOOTH DEVICES
OTHER BLUETOOTH HEADSET AND SPEAKERS
BLUETOOTH PRINTER
BLUETOOTH SCANNER
BLUETOOTH KEYBOARD AND MOUSE
IR wireless is the use of wireless technology in devices or systems
that convey data through infrared(IR) radiation.
Infrared technology allowed computing devices to
communicate via short-range wireless signals in the 1990s.
This range of wavelengths corresponds to a frequency range of
approximately 430 THz down to 300 GHz.
INFRARED
REMOTE CONTROLS USE INFRARED
OTHER USES OF INFRARED
This is a protocol for MAN or WAN
It is designed to provide broadband access to the internet
without having to lay underground cables
Local subscribers connect to the antenna of a local base station
using microwave signal
WIMAX-WORLDWIDE INTEROPERABILITY
FOR MICROWAVE ACCESS
A mobile phone is often called a cell phone because of the
fundamental infrastructure provided for mobile phone users
Cell towers
CELLULAR NETWORKS
GENERATIONS
TYPES OF GENERATIONS
EVOLUTION
Computer networking allows for data to be transferred easily
from one place to another
Some data is personal data and contains details such as credit
card numbers, bank account details, medical information
The internet is not always secure so special measures need to be
taken to ensure no unauthorised access takes place(hacking)
PROBLEMS OF CONFIDENTIALITY
Usernames/user-IDs and passwords
Biometrics
Digital signature
Access levels
Training of staff about the risks in security
Physical security of room
METHODS OF SECURITY
These are techniques used to check that a person accessing a
network or communications system is the genuine person, also to
make sure that the emails are not sent by someone pretending
to be someone their not.
Authentication methods: Username and password, digital
signature and biometrics
AUTHENTICATION TECHNIQUES
USERNAMES AND PASSWORDS
Username is a series of characters that is used to identify a
certain user to the network
Username must be unique
Network manager(Administrator) is in charge of allocating
usernames and passwords to the users
Network manager also determines which user gets to have
access to which information
He/she also keeps track of what files the user is using for security
reasons
BIOMETRICS
Retinal scanning, the user looks into the scanner eyepiece
A beam of infra-red light scans over the retina and converts the
pattern of the reflected light into the computer code
This code is used to find a match to details stored in a database
This will authenticate the user
BIOMETRICS
FINGERPRINT AND RETINAL SCANNING
FINGERPRINT SCANNER ON
SMARTPHONES
PALM PRINT
VOICE RECOGNITION
VOICE RECOGNITION
You don’t have to remember passwords and usernames
The system is hard to abuse unlike swipe card systems where the
card could be used by someone else
ADVANTAGES OF BIOMETRICS
Some people worry about the privacy of data stored especially
fingerprint details
The readers/scanners are quite expensive
DISADVANTAGES OF BIOMETRICS
Ordinary signatures can be used to check the authenticity of a
document. By comparing a signature you can determine
whether a document is authentic
Especially when doing business over the internet, emails and
electronic documents ned to be authenticated
DIGITAL SIGNATURE
DIGITAL SIGNATURE AUTHENTICATION
ATTACH SIGNATURE TO EMAIL
It is method that protects data from prying eyes by scrambling
data as it travels over the internet
`It is also used when saving personal data onto a laptop or
removable storage devices
If any of these devices get lost or stolen then no one can read
the data
Only the authorized person who has the decryption key
ENCRYPTION
ENCRYPTION
ENCRYPTION
Sending credit card details such as card number, expiry dates,
etc. over the internet
Online banking
Sending payment details(bank details such as code numbers,
account numbers, etc.)
Confidential emails(e.g. with personal or medical details)
Sending data between computers on a network here
confidentiality is essential
Storing sensitive personal information on laptops and portable
devices and media
ENCRYPTION USES
Fax
Email
Teleconferencing/video conferencing
METHODS OF COMMUNICATION
Fax is like a long distance photocopier
You put in a document in the fax machine, then enter the fax
number you would like to send to, then document will be
scanned and converted to a binary pattern of the
page(analogue),passed along a telephone line and then it will
be converted by the other fax machine to digital and then
printed.
It is mostly used to maintain originality
FAX stands for Facsimile
FAX
Fax do not spread viruses
Fax cannot be hacked
Faxed signed documents are legally accepted
ADVANTAGES OF FAX
Fax’s are printed in an area where everybody can access the
machine view confidential documents intended for someone
else
Paper jams cause wasted time
Receivers fax maybe off
Receivers fax maybe out of paper
Information sent by the fax cannot be edited
DISADVANTAGES OF FAX
FACSIMILE
An email is an electronic message sent from one communication
device(Computer, mobile phone or PDA) to another.
All web browser software has email facilities
EMAIL
EXAMPLES
This allows two or more individuals situated in different places to
talk to each other in real time.
They are also able to exchange electronic files with each other
TELECONFERENCING/VIDEO
CONFERENCING
International Network is the worldwide collection of networks that
use the Internet Protocol Suite(TCP/IP)
The World wide Web(WWW) is the collection of web pages
hosted on web servers. The web runs HTTP
Internet=Hardware, the Web = Sources hosted on the internet
URLs are there to address specific web resources
http://www.example.com/folder/file
INTERNET