Chapter Four: Data Communication and Networking
Chapter Four: Data Communication and Networking
Data communication
and
networking
10/15/2021 1
What is data communication?
10/15/2021 3
Cont’d…
Timeliness: the system must deliver data in a
timely manner. Data delivered late are useless..
Jitter. It is the uneven delay in the delivery of
audio or video packets.
uneven quality in the video is the result
10/15/2021 4
Data Representation
• Text, numbers, images, audio, and video are the
basic data representation methods.
The five components of data communication are:
10/15/2021 6
Data Flow
Simplex: the communication is unidirectional. only one
of the devices on a link can transmit, the other can only
receive. e.g. keyboards, monitors, Radio and TV.
Half-duplex: each station can both transmit and receive,
but not at the same time. When one device is sending,
the other can only receive, and vice-versa.
e.g. walky talky ,etc.
Full Duplex : both stations can transmit and receive
simultaneously. One common example of full duplex is
the Telephone network.
10/15/2021 7
cont’d…
When two people are communicating by a
telephone line, both can talk and listen at the
same time.
The full-duplex mode is used when in both
directions are required all the time and also
called bidirectional.
10/15/2021 8
Transmission Media
• Transmission Medium is the physical path between transmitter
and receiver in a data communication system.
• The characteristics and quality of data transmission are
determined both by the characteristics of the medium and
characteristics of the signal.
• Factors to be considered in selecting data transmission media:
• Bandwidth – the amount of data that can be transmitted
through the medium.
10/15/2021 9
Cont’d…
• Transmission impairments: ability to withstand signal
loss (attenuation) and noise (unwanted signals).
• Interference: ability to avoid cross talks (cross talks
are signal exchanges between signals at close
frequency ranges).
• Number of receivers: A guided media can be used to
construct a point to point link or a shared link with
multiple attachments.
10/15/2021 10
NETWORKING
• A communications network is a collection of
transmitters, receivers, and communications channels
that send messages to one another.
• The transmission media in the communication network
is broadly classified into two categories.
Guided: the signal travels through a physical medium.
are more commonly known as the wired
communication or bounded transmission media.
10/15/2021 11
Cont’d…
• The electromagnetic signals travel between the
communicating devices through a physical
medium/conductor.
• E.g, Twisted pair cable, coaxial cable and fiber optic cable.
10/15/2021 12
Different Types of Connections
• A network is two or more devices connected
through links.
• A link is a communications pathway that
transfers data from one device to another. For
communication to occur, two devices must be
connected in some way to the same link at the
same time.
• Point-to-Point: provides a dedicated link
between two devices.
• The entire capacity of the link is reserved for
transmission between those two devices.
10/15/2021 13
Cont’d…
• Most point-to-point connections use an actual length of wire or
cable to connect the two ends.
• Multipoint: multipoint (also called multidrop) connection is
one in which more than two specific devices share a single
link.
• technical must be used to represent a digital signal or an analog
carrier.
• Modulation: Converting digital signals into analog signals.
• Demodulation: Converting analog signals back into digital
signals.
• Modem: A communications device that converts one form of a
signal to another that is suitable for transmission over
communication circuits.
10/15/2021 14
Components of Computer Networks
Hardware
10/15/2021 17
Cont’d…
• Some Commonly used workstations are:
– Hubs: devices that connect devices (workstations,
servers, printers, etc) to each other. It is suitable for small
networks ( <16 devices on the network)
– Switches: have the same function as hubs. But they are
faster and more expensive than Hubs. They are used in
large networks.
– Routers: These devices are used to interconnect different
networks. If a company has different networks at different
sites, routers are used to interconnect these networks.
– Firewall: devices used to protect a network from
unauthorized access from a different site.
10/15/2021 18
Cont’d…
Software
The Network Operating System
10/15/2021 22
Network topology
A network topology is the arrangement of a network,
including its nodes and connecting lines.
Star Topology
• devices are connected to a central computer, called a
hub.
• Nodes communicate across the network by passing
data through the hub.
• Main Advantage: In a star network, one
malfunctioning node doesn't affect the rest of the
network.
Main Disadvantage: If the central computer fails, the
entire network becomes unusable.
10/15/2021 23
Cont’d…
Bus Topology
• In networking a bus is the central cable -- the
main wire -- that connects all devices on a
local-area network (LAN).
• Main Advantage: It's easy to connect a
computer or device and typically it requires
less cable than a star topology.
Main Disadvantage: The entire network shuts
down if there is a break in the main wire and it
can be difficult to identify the problem if the
network shuts down.
10/15/2021 24
Cont’d…
Ring Topology
• A local-area network (LAN) whose topology is a
ring. That is, all of the nodes are connected in a
closed loop. Messages travel around the ring, with
each node reading those messages addressed to
it.
Mesh topology: occurs when every node has a
circuit connecting it to every other node in a
network. Full mesh is very expensive to implement
but yields the greatest amount of redundancy, so
in the event that one of those nodes fails, network
traffic can be directed to any of the other nodes.
10/15/2021 25
The Internet and Computer Threats
10/15/2021 27
Computer virus
• A computer virus is a small software program that
spreads from one computer to another computer
and that interferes with computer operation.
• A computer virus may corrupt or delete data on a
computer, use an e-mail program to spread the
virus to other computers.
10/15/2021 28
Cont’d…
• Characteristics of Computer Viruses:
• Cannot exist in a viable form, apart from
another (usually legitimate) program.
• Propagates when the host program is
executed.
• Has an incubation period, during which no
damage is done.
• After incubation period, begins to manifest its
behavior.
10/15/2021 29
Cont’d…
• Different Malware Types
• Worms: is a computer program that has the ability to
copy itself from machine to machine.
• Worms normally move around and infect other
machines through computer networks.
• Worms eat up storage space and slow down the
computer But worms don't alter or delete files.
10/15/2021 30
Cont’d…
• Trojan horses: is simply a computer program that
claims to do one thing (it may claim to be a game) but
instead damage when you run it (it may erase your
hard disk).
• When loaded onto your machine, a Trojan horse can
capture information from your system -- such as user
names and passwords or could allow a malicious
hacker to remotely control your computer. .
10/15/2021 31
Cont’d…
• How They Spread?
• Sharing disks
• E-mail attachment
• Network
• Symptoms of a computer virus
• The computer runs slower than usual.
• The computer stops responding, or it locks up
frequently.
• The computer crashes, and then it restarts every
few minutes.
10/15/2021 32
Cont’d…
Prevention :