Sie sind auf Seite 1von 71

1

Chapter Five
Data Communication
and Computer
Networks
2

Topics
▫ Data communication concepts
▫ Networking fundamentals
▫ Network components
▫ Network Architecture
▫ Types of Networks
▫ Network Topology
What is Data Communications?
• The term communication can be defined as the process of
transferring messages between entities.
• Data communications: is the process of transferring data from
one place to another, and vice versa using computer and
communication technologies.
• Based on what these two entities are, there are three basic types
of communication:
▫ Human-to-Human
▫ Computer-to-Computer
▫ Human-to-Computer
• General communication model

3
The five components are :
1. Message - It is the information to be communicated. Text,
pictures, audio, video etc.
2. Sender - It is the device which sends the data messages.
It can be a computer, workstation, telephone handset etc.
3. Receiver - It is the device which receives the data messages.
It can be a computer, workstation, telephone handset etc.
4. Transmission Medium - It is the physical path by which
a message travels from sender to receiver.
5. Protocol - It is a set of rules that governs the data
communications. It represents an agreement between the
communicating devices.
Data Communication Signals
• Two communication signal
▫ Analog Signal
▫ Digital Signal
• What is Modem?
• Short for modulator/demodulator (Mo/dem).
• A communications device that converts one
form of a signal to another.
• Modulation: Converting digital signals into analog
signals.
• Demodulation: Converting analog signals back into
digital signals.

5
Modes of Data Transmission
• When data are transmitted from one point to
another, three modes of transmission can
be identified:
 Simplex
 Half Duplex
 Full Duplex

6
Data transmission mode
• Three ways for transmitting data
▫ Simplex: communication take place in one direction. Flow
of information is Uni-Directional.
 Radio and television
▫ Half-duplex: communication channel is used in both
directions, but only in one direction at a time.
 Walkie-talkie
▫ Full-duplex: communication channel is used in both
directions at the same time.
▫ Simultaneous communication and More efficient.
 Telephone
Data transmission mode…
Types of Transmission Media
 There are two broad categories of transmission media:

1.Guided Transmission 2. Unguided Transmission


media media
• Data transmission is through • Data transmission through air
solid medium. /space.
• Wired system. • Wireless Transmission
• Commonly used cable types are: • Wireless transmission can of the
▫ Twisted pair following types:
▫ Coaxial cable  Infrared Transmission

▫ Optical fiber  Terrestrial Microwave


 Satellite Microwave
Networking Fundamentals
• Computer network:
▫ Two or more computers connected together
 Each is a Node
▫ Group of Computers and other devices connected
together.
• Benefits of a network:
▫ Sharing resources
▫ Transferring files
▫ Increase productivity
▫ Facilitate Internet connectivity
▫ Enable the sharing of hardware &software resources

10
Network Architecture
(Network Configuration)
• Network designs:
▫ Individual PC controlled:
 Peer-to-peer (P2P)
▫ Centrally controlled:
 Client/server

Peer-to-peer

Client/
server

11
Peer-to-Peer Networks
• Nodes communicate with
each other:
▫ Peers
• Share peripheral devices:
▫ Printers
▫ Scanners
• Home and small office
networks

12
Client/Server Networks
• Client computers:
▫ Users
• Server computers:
▫ Provide resources to clients
▫ Central network control
• Internet
▫ A large, multi-server,
multi-client network.

13
Types of Networks(LANs, MAN and WANs)
• Local area network (LAN):
▫ Nodes are within a small geographic region:
 Homes
 Schools
 Small businesses
• METROPOLITAN AREA NETWORK (MAN)
▫ Collection of LANs linked together with in a city or town.
▫ It covers larger geographical areas such as cities or school
districts.
• Wide area network (WAN)
▫ Has no geographic limitations
▫ LANs connected over long distances:
 A few miles to thousands of miles
 Use telecommunications lines
14
Components of Computer Networks Categorizes
Hardware Components
Software Components
• The hardware components of a network
consist of the following five items • The software components
1. Server
 High capacity computers of a network consist of the
 Server is also responsible for controlling following items
which users on which computers in the
network are granted access to a service. ▫ Network Operating
2. Workstation
3. Cabling
System
4. Network Interface Cards (NIC) ▫ Workstation operating
5. Other Networking Devices
 Hubs system
 Switches
 Routers ▫ Server software
 Firewall
▫ Client software
Network Components

• Transmission Media
• Network adapters
• Navigation devices
• Network software
Transmission Media
• Provides communications channel between nodes
• Forms of transmission media:
▫ Telephone wire:
 Twisted pair
 Two wires are twisted together.
 Two types: UTP and STP
▫ Coaxial cable (Coax)
 Made of Copper
 Highly insensitive to EMI
 Coax can be bulky.
▫ Fiber-optic cable
 Utilize light waves to
transmit data through
a thin glass or plastic fiber.
▫ Radio waves:
 Wireless
 Wireless Fidelity (Wi-Fi)
 Uses radio waves
 802.11 standard 17
Network Navigation Devices /Other Networking Devices
• Devices used to help the data flow possible
• Hubs:
▫ Devices that connect devices
(workstations, servers, printers, etc) to
each other.
▫ It is suitable for small networks ( <16
devices on the network)
▫ Switches:
 Have the same function as hubs.
 But they are faster and more expensive
than Hubs.
 Receive data and retransmit it to nodes
on the network
 They are used in large networks.
Network Navigation Devices /Other Networking Devices

• Routers:
▫ Route data between networks
▫ Used to interconnect different
networks.
▫ If a company has different networks at
different sites, routers are used to
interconnect these networks.
▫ Firewall:
▫ Devices used to protect a network from
unauthorized access from a different site.
Network Topology
• Topology refers to the layout of connected
devices on a network.
• Here, some logical layout of topology.
 Star
 Bus
 Ring
 Mesh
 Tree and Hybrid
21

Network Topology
1. Bus Topology
• All nodes are connected in
sequence on a single cable
• Used most often on
peer-to-peer networks
• Networked computers
communicate with each other
• One computer transmits data at
a time
▫ Access methods avoid data
collisions
▫ Data is transmitted in “packets”
Network Topology...
Advantages of Bus Topology
 Easy to install
 Requires less cable length than a star topology.
Disadvantages of Bus Topology
 Entire network shuts down if there is a break in
the main cable. (single point of failure)
 Terminators are required at both ends of the
backbone cable.
 Difficult to identify the problem if the entire
network shuts down.
Star Topology

• Nodes connect to a central


communications device
(hub/switch)
• A node sends a signal to the
hub/switch, which retransmits it to
the other nodes
• A node accepts only signal
addressed to it

23
Network Topology...
Advantages of a Star Topology
 Easy to install .
 No disruptions to the network when connecting or removing
devices.
 Easy to detect faults and to remove parts.
Disadvantages of a Star Topology
 Requires more cable length than a bus topology.
 If the hub or switch fails, nodes attached are disabled.
 More expensive than linear bus topologies because of the cost
of the hub/switch, etc.
Ring Topology
• Nodes are laid out in a ring
• Token (data packet) flows in one
direction from device to device

25
Network Topology...
Advantage of Ring Topology
 The data being transmitted between two nodes passes
through all the intermediate nodes.
 A central server is not required for the management of this
topology.
Disadvantages of Ring Topology
 The failure of a single node of the network can cause the
entire network to fail.
 The movement or changes made to network nodes affects
the performance of the entire network.
Mesh Topology
• A direct path is present from one computer to
another computer in the network.
• Fully Interconnected
• High cable consumption
• More reliable
• Complex installation

27
Network Topology...
Advantage of Mesh Topology
• It is possible to transmit data from one node to
many other nodes at the same time.
• More reliable
Disadvantage of Mesh Topology
• Expensive
• Complex installation
Hybrid Topology
• The hybrid topology scheme combines multiple topologies into
one large topology.
• The hybrid network is common in large wide-area networks.

29
Considerations for choosing topology
• Money
▫ Bus n/w may be the least expensive way to install a n/w.
• Length-
▫ the linear bus n/w uses shorter lengths of cable.
• Future growth-
▫ star topology, expending a n/w is easily done by adding
another devices.
• Cable type
▫ Most common used cable in commercial organization is
twisted pair, &topology used is star topologies.
31

Chapter Six
Internet and Computer Viruses
32

The Internet: The Basics


▫ Origin of the Internet
▫ The Web vs. the Internet
▫ Clients and servers
▫ Connecting to the Internet
▫ Computer Threat - Viruses
33

The Origin of the Internet

 ARPANET:
 Advanced Research Projects Agency Network.
 Funded by the US Government in the 1960s.
 Allowed computers at leading universities and research organizations to
communicate with each other over great distances.
34

What is Internet?
• The Internet is a term used to describe a worldwide network of
computer networks connecting millions of computers around
the world.
• It is a group of two or more networks that are:
 Interconnected physically.
 Capable of communicating and sharing data with each other.
 Able to act together as a single network.
35

Advantages of the Internet


• To get information
 Easy to get information about people, products, organizations, research
data, electronic versions of the printed media, etc. from the Internet
• To provide information
 Teaching: distance learning and assistance for students
 Sharing/exchanging information with the outside world.
 Publishing: including full test articles, reports, abstracts, computer
programs, and demonstrations
• Ability to communicate

 Electronic mails to transmit messages.


 Electronic chat.
36

Applications and Services on the Internet


Internet applications include:
 World Wide Web (WWW)
 Electronic mail
 File Transfer
 Discussion Groups
 Usenet (News Group)
 Internet Relay Chat
 Telnet( Remote Login/Execution)
 Search Services
37

The Internet vs. The Web


 Internet – part of the system that is
primarily hardware infrastructure INTERNET
(telecommunications, routers, servers, disk
drives, etc….)
WWW
 Web - part of the system that contains
intellectual property in many multimedia
formats (test files, graphic files, sound
files, video files, etc):
 The means to access the Internet.
38

Client and Server


 Client computer:
Users connect to the Internet
Request data and Web pages
 Server computers
Store Web pages and data
Return the requested data to the client
Server

Client
Connecting to the Internet
 Dial-up connections:
 Uses standard telephone line.
 Least costly connection.
 Requires a modem:
Modulate::converts digital
signals the computer can
understand to analog signals
that can travel over the phone
line.
Demodulate
 Slowest connection speed
(56kbps)
40

Broadband Connections
• Digital Subscriber Lines (DSL)
▫ Faster than dial-up
▫ Upstream (16Kbps -640kbps)
▫ Downstream (1.5 Mbps – 9 Mbps)
▫ ADSL: asymmetrical DSL
▫ SDSL: same upload and download speed.
▫ Requires special DSL modem

DSL
modem
Broadband Connections

• Cable:
▫ Fast connection speed
(300kbps – 4mbps)
▫ Speed depends on number of
users.
▫ Not available in all areas.

Coaxial
Cable
Satellite Connections

• Uses a satellite dish and coaxial


cable.
▫ Download speed 500kbps
▫ Upload speed 100kbps
▫ Signal is affected by location
and weather.
43

Internet Service Providers


• ISP:
Internet service provider
▫ Provide user access to the
Internet.
▫ National, regional or local
companies.
• OSP:
Online service provider
▫ Provide online proprietary
content as well as Internet access.
▫ AOL, CompuServe, MSN
44

Navigating the Web: Web Browsers

 Computer software
 Graphical
 Enables Web navigation
 Popular browsers:
Internet Explorer
Netscape Navigator
Mozilla (Firefox)
Google Chrome
45

Web Sites
• Web site:
▫ Collection of related Web pages.
▫ First page known as Home or Index page.
Home page
• Web page:
▫ HTML document
 Text and graphics
▫ Unique address
▫ Hyperlinks

Related
pages
46

URL
• URL:
▫ Uniform Resource Locator
▫ Unique Web page address

Protocol Domain name Path


identifies contains the identifies the
the means host and top- subdirectories
of access level domain within the
Web site

URL http:// www.nytimes.com/ Pages/cartoons/


47

.aero Members of the air transport industry


Current Top-Level Domains
.biz
.com
Businesses
Can be used by anyone
.coop Cooperative associations
.edu Degree granting institutions
.gov United States government
.info Information service providers
.mil United States military
.museum Museums
.name Individuals
.net Networking organizations
.org Organizations (often nonprofits)
.pro Credentialed professionals
Hyperlinks
• Provide access to other Web pages.
• Specially coded text or graphics.

• Cursor becomes a hand with finger pointing upward .


49

SEARCH ENGINES
Larry Page
1973 East Lansing, Michigan
Entrepreneur

Sergey Brin Jerry Yang and David Filo,


the founders of Yahoo
August 21, 1973 Moscow, Russia
Entrepreneur
50

Search Engine
• A search engine is a web site that collects and
organizes content from all over the internet.
• Those wishing to locate something would enter a
query about what they'd like to find and the
engine provides links to content that matches
what they want.
• Examples:
▫ google.com,
▫ yahoo.com,
▫ Ask.com ...
Search Engines
• User write keys word or phrase
in search box.
• “Spider” or “Web Crawler”
program scans web pages.
• Results are indexed and sent to
the client.
52

E-mail
 Electronic mail.
 Primary means of
Communication.
 E-mail accounts:
Client-based
Web-based
 Spam
Prevention
 Online Annoyances
• Spam – electronic junk mail.
• Pop-ups – intrusive advertising
53

Conducting Business Over the


Internet
 E-Commerce:
Electronic commerce
Business-to-consumer (B2C)
Business-to-business (B2B)
Consumer-to-consumer (C2C)
Secure transactions
B2B
E-commerce

Suppliers

Manufacturer Retailer
54

Computer Threats
• Cyber-crimes are criminal acts conducted through
the use of computers by Cyber-criminals.
55

Hackers
• Anyone who unlawfully accesses a computer
system.
• Types of hackers:
▫ White-hat
▫ Black-hat
▫ Script kiddies
56

What Hackers Do?


• Steal information from computers:
▫ Credit card numbers.
▫ Bank account numbers.
• Internet packet sniffing.
• Commit identity theft.

• A black hat hacker


▫ is an individual with extensive computer knowledge whose purpose is to
breach or bypass internet security.
▫ Black hat hackers are also known as crackers or dark-side hackers.
• Script kiddies: is an unskilled individual who uses scripts or
programs developed by others to attack computer systems and
networks, and deface websites.
Denial of Service Attacks
 Backdoor programs
Trojan horse
Zombies
 Denial of service attacks

57
How Hackers Gain Access?
• Direct access:
▫ Hacking software
• Indirect access:
▫ Internet connection
▫ Logical ports
 http: 80
 SMTP: 25
 ftp: 21

58
Computer Threat - Viruses
• A computer virus is a computer program that can copy itself
and infect a computer without permission or knowledge of the
user.
• A program that attaches itself to another program and spreads
itself to other computers.
• Viruses are hidden within the code of a host program.

59
How Does a Computer Catch a Virus?
• Viruses copy themselves .
• Infect a file on your computer.
• Viruses spread by sharing disks.
• E-mail attachments are the most likely source of a virus.

60
What Viruses Do?
• Replicate themselves:
▫ Slow down networks.
• Secondary objectives:
▫ Annoying messages.
▫ Delete files on the hard drive.
▫ Change computer settings.

61
Types of Viruses
• Boot-sector viruses:
▫ Replicate themselves in the boot sector of the hard
drive.
• Logic bombs:
▫ Activate when certain conditions are met.
• Worms:
▫ Travel between systems through networks.
▫ Independently replicates.
▫ Slightly different with viruses (dependable on host).

62
Types of Viruses
• Script viruses:
▫ Hidden on Web pages.
▫ Mini programs.
• Macro viruses:
▫ Attached to documents.
▫ Series of commands.
• Trojan horses:
▫ Backdoor programs.
▫ Control remote computers.

63
64

Question ?
 What is the difference between viruses, worms
and Trojan horses?
 Worm is a special type of malware programs
that can replicate itself and use memory, but
cannot attach itself to other programs.
 Trojan horse is a file that appears harmless until
executed.
 Virus attach itself to other program and spreads
and damages a pc when executed.
Antivirus Software
• Programs designed to detect viruses:
▫ Scan files looking for virus signatures (unique code).
▫ Provides options for deleting or fixing infected files.
• Detect known viruses.
• Antivirus programs need to be updated frequently.
Summary of network and communication
Terminology
• What is an internet? What is the
Internet?
• The internet is a general term for an
interconnected network, while the Internet
refers to a specific worldwide internetwork.
• Extranet is a corporate network for both
employees from one organization and their
partners, sometimes clients etc.
• Intranet is a private network, that was created for
business needs.
▫ It is accessible only for the employees from one
company to enhance communication
Thanks!!
Quizzes
1. In hex, AC74 - B3F.
2. List at least 4 input and 4 output devices?
3. Convert 1100101110100102 to hexadecimal.
4. Identify the five components of a data
communications system

Das könnte Ihnen auch gefallen