CHAPTER 5
DATA COMMUNICATION,
COMPUTER NETWORK and
the Internet
Data Communication
An electronic transmission of information that has
been encoded digitally for storage and processing
by computers.
Data communications (DC) is the process of using
computing and communication technologies to
transfer data from one place to another, and vice
versa
The media used to transmit may be guided or
unguided.
Elements of Data Communication
Four basic elements are needed for
any communication system.
Source
Medium
Receiver
Message
Protocol
Sender
The computer or device that is used for sending data is
called sender, source or transmitter. In modern digital
communication system, the source is usually a computer.
Receiver
The device or computer that receives the data is called
receiver. The receiver can be a computer, printer or a fax
machine.
Transmission Medium
The means through which data is sent from
one location to another is called transmission
medium.
Wired transmission media
Wireless transmission media
Protocols
Are rules under which data transmission takes
place between sender and receiver.
The data communication follows some
communication protocols to communicate and
exchange data.
Examples
HTTP Hypertext Transfer Protocol
FTP File Transfer Protocol
DHCP---dynamic host configuration protocol
DNS domain name system
Simplified Communications Model - Diagram
Modes of Data Communication
The manner in which data is transmitted
from one location to another location is
called data transmission mode.
There are three modes for transmitting
data from one location to another. These
are:
Simplex
Half duplex
Full duplex
Simplex
In simplex mode, data is transmitted in only
one direction. A terminal can only send data
and cannot receive it or it can only receive data
but cannot send it. It is not possible to confirm
successful transmission of data in simplex
mode.
Examples
Speaker, radio and television broadcasting
There is no return signal.
SENDER UNIDIRECTIONAL RECEIVER
Half Duplex
In half duplex mode, data can be transmitted in
both directions but only in one direction at a
time.
During any transmission, one is the transmitter
and the other is receiver. So each time for
sending or receiving data, direction of data
communication is reversed, this slows down
data transmission rate.
In half duplex modes, transmission of data can
be confirmed.
BIDIRECTIONAL
SENDER/ RECEIVER RECEIVER/ SENDER
BIDIRECTIONAL
Full Duplex
In full mode, data can be transmitted in both
directions simultaneously. It is a faster mode for
transmitting data because no time wastes in
switching directions.
Full Duplex Mode
Example of full duplex is Computer network set in
which both the users can send and receive at the
same time.
SENDER/ RECEIVER BIDIRECTIONAL RECEIVER/ SENDER
Simplex, Half Duplex & Full Duplex
Simplex Half Duplex Full Duplex
Cost Cheapest Expensive Most Expensive
communication
Data One way Two way one at Simultaneous
transmission a time transmission
Bandwidth Low Medium High
Networking Hardware
There are wide range of hardware systems used in a computer
network
The major networking hardware are:
Network Interface Card (NIC)
Network Cable
Hub
Switch
Router
Proxy Server
Bridge
Firewall and
Modem
Computer Network
A computer network is defined as the
interconnection of two or more
computers. It is done to enable the
computers to communicate and share
available resources.
Networks increase efficiency and reduce
costs. Computer networks achieve these
goals in four primary ways:
Why Netwok?
i. Sharing of Hardware resources
ii. Sharing of expensive software's and
database
iii. Communication from one computer to
another computer
iv. Exchange of data and information among
users via network
v. Sharing of information over geographically
wide areas.
Sharing Programs/Software
Application (software) sharing occurs when
several users at different locations run application
programs that are installed centrally in one
location (application server).
Less disk storage-saves disk space
When a new version of the software is released, it is
easier to update from the server than to updating
each computing device which greatly reduces
maintenance cost and time.
Purchasing a software license for a network can be
less expensive than purchasing a single-user license
for every workstation.
Sharing Hardware
Computer networks enable us to share expensive
hardware resource among
several computers. A typical example of shared resource is
Printer
Central Disk storage
Advantages and Disadvantage
Advantages Network
Speed
Cost
Security
Centralized Software Management
Resource Sharing
Electronic Mail
Disadvantages Network
Expensive to Install
Requires Administrative Time
File Server May Fail
Cables May Break
Classification of Networks
Based on Geographical Location.
LAN
MAN and
WAN
BY ROLE OF COMPUTERS
Peer-to-peer (P2P)
Client/Server
Based on Network Topology
Physical Topology
Logical Topology
Based on Geographical Location
Local Area Network (LAN)
A LAN covers a relatively small area such as a
classroom, school, or a single building.
LANs are inexpensive to install and also provide
higher speeds.
Based on Geographical Location
Metropolitan Area Network (MAN):
A MAN spans the distance of a typical metropolitan
city.
The cost of installation and operation is higher.
MANs use high-speed connections such as fiber
optics to achieve higher speeds.
Based on Geographical Location
Wide Area Network (WAN):
WANs span a larger area than a single city.
Uses long distance telecommunication
networks for connection, thereby increasing
the cost.
The Internet is a good example of a WAN.
Based on the role Computers
Peer-to-Peer (P2P)
In peer to peer network each computer is responsible for
making its own resources available to other computers on
the network.
Each computer is responsible for setting up and
maintaining its own security for these resources.
Also each computer is responsible for accessing the
required network resources from peer to peer relationships.
Peer to peer network is useful for a small network
containing less than 10 computers on a single LAN .
In peer to peer network each computer can function as both
client and server.
Peer to peer networks do not have a central control system.
There are no servers in peer networks.
Peer-to-Peer (P2P)
Based on the role Computers
Client/Server Network
The client–server network is a type of network that
partitions tasks or loads between client and Server
Servers the providers of a service and
Clients service requesters
Specialized Servers
Servers must perform varied and complex tasks.
Servers for large networks have become specialized to
accommodate the expanding needs of users. types of
servers included on many large networks.
File Servers
Print Servers
Database Servers
Application Servers
Mail Servers
Web Servers
Proxy Server
Server
A dedicated server is one that services the
network by storing data, applications,
resources, and also provides access to
resources required by the client.
These servers can also control the network’s
security from one centralized location or
share it with other specially configured
servers.
Client
Client computer takes the advantages of
powerful processing capabilities of both the
client and the server.
Example of client-server network
Advantages of Client/Server network
▪ Facilitate resource sharing – centrally
administrate and control
▪ Facilitate system backup and improve
fault tolerance
▪ Enhance security – only administrator
can have access to Server
▪ Support more users – difficult to
achieve with peer-to-peer networks
Disadvantages of Client/Server network
High cost for Servers
Need expert to configure the network
Introduce a single point of failure to
the system.
Based on Network Topology
Topology refers to the way in which multiple
devices are interconnected via communication
links. There are two types of topology:
Physical Topology
Logical Topology
Logical Topology
Logical topology is bound to network protocols and
describe how data is moved across the network
Some times called protocols.
A protocol is a formal description of a set of
rules and conventions that govern how
devices on a network communicate.
Connections to the Internet may use multiple
protocols. TCP/IP is a suite of protocols that
work together to transmit data.
Application/Services
Interprets the data and displays the information in
an understandable form is the last part of the
connection.
Applications work with protocols to send and
receive data across the Internet.
A web browser displays HTML as a web page.
File Transfer Protocol (FTP) is used to download
files and programs from the Internet.
Domain Name System (DNS): is used to translate
the IP address to that of Unified Resource
Locator
www.facebook.com (URL) to 31.13.86.16 (IP address)
Physical Topologies
Physical topology is the layout of wiring, cables, the
locations of nodes, and the interconnections between
the nodes and the cabling or wiring system between
them
Four fundamental type of Physical topology:
Bus
Ring
Star
Mesh
Hybrid/tree
.
Bus Topology
A Bus topology consists of a single cable called a
bus connecting all nodes on a network without
intervening connectivity devices.
Devices share responsibility for getting data from
one point to another
Merits and Demerits of Bus Topology
Merits
Works well for small networks
Relatively inexpensive to implement
Easy to add to it
Demerits
Management costs can be high
Potential for congestion with network traffic
Terminators must be there at every end
Not scalable
Difficult to troubleshoot, not fault-tolerant
Ring Topology
Ring topology
Each node is connected to the two nearest nodes so
the entire network forms a circle
One method for passing data on ring networks is
token passing
Active topology
Each workstation transmits data
Merits and Demerits of Ring Topology
Merits
Easier to manage; easier to locate a defective node or cable
problem
Well-suited for transmitting signals over long distances on a LAN
Handles high-volume network traffic
Enables reliable communication
Equal access
Demerits
Expensive
Requires more cable and network equipment at
the start
Not used as widely as bus topology
Fewer equipment options
Fewer options for expansion to high-speed
communication
Star
Any single cable connects only two devices
Cabling problems affect two nodes at most
Requires more cabling than ring or bus
networks
More fault-tolerant
Easily moved, isolated, or interconnected with
other networks
Scalable
Every node on the network is connected through a
central device is called switch/hub
Merits and Demerits of Star Topology
Merits
Good option for modern networks
Low startup costs
Easy to manage
Scalable
Most popular topology in use
wide variety of equipment available
Demerits
Switch/Hub is a single point of failure
Requires more cable than the bus
Mesh Topology
Not common on LANs
Most often used in WANs to interconnect LANS
Each node is connected to every other node
Allows communication to continue in the event of a
break in any one connection
Provides redundant paths through the new work
Merits and Demerits of Star Topology
Merits
Improves Fault Tolerance
Demerits
▪ The most Expensive
▪ Difficult to install
▪ Difficult to manage
▪ Difficult to troubleshoot
Hybrid Topology Types
Hybrid Physical Topologies:
Star-Ring topology Star-bus topology
Transmission Media
Transmission Media
Two main categories:
Guided ― wires, cables
Unguided ― wireless transmission, e.g.
radio, microwave, infrared, Bluetooth …
Guided/Wired media
Twisted-Pair cables:
➢ Unshielded Twisted-Pair (UTP) cables
➢ Shielded Twisted-Pair (STP) cables
Coaxial cables
Fiber-optic cables
Categories of UTP Cables
Category 1 ― the lowest quality, only good for voice,
mainly found in very old buildings, not recommended
now
Category 2 ― good for voice and low data rates (up to
4Mbps for low-speed token ring networks)
Category 3 ― at least 3 twists per foot, for up to 10
Mbps (common in phone networks in residential
buildings)
Category 4 ― up to 16 Mbps (mainly for token rings)
Category 5 (or 5e) ― up to 100 Mbps (common for
networks targeted for high-speed data communications)
Category 6 ― more twists than Cat 5, up to 1 Gbps
Type Distance Speed Cost Advantages Disadvantages
Easy to install; widely Susceptible to
100 m
10 Mbps to Least
UTP
available and widely interference; can cover
1000 Mbps expensive
used only a limited distance
More Reduced crosstalk; Difficult to work with;
100 m
10 Mbps to
STP
expensive more resistant to EMI can cover only a limited
100 Mbps
than UTP than Thinnet or UTP distance
Difficult to work with
10 km and above single 500 m (Thicknet)
2 km and farther multi 185 m (Thinnet)
Relatively (Thicknet); limited
inexpensive, Less susceptible to EMI bandwidth; limited
Coaxial
10 Mbps to
but more interference than other application (Thinnet);
100 Mbps
costly than types of copper media damage to cable can
UTP bring down entire
network
Cannot be tapped, so
security is better; can
100 Mb to 100
Fiber-Optic
be used over great
Gb single
distances; is not
mode Expensive Difficult to terminate
susceptible to EMI; has
100 Mbps to
a higher data rate than
9.92 Gb multi
coaxial and twisted-
pair cable
INTERNET
The internet is the global network of networks, which
interconnects thousands of computer systems and
millions of people around the world.
It is a “network of networks” that consists of smaller
domestic, academic, business, and government
networks, which together carry various information and
services such as e-mail, online chat, file transfer and the
interlinked Web pages and other documents of the World
(WWW).
Internet
When you connect your computer to the Internet via
your Internet Service Provider (ISP), you become part
of the ISPs network, which is connected to other
networks that make up the Internet
the Internet is not a closely controlled by ‘single’
system, but an assemblage of independent networks
united by the common use of TCP/IP protocol.
It grew out of an experiment begun in the 1960's by
the U.S. Department of Defense , ARPANET (The
Advanced Research Projects Agency Network)
Internet
Internet
To connect to the Internet, the following are needed:
Computer
Telephone line (cable)
Modem and/or router
Switch or hub
ISP (Internet Service Provider)
Web browser, e.g., Internet Explorer, Mozilla
Firefox, Google Chrome, Safari, Opera, etc.
Internet Connections
Dial-up Connection
This provides connection to Internet through a
dial-up terminal connection. The computer,
which provides Internet access is known as
‘Host or server’ and the computer that receives
the access, is ‘Client’ or ‘Terminal’.
The client computer uses modem to access a
"host" and acts as if it is a terminal directly
connected to that host.
Internet Connections
Leased Connection
It is the secure, dedicated and most expensive, level of
Internet connection.
With leased connection, your computer is dedicatedly
and directly connected to the Internet using high-speed
transmission lines.
It is on-line twenty-four hours a day, seven days a
week.
Leased Internet connections are limited to large
corporations and universities who could afford the cost
Internet Services
Internet is best characterized by the services it provides. It
offers access to data in the form of text, graphics, sound,
software and also people through a variety of services and
tools for communication exchange.
WWW
E-mail
FTP
Internet Telephony
Telnet
RFC/Chat
WWW (World Wide Web)
www is the most important service provided by
Internet.
WWW is a set of sites that you can go for information.
Links within WWW documents can take you quickly to
other related documents.
The process of sharing common information of the
world by the help of the Internet services. It includes
education, health, games, chat, sport, news and others.
It requires special software programs like Netscape,
Internet Explorer, AltaVista, Wikipedia or others. They
are called Web Browsers
Tim Berners-Lee
WWW is Developed in 1989 by Tim Berners-Lee of
the European Particle Physics Lab (CERN) in
Switzerland
Father of W .W .W
The inventor of HTML.
Invented W W W while working at CERN, the
European Particle Physics Laboratory.
http://www.aau.edu.et
Electronic Mail
Email is the most frequently used application of the
Internet which this is used for sending a message
electronically over the internet, from the sender to
the receiver.
• To create, send, and receive e-mail messages, you
need an e-mail account and program on an Internet
mail server with a domain name.
E.g [email protected]
[email protected]
File Transfer Protocol (FTP)
Using FTP programs, we can upload or download files.
But to do this there should be an admission from the
remote computer.
There are two computers involved in an FTP transfer: a
server and a client.
The FTP server, running FTP server software, listens on
the network for connection requests from other
computers. The client computer, running FTP client
software, initiates a connection to the server
Internet Telephony (Voice over IP)
Voice over Internet Protocol (VoIP) is a
methodology and group of technologies for the delivery
of Voice communications and Multimedia sessions
over Internet Protocol (IP) networks, such as the
Internet.
Other terms commonly associated with VoIP are IP
telephony, Internet telephony.
E.g. Skype,VIBER
Telnet (Remote Login)
Telnet:- It is a program that allows you log in from your
own computer to a remote computer directly through the
Internet and you can work on that computer.
The term "telnet" is a mashing together of "telephone"
and "network”
For example, if I travelled abroad and had use of machine
with Internet access, I could use telnet to login to my
account on csserver at AAU provided I have an account on
the machine.
Internet Relay Chat-IRC
Internet Relay Chat is one of the most popular and
most interactive services on the Internet.
Using an IRC client (program) you can exchange
text messages interactively with other people all
over the world
Computer Security
Computer security, also known as cyber security or IT
security, is the protection of computer systems from the theft
or damage to the hardware, software or the information on
them, as well as from disruption or misdirection of the services
they provide.
Security goals
▪ Data Confidentiality
▪ System Availability
▪ Data Integrity
Security is thus based:
Privacy, Trust, Authenticity, Integrity
Computer Security …
Why security???
computer systems are vulnerable to many
threats
Security Threats
any person, act, or object that poses a danger to
computer security
Human, Physical, Software
Computer Security …
Threats:
Fraud and Theft
Loss of Physical and Infrastructure Support
Malicious Hackers
Threats to Personal Privacy
Denial of Service/DoS
Malicious Code
Viruses …
Is a malicious program that invades a computer system
without the knowledge of the owner.
Viruses:
corrupt or destroy data
increase file size
format the hard disk
degrade system performance
manipulate the directory contents
rename all files with different name
Viruses …
Many kinds of Viruses
Multipartite
Companion
Macro
Trojan horse
Worms
Boot sector/ MBR
spyware
Stealth
Time/ Logic bomb
Viruses …
Viruses get transmitted:
Removable storage devices
Network
Email
Viruses …
Protection:
Backups/ Redundancy
Encryption
Isolate the Machine
Installing an antivirus SW
Installing a virus resistant operating systems
Scanning removable devices before use
Avoiding programs from unknown sources
Disabling floppy disk booting
Viruses …
What do antiviruses do?
Identification of known viruses
Detection of suspected viruses
Blocking of possible viruses
Disinfection of infected objects
Deletion and overwriting of infected objects
Viruses …
Anti-viruses
Norton Antivirus
McAfee Antivirus
AVG Antivirus
Avira Antivirus
Kaspersky Antivirus
…