5040 - File - COMMUNICATION AND COMPUTER NETWORK LT 3
5040 - File - COMMUNICATION AND COMPUTER NETWORK LT 3
7.0 Introduction
Communication has extended the uses of microcomputer enormously. The mobile telephone and
other wireless technologies are revolutionizing how we use computer today. You can connect
your microcomputer to other people’s microcomputers, to the internet, and to other larger
computers located throughout the world. Communication systems are the electronic systems that
transmit data over communication lines from one location to another.
Computer communication is the process of sharing data, programs, and information between two
or more computers.
7.2 BANDWIDTH
Bandwidth is one of the factors that affect how data is transmitted. Bandwidth is a measurement
of the width or capacity of the communication channel. Effectively, it means how much
information can move across the communication channel in a given amount of time. There are
three categories of bandwidth
1. Voiceband: this is also known as voice grade or low bandwidth and it is used for
standard telephone communication. Voiceband can be effectively used for transmitting texts.
However, it is too slow for many types of transmission including high-quality audio and video.
Typical speeds are 56 to 96 kbps.
2. Medium band: this is the bandwidth used in special leased lines to connect
minicomputers and mainframes as well as to transmit data over long distances.
3. Broadband: this is the bandwidth used for high-capacity transmissions. Microcomputer
with digital subscriber lines, cable and satellite connections as well as other more specialized
high-speed devices uses this bandwidth. It is capable of effectively meeting most of today’s
communication needs including transmitting high-quality audio and video. Speeds are typically
1.5 mbps, although much higher speeds are possible
7.3 COMPUTER NETWORK
A computer network is an interconnection of various computer systems located at different
places. In computer network, two or more computers are linked together with a medium and data
communication devices for the purpose of communicating data and sharing resources. The
computers on a network may be linked through cables, telephone lines, radio waves, satellites, or
infrared light beams
Speed
Networks provide a very rapid method for sharing and transferring of files, program and
information. The concept of electronic mail and short message service (SMS) which are made
possible through network has revolutionized communication system.
Security of Information
Files and programs on a network can be well secured. Such files and programs would be backed
up or duplicated on a networked storage device shared by others. Also, authentication is
established for specific sensitive programs to restrict access to authorized users.
Cost
Since programs and hardware devices are shared over a computer network, this reduces the
financial implication of using information and communication technology. Besides monetary
savings, sharing of programs on a network allow for easier use of programs by multiple users
simultaneously.
CLIENT/SERVER NETWORKS
A client/server network consists of clients, which are micro computers that request data and
servers which are computers used to supply data as depicted in figure 7.1.
The server is a powerful microcomputer that manages shared devices such as laser printers. It
runs server software for applications such as email and web browsing. Different servers may be
used to manage different tasks. A file server is a computer that behaves like a disk drive, storing
user programs and data files on a LAN.
A print server control one or more printers and stores the print-image output from all the
microcomputer on the system. Web servers contain web pages that can be viewed using a
browser. Mail servers manage mails.
It is however expensive and administration can be very tasking and required specialized staff.
Internet, extranet and intranet are examples of client/server network
PEER-TO-PEER NETWORK
In a peer-to-peer (P2P) network, all microcomputers on the network communicate directly with
one another without relying on a server. Considering figure 7.2, every computer can share files
and peripherals with all other computers on the network, given that all are granted access
privileges. P2P networks slow down under heavy use. P2P networks are less expensive than
client/server networks and works effectively for up to 25 computers.
A workgroup is a collection of computers networked for a common purpose, such as accounting
or marketing functions.
Peer-2-Peer network has advantages of cheaper setup cost and low financial commitment.
However, porous security, low performance, and absence of central control are demerits of this
approach.
Advantages
The reliability of network is high because the failure of one computer in the network does
not effect the functioning for other computers.
Addition of new computer to network is easy.
High rate of data transmission is possible.
Peripheral devices like magnetic disk and printer can be shared by other computers.
Disadvantages
If the communication line fails, the entire network system breaks down.
Use of LAN
Followings are the major areas where LAN is normally used
File transfers and Access
Word and text processing
Electronic message handling
Remote database access
Personal computing
Digital voice transmission and storage
Characteristics of WAN
Followings are the major characteristics of WAN.
1. Communication Facility: For a big company spanning over different parts of the country
the employees can save long distance phone calls and overcomes the time lag in overseas
communications. Computer conferencing is another use of WAN where users communicate
with each other through their computer system.
2. Remote Data Entry: Remote data entry is possible in WAN. It means sitting at any location
you can enter data, update data and query other information of any computer attached to the
WAN but located in other cities. For example, suppose you are sitting at Abuja and want to
see some data of a computer located at Abeokuta, you can do it through WAN.
3. Centralized Information: In modern computerized environment you will find that big
organizations go for centralized data storage. This means if the organization is spread over
many cities, they keep their important business data in a single place. As the data are
generated at different sites, WAN permits collection of this data from different sites and save
at a single site.
Cost of data transmission in LAN is less because the transmission medium is owned by a
single organization. In case of WAN the cost of data transmission is very high because
the transmission mediums used are hired, either telephone lines or satellite links.
The speed of data transmission is much higher in LAN than in WAN. The transmission
speed in LAN varies from 0.1 to 100 megabits per second. In case of WAN the speed
ranges from 1800 to 9600 bits per second (bps).
Few data transmission errors occur in LAN compared to WAN. It is because in LAN the
distance covered is negligible.
1. Star topology
In star topology a number of workstations (or nodes) are directly linked to a central node (see,
Figure 7.3). Any communication between stations on a star LAN must pass through the central
node. There is bi-directional communication between various nodes. The central node controls
all the activities of the nodes. The advantages of the star topology are:
It offers flexibility of adding or deleting of workstations from the network.
Breakdown of one station does not affect any other device on the network.
Easy to manage and monitor
The major disadvantage of star topology is that failure of the central node disables
communication throughout the whole network.
2. Bus Topology
In bus topology, all workstations are connected to a single communication line called bus. In this
type of network topology there is no central node as in star topology. Transmission from any
station travels the length of the bus in both directions and can be received by all workstations
(see, figure 7.4). The advantage of the bus topology is that
It is quite easy to set up.
If one station of the topology fails, it does not affect the entire system.
Cable use is economical
Layout is simple
The disadvantages of bus topology are:
Any break in the bus is difficult to identify.
Slow down under heavy use
Figure 7.4 Bus Topology
3. Ring Topology
In ring topology, each station is attached nearby stations on a point to point basis so that the
entire system is in the form of a ring as shown in figure 7.5. In this topology data is transmitted
in one direction only. Thus, the data packets circulate along the ring in either clockwise or anti-
clockwise direction. The advantage of this topology is that any signal transmitted on the network
passes through all the LAN stations. The disadvantage of ring network is that the breakdown of
any one station on the ring can disable the entire system.
In a mesh topology, all devices are connected to each other more than once to create fault
tolerance when a system's hardware or software must recover from failure. A single device or
cable failure does not affect the performance because the devices are connected by more than
one means. This is more expensive than other topologies because it requires more hardware and
cabling.
Server
A Server is a node that shares resources with other nodes. Dedicated servers specialize in
performing specific tasks. Depending on the specific task, they may be called an application
server, communication server, database server, file server, printer server or web server.
Terminals
A computer system that is directly connected to a server is called a terminal.
Packets
Electronic messages are sent as packets. A Packet is a fixed-length block of data for
transmission. Once the packet arrives at their destination, the receiving computer reassembles
them into proper sequence to complete the message.
Protocols
A protocol is a set of rules governing the exchange of data between hardware and/or software
components in a computer network. Every device connected, to a network has an Internet
Protocol (IP) address so that other computers on the network can properly route data to that
address. Sending and receiving devices must follow the same set of protocols. Protocols are
built into the hardware or software you are using.
Common examples of protocol that are available for LAN connection are CSMA, Polling and
Token-passing.
Hub
A hub is the central part/point for devices in a network – a place of convergence where data
arrives from one or more directions and is forwarded out in one or more other directions. Hubs
are commonly used to connect segments of a LAN. A hub contains multiple ports. A hub is a
half-duplex, meaning it transmits data in both directions but only in one direction at a time.
Switches
A switch is a device that connects computers to a network, figure 7.7. Unlike a hub, it sends
messages only to a computer that is the intended recipients. A switch is a full-duplex, meaning
data is transmitted back and forth at the same time.
Modems
Modem enables digital microcomputers to communicate across analog telephone lines. This
communication includes both voice and data communications. The speed with which modems
transmit data varies and it is measured in bits per second (bps). There are four basic types of
modems: external, internal, PC card and wireless modem.
Bridges
A bridge is an interface used to connect the same type of networks e.g LAN to LAN
Gateways
A gateway is an interface permitting communication between dissimilar networks e. LAN to
WAN
Routers
A router is a special computer that directs communicating messages when several networks are
connected together. High – speed routers can serve as part of the internet backbone handling the
major data traffic.
Backbones
The backbone consists of the main highway that connects all computer networks in an
organization.
Infrared:
Infrared uses infrared light waves to communicate over short distances. It is sometimes referred
to as line of sight communication because the light waves can only travel in a straight line. This
requires that sending and receiving devices must be in clear view of one another without any
obstructions blocking that view. Bluetooth is a short-range wireless communication standard that
uses microwaves to transmit data over short distances of up to approximately 33 feet. Unlike
traditional microwaves, Bluetooth does not require line of sight communication. Rather it uses
radio waves that can pass through nearby wall and other nonmetal barriers.
Broadcast radio
Broadcast radio communications uses special sending and receiving towers called transceivers.
These transceivers send and receive radio signals from wireless devices. For examples, cellular
telephones and many web-enabled devices use broadcast radio to place telephone calls and/or to
connect to the internet.
Microwave
Microwave system uses very high frequency radio signals to transmit data through space. The
transmitter and receiver of a microwave system should be in line-of-sight because the radio
signal cannot bend. With microwave very long distance, transmission is not possible. In order to
overcome the problem of line of sight and power amplification of weak signal, repeaters are used
at intervals of 25 to 30 kilometers between the transmitting and receiving end.
Communication Satellite
The problem of line-sight and repeaters are overcome by using satellites that are the most widely
used data transmission media in modern days. A communication satellite is a microwave relay
station placed in outer space. In satellite communication, microwave signal is transmitted from a
transmitter on earth to the satellite at space. The satellite amplifies the weak signal and transmits
it back to the receiver. The main advantage of satellite communication is that it is a single
microwave relay station visible from any point of a very large area. They are mostly used to link
big metropolitan cities.
Auditing
Auditing is the process of tracking users and their actions on the network. Auditing of access use
and rights changes should be implemented to prevent unauthorized or unintentional access for a
guest or restricted user account access to sensitive or protected resources.
Some activities that can be audited include users doing the following:
1. Reading, modifying, or deleting files
2. Logging on or off the network
3. Using services, such as remote access or Terminal Services
4. Using devices, such as printers
Employing firewalls
A firewall is a component placed between computers and networks to eliminate undesired access
by the outside world. It can be comprised of hardware, software, or a combination of both. A
firewall is the first line of defense for a network, and should be set up during network
installation. Even though a firewall is an important part of your defense, you should not rely on it
exclusively for network protection. Combine a firewall with all the security solutions outlined in
this section.
Scanning
To reduce security risks, you should regularly use a network scanner to check your network for
rogue access points (unauthorized access points) and other threats.