0% found this document useful (0 votes)
6 views

INF1505 - Module 6 - Study notes

Module 6 covers the fundamentals of data communication, including its major applications, components, processing configurations, and network types. It emphasizes the importance of wireless technologies, security measures, and the convergence of voice, video, and data for enhanced business operations. Key concepts such as protocols, network topologies, and the OSI model are also discussed to provide a comprehensive understanding of data communication systems.

Uploaded by

SurethaErasmus
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

INF1505 - Module 6 - Study notes

Module 6 covers the fundamentals of data communication, including its major applications, components, processing configurations, and network types. It emphasizes the importance of wireless technologies, security measures, and the convergence of voice, video, and data for enhanced business operations. Key concepts such as protocols, network topologies, and the OSI model are also discussed to provide a comprehensive understanding of data communication systems.

Uploaded by

SurethaErasmus
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Module 6: Data Communication: Delivering Information Anywhere and Anytime

Learning Objectives
After studying this module, you should be able to:
• Describe the major applications of a data communication system.
• Explain the three major components of a data communication system.
• Describe the three major types of processing configurations.
• Explain the three types of networks.
• Describe the five main network topologies.
• Explain important networking concepts, including protocols, TCP/IP, routing, routers, and the
client/server model.
• Examine wireless and mobile technologies and networks in a business setting.
• Describe networking trends such as Wi-Fi, WiMAX, and Bluetooth.
• Discuss the importance of wireless security and the techniques used.
• Summarize the concept of convergence and its applications for business and personal use.

Section 1: Defining Data Communication


Data Communication is the electronic transfer of data from one location to another. It enables an
information system to deliver information efficiently, which is critical for organizations that collect and
transfer data across great geographic distances.
Why Managers Need to Know about Data Communication:
• Collaboration: Enables decision makers located worldwide to collaborate effectively.
• Efficiency: Supports just-in-time delivery of goods, reducing inventory costs.
• Virtual Organizations: Facilitates operations across geographic boundaries.
• Applications: Includes e-collaboration tools like GoToMeeting, WebEx, Zoom, etc.

Section 2: Basic Components of a Data Communication System


A typical data communication system includes:
1. Sender and Receiver Devices:
• Input/output devices (thin clients, smart terminals, intelligent terminals, workstations,
PCs, smartphones).
2. Modems or Routers:
• Modems connect users to the Internet via analog phone lines or broadband services like
DSL and cable.
3. Communication Medium (Channel):
• Conducted media (wired) vs. radiated media (wireless).
• Types include twisted-pair copper cables, coaxial cables, fiber optics, infrared,
microwave, satellite, etc.
Key Concepts:
• Bandwidth: Amount of data transferred per second (bps, Kbps, Mbps, Gbps).
• Attenuation: Loss of signal power during transmission.
• Synchronization: Ensuring both sender and receiver start/stop communication at the same
points using protocols.

Section 3: Processing Configurations


Three types of processing configurations have emerged over the past 60 years:
1. Centralized Processing:
• All processing occurs at one central computer.
• Advantages: Tight control over operations.
• Disadvantages: Lack of responsiveness to user needs.
2. Decentralized Processing:
• Each department/division has its own computer for processing tasks.
• Advantages: More responsive to users.
• Disadvantages: Lack of coordination, high costs, duplication of efforts.
3. Distributed Processing:
• Combines centralized control with decentralized operations.
• Advantages: Improved fault tolerance, modularity, resource sharing.
• Disadvantages: Security challenges, compatibility issues.
Open Systems Interconnection (OSI) Model:
• A seven-layer architecture defining how data is transmitted between computers.
• Layers include Application, Presentation, Session, Transport, Network, Data Link, and Physical
layers.

Section 4: Types of Networks


1. Local Area Network (LAN):
• Connects devices in close proximity (e.g., office building).
• Speed: 100 Mbps to 10 Gbps.
• Commonly uses Ethernet technology.
2. Wide Area Network (WAN):
• Spans cities, states, or countries.
• Speed: 28.8 Kbps to 155 Mbps.
• Used by organizations with multiple branch offices.
3. Metropolitan Area Network (MAN):
• Designed for data communication within a city or nearby cities.
• Speed: 34 Mbps to 155 Mbps.

Section 5: Network Topologies


Network topology refers to the physical layout of a network. Common topologies include:
1. Star Topology:
• Centralized control; easy to modify but dependent on the host computer.
2. Ring Topology:
• Nodes connected in a closed loop; uses token-passing protocol.
3. Bus Topology:
• Linear arrangement; simple and cost-effective but prone to bottlenecks.
4. Hierarchical (Tree) Topology:
• Combines computers with different processing strengths in organizational levels.
5. Mesh Topology:
• Every node connects to every other node; highly reliable but costly.

Section 6: Major Networking Concepts


1. Protocols:
• Rules governing data communication (e.g., TCP/IP).
2. Transmission Control Protocol/Internet Protocol (TCP/IP):
• Industry-standard suite enabling interoperability across platforms.
• TCP operates at the Transport layer; IP operates at the Network layer.
3. Routing:
• Process of deciding the best path for data packets.
• Techniques include centralized routing and distributed routing.
4. Routers:
• Devices connecting networks and controlling traffic flow.
• Can choose the best path based on distance or cost.
5. Client/Server Model:
• Software runs on the client (local computer) and communicates with the server to request
information/services.
• Architectures include two-tier, three-tier, and n-tier models.

Section 7: Wireless and Mobile Networks


1. Wireless Networks:
• Use radio waves instead of wires.
• Advantages: Mobility, flexibility, ease of installation.
• Disadvantages: Limited throughput, range, and susceptibility to interference.
2. Mobile Networks (Cellular Networks):
• Operate on radio frequencies (RF) and consist of cells served by base stations.
• Generations include 1G, 2G, 3G, 4G, and 5G.
• 5G offers significantly higher speeds and lower latency.
3. Technologies:
• Wi-Fi (IEEE 802.11): Broadband wireless technology for short distances.
• WiMAX (IEEE 802.16): For wireless metropolitan area networks.
• Bluetooth: Short-range wireless technology for personal area networks (PANs).

Section 8: Wireless Security


Techniques for securing wireless networks:
1. SSID (Service Set Identifier): Requires all packets to include an SSID.
2. WEP (Wired Equivalent Privacy): Uses encryption keys but has vulnerabilities.
3. EAP (Extensible Authentication Protocol): Dynamically generates keys.
4. WPA (Wi-Fi Protected Access): Combines features of WEP and EAP.
5. WPA2 (802.11i): Uses Advanced Encryption Standard (AES) for stronger security.

Section 9: Convergence of Voice, Video, and Data


Convergence integrates voice, video, and data into a single platform for multimedia communication. Key
technologies include:
• High-speed technologies like Gigabit Ethernet, ATM, 4G, and 5G.
• Applications: E-commerce, entertainment, video conferencing, telepresence systems.
Benefits:
• Improved efficiency and productivity.
• Enhanced customer service and collaboration.

Key Terms
• Attenuation: Loss of signal power.
• Bandwidth: Data transfer capacity.
• Bluetooth: Short-range wireless technology.
• Bus Topology: Linear arrangement of nodes.
• Centralized Processing: Single central computer handles all processing.
• Client/Server Model: Local software communicates with remote servers.
• Hierarchical Topology: Organizes computers in levels.
• LAN: Local Area Network.
• Mesh Topology: Fully interconnected nodes.
• MAN: Metropolitan Area Network.
• Mobile Network: Operates on RF signals.
• Modem: Device connecting users to the Internet.
• Multiplexer: Allows multiple nodes to share one channel.
• Narrowband: Voice-grade transmission channel.
• Code Division Multiple Access (CDMA): Improves digital communication efficiency.
• Network Interface Card (NIC): Hardware enabling network communication.
• Convergence: Integration of voice, video, and data.
• Data Communication: Electronic transfer of data.
• Decentralized Processing: Each unit has its own computer.
• Digital Subscriber Line (DSL): High-speed Internet service.
• Distributed Processing: Combines centralized control with decentralized operations.
• Dynamic Routes: Automatically learned routes.
• Network Topology: Physical layout of a network.
• N-Tier Architecture: Balances workload between client and server.
• Open Systems Interconnection (OSI) Model: Seven-layer architecture for data communication.
• Packet: Collection of binary digits sent over a network.
• Protocols: Rules governing data communication.
• Radiated Media: Wireless communication channels.
• Ring Topology: Closed-loop arrangement of nodes.
• Router: Device connecting networks and controlling traffic.
• Routing: Process of determining the best path for data.
• Routing Table: List of network nodes and paths.
• Star Topology: Centralized control with independent nodes.
• Static Routes: Manually configured routes.
• Throughput: Amount of data processed in a given time.
• Two-Tier Architecture: Client communicates directly with the server.
• WAN: Wide Area Network.
• Wireless Fidelity (Wi-Fi): Broadband wireless technology.
• Time Division Multiple Access (TDMA): Improves digital communication efficiency.
• Wireless Network: Uses wireless technology.
• Transmission Control Protocol/Internet Protocol (TCP/IP): Industry-standard communication
protocols.
• Worldwide Interoperability for Microwave Access (WiMAX): Broadband wireless technology.

Reviews and Discussions


1. Applications of Data Communication Systems:
• Collaboration tools (GoToMeeting, Zoom).
• Inventory management (Walmart's RetailLink).
• Real-time data access for suppliers.
2. Components of a Data Communication System:
• Sender and receiver devices.
• Modems or routers.
• Communication medium.
3. Advantages and Disadvantages of Processing Configurations:
• Centralized: Tight control vs. lack of responsiveness.
• Decentralized: Responsiveness vs. high costs.
• Distributed: Fault tolerance vs. security challenges.
4. Fastest and Slowest Networks:
• Fastest: LAN (100 Mbps to 10 Gbps).
• Slowest: WAN (28.8 Kbps to 155 Mbps).
5. Most Reliable Network Topology:
• Mesh topology due to redundancy.
6. TCP/IP:
• Industry-standard suite enabling interoperability.
7. Advantages of Wireless Networks:
• Mobility, flexibility, ease of installation.
8. Wireless Security Techniques:
• SSID, WEP, EAP, WPA, WPA2.
Projects
1. Collaboration Tool Comparison:
• Compare GoToMeeting, WebEx, and Zoom.
• Evaluate advantages/disadvantages and recommend one.
2. Telepresence Systems:
• Identify top products from Cisco and Poly.
• Discuss advantages/disadvantages compared to face-to-face meetings.
3. Healthcare Applications:
• Outline five applications of mobile/wireless devices in healthcare.
• Identify three mobile apps for medical personnel.
4. Banking Industry Apps:
• Identify five mobile apps increasing banker/customer productivity.
• Discuss potential drawbacks.
5. Smartphone Security:
• Provide six tips for improving smartphone privacy/security.
• Compare iOS and Android security.
6. Business Applications of Convergence:
• Describe five applications and industries benefiting from convergence.

Case Studies
1. Data Communication at Walmart:
• Improved supplier access through customized websites.
• Applications include automated distribution, EDI, VMS.
2. Protecting Mobile Device Security:
• Risks: Malware, premium SMS billing, phishing, spyware.
• Recommendations: Regular updates, strong passwords, location tracking controls.
Central Node: Data Communication

Branch 1: Components of Data Communication


• Sub-Branch 1.1: Sender and Receiver Devices
• Input/Output devices (e.g., thin clients, smart terminals, PCs, smartphones)
• Sub-Branch 1.2: Modems or Routers
• Connects users to the Internet via analog or broadband services
• Sub-Branch 1.3: Communication Medium
• Conducted media (wired): Twisted-pair copper cables, coaxial cables, fiber optics
• Radiated media (wireless): Radio frequency, infrared, microwave, satellite

Branch 2: Processing Configurations


• Sub-Branch 2.1: Centralized Processing
• All processing occurs at one central computer
• Advantages: Tight control over operations
• Disadvantages: Lack of responsiveness to user needs
• Sub-Branch 2.2: Decentralized Processing
• Each department/division has its own computer
• Advantages: More responsive to users
• Disadvantages: High costs, duplication of efforts
• Sub-Branch 2.3: Distributed Processing
• Combines centralized control with decentralized operations
• Advantages: Improved fault tolerance, resource sharing
• Disadvantages: Security challenges, compatibility issues

Branch 3: Types of Networks


• Sub-Branch 3.1: Local Area Network (LAN)
• Connects devices in close proximity (e.g., office building)
• Speed: 100 Mbps to 10 Gbps
• Sub-Branch 3.2: Wide Area Network (WAN)
• Spans cities, states, or countries
• Speed: 28.8 Kbps to 155 Mbps
• Sub-Branch 3.3: Metropolitan Area Network (MAN)
• Designed for data communication within a city or nearby cities
• Speed: 34 Mbps to 155 Mbps

Branch 4: Network Topologies


• Sub-Branch 4.1: Star Topology
• Centralized control; easy to modify but dependent on the host computer
• Sub-Branch 4.2: Ring Topology
• Nodes connected in a closed loop; uses token-passing protocol
• Sub-Branch 4.3: Bus Topology
• Linear arrangement; simple and cost-effective but prone to bottlenecks
• Sub-Branch 4.4: Hierarchical (Tree) Topology
• Combines computers with different processing strengths in organizational levels
• Sub-Branch 4.5: Mesh Topology
• Every node connects to every other node; highly reliable but costly

Branch 5: Major Networking Concepts


• Sub-Branch 5.1: Protocols
• Rules governing data communication (e.g., TCP/IP, HTTP, FTP)
• Sub-Branch 5.2: Transmission Control Protocol/Internet Protocol (TCP/IP)
• Industry-standard suite enabling interoperability across platforms
• TCP operates at the Transport layer; IP operates at the Network layer
• Sub-Branch 5.3: Routing
• Process of deciding the best path for data packets
• Techniques include centralized routing and distributed routing
• Sub-Branch 5.4: Routers
• Devices connecting networks and controlling traffic flow
• Sub-Branch 5.5: Client/Server Model
• Software runs on the client (local computer) and communicates with the server to request
information/services

Branch 6: Wireless and Mobile Technologies


• Sub-Branch 6.1: Wireless Networks
• Use radio waves instead of wires
• Advantages: Mobility, flexibility, ease of installation
• Disadvantages: Limited throughput, range, and susceptibility to interference
• Sub-Branch 6.2: Mobile Networks (Cellular Networks)
• Operate on radio frequencies (RF) and consist of cells served by base stations
• Generations include 1G, 2G, 3G, 4G, and 5G
• Sub-Branch 6.3: Technologies
• Wi-Fi (IEEE 802.11): Broadband wireless technology for short distances
• WiMAX (IEEE 802.16): For wireless metropolitan area networks
• Bluetooth: Short-range wireless technology for personal area networks (PANs)

Branch 7: Wireless Security


• Sub-Branch 7.1: Techniques
• SSID (Service Set Identifier): Requires all packets to include an SSID
• WEP (Wired Equivalent Privacy): Uses encryption keys but has vulnerabilities
• EAP (Extensible Authentication Protocol): Dynamically generates keys
• WPA (Wi-Fi Protected Access): Combines features of WEP and EAP
• WPA2 (802.11i): Uses Advanced Encryption Standard (AES) for stronger security

Branch 8: Convergence
• Sub-Branch 8.1: Definition
• Integration of voice, video, and data into a single platform for multimedia communication
• Sub-Branch 8.2: Key Technologies
• High-speed technologies like Gigabit Ethernet, ATM, 4G, and 5G
• Sub-Branch 8.3: Applications
• E-commerce, entertainment, video conferencing, telepresence systems
• Sub-Branch 8.4: Benefits
• Improved efficiency and productivity
• Enhanced customer service and collaboration
INF1505 – Module 6

Data communication is the electronic transfer of


What is data communication? data from one location to another. It enables an
information system to deliver information
efficiently.

Name the three major components of a data


Sender and receiver devices, modems or routers,
communication system.
and a communication medium (channel).

Bandwidth is the amount of data that can be


Define bandwidth. transferred from one point to another in a given
time period, usually measured in bits per second
(bps).

Attenuation is the loss of power in a signal as it


What is attenuation?
travels from the sending device to the receiving
device.

What are the three types of processing


Centralized processing, decentralized
configurations?
processing, and distributed processing.

In centralized processing, all processing is done


Describe centralized processing. at one central computer. Its advantage is tight
control, but it lacks responsiveness to user
needs.

The OSI model is a seven-layer architecture


What is the Open Systems Interconnection (OSI)
defining how data is transmitted between
model?
computers. It standardizes interactions between
networked devices.

Name the three types of networks. Local Area Network (LAN), Wide Area Network
(WAN), and Metropolitan Area Network (MAN).

A LAN connects workstations and peripheral


What is a LAN?
devices in close proximity, typically within a
building or campus.
A WAN spans cities, states, or countries and is
What is a WAN?
usually owned by multiple parties. It has slower
speeds compared to LANs.

Name five common network topologies.


Star, ring, bus, hierarchical, and mesh.

TCP/IP is an industry-standard suite of


What is TCP/IP? communication protocols enabling
interoperability between devices running on
different platforms.

In the client/server model, software runs on the


Explain the client/server model.
local computer (client) and communicates with a
remote server to request information or services.

Wi-Fi (Wireless Fidelity) is a broadband wireless


What is Wi-Fi?
technology allowing devices to communicate over
short distances using radio waves.

WiMAX (Worldwide Interoperability for Microwave


What is WiMAX?
Access) is a broadband wireless technology
designed for wireless metropolitan area networks.

Bluetooth is a wireless technology for transferring


What is Bluetooth?
data over short distances, often used to create
personal area networks (PANs).

Name five techniques for improving wireless


security. SSID, WEP, EAP, WPA, and WPA2/802.11i.

Convergence refers to integrating voice, video,


What is convergence in data communication?
and data so that multimedia information can be
used for decision-making.
What are the advantages of wireless networks
Mobility, flexibility, ease of installation, and lower
compared to wired ones?
cost.

What are two disadvantages of wireless


Limited throughput and range, susceptibility to
networks?
interference, and potential security risks.
Test: Data Communication: Delivering Information Anywhere and Anytime

Section 1: Multiple-Choice Questions (20)


1. What is data communication?
a) The physical transfer of hardware devices
b) The electronic transfer of data from one location to another
c) The process of creating software applications
d) The design of computer networks
2. Which component is NOT part of a typical data communication system?
a) Sender and receiver devices
b) Modems or routers
c) Communication medium (channel)
d) Local area network
3. What does bandwidth measure?
a) The size of the data packets
b) The amount of data transferred per second
c) The distance data can travel
d) The speed of the CPU
4. In which type of processing configuration is all processing done at one central computer?
a) Centralized processing
b) Decentralized processing
c) Distributed processing
d) Hierarchical processing
5. What is the OSI model?
a) A hardware device for connecting networks
b) A seven-layer architecture defining how data is transmitted between computers
c) A wireless communication standard
d) A protocol for securing wireless networks
6. Which topology connects nodes in a closed loop?
a) Star topology
b) Ring topology
c) Bus topology
d) Mesh topology
7. What is the main advantage of TCP/IP?
a) It enables interoperability between different platforms
b) It increases the speed of data transfer
c) It reduces network congestion
d) It eliminates the need for routers
8. What is Wi-Fi?
a) A wired networking technology
b) A broadband wireless technology
c) A mobile phone network
d) A security protocol
9. Which generation of cellular networks offers the highest speeds?
a) 3G
b) 4G
c) 5G
d) 2G
10. What is Bluetooth used for?
a) Creating personal area networks (PANs)
b) Connecting to satellite networks
c) Increasing the range of Wi-Fi signals
d) Securing wired networks
11. Which network type typically covers the largest geographic area?
a) LAN
b) WAN
c) MAN
d) WLAN
12. What is attenuation?
a) The loss of signal power during transmission
b) The increase in bandwidth
c) The encryption of data packets
d) The routing of packets
13. What is the purpose of a modem?
a) To connect users to the Internet via analog or broadband connections
b) To encrypt data packets
c) To generate wireless signals
d) To manage network traffic
14. Which layer of the OSI model formats message packets?
a) Application layer
b) Presentation layer
c) Session layer
d) Transport layer
15. What is the primary function of a router?
a) To connect network systems and control traffic flow
b) To store data packets
c) To encrypt data transmissions
d) To generate Wi-Fi signals
16. Which wireless technology operates on the IEEE 802.16 standard?
a) Wi-Fi
b) WiMAX
c) Bluetooth
d) TDMA
17. What is convergence in data communication?
a) The integration of voice, video, and data
b) The reduction of network bandwidth
c) The encryption of wireless signals
d) The separation of wired and wireless networks
18. Which technique improves digital communication efficiency by dividing channels into time slots?
a) WEP
b) CDMA
c) TDMA
d) EAP
19. What is the range of Bluetooth 5 indoors?
a) 150 feet
b) 300 feet
c) 131 feet
d) 800 feet
20. Which technology uses frequency-hopping spread spectrum (FHSS)?
a) Wi-Fi
b) Bluetooth
c) WiMAX
d) DSL

Section 2: True or False Questions (20)


1. Data communication is the physical transfer of hardware devices.
2. Bandwidth is measured in bits per second (bps).
3. Centralized processing allows for more responsive user needs compared to decentralized processing.
4. The OSI model has five layers.
5. A star topology requires less cable than a bus topology.
6. Wi-Fi operates on the IEEE 802.11 standard.
7. TCP/IP is an industry-standard suite of communication protocols.
8. WiMAX is designed for wireless metropolitan area networks.
9. Bluetooth can create personal area networks (PANs).
10. Convergence refers to the integration of voice, video, and data.
11. A router operates at the Physical layer of the OSI model.
12. Static routes are manually configured.
13. Dynamic routing is ideal for smaller networks.
14. A mesh topology is highly reliable but costly to maintain.
15. Wireless networks are immune to interference.
16. TDMA divides each channel into six time slots.
17. Convergence requires high-speed technologies like Gigabit Ethernet.
18. Mobile networks operate on radio frequency (RF).
19. SSID stands for Service Set Identifier.
20. A hierarchical topology combines computers with different processing strengths.

Section 3: Fill in the Missing Word Questions (20)


1. Data communication is the ________ transfer of data from one location to another.
2. ________ is the loss of power in a signal as it travels from the sending device to the receiving device.
3. A ________ is a hardware device that connects sender and receiver devices in a network.
4. The OSI model consists of ________ layers.
5. A ________ topology connects nodes along a network segment without closing the ends.
6. ________ is a broadband wireless technology based on the IEEE 802.16 standards.
7. The client/server model involves software running on the ________ computer and communicating with
the server.
8. ________ is a wireless technology for transferring data over short distances.
9. A ________ network spans several cities, states, or even countries.
10. ________ refers to integrating voice, video, and data for decision-making.
11. A ________ is a hardware and software device that controls data transfer between a computer and a
peripheral device.
12. ________ is the process of deciding the best path for data packets.
13. ________ is a major disadvantage of wireless networks due to interference from other signals.
14. A ________ is a collection of binary digits sent from one computer to another over a network.
15. ________ is the amount of data transferred or processed in a specified time.
16. A ________ is a fixed transmitter serving radio cells in a mobile network.
17. ________ is a protocol that dynamically generates keys for wireless security.
18. ________ is a technique used to improve digital communication efficiency by transmitting multiple
encoded messages.
19. A ________ is a hardware device that allows several nodes to share one communication channel.
20. ________ is a broadband wireless technology allowing computers and devices to communicate over
short distances.

Answers
Multiple-Choice Questions
1. b
2. d
3. b
4. a
5. b
6. b
7. a
8. b
9. c
10. a
11. b
12. a
13. a
14. b
15. a
16. b
17. a
18. c
19. c
20. b
True or False Questions
1. False
2. True
3. False
4. False
5. False
6. True
7. True
8. True
9. True
10. True
11. False
12. True
13. False
14. True
15. False
16. True
17. True
18. True
19. True
20. True
Fill in the Missing Word Questions
1. electronic
2. Attenuation
3. Router
4. seven
5. Bus
6. WiMAX
7. local
8. Bluetooth
9. Wide area
10. Convergence
11. Controller
12. Routing
13. Noise
14. Packet
15. Throughput
16. Base station
17. EAP
18. CDMA
19. Multiplexer
20. Wi-Fi

You might also like