Computer Network & Data Communication
Computer Network & Data Communication
Today computer is available in many offices and homes and therefore there is a need to share
data and programs among various computers. With the advancement of data communication
facilities the communication between computers has increased and thus it has extended the
power of computer beyond the computer room. Now a user sitting at one place can communicate
with computers of any remote site through communication channel. The aim of this lesson is to
introduce you the various aspects of computer network and data communication.
Learning objectives
It is expected that after going through this lesson, you would be able to
- Understand basics of the various types network technologies in the area of computers,
Local Area Network (LAN) and different components of computer network
- explain the features and the use of computer network and data communication
- describe the OSI model and its 7 layers
- Give some network security problems and eventual solutions
Contents
I. BASIC NETWORKING CONCEPTS ................................................................................................. 2
II. CLASSIFICATION OF COMPUTER NETWORK ............................................................................ 4
III. NETWORK TOPOLOGIES ............................................................................................................. 6
IV. COMMUNICATION OVER NETWORK ..................................................................................... 11
V. TRANSMISSION MEDIA ................................................................................................................. 13
VI. COMMUNICATION PROTOCOLS ............................................................................................. 17
VII. LAN TECHNOLOGIES ................................................................................................................. 19
VIII. NETWORK ADRESSING ............................................................................................................. 22
IX. NETWORK SECURITY ................................................................................................................ 23
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 1 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
Networking is the concept of sharing resources and services. A network is a set of interconnected
objects (roads, computers, …) with something to share. A computer network is therefore a group of
interconnected computer systems sharing resources and interacting using a shared communications
link. All networks must have the following:
Sharing information: networks allow users to communicate with each other in various ways:
email, chat, forums, etc.
Sharing resources: Certain computer resources, such as printers or hard drives, can be set up
so that network users can share them. Sharing hard drives involves also sharing of files and
folders. A network can be used to share an Internet connection.
Sharing applications: several users can work together on a single business application.
Flexible Access: Networks allow their users to access files from computers throughout the
network.
Reducing of cost: Instead of buying a printer for each computer of a big network, a single
printer can be shared, and then cost is considerably reduced
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 2 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
Slow service: As more users log onto the network and request files, send things to be printed
and open more software applications, the network can start to slow down.
Cost: Building a network isn't cheap.
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 3 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
analog signal used on phone lines (modulation) and then converting it back once received on
the other end (demodulation).
Proxy: A proxy is a computer server or software program that is part of the gateway server or
another computer that separates a local network from outside networks. A proxy server will
cache all pages accessed through the network allowing users who may wish to visit that same
page to load it faster and reduce the networks bandwidth.
Computer networks can be classify in different ways: according to the geographical area covered, the
strategy used or type of connection
According to the type of connection, there exist two types of connections. Wired connection and
wireless connection
A wired network is when you physically connect your computer or other compatible device to your
Super Hub with an Ethernet cable. The best thing about a wired connection is the reliability and speed
it gives you (wired is faster than wireless). This makes it ideal for things that use a lot of bandwidth,
like playing online games on your Xbox.
A wireless network, as its name would suggest, is a network of computers and computer peripherals
that are connected to each other without wires.
Advantages
It is easier to add or move workstations.
It is easier to provide connectivity in areas where it is difficult to lay cable.
Installation is fast and easy, and it can eliminate the need to pull cable through walls and
ceilings.
Access to the network can be from anywhere within range of an access point.
Disadvantages
As the number of computers using the network increases, the data transfer rate to each
computer will decrease accordingly.
As standards change, it may be necessary to replace wireless cards and/or access points.
Security is more difficult to guarantee and requires configuration.
Devices will only operate at a limited distance from an access point.
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 4 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
According to the geographical area covered, there exist three main types of network: LAN, MAN and
WAN
A LAN is a computer network that spans only a small geographical area such as an office, home
building or closed buildings. A LAN is useful to share resources like files, printers, games and other
application. The infrastructure in a LAN is private. The distance between computers in a LAN cannot
be more than 15 Km. Ex: A school network
A MAN is a network of computers spread over a city or closed cities. It may be a single network such
as a cable television network, or it may be many LANS connected together. A MAN may be operated
by one organization (with several offices in one city) or be shared and used by several organizations in
the same city. It can be either a private network or a public network. Ex: A network of all the agencies
of CAMCCUL in Bamenda
A WAN is a system of interconnecting many computer over a large geographical area such as states,
countries or even the whole world. These kind of networks use telephone lines, satellite link and other
long-range communication technologies to connect. Such networks are design to serve an area of
hundreds kilometres such as national telephone network. For instance a company like Express Union
with agencies at Fundong, Bamenda, Douala, Bafoussam, Yaoundé use a WAN to connect all its
agencies. Although a WAN may be owned or rented by private business, it is usually a public network,
designed to connect LANs or MANs together. The most known and the largest WAN is Internet.
According to the strategy used there exist two main types of network: Client/Server network and Peer
to Peer (P2P) network:
Computers that perform a service on behalf of other network devices are called servers. There are
several types of servers. For example, a computer that provides other network nodes with access to
network storage devices is called a file server. Print servers provide other network nodes with access
to network printers. Computers that use the services of a server are called clients. Networks in which
servers control access to network storage and other network resources are called client/server
networks. In a Client/server network, the role of the server is to provide services demanded by client
computers
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 5 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
Computers that perform similar functions on a network are called peers. Networks in which no single,
centralized computer controls network functions are called peer-to-peer networks. The idea of peer-to-
peer networking is that each computer on the network can be both a server and a client. Since any
computer on the network can share a resource for other to use. Users can configure their computers so
that they can share directories or printers with other users on the network. All computers are considered
to have equal, or peer, status.
· Potentially, all resources can be made available over a · Security can be difficult to
network. control
· Processing power can be localized to the point of need.
Network topology is the layout pattern of interconnections of the various elements (links, nodes, etc.)
of a computer network. Network topologies may be physical or logical. Physical topology means the
physical design of a network including the devices, location and cable installation. Logical topology
refers to how data is actually transferred in a network as opposed to its physical design. Topology can
be considered as a virtual shape or structure of a network, for it not correspond to the actual physical
design of the devices on the computer network. The computers on a home network can be arranged in a
circle but it does not necessarily mean that it represents a ring topology.
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 6 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
the help of interface connectors. This central cable is the backbone of the network and is known as Bus.
Every workstation communicates with the other device through this Bus. A signal from the source is
broadcasted and it travels to all workstations connected to bus cable. Although the message is
broadcasted but only the intended recipient, whose MAC address or IP address matches, accepts it. A
terminator is added at ends of the central cable, to prevent bouncing of signals. A barrel connector can
be used to extend it.
1) There is a limit on central cable length and number of nodes that can be connected.
2) Dependency on central cable in this topology has its disadvantages. If the main cable (i.e. bus)
encounters some problem, whole network breaks down.
3) It is difficult to detect and troubleshoot fault at individual station.
4) Maintenance costs can get higher with time.
5) Efficiency of Bus network reduces, as the number of devices connected to it increases.
6) It is not suitable for networks with heavy traffic.
7) Security is very low because all the computers receive the sent signal from the source.
1) This type of network topology is very organized. Each node gets to send the data when it
receives an empty token. This helps to reduces chances of collision.
2) Even when the load on the network increases, its performance is better than that of Bus
topology.
3) There is no need for network server to control the connectivity between workstations.
4) Additional components do not affect the performance of network.
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 7 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
1) Each packet of data must pass through all the computers between source and destination. This
makes it slower than Star topology.
2) If one workstation or port goes down, the entire network gets affected.
3) Network is highly dependent on the wire which connects different components.
1) As compared to Bus topology it gives far much better performance, signals don’t necessarily get
transmitted to all the workstations.
2) Easy to connect new nodes or devices. In star topology nodes can be added or removed easily
without affecting rest of the network.
3) Centralized management. It helps in monitoring the network.
4) Failure of one node or link doesn’t affect the rest of network. At the same time it’s easy to detect
the failure and troubleshoot it.
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 8 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
1. Because of its basic structure, tree topology, relies heavily on the main bus cable, if it breaks whole
network is crippled.
2. As more and more nodes and segments are added, the maintenance becomes difficult.
3. Scalability of the network depends on the type of cable used.
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 9 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
1) Complexity of Design: It’s not easy to design this type of architecture and it’s a tough job for
designers. Configuration and installation process needs to be very efficient.
2) Costly Hub: The hubs used to connect two distinct networks, are very expensive. These hubs are
different from usual hubs as they need to be intelligent enough to work with different
architectures and should be function even if a part of network is down.
3) Costly Infrastructure: As hybrid architectures are usually larger in scale, they require a lot of
cables; cooling systems, sophisticate network devices, etc.
Ethernet uses CSMA/CD to manage media access, as defined in the IEEE 802.3 specification. Devices
that have data to transmit listen for an opening on the line before transmitting (Carrier Sense) and
when a device detects an opening, it transmits its data. However, several devices may simultaneously
sense that the line is clear and they may all transmit at the same time. If this happens, the data packets
collide and the data is lost. This is called a collision.
Using the CSMA/CD protocol, the devices will each detect that a collision has occurred (collision
detection) and each of them will wait a random amount of time before retransmitting. The likelihood of
two or more devices randomly selecting the same delay is almost zero, so retransmission is likely to be
successful.
With CSMA/CA, a device listens for an opportunity to transmit its data in a similar fashion to
CSMA/CD. However, when a device senses an opening, it first transmits a signal notifying other
devices that it is transmitting before actually sending the data. This means data packets will never
collide, although warning packets might. Unfortunately, CSMA/CA creates a significant overhead as it
adds unnecessary traffic to the network, slowing everything down. CSMA/CA was commonly used by
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 10 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
older AppleTalk networks, but nowadays most Apple systems can use Ethernet hardware and use of
CSMA/CA has declined. One area where CSMA/CA continues to be used is in wireless networks.
c) Token Passing
In CSMA/CD and CSMA/CA the chances of collisions are there. As the number of hosts in the
network increases, the chances of collisions also will become more. In token passing, when a host want
to transmit data, it should hold the token, which is an empty packet. The token is circling the network
in a very high speed. If any workstation wants to send data, it should wait for the token. When the
token has reached the workstation, the workstation can take the token from the network, fill it with
data, mark the token as being used and place the token back to the network.
Data communication is the exchange of data between two devices using some form of wired or
wireless transmission medium. It includes the transfer of data, the method of transfer and the
preservation of data during the transfer process.
Delivery: The system must deliver data to the correct or the intended destination.
Accuracy: The system must deliver data accurately (error-free).
Timeliness: The system must deliver data in a timely manner without enough time lags.
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 11 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
Data transmission mode refers to the direction of signal flow between two linked devices. There are
three types of transmission modes—simplex, half-duplex and full-duplex
1) Simplex: The information flows in one direction across the circuit, with no capability to
support response in the other direction.
2) Half-duplex: In half-duplex mode, each communicating device can receive and transmit
information, but not at the same time.
3) Full-duplex: allows both communicating devices to transmit and receive data
simultaneously. A full-duplex mode can be compared to a two-way road with traffic flowing
in both directions.
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 12 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
V. TRANSMISSION MEDIA
A transmission medium (plural transmission media) refers to the physical media through which
communication signals (data and information) can be transmitted from one point to another media.
There are two categories of transmission media used in computer communications:
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 13 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
a) Twisted-Pair Wiring
Twisted-pair wiring refers to a type of cable composed of four (or more) copper wires twisted around
each other within a plastic sheath. The wires are twisted to reduce outside electrical interference. The
RJ-45 connectors on twisted-pair cables resemble large telephone connectors. Twisted-pair cables
come in two varieties: Shielded Twisted Pair (STP) and unshielded Twisted Pair (UTP).
→ Unshielded twisted pair (UTP) UTP cable is the most common type of telecommunication
medium in use today and is generally the best option for school networks. It is most suited for
both data and voice transmission and hence is commonly used in telephone systems. The cable
has four pairs of wire inside the jacket. An UTP cost less than STP easily available. There are
five levels of data cabling
- Cat 1: These are used in telephone lines and low speed data cable.
- Cat 2: These cables can support up to 4 mps implementation.
- Cat 3: These cable supports up to 16 mps and are mostly used in 10 mps.
- Cat 4: These are used for large distance and high speed. It can support 20mps.
- Cat 5: This is the highest rating for UTP cable and can support up to 100mps.
→ A disadvantage of UTP is that it may be susceptible to radio and electrical frequency
interference. Shielded twisted pair (STP) is suitable for environments with electrical
interference; however, the extra shielding can make the cables quite bulky. Shielded twisted
pair is often used on networks using Token Ring topology.
b) Coaxial Cable
Coaxial cables have a single central conductor, which is made up of solid wire (usually copper). This
conductor is surrounded by an insulator over which a sleeve of metal mesh is woven to block any
outside interference. This metal mesh is again shielded by an outer covering of a thick material (usually
PVC) known as jacket. Coaxial cable is very robust and is commonly used in Cable TV network. As
compared to twisted pairs, it also offers higher bandwidth. A coaxial cable is capable of transmitting
data at a rate of 10 Mbps.
c) Fiber-Optic Cable
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 14 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
Fiber optic (or optical fiber) refers to the technology associated with the transmission of information
as light impulses along a glass wire or fiber. Optical fiber cable can transmit data over long distances
with little loss in data integrity. In addition, because data are transferred as a pulse of light, optical fiber
is not subject to interference. Fiber optic cable has the ability to transmit signals over much longer
distances than coaxial and twisted pair. It also has the capability to carry information at vastly greater
speeds. This capacity broadens communication possibilities to include services such as video
conferencing and interactive services. however, it is more difficult to install and modify. 10BaseF
refers to the specifications for fiber optic cable carrying Ethernet signals.
b) Microwave Transmission
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 15 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
data over long distances. Microwave communication uses parabolic antennas (satellite TV dish
antennas) that are mounted on the tower, which could be tens of kilometers away, but in line of sight.
Due to long distances, repeaters are used at regular intervals in between the transmitter and the receiver
to boost the signals
Infrared frequencies are just below the visible light spectrum. These are the high-
frequency waves used for short-range communication. The waves are cheap,
directional and can be easily built; however, the waves do not pass through solid
objects. Infrared waves are used in TV remotes, garage doors and wireless
speakers. Computer machines in an office can easily be connected to a wireless
LAN using infrared waves
d) Satellite Transmission
e) Bluetooth transmission
f) Wi-Fi transmission
The term Wi-Fi, which stands for Wireless Fidelity is widely used for creating wireless LANs and also
for providing wireless Internet access. To create wireless LAN, the devices in the network such as
computer, laptop and PDA should be equipped with wireless network interface card (NIC) to send and
receive Wi-Fi signals. A WI-Fi-enabled device should be within a specific range (i.e. up to 50 m) from
the network to connect.
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 16 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
A communication protocol is a set of rules that coordinates the exchange of information. If one
computer is sending information to another and they both follow the same protocol, the message gets
through; regardless of what types of machines they are and on what operating systems they are running.
As long as the machines have software that can manage the protocol, communication is possible.
Syntax: Syntax refers to the structure or format of the data, meaning the order in which they are
presented.
Semantics: Semantics refers to the meaning of each section of bits. How is a particular pattern
to be interpreted, and what action is to be taken based on that interpretation.
Timing: Timing refers to two characteristics: when data should be sent and how fast they can
be sent.
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 17 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
The seven layers of the OSI reference model can be divided into two categories:
Upper Layers: The upper layers of the OSI model consist of the application, presentation and
session layers. Primarily, these layers deal with application issues and are implemented only in
the software.
Lower Layers: The lower layers of the OSI model comprise the transport, network, data link,
and physical layers. These layers handle the data transport issues. The physical layer and data
link layer are implemented in both hardware and software. The network and transport are
generally implemented only in software.
This layer conveys the bit stream - electrical impulse, light or radio signal -- through the
network at the electrical and mechanical level. It provides the hardware means of
Physical sending and receiving data on a carrier, including defining cables, cards and physical
(Layer 1) aspects
Protocols: Fast Ethernet, ATM Data Unit: Bit
Device: Hubs, Repeaters, Cables and Connectors
Data Link Physical addressing, Provides low-level error detection and correction. For example if a
(Layer 2) packet is corrupted this layer is responsible for retransmitting the packet.
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 18 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
This layer provides switching and routing technologies, creating logical paths, known as
virtual circuits, for transmitting data from node to node. Routing and forwarding are
Network functions of this layer, as well as addressing, internetworking, error handling,
(Layer 3) congestion control and packet sequencing.
Protocols: IPv4, IPV6, IPX, OSPF, NWlink, NetBEUI, ICMP, ARP, RARP
Data Unit: Packet, Datagram
This layer provides transparent transfer of data between end systems, or hosts, and is
responsible for end-to-end error recovery and flow control. It ensures complete data
Transport
transfer.
(Layer 4)
Protocols: TCP, SPX and UDP
Device: Router, gateway Data Unit: Segments
This layer establishes, manages and terminates connections between applications. The
session layer sets up, coordinates, and terminates conversations, exchanges, and
Session
dialogues between the applications at each end. It deals with session and connection
(Layer 5)
coordination.
Protocols: NetBIOS Device: gateway Data Unit: data
This layer works to transform data into the form that the application layer can accept.
Presentation This layer formats and encrypts data to be sent across a network, providing freedom
(Layer 6) from compatibility problems. It is also called the syntax layer.
Protocol: SSL, WEP, WPA, Kerberos Device: Gateway
This layer supports application and end-user processes. Communication partners are
identified, quality of service is identified, user authentication and privacy are
considered, and any constraints on data syntax are identified. Everything at this layer is
Application application-specific. This layer provides application services for file transfers, e-mail,
(Layer 7) and other network software services.
Protocol: DHCP, DNS, FTP, HTTP, IMAP4, NNTP, POP3, SMTP, SNMP, SSH,
TELNET and NTP
Device: PC Data Unit: Data
Each computer in a LAN can effectively send and receive any information addressed to it. This
information is in the form of data 'packets'. The standards followed to regularize the transmission of
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 19 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
packets, are called LAN standards. There are many LAN standards as Ethernet, Token Ring , FDDI etc.
Usually LAN standards differ due to their media access technology and the physical transmission
medium.
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 20 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
b) Local Talk
Local Talk is a network protocol that was developed by Apple Computer, Inc. for Macintosh
computers. The method used by Local Talk is CSMA/CA. The Local Talk protocol allows for linear
bus, star, or tree topologies using twisted pair cable. A primary disadvantage of Local Talk is speed.
Its speed of transmission is only 230 Kbps.
c) Token Ring
The Token Ring protocol was developed by IBM in the mid-1980s. The access method used involves
token-passing. The Token Ring protocol requires a star-wired ring using twisted pair or fiber optic
cable. It can operate at transmission speeds of 4 Mbps or 16 Mbps. Due to the increasing popularity of
Ethernet, the use of Token Ring in school environments has decreased.
d) FDDI
e) ATM
Asynchronous Transfer Mode (ATM) is a network protocol that transmits data at a speed of 155 Mbps
and higher. ATM works by transmitting all data in small packets of a fixed size; whereas, other
protocols transfer variable length packets. ATM supports a variety of media such as video, CD-quality
audio, and imaging. ATM employs a star topology, which can work with fiber optic as well as twisted
pair cable.
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 21 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
It is sometimes useful to view the values in their binary form. 140.179.220.200 becomes
10001100.10110011.11011100.11001000
Every IP address consists of two parts, one identifying the network and one identifying the node. The
Class of the address and the subnet mask determine which part belongs to the network address and
which part belongs to the node address.
The Internet community originally defined five address classes to accommodate networks of varying
sizes. Microsoft TCP/IP supports class A, B, and C addresses assigned to hosts. The class of address
defines which bits are used for the network ID and which bits are used for the host ID. It also defines
the possible number of networks and the number of hosts per network.
Class 1st Octet 1st Octet Network/Host Default Subnet Number of Hosts per Network
Decimal High ID Mask Networks (Usable Addresses)
Range Order (N=Network,
Bits H=Host)
A 1 – 126* 0 N.H.H.H 255.0.0.0 126 (27 – 2) 16,777,214 (224 – 2)
B 128 – 191 10 N.N.H.H 255.255.0.0 16,382 (214 – 2) 65,534 (216 – 2)
C 192 – 223 110 N.N.N.H 255.255.255.0 2,097,150 (221 – 2) 254 (28 – 2)
D 224 – 239 1110 Reserved for Multicasting
E 240 – 254 1111 Experimental; used for research
Note:
→ Class A addresses 127.0.0.0 to 127.255.255.255 cannot be used and is reserved for loopback
and diagnostic functions.
→ Class D addresses are reserved for IP multicast addresses. The four high-order bits in a class D
address are always set to binary 1110. The remaining bits are for the address that interested hosts
recognize.
→ Class E is an experimental address that is reserved for future use. The high-order bits in a class E
address are set to 1111.
→ All bits within the network ID cannot be set to 1. All 1's in the network ID are reserved for use
as an IP broadcast address.
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 22 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
→ All bits within the network ID cannot be set to 0. All 0's in the network ID are used to denote a
specific host on the local network and are not routed.
Network security consists of the provisions and policies adopted by a network administrator to
prevent and monitor unauthorized access, misuse, modification, or denial of a
computer network and network-accessible resources.
1. Secrecy: This is also called confidentiality, and has to do with keeping information out of the
hands of unauthorized users.
2. Authentication: this deal with determining whom you are talking to before revealing sensitive
information or entering into a business deal.
3. Nonrepudiation: This deals with signatures: How does amazon.ca prove that Kartik indeed
placed an order for a book, which Kartik claims he never placed?
4. Integrity of service: How does one ensure that the message received was really the one sent, and
not something that a malicious adversary modified in transit or concocted?
a) Passive Attacks: These attacks are in the nature of eavesdropping on, or monitoring of,
transmissions. The goal of the opponent is to obtain information that is being transmitted. Passive
attacks are very difficult to detect since they do not involve the alteration of the data. Two types
of passive attacks are:
release of message contents where an eavesdropper tries to learn the contents of what is being
transmitted. This can be prevented by encryption
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 23 of 24
Topic: Computer Network & Data Communication By DZEUGANG Placide
traffic analysis: where the opponent tries to observe the pattern, frequency and length of
messages being exchanged which could be used in guessing the nature of the communication
that is taking place.
b) Active Attacks: Active attacks involve some modification of the data stream or the creation of a
false stream. It is difficult to prevent active attacks absolutely because to do so would require
physical protection of all communications facilities and paths at all times. Instead, the goal is to
detect them and to recover from any disruption or delays caused by them.
a) Graphic Interchange Format (GIF): This is a widely used compression format that is used for
storing and transferring graphic images in relatively small files over computer network such as
Internet
b) Joint Picture Expert Group (JPEG): This is a popular file compression format for storing and
transferring colour photograph and high quality images in relatively small files over computer
network such as Internet
c) Motion Picture Expert Group (MPEG): This is a standard file compression format for storing
and transferring digital audio and video (moving images) in relatively small files over computer
network
d) Huffman coding: This is a lossless compression technique in which the characters in a data file
are converted to a binary code, where the most common characters in the file have the shortest
binary code, and the least common have the longest.
e) Run-length encoding: This a compression technique that is designed for compressing, long,
repetitive character strings in a piece of text, as well as compressing byte of a monochrome
image file.
An important characteristic feature in any coding scheme is the compression ratio. It is the ratio of a
compressed file to the original uncompressed file. There are two basic form of data compression:
lossless compression and lossy compression.
- Lossless compression is the form of compression in which the original data can be restores
exactly.(ex: zip)
- Lossy compression is the form of compression in which the original data cannot be restored
exactly due to loss of some of its elements (ex: mp3)
Data encryption refers to mathematical calculations and algorithmic schemes that transform plaintext
into cyphertext, a form that is non-readable to unauthorized parties. The recipient of an encrypted
message uses a key which triggers the algorithm mechanism to decrypt the data, transforming it to the
original plaintext version.
Visit www.dzplacide.overblog.com to download more notes in computer science & ICT Page 24 of 24