Data Communication - Networks
Data Communication - Networks
Generally communication means sending information from one person to another. Data
communication can be broadly described as the transmission of data from one place to another
via transmission channels. Transmission channels are the different media that can be used to
move data.
Transmission media consists of materials or techniques capable of carrying signals from their
source to the destination computer or device. There are two types of transmission media; -
Physical transmission media and Wireless transmission media.
ii. Wireless transmission media - Send communications signals through air or space. These
include broadcast radio, cellular radio, microwaves, communications satellites and infrared.
Broadcast radio distributes radio signals through the air over long distances. Cellular radio is a
form of broadcast radio used widely for mobile communications. Microwaves are radio waves
that provide a high-speed signal transmission. A communications satellite is a space station
that receives microwave signals from an earth-based station, amplifies the signals and
broadcasts the signals back over a wide area to any number of earth-based stations. Infrared
(IR) sends signals using infrared light waves.
COMPUTER NETWORKS
A computer network is a connection of two or more computers that are linked in order to share
resources (such as printers, data, applications, etc.), exchange files, or allow electronic
1
communications. The computers on a network may be linked through cables, telephone lines,
radio waves, satellites, or infrared light beams.
Bandwidth is the amount of data that can be transferred from one point to another within a
network in a specific amount of time. It is measured in bits per second (bps). This can also be
referred to as Data transfer rate.
Networking of computers helps the network users to easily share resources such as data files
and applications from different locations.
To allow communication using e-mail, newsgroups, and video conferencing etc. from
different locations.
It is expensive to set-up a network since there is a need to buy devices such as routers,
switches, hubs, etc.
High technical skills and knowledge are required to set up an effective and efficient network.
Networks allows a large number of people to share resources therefore user’s files or
documents’ security would be always at risk.
Allows easy sharing of illegal or malicious information among users.
Computer networks can be categorized by their size and they are three main types of computer
networks; - Local Area Network (LAN), Wide Area Network (WAN) and Metropolitan Area
Network (MAN).
1. Local Area Network (LAN) - Is a group of computers connected to each other in a small
area such as building, office. LAN is used for connecting two or more personal computers
through a data transmission media such as twisted pair, coaxial cable, etc.Two popular types
of LANs are peer-to-peer and client/server.
Advantages of LAN
All computers can access the same services and resources (e.g. Printers, scanners,
internet, etc.)
It is less costly as it is built/set up with less expensive hardware such as hubs, network
adapters, and ethernet cables.
The data is transferred at an extremely faster rate in Local Area Network.
Local Area Network provides higher data security since the data transmission in within
the same area (eg. Office).
All computers can be easily controlled or monitored by the network administrator. (eg.
Changing passwords, monitoring internet use, etc.)
2
Disadvantages of LAN
There is a great risk of spreading of viruses easily between the computers that are part of
the network.
There may be slow processing of some activities in situations where more users access
the same resources at the same time (eg. a printer).
There may also be a slower access to external networks such as the internet.
In cases where the main server of the LAN breaks down, the network will not function.
2. Wide Area Network (WAN) – Is a network that extends over a large geographical area
(typical more than1 kilometer) such as states or countries.A Wide Area Network is not limited
to a single location, but it spans over a large geographical area through a telephone line, fibre
optic cable, microwave links or satellite links. It is widely used in the field of business,
government, and education. The internet is one of the biggest WAN in the world.
A Wide Area Network covers a large geographical area. E.g. Connecting branch offices
in different cities.
Data is centralized, therefore there is no need to buy back up servers.
Data transfer rate is higher in WAN since it has a high bandwidth.
Adding of new computers on the WAN is faster and easier hence costs are reduced. (All
that is required is a wireless adapter provided the device is within range of an access
point).
Security is compromised in WAN, anyone with a wireless enabled computer can access
the network if it can pick up the signal.
Needs a Firewall & antivirus software since data transferred through the internet can be
changed or hacked by unauthorized users.
Set up costs of the WAN network are high as it involves the purchasing of routers,
switches, etc.
Troubleshooting problems in a WAN is difficult since the network covers a large network
area.
NETWORK TOPOLOGIES
A network topology describes a network's layout and arrangement, the way in which the
computers and any other hardware (e.g.printers, scanners, etc.) known as nodes are all linked
together.
3
1. Linear/Bus topology
The type of network topology is where all the nodes of the network are connected to a central
line. All data transmitted between nodes goes through the central cable until it reaches the
computer or device it requires. The ends of the central line have terminators at its ends to prevent
signal bounce/loss which would cause data interference.
Advantages
Disadvantage
Only one route for data to take so performance will decrease when more data is
transmitted.
Entire network shuts down if there is a break in the main cable.
Terminators are required in both ends of the central cable to avoid loss of data signals.
Not suitable to be used as a stand-alone solution in a large building.
2. Ring topology
In a ring topology all the nodes are connected together in a circle form. Data is transmitted from
one node to another in a single direction until it reaches the computer or device it requires.
Advantages
4
Has the ability to work well under heavy loads since all data can only travel in one
direction hence the transmission of messages is simple and high rates can be achieved.
Every device has the opportunity to transmit.
There is no dependence or need of a central computer to manage the connectivity
between computers.
It is possible to create a very large network using this topology since it can work well
under heavy loads.
Disadvantages
If one node/workstation or line fails then data cannot continue to be transmitted between
all the rests of the nodes in the network, therefore the entire network will be down.
Moves, additions and changes of devices can affect the whole network.
Difficult to add new nodes into the system, requires the network to be disrupted.
3. Star topology
In the star network topology each node is connected directly to a central computer, hub or
switch. Data is sent to the central computer or device which then sends out data along every
cable to every computer or device (no checking is done to see where the data should be sent);
and it will be accepted by the computer or device it is assigned to.
Advantages
If one computer or device (other than the central one) fails or malfunction, the entire
network is not affected.
It is a more secure connection since data is sent directly between nodes.
Faults are easier to identify since a failure of a cable will only affect one node.
Easy to add new nodes without any disruption of the network.
Disadvantages
5
It is dependent upon a central computer/device; if it is down/fails to operate, the entire
network also breaks down.
It is more expensive to setup since it requires more cables.
NETWORKING HARDWARE
Networking hardware includes all computers peripherals, interface cards and other equipment
needed to perform data-processing and communication within the network. The following are
networking components;
File Servers
Modem
Workstations
Network Interface cards
Switches
Repeaters
Bridges
Routers
File Servers
A file server stands at the heart of most networks. It is a very fast computer with a large amount
of RAM and storage space along with a fast networking interface card. The network’s operating
system software resides on this computer along with the software application and data files that
need to be shared. The file server controls the communication of information between the nodes
on a network.
Modem
A modem (modulator/demodulator) is a device that connects a computer to a telephone line. It
converts the digital signal produced by the computer into analogue signal which can be
transmitted along normal voice-carrying telephone lines and it receives analogue data
signalsfrom the telephone line and converts them back into digital signals for the terminal.
Workstation
All of the user computers connected to a network are called workstation. A typical workstation
is a computer that is configured with a network interface card, networking software and
appropriate cables.
6
Controls the flow of data in a network.
The ability to connect to a network.
Allows computers to be recognized in a network.
Switch/Hub
This is also referred to as a concentrator; is a device that provides a central connection point
for cables from workstation, servers, and peripherals.
Switches also memorize addressing of computers and send the information to the correct
location directly.
Repeater
A device that boost the signal strength as it passes along the network cable.
Router
Receives data and forwards it to the correct location.
Links two different networks of the same protocol.
Translates network address.
7
DATA TRANSMISSION CHANNELS
The direction in which information can flow over a transmission path is determined by the
properties of both the transmitting and the receiving devices. There are three basic types of data
transmission channels; Simplex, Half-Duplex and Full Duplex Communication.
(a) In Simplex mode, the communication channel is used to transmit datasignals in one direction
only. The receiver, receives the signals from the transmitting device. The simplex mode of
transmission is rarely used for data communication. Examples include radio and television
transmission, etc.
(b) In Half-duplex mode, the communication channel is used to transmit data signals in both
directions, but only in one direction at a time. This requires the receiving and transmitting
devices to switch between send and receive modes after each transmission.Example include a
walkie talkie.
(c) In Full-duplex mode, the communication channel is used in both directions at the same time.
Typical example of this mode of transmission is the telephone/cellular phone in which both
parties talk to each other at the same time.
8
NETWORK PROTOCOLS
These are rules that governs the communications between computers on a network. Protocols
are used to ensure the proper transfer of data between the devices. Protocols specify; the format
of data and the signal to access data. These rules include guidelines that regulate the following
characteristics of a network: access method, allowed physical topologies, types of cabling, and
speed of data transfer.
Functions of Protocols
A Gateway translates the protocols between computers so that the different computers are able
to communicate with each other. Before sending data a computer performs what is called
Handshake. The handshake is the exchange of signals between devices to establish their
readiness to send and receive data, for example the transmission of data from a computer to a
printer. Handshaking is one of the methods of ensuring that both the sender and receiver are
ready before transmission begins.
TCP/IP can be defined as a set of rules that defines how computers interact or communicate with
each other to transfer data from computer to another over the internet. TCP/IP is a set of
working practices which allows all internet users and providers to communicate with each other
regardless of their equipment type. TCP/IP specifies how individuals’ signals are sent over the
Internet. TCP/IP enables hardware and operating systems software from different computers to
communicate.
9
IP – is responsible for moving packet of data from node to node. IP forward each packet
based on a four byte destination address (the IP number). The Internet authorities assign
ranges of numbers to different organizations. The organizations assign groups of their
numbers to departments. IP operates on gateway machines that move data from department
to organization’s region and then around the world.
TCP – is responsible for verifying the correct delivery of data from server client to server.
Data can be lost in the intermediate network. TCP adds support to detect errors or data lost
and trigger re-transmission until the data is correctly and completely received.
Sockets –is a package of subroutines that provide access to TCP/IP on most systems.
This are set of rules that controls how data travels between a server and a client. In order to
find, retrieve, display and send hypertext and hypermedia, you need a browser. HTTP is also
used as a generic protocol for communication between user agents and proxies/gateways to other
Internet systems, including those supported by the SMTP (Simple Mail Transfer Protocol), FTP
(File Transfer protocol) protocols. In this way, HTTP allows basic hypermedia access to
resources available from diverse applications.
Client – A program that establishes connections for the purpose of sending requests.
Server – An application program that accepts connections in order to service requests by sending
back responses. Any given program may be capable of being both a client and a server; the use
of these terms refers only to the role being performed by the program for a particular connection,
rather than the program’s capabilities in general.
Allows a user to send a message causing a copy of a file to be transferred between computers. It
provides the facilities for transferring to and from remote computer systems. Usually the user
transferring a file needs authority to login and access files on the remote system. The file can be
saved by the user and the data read. The file transfer controls the message between computers,
the sending of the file copy in sections (Blocks) and checks the data received for errors. To
make the transfer faster, the files provided for file transfer are usually compressed and are
referred to as an archive.
10