Chapter Three
Chapter Three
Chapter Three
Data Communication and Networks
Introduction
Network
A network is a collection of related entities. There are different types of networks, such as
telephone network, which is a collection of telephone systems interconnected with each other.
Telegraph network, television network, radio network and computer network are some of them.
Computer Networking
Computer networking refers to two or more connected computers that can share a resource such
as data, a printer, an internet connection, applications, or a combination of these. A computer
network is a set of cooperative, interconnected autonomous computers. If we simply interconnect
two or more computers with the help of a wire, they are not said to be networked. In order for
the communication to take place, there should be a kind of cooperation between the
communicating systems. Network hardware will provide the necessary interconnection and
network software will provide the necessary cooperation. Computer network is created when
several computers and terminal devices are connected together by data communication system.
Each computer in a network can have its own processing capabilities and can share computer
hardware, programs, and software and data files. In general, it is a collection of computers and
peripheral devices connected by communication links that allow the network components to
work together.
Importance of Networking
1. Resource sharing ( To share hardware such as the server, to share computer CPU, to
share databases, to share application programs and hard disk, Data/information,
Memory(storage), Files, Printers etc)
2. To undertake parallel processing
3. High reliability by having alternative sources of supply
4. Money saving
5. Increase system performance
6. Powerful communication medium among widely separated people
Types of signals
In communication system, data is transmitted from one point to another by means of
electrical signal. There are two types of signals that can travel over the various
transmission media.
1. Analog Signal: - Continuously varying electromagnetic waves that may be propagated
over a variety of media
E.g. Wire media, twisted pair and coaxial cable.
2. Digital Signals:
Normally, it comprises only two states. It uses separate ON/OFF pulses that create
a square rather than a continuous wave.
Are considered as sequence of voltage pulses that may be transmitted over a wire
medium.
Transmits data faster and more accurately than analog signals.
E.g., a constant positive voltage level may represent binary 1 and a constant negative
voltage level may represent binary 0.
Topologies
A topology describes the layout of the cables, computers and other network devices. It
describes the way in which the devices of the network are linked together. There are four
most common topologies: Bus, Ring, Star and Mesh.
1. The Bus Topology
In a bus topology, all computers are connected to a single cable.
The cable is terminated at its ends to avoid signal bouncing.
When a computer wants to send data to another computer, it places the data and
address of the recipient computer on the cable. Only the computer whose address
is included with the data accepts the data.
If one node fails, the rest of the network can continue to function normally.
It is easy to implement and with low cost.
Cable fault affects all workstations.
Advantages
Easy to implement
Low cost
Disadvantages
Limited cable length and workstation
Difficult to isolate network fault
Cable fault affects all workstations
2. The Star Topology
Each computer in a star topology is connected to a central device (hub) by a
separate cable.
When a computer wants to send data to another computer, it sends the data and
address of the recipient computer to the hub, which in turn, sends it to every
computer connected to it. Only the computer whose address is included with the
data accepts the data.
Failure of one computer does not affect the network.
Failure of the hub affects the network.
Advantage
Easy to add new workstations
Centralized control
Centralized network
Easy to modify
Disadvantages
Hubs are expensive
Hub failure, fails the network
3. The Ring Topology
Each computer is connected directly to two other computers in the network.
Data moves down a one-way path from one computer and if the next computer is the
recipient it accepts the data; otherwise it amplifies it and sends it to the next computer
down in the path
Any break disrupts the entire network and hence the physical ring topology is seldom
used.
No terminated end in this topology.
Failure of one computer can have an impact on the entire network.
Logically, a ring topology is a circular arrangement of computers where the signals from
one node travel around the ring in clockwise direction .Because the signals pass through
each computer, the failure of one computer or a break in a cable could bring the entire
network failure.
Today, the mesh topology is rarely used, and then only in a WAN environment and
only because the mesh topology is fault tolerant computers or network devices can
switch between these multiple, redundant connections if the need arises.
On the con side, the mesh topology is expensive and quickly becomes too complex.
Physical Media
Although it is possible to use several forms of wireless networking, such as radio and
infrared, most networks communicate via some sort of cable. In this section, we will look
at three types of cables:
Coaxial
Twisted-pair
Fiber-optics
1. Coaxial Cable
Coaxial cable (or coax) contains a centered conductor, made of copper, surrounded by a
plastic jacket, with a braided shield over the jacket. There are two types of coaxial cables:
Thick Ethernet cable or ThickNet. It is also called 10Base5. The 10 refers to the
data transfer speed, which is 10 Mbps, and the 5 refers to the maximum length of
a single cable, which is 500m.
Thin Ethernet cable or Thinnet. It is also called 10Base2. The 10 refers to the
data transfer speed, which is 10 Mbps, and the 2 refers to the maximum length of
a single cable, which is 185m (200m). ThinNet is connected to the computer
through BNC connectors.
With coaxial cable, the signal travels up and down the entire length of the wire. When the
signal reaches the end of the wire, it bounces back down the wire. This creates an echo.
These additional signals on the wire make communication impossible. To prevent this,
terminators are placed on each end of the wire to absorb the unwanted echo. One
terminator is also connected to a ground.
2. Twisted-Pair Cable
Twisted-pair cable consists of multiple, individually insulated wires that are twisted
together in pairs. There are two types of twisted pair cables:
1. Shielded twisted-pair (STP):-A metallic shield is placed around the twisted pairs.
2. Unshielded twisted-pair (UTP):-Cable with no outer shielding.
Note; - UTP is commonly used in 10BaseT, star-wired networks.
When electromagnetic signals are conducted on copper wires that are in close proximity
(such as inside a cable), some electromagnetic interference occurs. This interference is
called crosstalk. Twisting two wires together as a pair minimizes such interference and
provides some protection against interference from outside sources. This cable type is the
most common today. It is popular for several reasons:
It is cheaper than other types of cabling.
It is easy to work with.
3. Fiber-Optic Cable
Because fiber-optic cable transmits digital signals using light pulses, it is immune to EMI
(electromagnetic Interference). Light is carried on either a glass or a plastic core. Glass
can carry the signal a greater distance, but plastic costs less.
Fiber-optic cable is suited for data running large distances and without electronics
regenerating the signal or for an installation requiring high security. Fiber-optic is now
being used in such applications as gigabit Internet backbones. However, it is difficult to
install and is expensive.
3) The Repeater
A repeater amplifies (or repeats) network signals to extend the
maximum reach of a network. Repeaters receive network signals
on one port, amplify them, and repeat them out on the other port.
Repeaters can interconnect different media types but cannot
convert protocols.
4) The Hub
A hub is the central device in a star topology. Most
hubs are simple multiport repeaters. That is, they
receive a signal on one port and repeat it to all other
ports.
5) The Bridge
A bridge is a network device that logically separates a single network into two segments.
The primary use for a bridge is to keep traffic meant for stations on one segment on that
side of the bridge and not let that traffic pass to the other side. Bridges can improve
network performance because traffic is not propagated unnecessarily on all network
segments.
7) The Router
A router is a network device that connects multiple, often dissimilar, network segments
into an internet work. The router, once connected, can make intelligent decisions about
how best to get network data to its destination.
A router is more like a special-purpose computer than a simple electronic device. The
classic definition of a router is a device that reads the source and destination address of a
packet and forwards it based on the information it gathers about the network. Routers can
make intelligent decisions about the best way to forward packets.
Network Connectors
The type of connector you use depends on the type of network and the type of cable (copper
or fiber-optic).
D-type Connectors: - The first type of networking connector was the D-type
connector. A D-type connector is characterized by its shape. The Attachment Unit
Interface (AUI) connector is a D-type connector used to connect your computer to
Thick Net coaxial cable.
BNC Connectors: - Most commonly used with ThinNet coaxial cable, BNC
connectors are tube-shaped. A twist-lock mechanism prevents the cable from
disconnecting. You must push the cable's connector onto the connector on the NIC
and then twist the connector on the cable to lock it in place. BNC connectors are most
commonly found in 10Base2 Ethernet networks, as well as in ARCNet.
RJ Connectors: - RJ-45 connectors are most commonly found on both 10BaseT and
Token Ring networks, but they can be found on any network that uses four-pair, UTP
cable. An RJ-11 connector is smaller than an RJ-45 connector, and RJ-11 uses four
(or six) wires; the RJ-45 has eight wires housed in its case.
Media Access
With many stations on the same piece of network media, there has to be a way of vie for
time on the cable. This process is called media access, and two of the most popular
methods are discussed below.
Token passing – this media access method uses a special packet called a token. The first
computer turned on creates the token. It then passes the token on to the next computer.
The token passes around the network until a computer that has data to send takes the token
off the network, modifies it, and puts it back on the network along with the data it has to
send.
Each station between the sender and the receiver along the network reads the destination
address in the token. If the destination address does not match its own, the station simply
sends the package on its way.
When the destination station recognizes its address in the destination address of the token,
the NIC copies the data into the station's memory and modifies the token, indicating it has
received the data.
The token continues around the network until the original sender receives the token back
again. If the original sender has more data to send, the process repeats itself. If not, the
sender modifies the token to indicate that the token is "free" for anyone else to use.
With this method, there are no collisions (as in CSMA/CD networks) because everyone
has to have "permission" to transmit (via the token).
Internet
What is the Internet?
The Internet is a global connection of computers. These computers are connected via a
huge network of telecommunications links. The Internet allows you to access to a whole
resource of data and information stored at different sites (called hosts or servers) and
locations all around the world.
The communication links that interconnect each host computer use a common method of
transmission, known as TCP/IP, which stands for Transmission Control Protocol/Internet
Protocol.
Each computer connected to the Internet (by the way, it is always spelt with a capital I)
can act as a host. A host computer provides information for other people to access and
retrieve.
The Internet (also known as the Net) is a worldwide system of computer networks. A
network of networks where users of any one computer can access information from any
other computer provided that they have permission to access the information (e.g. having
the correct password).
The Internet is a public, co-operative and self-sustaining facility giving access to hundreds
of millions of users worldwide. Everything that you want to know about can usually be
found on the Internet.
To access the Internet a user must subscribe to an Internet Service Provider (ISP) that
allows the user to connect to the Internet via the ISP’s server, usually using a modem
connection. The ISP’s server is then connected to all the other computers on the Internet.
In Ethiopia users will use the Ethiopian Telecommunication ISP server.
Browser
Browser, which is a piece of software that acts as an interface between the user and the
inner-workings of the Internet, specifically the World Wide Web. Browsers are also
referred to as web clients, or Universal Clients, because in the client/server model, the
browser functions as the client program.
The MS-IE Environment: - The MS-IE acts on behalf of the user. It is a browser which
Contacts a web server and sends a request for information
Receives the information and then displays it on the user’s computer.
The MS-IE is a graphical based browser, which allows the user to see more of what the
WWW has to offer such as graphics, photographs and multimedia. It allows the user to
view images on their computer, “point-and-click” with a mouse to select hypertext links,
and uses drop-down menus and toolbar buttons to navigate and access resources on the
Internet.
Extension: to indicate the type of organization who has published the Website
.com International business/commercial
.org Non-commercial organization
.net Network and Internet specialist
.edu Educational Institution
.mil Military
.ws website
.tv television
.pro business (also .biz, .info)
You do not need to subscribe to an ISP, or even own a computer; all you need to do is have access
to a computer that is connected to the Internet to have an email address.
2) Web browsing
Internet browsing or ‘net surfing’, as it is often called, is the process of visiting different web
sites on the Internet hosted by various companies, organizations, educational institutions,
magazines, individuals, etc. The Internet contains a wealth of information that can help your
business. Armed with a good Internet browser, we can easily get around to the websites,
gathering competitive information, conduction market research, reading publications, and
staying in touch with what’s happening at business associations.
Example Browsers:
Internet Explorer Google chrome
Opera MS-Internet explorer
Mozilla Firefox
4) Search Engines
To find information on the Internet there are a number of Websites designed to help you find
other Websites containing the information. The user will typically specify a keyword(s) (e.g.
Ethiopia) and a list of the relevant Websites will be given that can then be accessed. These
Websites are known as Search Engines
Most popular search engines
http://www.google.com
http://www.bing.com
http://www.search.yahoo.com.
http://www.ask.com
Search engine information is collected and ranked by software programs (sometimes called
spiders).
FTP – file transfer protocol
Chat – online chatting (real-time communication)