Your SlideShare is downloading. ×
La3 ict-topic-3-computer-networks
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

La3 ict-topic-3-computer-networks

1,531
views

Published on

Published in: Technology, Business

0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,531
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
31
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.1LESSON 1INTRODUCTION TO COMPUTER NETWORKS ANDCOMMUNICATIONSCOMPUTER NETWORKA computer network is a system of interconnected computers and peripheraldevices. For example, it may connect computers, printers, scanners andcameras.
  • 2. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.2Using hardware and software, these interconnected computing devices cancommunicate with each other through defined rules of data communications.In a network, computers can exchange and share information and resources.A computer network may operate on wired connections or wirelessconnections.When two or more networks are linked or connected and are able tocommunicate with one another using suitable hardware and software, it iscalled an internetwork.
  • 3. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.3COMMUNICATIONSCommunications is about thetransfer of information from asender, across a distance, to areceiver.Using electricity, radio waves orlight, information and data in theform of codes are transmittedthrough a physical medium such aswire, cable, or even the atmosphere.The information that is transmitted(sent) can be text, voice, sound,video, graphics and images, or acombination of all these, which wecall multimedia.We transmit information or data byusing two types of signals, namelyanalog and digital.Computers communicate with digital signals. The older forms ofcommunications technology, such as telephones and radios, use analogsignals.
  • 4. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.4Therefore, in order to makecommunications possible fromcomputers, across telephonesand radios and back to computersand other digital devices again,there must be a signal translator,which we call a modem.The modem, which is short formodulator or demodulator,converts digital signals intoanalog and back again intodigital signals for information tomove across the telephone line.CONNECTIONS FOR NETWORKINGCommunications among computingdevices in a network can onlyhappen through defined rules ofcommunications and connections. Ingeneral, for communications in anetwork to be possible, there mustbe:a physical medium to allowdata to travel across it fromdevice to devicea set of rules called protocolsto ensure that interconnectedcomputing devices have thesame standards for exchangeof information to occursmoothly.a system application formanaging network informationflow to ensure that data transmission sent from one device isreceived by the intended receiver.If any of these levels of connectivityis missing, communications fornetworking will not be possible.For example, if the physical mediumis cut off, there will be nocommunications.
  • 5. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.5If protocol between interconnecteddevices are not the same, datatransmission will not be understoodbetween devices. If there is nonetwork management applicationavailable, there will be no means ofensuring that information from onedevice will be sent to the correctreceiving device.ProtocolOften simply referred to as a protocol, a communications protocol is a set ofrules or standards designed so that computers can exchange informationwith a minimal errors.
  • 6. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.6LESSON 2COMPONENTS OF COMMUNICATIONSINTRODUCTIONIn order for a network to properly operate, two categories of networkcommunications components are needed; Hardware and Software .Computers, hub, switch, router,network interface cards and bothwired and wireless communicationsmedia fall under the Hardwarecategory.Operating systems and applications fallunder the Software category.
  • 7. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.7NETWORK COMMUNICATION CHANNELSSignals which carry informationin a communications systemtravel through a physicalmedium.This physical medium is calleda communications channel, or atother times a communicationslink, a communications line, ora communications medium.Some common types of networkcommunications channels arethe:twisted-pair wirecoaxial cablefiber-optic cablesatelite systemswireless systems (namely using radiowaves, microwaves andinfrared)Communications channels provide the most basic levelof connectivity medium for a network.
  • 8. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.8NETWORK INTERFACE CARDS AND NETWORKINGDEVICESThe Network Interface Card or NIC is one of the most importantcommunications devices for a PC.The NIC providesconnectionbetween thecomputer and thenetwork scommunicationsmedia.This connection is necessary because the NIC functions as a data conversiondevice to move data from the PC s system to the network medium and viceversa.The Network Interface Card also supplies the basic addressing system usedto get data from PC to PC across a network.The other hardware component that is required for communications to workon a network is the networking device,such as the hub, switch, router andeven the modem.The function of these devices isgenerally to control the flow of data ona network.
  • 9. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.9NETWORK SOFTWAREHow do computers communicate on a network?Once we have got the necessary hardware set up for a network, we willneed to have suitable software on the network computers that would beable to provide some basic functions, such as connecting toother computers on the network, sharing resources andfiles and providing for network security for users who areonline.In general, a network software must be able to handle networking protocolsand connections within the network and with other networks. Mostimportantly, it should also provide file systems functions to organise diskspace on the network computers for sharing purposes.Since most computer networks are connected to the Internet, a networksoftware must have some form of management and security services toprotect the network as well as computers on the network, fromunauthorised access.
  • 10. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.10LESSON 3APPLICATION SOFTWARE: ADVANCED FEATURES OFPRESENTATION SOFTWARENetworking and communications technology is fast changing the way peopleview society and how we plan our daily social activities.Through networking technology alone, many today arefinding friends online, visiting a library in anothercountry. Some people are able to go to the banksafter they are closed, as well as getting the latestdevelopment in news from within and outside thecountry.Mobile communications today is also based on thenetworking technology. Surfing the internet is not onlylimited to the desktop computer users but also thosewho have mobile phones with wireless technology. Atpresent there are more than 7 million such usersacross the world.The internet has helped science and medical researchprogress further as doctors and researchers fromanywhere in the world can contribute and cooperate inany problem brought to their attention. Technologicalsolutions can be discovered quickly as individualscome forward to offer their help through the internet.Homemakers, students, teachers, business people,and almost anyone with access to networkedcomputer go online and continue their path of lifelongeducation anywhere, anytime.Organisations and individuals can make connectionsand establish communications within seconds withpeople nearby or overseas. Online communities can beformed and important issues and opinions to difficultproblems can be discussed without a threateningenvironment.All these are now possible because of networks and communicationstechnology.
  • 11. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.11IMPORTANCE OF NETWORKS ANDCOMMUNICATIONSInformation is now made easy with the availability of networkcommunications.In a clinic for example, network communicationsplays an important part in keeping patientsdatabase for easy retrieval. Unlike in conventionalpractice, doctors and nurses have to look for apatient s personal file from hundreds or maybethousands of records. With networkcommunication, the clinic saves time andmanpower allocation can be effectively planned.E-BusinessE-business or electronic business refers toconducting business transactions on theinternet, not only limited to buying and sellingbut also servicing customers and collaboratingwith business partners.E-business supports many types of businesstransactions, including online shopping, sellingand renting. Users can browse the website andchoose from the list of items or services tobuy. Payment is usually via credit card.
  • 12. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.12Online EducationWith a network connections, onlineeducation is made possible.Students at any location around theworld can participate in an onlineclassroom, download tutorialquestions and submit theirassignments.E-BankingE-banking or electronic banking is the mostpopular banking facility nowadays. It handlesall types of banking transactions like accountmanagement, fund transfer and paymentsprimarily over the internet.User can pay bills, check the account balanceand transfer money to other parties, using e-banking facilities twenty four hours a day andseven days a week.With e-banking, most of the transactions canbe done at home or from the office, thus userssave time on traveling and queuing at the bankcounters.Long Distance CommunicationLong distance communication is made easy vianetwork availability. Communication is possiblevia voice, text or video. The cost of having thistype of communication is cheaper than makinga normal phone call and definitely faster andmore effective than corresponding via letters offax.In business, important decisions can effectivelymade through video conference meeting.
  • 13. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.13LESSON 4TYPES OF NETWORKSTYPES OF NETWORKSThree types of networks:Local Area Network or LANMetropolitan Area Network or MANWide Area Network or WANHere:LAN - the email system within the school lab in SMK KLMAN - the email system within KL cityWAN - the email system between KL and LondonA LAN covers a small region of space, typically a single building.A MAN is a collection of LANs with the same geographical area, for instancea city.A WAN can be a collection of LANs or MANs or the mix of two with a verylarge geographical area, for instance a country or even beyond the border.
  • 14. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.14LESSON 5LOCAL AREA NETWORK (LAN)Local Area Network (LAN) is the smallest networkcompared to the other two networks.The simplest form of LAN is to connect two computerstogether.LAN is operated within a limited physical area, such asat home, school, a single building orseveral buildings.A network which consists of lessthan 500 interconnected devicesacross several buildings, is stillrecognised as a LAN.Inexpensive hardware used in LAN previously includetwisted pair, coaxial cables and the higher end is fiberoptic or wireless. However, coaxial cables are nowbeing replaced by a higher speed cabling systemsuch as CAT5 using RJ45 connectors.LAN is a very high speed network (from previously10Mbps) to 100Mbps, which is faster than MAN and WAN.Local Area Network is a groupof computers and networkdevices connected together,usually within the samebuilding.
  • 15. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.15LESSON 6METROPOLITAN AREA NETWORK (MAN)First, you have to understand the wordmetropolitan. Metropolitan describesimportant cities such as Kuala Lumpur, Manila,Singapore, Tokyo, London and New York.MAN is a network of computers located atdifferent sites within a large physical area, suchas a city. Companies that have several brancheswithin the Kuala Lumpur city such as banks,might find a MAN useful to them.In this case, setting up a MAN across longdistances can be best connected using fiberoptics. Sometimes, a MAN can be a collection ofseveral LANs within the same city.MAN often acts as a high speed network(although not as fast as a LAN) to allowsharing of regional resources.MAN can be defined as a group of computersand network devices connected together withina large physical area.
  • 16. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.16LESSON 7WIDE AREA NETWORK (WAN)Wide Area Network (WAN) is the largestnetwork of all network types. The Internet is thelargest WAN in the world. WAN generally coverslarge distances such as states, countries orcontinents.An example in the society using WAN is thebanking organisation. Local banks have alwaysmaintained their business online by connectingall computers of their branches in the countries.International banks also use WAN to connecttheir computers all over the world.Actually, WAN is a group of MANs or LANs or themixture of both networks.A device called a router is needed to connect theMANs and LANs all over alarge physical area. A routeris a special networking devicethat connects two or moredifferent networks and keepsdata flowing between them.A router makes all thedifferent networks communicate, such as connectingLAN to LAN, LAN to WAN or WAN to WAN.The transmission media in WAN uses the fibre opticcable.WAN is still considered a fast network with speeds20 2000 Kbps, but slower than LAN and MAN.
  • 17. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.17LESSON 8DIFFERENCES BETWEEN TYPES OF NETWORKSETTING UP COSTSetting up a MAN network is more expensive than a LANbut less than a WAN. Managers have to consider the costof buying the necessary hardware, software, medium andmaintenance service for the desired network.NETWORK SIZEThe network size of a MAN falls between LANand WAN. As you know, a LAN usually coversonly a limited area such as a school lab; a MANwill cover a greater area such as a city while aWAN will cover the largest geographical areasuch as the size of Malaysia.SPEEDLAN offers the best speed in transmitting informationfollowed by MAN and WAN. In addition, LANs arecapable of transmitting data at very fast rates, muchfaster than data which is transmitted over atelephone line although the distances are limited.LAN is also frequently used to provide a sharedconnection to other networks using a link to a WAN.A MAN often acts as a high speed network to allowsharing of regional resources (similar to a large LAN). For larger networkcoverage, MAN is a better choice for a higher speed connection compared toa WAN.
  • 18. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.18TRANSMISSION MEDIAA LAN uses the cheapest transmission mediacompared to MAN and WAN. Generally LAN only usescommunication media such as twisted-pair cables.A MAN might have more than one transmission media since it involves acombination of two or more LANs and the media used depends on thenetwork coverage. Here, a MAN might use the twisted-pair and fibre-opticscables.A WAN might use costlytransmission medias such asfibre-optics, radio waves andsatellites, depending on theircoverage.CONNECTION LIMITThe number of computers that can be attached to a single LAN is limited.A MAN can have a large number of computers compared to a LAN but lessthan a WAN.A WAN can have up to billions of computers attached to it.
  • 19. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.19COMPARISON OF LAN, MAN AND WAN
  • 20. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.20LESSON 9NETWORK ARCHITECTURETYPES OF NETWORK ARCHITECTURENetwork architecture is theoverall design of a computernetwork that describes how acomputer network is configuredand what strategies are beingused.Network architecture mainlyfocuses on the functions of thenetworks. Network architectureis also known as network modelor network design.There are two main network architectures:client/server networkpeer-to-peer networkCLIENT/SERVER NETWORKA client/server network is a networkin which the shared files andapplications are stored in the serverbut network users (clients) can stillstore files on their individual PCs.A server is a computer that sharesinformation and resources with othercomputers on a network. A client isa computer which requests servicesor files from a server computer.
  • 21. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.21PEER-TO-PEER NETWORKPeer-to-peer or P2P network is anetwork with all the nodes acting asboth servers and clients. A PC canaccess files located on another PC andcan also provide files to other PCs.All computers in the peer-to-peernetwork has equal responsibilities andcapabilities to use the resourcesavailable on the network.With peer-to-peer network, no serveris needed; each computer in thenetwork is called a peer.
  • 22. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.22LESSON 10CLIENT / SERVERCLIENT / SERVER NETWORKOn a client/server network, shared files andapplications are stored in the server but network userscan still store files on their individual PCs.A smaller client/server network uses twisted-pair orcoaxial cables for networking but a larger andpowerful network will use fibre optics. A client/servernetwork is suitable for connecting 10 or morecomputers.To set up a client/server network, you need to installa server program for the server and a client programfor the clients. A network administrator needs toconfigure access rights on the server side to allowaccess for the clients to use the resources.An email program is an exampleof a client program, as it sendsemail requests to a mail server.IRC (Internet Relay Chat),Internet browser and emailprogram are examples ofsoftware applications for aclient/server network.SERVERA server is sometimes called ahost computer. A server is acomputer that providesservices to other computerscalled clients. A server controlsaccess to the hardware,software and other resourceson the network.It provides a centralisedstorage area for programs,data and information.
  • 23. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.23DEDICATED SERVERDedicated servers perform specific tasks and usually execute only one job.For example, a file server stores andmanages files, a print server managesprinters and print jobs. A database serverstores and provides access to a database.A network server manages network traffic.CLIENTThe client computers are computers on thenetwork that rely on the server for its resourcesand services.Client computers send requests to a server forresources or services to perform their job. Forexample, a client computer can send a requestasking permission to use the printer attached tothe server, to print a document.Usually a client computer has to log onto thenetwork using a user name and password to usethe server s resources and services.A dedicated server helps savetime and storage space in onecomputer. It will not put thewhole network at risk if it fails.
  • 24. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.24For example, you have to be a TMnet or Jaring member to use the internetservice. You need to logon to TMnet or Jaring s server by sending yourusername and password.After your successful login process, then you can access the internet throughTMnet or Jaring s server.
  • 25. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.25LESSON 11PEER-TO-PEERPEER-TO-PEER FUNCTIONSPeer-to-peer (P2P) network is anetwork with all the nodesacting as both servers andclients. A PC can access fileslocated on another PC and canalso provide files to other PCs.A P2P network usually usestwisted-pair or coaxial cablebecause these cables arecheaper and easier to workwith.P2P network is the best choiceto set up a network with lessthan 10 computers.P2P network is easier to manage aslong as there are network cardsinstalled on the PCs and connectioncan be done with a network cable.To share the resources, each PCmust have the necessary program.There is no central server or centralrouter managing a P2P network.Wireless networking can be anexample of a P2P network asyou only need a wireless card,connect it to an existing wirelessnetwork and resources can besharedLimewire, Bearshare and Kazaa areall examples of software applicationsfor peer-to-peer (P2P) file sharing.
  • 26. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.26THE DIFFERENCES BETWEEN CLIENT/SERVER ANDPEER-TO-PEER
  • 27. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.27LESSON 12NETWORK TOPOLOGYNow, imagine replacing the dinner table as yournetwork, and the chairs are your computers. Howwould you like your network to be? How wouldyou arrange the computers?In networking terms, the structure you areplanning to connect the computers to, is callednetwork topology.Network topology is alsoreferred to as the configurationof a network.It usually refers to the physicalarrangement of the computersand other networking devicesthat are linked together.It defines how nodes are connected to oneanother in a communication network. A networktopology must show the nodes and the linksbetween them. The nodes must be an activedevice connected to the network, such as acomputer, printer, hub or a router.To see a network topology clearly, always apply it on a Local Area Network(LAN). According to the needs, there are three main types of networktopology. They are bus topology, star topology and ring topology.Bus Topology
  • 28. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.28Star TopologyRing Topology
  • 29. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.29LESSON 13BUS TOPOLOGYIn communications technology, you think of abus as a common highway on which data istransmitted. A bus refers to the main physicalpathway or central cable where all otherdevices are connected to it. Like a major motorhighway, all traffic flow will be affected if thismain road is broken.A bus topology consists of a single central cable to which all computers andother devices connect. A bus topology is also known as a bus network.DESCRIPTION OF BUS TOPOLOGYBus networks are very common in LocalArea Networks (LAN). A bus networkmust have a common backbone (thecentral cable) to connect all devices.All nodes share the backbone tocommunicate with each other on thenetwork. Sometimes, a bus networkhas more than one server. Sometimes,a server is not needed on the network.
  • 30. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.30DEPENDENCE OF A BUS TOPOLOGYIf one of the nodes fails, the bus network would still function as long as thebackbone is working. If the backbone fails, the network will fail to function.
  • 31. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.31ADVANTAGES OF BUS TOPOLOGYEasy implementation. New devices can be added to the backbone or tothe existing nodes.Failure of a node doesnt affect the entire LAN.No disruptions to the network when connecting or removing devices.Network can easily be extended, by adding new devices to thebackbone or existing nodes.DISADVANTAGES OF BUS TOPOLOGYIf the backbone fails, the entire bus network will be affected.Network speed decreases when the number of nodes increases.Troubleshooting is difficult when one of the nodes fails.
  • 32. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.32LESSON 14RING TOPOLOGYA ring topology consists of all computers andother devices that are connected in a loop.Ring topology is also known as a ring network.A ring network can be found in Local AreaNetworks. In a ring network each nodedirectly connect to two neighbouring nodes.A server may exist in a ring network, but it willnot connect to all the nodes in the network.The server, like other nodes,will only communicate to its twoneighbouring nodes.DEPENDENCE OF A RING TOPOLOGYIf one of the nodes fails, the network will fail to function.ADVANTAGES OF A RING TOPOLOGYTroubleshooting is easy when one of the nodes fails.Repair or remove the failing nodes and the network willcontinue to function.DISADVANTAGES OF A RINGTOPOLOGYImplementation is difficult.Network administrator has toterminate the entire network toinstall a new node betweenexisting nodes.A failing node will affect theentire LAN.Connecting or removing devicesis difficult because network administrator needs to terminate thenetwork in order to do it.Network speed decreases when the number of nodes increases.
  • 33. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.33LESSON 15STAR TOPOLOGYIn the early days of computernetworking, all computers wereconnected to a centralised mainframecomputer.All resources and management ofinformation were centred in this maincomputer.The idea of a centralised mainframecomputer is where the basic concept ofa star topology comes from.A star topologyconsists of acentral host whichacts as the centre,and all nodesconnect to thehost. A startopology is alsoknown as starnetwork.DESCRIPTION OF STAR TOPOLOGYA star network is found in a Local Area Network setting.A star network must have a host which acts as the centre.The host can be a server, hub or router.In a star network, every node will not connect to the neighbouringnodes.Every node must connect to the host in order to communicate.The host will control the flow of communication in the network.
  • 34. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.34DEPENDENCE OF A STAR TOPOLOGYIf one of the nodes fails, the star network can stillfunction as long as the host is working.If the host fails, the network willfail to function.ADVANTAGES AND DISADVANTAGES OF STARTOPOLOGYAdvantagesIt is easy to implement. You only add nodes tothe host.The failure of a node does not affect the entireLAN.There are no disruptions to the network whenconnecting or removing devices.The network can be extended by adding newdevices to the host or nodes.Troubleshooting is easy when the host fails. Simply repair or replacethe host and the network will continue to function.DisadvantagesIf the host fails, the entire LAN will beaffected.Network speed decreases when the numberof nodes increases.Troubleshooting is difficult when one of thenodes fails.A host must be installed to control thenetwork.
  • 35. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.35LESSON 16DIFFERENCES OF NETWORK TOPOLOGIESUNDERSTANDING DIFFERENT TOPOLOGIESUnderstanding differences in network topologies helps us to see what eachtopology is able to do.Each topology has an influence on:the type of equipment we will usethe potential of the network in accommodating more computersthe way we manage our networkthe capabilities of the hardware to manage the flow of informationTHE STRUCTURE NETWORK TOPOLOGYThe following table compares the structures of the three main types of thenetwork topologies:BusTopologyRingTopologyStarTopologyStructure there is a singlecentral cable(backbone) and allcomputers and otherdevices connect to itall computers andother devices areconnected in acirclethere is a centralhost and all nodesconnect to itHost existence depends on networkneedsdepends onnetwork needsyesConnectionbetween nodesIt has no connectionbetween the nodes.yes noHost failure network can still run network will fail network will failNode failure network can still run network will fail network can stillrunEase oftroubleshootingdifficult. Need tosearch for thedepends onbackbone. If theredepends on thehost. It
  • 36. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.36problematic node oneby oneis a backbone,troubleshooting isdifficult. If there isno backbone, thefocus is on thetwo nodes notcommunicatingis easier to repairthe problematichost. However, ifthe nodes fail,then each nodehas to be searchedEase of addingor removingnodesEasy difficult averageNumber ofnodes whenextendingnetworkMany limited limited
  • 37. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.37LESSON 17INTRODUCTION TO NETWORK STANDARDSNetwork architectures are defined by exact anddetailed specifications regarding the physical layout,cabling and methods used to access and maintaincommunications in and between network media.The Institute of Electrical andElectronic Engineers (IEEE), is oneinternational organisation responsible for developing andproviding networking technology specifications forworldwide usage.We call these networking technology specifications asnetwork standards.COMMON NETWORK STANDARDSNetwork communications use a variety of standardsto ensure that data travels correctly to itsdestination. Network standards define guidelines thatspecify the way computers access the mediumto which they are attached. The guidelines alsodescribe the type of medium used, the speeds usedon different types of networks and the type ofphysical cable or wireless technology used.The well-known standards adopted by the Institute ofElectrical and Electronic Engineers (IEEE) are the 802standards.These are the standards that define therequirements for physical cabling and specify the way data istransmitted.The ones we will get to know here are:802.3802.7802.8802.11
  • 38. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.38802.3 ETHERNET LANThe 802.3 standard is the standard for an EthernetLAN. In 802.3, Ethernet refers to the physicalcabling, while the way data is transmitted throughthe cable is called Carrier Sense Multiple Access/Collision Detection (CSMA/ CD).This method of transmission requires that only onedevice on the network can be transmitted at a time. If another device cansense that a transmission is already in the cable, it will have to wait. All theother devices on the network will also sense and wait until the line is clearbefore one of them can transmit data along the cable.802.7 BROADBAND LAN802.7 is the standard specifications for a Broadband LAN. This 802.7standard provides specifications for the design, installation and testingneeded for broadband transmissions. Broadband transmissions allowsimultaneous multiple transmissions or signals using differentcommunications channels at the same time.
  • 39. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.39802.8 FIBRE-OPTIC LAN AND MANSpecifications for a Fibre-Optic LAN and MAN aregiven under the 802.8 standard. This standard givesthe recommendations for the configuration and testingof fibre-optic Local Area Networks and MetropolitanArea Networks.802.8 WIRELESS LANThis standard defines communication between a wireless computer or clientand an access point or between two wireless computers or clients.The 802.11 standard uses the 2.4GHz frequency band to transmit data up to2Mbps.
  • 40. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.40LESSON 18PROTOCOLSPROTOCOLSProtocols provide the rules on how computerscommunicate. They define how devicesintercommunicate in a network environment.THE IMPORTANCE OF PROTOCOLSBefore protocols were developed, intercommunicationbetween devices was not possible. Protocols areimportant as they define how devices, applications orcomputers communicate in a network.When two computers on a network perform a singleexchange of data or information, they will be busylooking for the best communication process betweenthem.For example, there will be a protocol to specifythe format that the information bits or packetsmust contain when traveling across thisconnection.There are also protocols that are responsible forensuring that the information bits or datapackets are sent or received in a propersequence.All these protocols worktogether as a group toprepare and processdata for an exchange ofinformation over anetwork. We call such agroup a protocol stackor a protocol suite.
  • 41. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.41SOME TYPES OF PROTOCOLSHypertext Transfer Protocol (HTTP) This protocol is used to access,send and receive Hypertext Markup Language files (HTML) files on theInternet.Simple Mail Transfer Protocol (SMTP) This protocol is used fortransferring e-mail between computers.File Transfer Protocol (FTP) FTP isresponsible for allowing files to be copiedbetween devices.
  • 42. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.42Transmission Control Protocol (TCP) This protocol ensures thedelivery of information packets across network.Internet Protocol (IP) This important protocol is responsible forproviding logical addressing called IP address to route information betweennetworks.
  • 43. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.43LESSON 19INTRODUCTION TO TCP/IPFor communications across the Internet, we need to have protocols todemonstrate how data should be packaged and sent. TCP/IP is thecommunication protocol suite on the internet. It has a number of protocolscontrolling and handling data communication on the internet.TCP/IP stands for Transmission Control Protocol / Internet Protocol.TRANSMISSION CONTROL PROTOCOL / INTERNETPROTOCOLTCP/IP (Transmission ControlProtocol / Internet Protocol) is theinternet communication protocol. Itis a standard that sets the rulescomputers must follow incommunicating with each other ona network. Some refer TCP/IP asthe Internet Protocol Suite.When you use any applications orprograms to access the Internet,these application will use TCP/IP toachieve the task. For example,when you want to surf a network,you will use the internet browser.Your browser then uses TCP/IP torequest services from Internet servers. These servers will use TCP/IP tosend the web pages you requested back to your browser.
  • 44. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.44TRANSMISSION CONTROL PROTOCOLTCP (Transmission Control Protocol) is the protocol that sets thecommunication rules between computers. Here, TCP establishes connectionbetween two computers, protects against data loss and data corruption.TCP is responsible for breaking the data into packets before they are sent.TCP then assembles the packets when they reach a destination.INTERNET PROTOCOLIP (Internet Protocol) is the protocol that transfers data from node to node.Here, IP takes care of delivering data packets between two computers. IP isresponsible for sending the packets from sender to receiver.
  • 45. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.45LESSON 20THE WAY TCP AND IP WORKEach computer must have an IP addressassigned by the network administrator toaccess the internet. Let say yours is192.168.0.1.When you access a web page, forexample the Yahoo main page, theTCP/IP will make the communicationwork between your computer and theYahoo server.First, you type the URL addresswww.yahoo.com on the browser. TheTCP will send a request for the web pageon Yahoo server according to the addressyou typed in.TCP will establish a connection betweentwo computers which is yours and Yahooserver and it will prepare the full-duplexcommunication.A full-duplex system allows communication in both directions, and unlike half-duplex, allowsthis to happen simultaneously. Land-line telephone networks are full-duplex since theyallow both callers to speak and be heard at the same time. A good analogy for a full-duplexsystem would be a two lane road with one lane for each direction
  • 46. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.46The IP will begin sending the datarequest from 192.168.0.1 towww.yahoo.com or 209.131.36.158.The Internet is a huge collection ofnetworks. There are many routes fromyour computer to the server. IP willsend the data packets through theseroutes as fast as possible. It willconstantly use several different routesto deliver the packets to thedestination.Meanwhile, TCP will continue tomaintain the link between the twocomputers. TCP will close thecommunication link once the web pagehas reached your computer.
  • 47. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.47LESSON 21PRIVATE COMPUTER NETWORK SETTINGSimilar to mobile phones, computers connected to a network have:A phone number (an IP address on anetwork).Service provider identification, forexample Maxis 012, Digi 016 andCelcom 019 ( a subnet mask on anetwork).Antennas ( a network gateway on anetwork).A phone book function to help user putnames to telephone numbers ( a DNSserver on a network).STEPS TO SETTING UP PRIVATE NETWORKWhen you want to set up a private network for the school, you will need toinstall the network card, IP address, Subnet mask and Default gateway.1. Right click on the My Network Places icon onthe desktop and click the properties command.2. In the Network Connections window, right clickon the network interface and click theproperties command.3. In the network interface s Properties dialogbox, click the Internet Protocol (TCP/IP) entryand then click the Properties button.4. In the Internet Protocol (TCP/IP) Propertiesdialog box, select the Use the following IPaddress option.
  • 48. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.485. Type in the IP address in the IP address textbox, for example 172.28.11.100.6. Type in the Subnet mask in the subnet masktext box with 255.255.255.07. Enter a default gateway with your server s IPaddress. Let s say your server IP address is171.28.11.1.8. Make sure Obtain DNS server addressautomatically is chosen.9. Click OK in the Internet Protocol (TCP/IP)Properties dialog box.Click OK in theexternal interface sProperties dialog box.
  • 49. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.49LESSON 22TYPES OF NETWORK COMMUNICATION TECHNOLOGYThe Internet has become one of thenecessary things in our daily lives. A lot canbe done via the Internet.We use the Internet to communicate with each other,deal with money transaction, surfing for entertainmentand education.For example, we can pay our utility bills using thee-banking services as shown in the video.The Internet is one of the types of networkcommunications technology besides intranet andextranet.
  • 50. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.50INTERNETThe Internet, or the Net, is the worldwide, publiclyaccessible system of interconnected computernetworks that transmit data by packet switchingusing the standard Internet Protocol (IP).It consists of millions of smaller business,academic, domestic and government networks,which together carry various information andservices, such as electronic mail, online chat, andthe interlinked Web pages and other documents ofthe World Wide Web.Internet is one of the uses ofcommunication. Through theInternet, society has access toglobal information and instantcommunication.INTRANETAn Intranet (intra means within) is an internal networkthat uses Internet technologies and it is a smallversion of the Internet that exists within anorganisation.An intranet is a private computer network that usesInternet protocols, network connectivity and possiblythe public telecommunication system to securely sharepart of an organisation s information or operation with its employees.Intranet generally make company information accessible to employees andfacilitate working in groups.Simple intranet applications include electronic publishing of organisationalmaterials such as telephone directories, event calendars and job postings.
  • 51. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.51EXTRANETAn extranet is a private network that uses Internet protocols, networkconnectivity, and possibly the public telecommunication system to securelyshare part of a business s information or operations with suppliers, vendors,partners, customers or other businesses.Package shipping companies, for example, allow customers to access theirnetwork to print air bills, schedule pickups, and even track shipped packagesas the packages travel to their destinations.
  • 52. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.52LESSON 23INTERNETThe Internet was created in the 1960s by people with great vision. They sawthe great potential value in allowing computers toshare information on research and development inscientific and military fields.Nowadays, when Internet is mentioned, it meansconvenience, speed and economical. Many tasks canbe accomplished without having to travel far, spendtoo much money or even wait for responses.INTERNETThe Internet is the world slargest computer network whichconnects millions of computersall over the world. Manyorganisations including privateas well as governmentagencies, educationalinstitutions and individuals areconnected to the Internet.Some of the many usages of the Internet are:Information; research & exchangeCommercereal time communicationbankingshoppingentertainmenteducationgamingInternet transmits data by using Internet Protocol (IP).INTERNET ACCESSTo access the Internet, users need tosubscribe services to an Internet ServiceProvider (ISP). An ISP can either be atelecommunication company or any other organisation specialising inproviding access to Internet services.
  • 53. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.53Our Ministry of Energy, Water and Communications has licensed 6telecommunication companies to provide telephony services in Malaysia.Currently, only four of them are providing Internet services, they are Jaringby MIMOS, TMnet by Telekom Malaysia Berhad, Maxisnet by MaxisCommunications Bhd and Time.net by Time dotcom Berhad.Internet connection is divided into two categories; dial-up or broadband.For dial-up connections, a phone line and modem are needed to access theInternet while broadband connections use cable modem or router.INTERNET SERVICESInternet users can access services like:Web browsingEmailFile transferNewsgroup&Message boardsMailing listsChat roomsInstant messaging.
  • 54. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.54LESSON 24INTRANETINTRANETWith new technologies many of our tasks canbe performed with a click of a few buttons.Company operations are now not just limitedwithin very tall buildings or between twobuildings located within the city. They are alsoavailable between cities, states and evencountries.The intranet technology allows sharing of valuable information and letsbusiness activities carry on even without a key personnel present at thebusiness premises.USES OF INTRANETAn Intranet is an internal network that usesInternet technologies. It is a small version ofthe Internet that exists within an organisation.Intranet generally make company informationaccessible to employees and facilitate workingin groups.To access intranet, employees need to be online. To letthe employees access the intranet fro everywhere aroundthe world, every employee will be given the intranetaddress, user name and password.
  • 55. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.55Intranet usually includes electronic publishingof materials related to an organisation suchas:Telephone directoriesEvent calendarsEmployee handbookJob postingEmail servicesNews bulletinCompany formsStaff informationIntranets too are used to conduct moresophisticated tasks such as:Groupware applications in projectmanagement.Remote discussion rooms (chat rooms)Group schedulingVideo conferencingCOMPARISON BETWEEN INTRANET AND INTERNET
  • 56. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.56LESSON 25EXTRANETIn the late 1990 s and early 2000,several industries started to use theterm extranet .It describes central repositories ofshared data made accessible via theweb only to authorised members ofparticular work groups.Currently extranet s usages hasexpanded to even allowing customersand affiliates to access the web site ofa company.WHAT IS EXTRANETAn extranet is a private network thatuses Internet technology and publictelecommunications system tosecurely share relevant informationwith authorised parties.Only registered or authorised userscan navigate or access the extranet.USES OF EXTRANETExtranet can be used to:Share product catalogues withwholesalers.Jointly develop programs withother companies.Provide access services given byone company to a group ofother companies.Share news of common interestexclusively with partnercompanies.
  • 57. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.57INTERNET AND EXTRANET
  • 58. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.58LESSON 26COMMUNICATION DEVICES : HARDWARE REQUIREMENTSCommunication devices are hardwarecomponents that enable a computer to sendor receive data, instructions andinformation to and from one or morecomputers.Examples of communication devices are:Network Interface Card (NIC)Wireless Network Interface Card(WNIC)internal and external modemhub or switchrouterwireless access pointNETWORK INTERFACE CARDA network card, sometimes pronounced as NICK, is an adapter card or PCcard that enables the computer to access the network.WIRELESS NETWORKINTERFACE CARDWireless Network Interface Card is a network cardthat provides wireless data transmission.NETWORK COMMUNICATION CHANNELSThere are two types of modem, internal modem and external modem. Aninternal modem only works in stand-alone computers. It is built into thecomputer.
  • 59. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.59An external modem is separated from the computer and is also mobile.HUB/SWITCHHub or switch is a common connection point for devices in a network. Hubsare commonly used to connect segments of a LAN.
  • 60. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.60ROUTERA router is a communications device that connects multiple computers orother routers together and transmits data to the correct destination.WIRELESS ACCESS POINTA wireless access point is a central communications device that allowcomputers to transfer data. This device can help information to betransferred wirelessly to other wireless devices or to a wired network.Wireless access point has high quality antennas for optimal signals.
  • 61. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.61LESSON 27FUNCTIONS OF COMMUNICATION DEVICESNETWORK INTERFACE CARDA Network Interface Card is a piece of computer hardware designed to allowcomputers to communicate over a computer network. The card implementsthe electronic circuitry required to communicate using a specific physicallayer and data link layer standard such as ethernet or token ring.
  • 62. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.62WIRELESS NETWORK INTERFACE CARDA Wireless Network Interface Card or WNIC is anetwork card which connects to a radio-basedcomputer network.WNIC is an essential component forwireless desktop computer. This card usesan antenna to communicate throughmicrowaves.WNICs are designed around the IEEE 802.11 standardwhich sets out low-level specifications on how allwireless networks operate and can operate in twomodes known as infrastructure mode and ad hoc mode.INFRASTRUCTURE MODEIn an infrastructure mode network the WNICneeds an access point: all data is transferredusing the access point as the central hub. Allwireless nodes in an infrastructure modenetwork connect to an access point. All nodesconnecting to the access point must have thesame service set identifier as the access point.AD HOC MODEIn an ad hoc mode network the WNIC does notrequire an access point, but can directlyinterface with all other wireless nodes directly.All the peer nodes in an ad hoc network musthave the same channel and service setidentifier.
  • 63. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.63MODEMA modem is a device that enables acomputer to transmit data overtelephone or cable lines.Computer information is stored digitally,whereas information transmitted overtelephone lines is transmitted in the formof analog waves. A modem convertsbetween these two forms.HUB / SWITCHHubs are commonly used to connect segments of a LAN. A hub containsmultiple ports.When a packet arrives at one port, it is copied tothe other ports so that all segments of the LAN cansee all the packets.A hub connects all the devices on its ports together. A switch understandswhen two devices want to talk to each other, and gives them a switchedconnection.
  • 64. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.64ROUTERA router is a computernetworking device thatforwards data packetsacross a network towardtheir destinations,through a processknown as routing.A router acts as a junction between two or more networks to transfer datapackets among them. In order to route packets, a router communicates withother routers using routing protocols.WIRELESS ACCESS POINTA wireless access point is a device that connects wireless communicationdevices together to form a wireless network.Wireless access point (or Wireless AP) usually connects to a wired networkand can relay data between wireless devices and wired devices.Several Wireless APs can link together to form a larger network that allows"roaming". Wireless access points have IP addresses for configuration.
  • 65. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.65LESSON 28TRANSMISSION MEDIUMIn communications, transmission is the sending of electrical messages in theform of wave or energy. Transmission medium means any materialsubstance which can propagate waves or energy.Computers and other telecommunication devices use signals in a form ofwave or energy to represent data which are sent through a transmissionmedia.TYPES OF TRANSMISSION MEDIATransmission media can be divided into two broad categories. The physicaltransmission media, or guided medium and the wireless transmission media.The twisted-pair cable, coaxial cable and fibreoptic cable are examples of physical transmissionmedia.Wireless transmission medium or unguidedmedium is through air.
  • 66. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.66PHYSICAL TRANSMISSION MEDIUMIn physical transmission medium,waves are guided along a solidtransmission medium. Wirelesstransmission medium waves areunguided and the transmissionand reception are by means ofantennas.In our daily activities we probably use both media consciously orunconsciously.For example, we use physical transmission medium when we:connect a PC to a printer using parallel port or USB portconnect a PC to the same phone line for Internet communicationsuch as TMNET Streamyx.PCs are connected using twisted-pair cables to wall sockets in theofficeWe use wireless transmission medium when we:listen to the radiotalk over the telephoneuse hotspots that have wireless Internet access with WiFi technologyat restaurants and airports.
  • 67. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.67WIRELESS TRANSMISSION MEDIAWireless data transmission means data communication between networkdevices without using cables or cords, but by using radio frequency orinfrared waves.Wireless data transmission is categorised into short, mediumand long range data transmission.An example for short range is Bluetooth or Infrared. Medium range datatransmission is WiFi or wireless LAN and for long range it is 3G.3G is a so-called "third-generation broadband packet-based transmission oftext, digitised voice, video, and multimedia at data rates up to and possiblyhigher than 2 megabits per second (Mbps), offering a consistent set ofservices to mobile computer and phone users no matter where they arelocated in the world. 3G works over wireless air interfaces.TRANSMISSION ENVIRONMENTIn our daily activities, such as talking over the phone, sending shortmessages, sending email or uploading files to remote users, will likelyinvolve a combination of transmission mediums along the way.The sender and the receiver will also involve many communication devicesespecially switches and routers. These devices are interconnected bytransmission mediums that can be from any of the physical or wirelesstransmission mediums stated earlier.In network communications, it is common to represent the interconnectionbetween devices as network clouds.
  • 68. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.68LESSON 29PHYSICAL TRANSMISSION MEDIAPhysical transmission media refers to material substances that canpropagate waves or energy. It is used to guide electrical messages fromone end to the other.Ethernet and token ring LANsoften use physicaltransmission media.CABLES AS A PHYSICAL TRANSMISSION MEDIUMCables are used as a physical transmission medium. There are three types ofcables used in transmitting electrical messages. They are:Twisted-Pair Cable - Two insulated copperwires that are twisted around each other.Each connection on twisted-pair requiresboth wires.Coaxial Cable - A cable consisting of aconducting outer metal tube that enclosesand is insulated from a central conductingcore, used primarily for the transmission ofhigh-frequency signals.Fibre Optic Cable - Glass fibre used forlaser transmission of video, audio and/ordata.
  • 69. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.69TWISTED-PAIR CABLEThe twisted-pair cable is generally a commonform of transmission medium. It consists oftwo wires or conductors twisted together, eachwith its own plastic insulation. The twistedwires cancel out electromagnetic interferencethat can cause crosstalk , the noise generatedby adjacent pairs.The most common connector used for twisted-pair cable is RJ-45.ElectromagneticA wave produced by the interaction of time-varying electric andmagnetic fields.CrosstalkUndesired coupling of a signal from one circuit, part of a circuit, or channel,to another.RJ-45Registered Jack-45 (RJ-45) is an eight-wire connector used commonly toconnect computers onto Local Area Networks (LAN), especially Ethernets.TYPES OF TWISTED PAIR CABLEThe Unshielded Twisted-Pair or UTP is the most commontwisted-pair cable used in communications.It has four pairs of colour-coded twisted-pair cables thatare covered with a plastic outer jacket.UTP CableCables that consist of pairs of unshielded wire twisted together. It is themost common kind of copper telephone wiring.The Shielded Twisted-Pair or STP is another form oftwisted-pair cable.Its four pairs of colour-coded wires are eachwrapped in metallic foil, and all four are thencollectively wrapped in a layer of metallic braid orfoil. Finally, this layer is wrapped with a plastic outerjacket.STP CableTwisted-pair cable wires that consist of an outer covering or shield.
  • 70. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.70COAXIAL CABLEThe coaxial cable, often referred to as coax , consistsof a single copper wire surrounded by at least threelayers.They are an insulating material, a woven orbraided metal and a plastic outer coating.This cable is often used as cable television(CATV) network wiring because it can becabled over longer distances in comparisonto the twisted-pair cable.PART OF COAXIAL CABLEThe coaxial cable consists of a centreinner conductor of solid or strandedwire enclosed in an insulating sheath.The sheath is enclosed in an outerconductor of metal foil or a wovencopper braid.This outer conductor is also enclosed in another insulating sheath, and thewhole cable is protected by a plastic cover. The outer conductor acts as thesecond wire in the cable. It also acts as a shield for the inner conductor andhelps reduce outside interference.CONNECTORS FOR THE COAXIAL CABLEThe connector most commonly used inconnecting a coaxial cable to a device isthe BNC connector. BNC is short forBritish Naval Connector or Bayonet-Neill-Concelman.
  • 71. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.71There are three popular BNC connectors. They are:BNC connector: used to connect devices such as the TV setBNC T connector: used in Ethernet networksBNC terminator: connected at the end of a cable to prevent thereflection of signalsFIBRE OPTIC CABLEThe fibre optic cable is a networking mediumthat uses light for data transmission.The intensity of light is increased anddecreased to represent binary one and zero.Its core consists of dozens or hundreds ofthin strands of glass or plastic which useslight to transmit signals.Each strand, called an optical fibre, is as thinas a human hair.TransmissionThe act of sending electrical messages (and also radiant energy that passesthrough media.)BinaryThe binary system is a way of counting using justthe two numbers 0 and 1.Optical FibreA flexible optically transparent fibre, usually made ofglass or plastic, through which light can betransmitted by successive internal reflections.PARTS OF A FIBRE OPTIC CABLEInside a fibre optic cable, each optical fibre is clad with an insulating glassand a protective coating. Typically, a fibre optic cable has five parts.
  • 72. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.72The core is the light transmission element. It is typically made of glass orplastic.Cladding surrounds the core.It is also made of glass or plastic but is lessdense than the core.Buffer surrounds cladding. It is usually made of plastic and helps shieldsthe core and cladding from being damaged.A strengthening material surrounds the buffer to prevent the fibre cablefrom being stretched when installers pull it.Outer jacket surrounds the cable to protect the fibre against abrasion,solvents and other contaminants.CONNECTORS OF A FIBRE OPTIC CABLEThe most commonly used fibre optic connectors areSC, ST, FC and MT-RJ connectors.SCA fibre optic cable connector that uses a push-pulllatching mechanism similar to common audio andvideo cables.STA fibre optic cable connector that uses a bayonetplug and socket.FCA fibre optic cable connector that uses a threadedplug and socket.MT-RJMechanical Transfer Registered Jack (MT-RJ), afibre optics connector popular for small form factordevices due to its small size.
  • 73. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.73LESSON 30WIRELESS TRANSMISSION MEDIAWIRELESS COMMUNICATIONWireless is a method of communication that uses electromagnetic wavesrather than wire conductors to transmit data between devices.Wirelessnetworks are telephone or computer networks that use radio frequenciesand infrared waves as their carrier.The mediums used in wireless communicationsare air, vacuum and even water. Air is the mostcommonly used medium. Signals are normallybroadcasted through air and are available toanyone who has a device capable of receivingthem.WIRELESS TECHNOLOGYThe use of wireless technology as amethod of data transport appears verysimilar to a wired technology.In a wireless media however, signaltransmission is unguided and the devicecommunicates without using wiresbetween nodes, usually by relying onradio frequencies instead.WIRELESS TRANSMISSIONWireless transmission can be categorised into three broad groups:Radio WavesMicrowavesInfrared
  • 74. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.74RADIOWAVESThere is no cleardifference betweenradio waves andmicrowaves.Electromagneticwaves ranging in frequencies between 3 KHz and 1 GHz arenormally called radio waves. Waves ranging in frequencies between 1 and300 GHz are normally called microwaves.It is actually the behaviour of the waves rather than the frequencies thatdetermines the classification of wireless transmission.RADIO WAVES SIGNALSRadio waves are normally omnidirectional.When an antenna transmits radio waves,they are propagated in all directions. Thismeans that the sending and receivingantennas do not have to be aligned.The omnidirectional characteristics of radiowaves make them useful for multicasting, inwhich there is one sender but manyreceivers.Our AM and FMradio stations,cordlessphones andtelevisions areexamples ofmulticasting.
  • 75. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.75DISADVANTAGES OF USING RADIO WAVESRadio waves transmitted by one antenna are susceptible to interference byanother antenna that is sending signals of the same frequency or band.MICROWAVESElectronic waves with frequencies between 1 GHz to 300 GHz are normallycalled microwaves.Unlike radio waves, microwaves are unidirectional, in which the sending andreceiving antennas need to be aligned. Microwaves propagation isline-of-sight therefore towers with mounted antennas need to be in directsight of each other.Due to the unidirectional property of microwaves, a pair of antennas can beplaced aligned together without interfering with another pair of antennasusing the same frequency.Two types ofantenna are usedfor microwavecommunications.They are theparabolic dishantenna and thehorn antenna.The parabolic dish antenna receives ingoingtransmissions by reflecting the signal to acommon point called the focus.Outgoing transmissions are broadcastedthrough a horn antenna by deflectingsignals outward in a series of narrow parallelbeams.
  • 76. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.76High-frequency microwaves cannot penetrate walls. Thisis why receiving antennas cannot be placed insidebuildings.INFRAREDInfrared is used in devices such as the mouse,wireless keyboard and printers. Some manufacturersprovide a special port called the IrDA port thatallows a wireless keyboard to communicate with aPC.Infrared signals have frequencies between300 GHz to 400 THz. They are used forshort-range communication.INFRARED SIGNALSInfrared signals have high frequencies and cannot penetrate walls. Due to itsshort-range communication system, the use of an infrared communicationsystem in one room will not be affected by the use of another system in thenext room.This is why using an infrared TV remote control in our home will notinterfere with the use of our neighbour s infrared TV remote control.
  • 77. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.77DISADVANTAGES OF USING INFRAREDInfrared signals cannot be used for long distance communication. Inaddition, we cannot use infrared waves outside a building because suns rayscontain infrared waves that can interfere with communication.
  • 78. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.78LESSON 31SERVER SOFTWARESoftware such as Windows Server 2003, Windows NT and Red Hat Linux aresome of the examples of server software. All of these software fall under theNetwork Operating System.DEFINITION OF NETWORK OPERATING SYSTEMSAn operating system is the program that firstloads when a computer boots and manages anyother software or hardware on the computer.A Network Operating System or known as NOS,has additional functionality that allows it toconnect computers and peripherals to a network.A Network Operating System is most frequentlyused with Local Area Networks and Wide Area Networks, but could also haveapplication to larger network systems.A NOS is not the same as thenetworking tools provided by someexisting operating systems, WindowsXP for instance.NOS is an operating system that hasbeen specifically written to keep networks running at optimalperformance.EXAMPLES OF NETWORK OPERATING SYSTEMSSome popular Network OperatingSystems include:Windows NTWindows 2000 ServerWindows Server 2003Red Hat Linux
  • 79. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.79Windows NT is a family of operating systemsproduced by Microsoft, the first version ofwhich was released in July 2003.It was the first 23-bit version of Windows.Windows XP and Windows Server 2003 are thelatest versions of Windows NT.Windows 2000 (also referred to as Win2K or W2K)is graphical and business-oriented operating system.It is part of the Microsoft NT line of operatingsystems and was released on February 17, 2000.Windows 2000 comes in four versions which areProfessional, Server, Advanced Server andDatacenter Server.Additionally, Microsoft offers Windows 2000Advanced Server-Limited edition, which wasreleased in 2001 and runs on 64-bit Intel ItaniumMicroprocessor.Windows Server 2003 is the name of Microsoft sline of server operating systems. It was introducedin April 2003 as the successor to Windows 2000Server.It is considered by Microsoft to be the cornerstone oftheir Windows Server System line of business serverproducts.Red Hat Linux was one of the most popular Linuxdistributions, assembled by Red Hat. It is one of themiddle-aged Linux distributions; 1.0 was released inNovember 3rd, 1994.Since 2003, Red Hat has discontinued the Red HatLinux line in favour of its new Red Hat Enterprise Linux.Red Hat Linux 9, the final release, ended on April 30th,2004, although the Fedora Legacy project continues topublish updates.
  • 80. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.80PEER-TO-PEER NETWORK OPERATING SYSTEMSPeer-to-peer Network Operating Systems allow usersto share resources and files located on theircomputers. It is also for users to access sharedresources found on other computers.However, they do not have a file server or acentralised management source.AppleShare and Windows forWorkgroups are examples ofprograms that can functionas peer-to-peer NetworkOperating System.CLIENT/SERVER NETWORKING OPERATINGSYSTEMClient/server Network Operating Systems allow thenetwork to centralise functions and applications inone or more dedicated file servers. The file serversbecome the heart of the system, providing access toresources andproviding security.Individual workstations or clients have access to theresources available on the file servers.The Network Operating System provides themechanism to integrate all the components ofthe network and allow multiple users tosimultaneously share the same resourcesirrespective of physical location.Novell Netware and Windows 2000 Server areexamples of client or server Network OperatingSystems.
  • 81. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.81LESSON 32CLIENT SOFTWAREFUNCTIONS OF WEBBROWSERA webbrowseris asoftware application that enables a user todisplay and interact with HTML documentshosted by web servers or held in a filesystem. Text and images on a web page cancontain hyperlinks to other web pages at thesame or to different websites.Web browser allow a user to quickly and easily access information providedon many web pages at many websites by surfing these links.Web browsers available for personal computer include Microsoft InternetExplorer, Safari, Netscape and Opera.Web browsers are the most commonlyused type of Hypertext Transfer Protocol (HTTP) user agent.Although browsers are typically used to access the World Wide Web, theycan also be used to access information provided by web servers in privatenetworks or content in file systems.FUNCTIONS OF EMAIL CLIENTAn email client is a computer program that isused to read and send email.FUNCTIONS OF FILETRANSFER PROTOCOL (FTP)File Transfer Protocol (FTP) is used toconnect two computers over the Internet sothat the user of one computer can transferfiles and perform file commands on the othercomputer.
  • 82. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.82LESSON 33SETTING NETWORK FACILITIESNETWORK INTERFACE CARDA computer, or any computing devices, needs anetwork interface to connect to a network andcommunicate with other devices on the network.A Network Interface Card or NIC is an expansioncard that allows the transmission of data over acable network.Also known as a network adapter card, it is anelectronic circuit card that is inserted inside thecomputer.Installing NIC into computers enables the user to connect with othercomputers and share not only data but also other devices such as the serverand printer.Once it is installed, you can connect the network cable from the computer tothe switch or hub. Then, with some software configuration, your computer isready for communication on the network.Inserting or installing a NetworkInterface card is not difficult. If youhave installed a modem, a soundcard, or a video controller card onyour computer before, you willprobably find it a simple task toinstall a Network Interface Card.CHECKING FOR A NETWORK INTERFACE CARDCheck whether your PC already has a NetworkInterface Card by inspecting the back of thePC for a network socket.
  • 83. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.83IDENTIFYING THE LOCATION OF THE NETWORKINTERFACE CARDIf your PC does not have a Network Interface Card,then you need to insert one. First you have todisconnect the power from your PC.You should remember the dangers of staticelectricity. Once the main power supply has beenturned off, touch anymetal part on your computer casing before startingyour work.Second, carefully remove the casing or side panel ofyour PC. Select either the ISA (black) or PCI (white)slot, depending on the Network Interface Card youare using.Third, remove the back blank plate from behind theslot you have selected for the Network InterfaceCard.
  • 84. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.84INSERTING THE NETWORK INTERFACE CARDInsert the Network Interface Card into the slot youhave selected by firmly pressing the card down.Secure the card in place with the screw from theblanking plate.Replace the casing or side panel of your PC.Finally, boot the PC and install the driver.
  • 85. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.85LESSON 34INSTALLING NETWORK INTERFAC E CARD (NIC)INSTALLING THE NIC DRIVER FOR WINDOWS 98AND WINDOWS ME.Step 1: After inserting the Network Interface Cardinto its slot, the Add New Hardware Wizard shouldnow appear. Click Next to continue.Step 2: Select Search for the better driver and clickNext to continue.Step 3: Select Specify a location and browse tothe location where your CD-ROM drive is located.Select Next to continue.Step 4: Windows will locate the correct driver foryour device on the CD supplied by the library.Windows will also indicate that it is now ready toinstall the driver. Select Next to continue.The NIC driver is now properly installed.Restart the computer to complete the installation.
  • 86. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.86INSTALLING THE NIC DRIVER FOR WINDOWS 2000Windows will indicate that it has found a newhardware after the NIC has been inserted into itsslot. The Found New Hardware Wizard will thenappear. Click Next to continue.Step 1: Select "Search for a suitable driver for mydevice (recommended) and click Next tocontinue.Step 2: Select CD-ROM Drives and click Next tocontinue. Windows will now search for a suitabledriver for your device.Step 3: Windows will locate the correct driver foryour device and indicate that it is now ready toinstall the driver. Click Next to continue.The NIC driver is now properly installed.Restart the computer to complete the installation.
  • 87. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.87INSTALLING THE NIC DRIVER FOR WINDOWS XPWindows will indicate that it has found a newhardware after the NIC has been inserted into itsslot. The Found New Hardware Wizard will thenappear. Click Next to continue.Step 1: Select Search for the best driver for mydevice (recommended) and click Next tocontinue.Step 2: Select CD-ROM Drives and click Next tocontinue. Windows will now search for a suitabledriver for your device.Step 3: Windows will locate the correct driver foryour device and indicate that it is now ready toinstall the driver. Click Next to continue.The NIC driver is now properly installed.Restart the computer to complete the installation.
  • 88. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.88INSTALLING A WIRELESS NETWORK INTERFACECARD DRIVERStep 1: Place your client adapter in the PCI of yourcomputer.Windows will indicate that it has found newhardware.The "Found New Hardware Wizard" will then appear.Click "Next" to continue.Step 2: Select CD-ROM Drives and click Next tocontinue. Windows will now search for a suitabledriver for your device.The NIC driver is now properly installed.Restart the computer to complete the installation.
  • 89. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.89LESSON 35CRIMPING STRAIGHT CABLESTRAIGHT CABLEA network cable acts as anextension enabling a device with aNetwork Interface Card to beattached to a network.A common form of network mediais the UTP CAT 5 known asUnshielded Twisted-Pair Category5 cable.ITEMS FOR MAKING STRAIGHT CABLECAT 5 CABLECAT 5 cable has four twisted pairs of wire for atotal of eight individually insulated wires.Each pair is colour coded with one wire having asolid colour:BlueOrangeGreenBrownTwisted around a second wire with a white background and a stripe of thesame colour.RJ-45The straight cable is terminated with CAT 5 RJ-45 (Jack)modular plug (RJ means Registered Jack).RJ-45 plug are similar to those youll see on the end ofyour telephone cable except they have eight contacts onthe end of the plug and they are about twice as big.Make sure they are rated for CAT 5 wiring.
  • 90. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.90CRIMP TOOLCrimp tool - to crimp RJ-45 connectors.CABLE STRIPPERCable stripper to cut and stripcables.CUTTERSCutters - to cut the cable off at the reel and to finetune the cable ends during assembly.CABLE CRIMPING PROCESSThe total length of wire segments between a PCand a hub or between two PCs cannot exceed 100Meters.Strip one end of the cable with the stripper or acutter.If you are using the stripper, place the cable inthe groove on the blade (left) side of thestripper and align the end of the cable with theright side of the stripper.Spread and arrange the pairs roughly:White/Green, BlueWhite/Blue, GreenWhite/Brown, BrownWhite/Orange, Orange
  • 91. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.91Trim the ends of the wires so they are even withone another.It is very important that the unstripped oruntwisted end be slightly less than half-inch long.If it is longer than half-inch it will be out of itsspecifications and will cause crosstalk.If it is slightly less than half-inch long, it will not beproperly clinched when RJ-45 plug is crimped on.There should be little or no space between thewires.
  • 92. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.92Hold the RJ-45 plug with the clip facing down oraway from you.Push the wire firmly into the plug.Inspect it carefully.Looking through the bottom of the plug, the wireon the far left side will have a white backgroundThe wires should all end evenly at the front of theplug.Hold the wire near the RJ-45 plug with the clipdown and firmly push it into the front-left of thecrimper.Hold the wire in place and squeeze the crimperhandles quite firmly.Crimp it once.Finally test the crimping result.Test the crimp strength.If it is done properly, an average person will not beable to pull the plug off the cable with his or herbare hands.
  • 93. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.93LESSON 36CRIMPING CROSSOVER CABLEThis cable can be used todirectly connect two computersto each other without the use ofa hub or switch.TOOLS FOR CABLE CRIMPINGWhat you need are some tools such as a cable, connectors, crimper,stripper and cutter.Be sure the cable you are using is properly rated for CAT 5.Crossover cables are terminated with CAT 5 RJ-45.STRIPPING CATEGORY 5 CABLEStart by stripping off about two inches (5cm) of theplastic jacket off the end of the cable.CATEGORY 5 CABLECategory 5 cable must only have half of an inch (1.3cm) at the end.CUTTING CATEGORY 5 CABLEBegin to untwist the twisted exposed wires on yourcable, be sure to hold onto the base of the jacketwith your other hand.Once you have all the wires untwisted begin toarrange them in the proper order:White/Green, GreenWhite/Orange, BlueWhite/Blue, OrangeWhite/Brown, Brown
  • 94. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.94Once you get all the wired arranged in the properorder, make sure your wire cutters are within reachthen grasp at the point where they enter the jacket.Grab your cutters now. Line them up along yourprepared wires about half an inch or 1.3 cm abovethe jacket.Be sure at this point that you are both half an inch or 1.3 cm above thejacket, and that your cutters are aligned straight across the wires.FITTING RJ-45 PLUGTake RJ-45 plugs and begin to slide the wires intothe RJ-45 plugs.You might face some difficulties at this point, buthave some patience and hold onto those wires.It will fit in there just fine. Once it is in as far as itwill go the wires should extend almost to the frontof the RJ-45 plugs, and about 3/8 of an inch or 2 cmof the jacket will be inside the RJ-45 plugs.CRIMPING CATEGORY 5 CABLEBe sure to keep a good grip on the RJ-45 plugand the cable.Insert the RJ-45 plug into the crimper.It should only go in one way, so you donthave to worry about inserting it.Begin to compress those crimpers.You will hear a clicking sound. Keepsqueezing.If you try to let go too early, nothing willhappen. They will not release.Keep compressing until they stop clicking orstop moving all together.At this point, you should be able to let go ofthe RJ-45 plug and the crimpers.
  • 95. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.95EXAMINING THE CRIMPED CATEGORY 5 CABLEIf you look at the end of the RJ-45 plug, youshould see that the copper connectors should notbe pressed down into the wires.Toward the back of the RJ-45 plug it should becrimped securely holding the jacket or cable in theRJ-45 plug.
  • 96. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.96LESSON 37CONFIGURATION OF NETWORKStep 1The first step is to open the Control Panel window.Step 2Select Network and Internet Connections.Step 3Click on the Network Connections icon.Step 4Inside the Network Connections window, right clickon Local Area Connection icon.Then click on Properties in the drop down menu.Step 5 (A)Make sure the TCP/IP is one of the items in the listof connection items.If TCP/IP is available, proceed to Step 6If TCP/IP is not available, click on the Installbutton.Step 5 (B)In the next dialog box, Select Protocol and clickAdd button.
  • 97. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.97Once inside the Protocol dialog box, install theInternet Protocol (TCP/IP)Then, proceed to step 6.Step 6In the next dialogue box,click on Internet Protocol(TCP/IP) icon. Then clickon the properties button.Step 7After the properties buttonis clicked, the InternetProtocol (TCP/IP) Propertieswindow will appear.You will see details like IP address, Subnet maskand Default gateway. Subnet mask specifies thesize of the network. Here,we usually use255.255.255.0 for smallnetworks.Gateways are used to connect to other networks andthe Internet.Step 8Select Use the following IPaddress .Fill in the network information given by yourteacher for the following.IP addressSubnet MaskDefault Gateway (optional)Preferred DNS Server (optional)Click the OK button when done.Finally, close all windows. You mustrestart your computer before the settingtake effect.
  • 98. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.98LESSON 38TESTING OF NETWORKOnce you have installed the network card, cables and software, you can testthe new TCP/IP protocol. Ping is the best utility for a TCP/IP connection test.TESTING OF NETWORKTo use ping, open the Command Prompt window.Enter the name or IP address you want to testafter the ping command.The ping utility then sends and receives packetsof information.If you successfully sent and received packets, allis well with the TCP/IP connection.If ping displays error messages such as:request timed outunknown hostcould not send, receive packets over thenetworkYou should verify that the IP is valid.If the problem still persists, you have to check your network adapter orprotocol.
  • 99. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.99LESSON 39SHARED FOLDERIn Windows, Macintosh and other operating systems, afolder is a named collection of a related files that can beretrieved as on entity.Folders can contain many different types of file, such asdocuments, music, pictures, videos and programs.These files can be copied or moved to other folders,computers and even to the Internet.You can also create folders within folders.You can share the files and folders stored onyour computer, and on your network.
  • 100. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.100LESSON 40WIRELESS AND MOBILEWireless and mobile technology allows you toaccess the Internet from wherever you are. You nolonger have to be at home or in the office to checkyour email or browse the net.With wireless technology, you can get connectedwith anyone from anywhere.WIRELESS AND MOBILE COMMUNICATIONWireless is a term used to describetelecommunications that use electromagneticwaves rather than some form of wire to carrysignal over part or the entire communication path.It refers to communication without cables or cords,but which chiefly uses radio frequency and infraredwaves. This method of communication relies onlow-powered radio waves to transmit data betweendevices.Wireless and mobile communications rely on IrDAand the wireless networking of computers.
  • 101. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.101WirelessWireless is a term used to describe telecommunications that useelectromagnetic waves rather than some form of wire to carry signal overpart or the entire communication path.TelecommunicationThe science of information transport using wire, radio, optical, orelectromagnetic channels to transmit and receive signals for voice or datacommunications.Electromagnetic WavesA wave produced by the interaction of time-varying electric and magneticfields.Radio FrequencyFrequency of electromagnetic waves used for radio and televisionbroadcasting.Infrared WaveElectromagnetic waves in the frequency range just below visible lightcorresponding to radiated heat. IR waves are often used for remote controls.IrDAInfrared Data Association (IrDA) is an organisation that defines the infraredcommunications protocol. A protocol used by many laptops and mobilecellular phones to exchange data at short ranges.WIRELESS TECHNOLOGYWireless technology is rapidly evolving, and is playing an increasinglyimportant role in the lives of people throughout the world. An ever-largernumber of people are relying on this technology both directly and indirectly.Specialised and exotic examples of wireless communications and controlinclude:Global System for Mobile CommunicationGeneral Packet Radio ServiceEnhanced Data GSM EnvironmentUniversal Mobile Telecommunications SystemWireless Application Protocoli-Mode
  • 102. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.102GSMGlobal System for Mobile Communications (GSM) is a globally acceptedstandard for digital cellular communications systemi-ModeThe Packet-based service for mobile phones offered by Japans leader inwireless technology, NTT DoCoMoGLOBAL SYSTEM FOR MOBILE COMMUNICATION(GSM)Global System for Mobile Communication (GSM) isa digital mobile telephone system used in Europeand other parts of the world. It is the de facto(widely recognised) wireless telephone standard inEurope.de factoA specification that hasnt been officiallyestablished by an accrediting agency but that is accepted and used as astandard by a majority of practitioners.GENERAL PACKET RADIO SERVICE (GPRS)General Packet Radio Service (GPRS) is a packet-based wireless communication service thatprovides continuous connection to the Internet formobile phone and computer users.GPRSGeneral Packet Radio Service (GPRS) is a standard for wirelesscommunications which runs at speeds up to 115 kilobits per second.PacketThe unit of data that is routed between an origin and a destination on theInternet or any other packet-switched network.
  • 103. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.103ENHANCED DATA GSM ENVIRONMENT (EDGE)Enhanced Data GSM Environment (EDGE) is a faster version of the GlobalSystem for Mobile (GSM) wireless service.EDGEEnhanced Data rates for Global Evolution(EDGE)is a faster version to the Global System for Mobile(GSM) wireless service designed to deliver dataat rates up to 384 Kbps.UNIVERSAL MOBILETELECOMMUNICATIONSSYSTEM (UMTS)Universal Mobile Telecommunications System(UMTS) is a broadband, packet-based system.It offers a consistent set of services to mobilecomputer and phone users no matter where theyare located in the world.UMTSUniversal Mobile Telecommunications System(UMTS) is a third-generation (3G) broadband, packet-based transmission oftext, digitised voice, video and multimedia at data rates up to 2 megabitsper second (Mbps) and offers global roaming.BroadbandTransmission over a network in which more than one signal is carried at atime. Broadband technology can transmit data, audio and video all at onceover long distances.WIRELESS APPLICATION PROTOCOL (WAP)Wireless Application Protocol (WAP) is a set ofcommunication protocols tostandardise the way that wireless devices, such ascellular telephones and radio transceivers can beused for Internet access.
  • 104. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.104InternetAn international network first used to connect education and researchnetworks, begun by the US government. The Internet now providescommunication and application services to international-based businesses,consumers, educational institutions, governments, and researchorganisations.TransceiverA device that performs both transmitting and receiving functions.WAPWireless Application Protocol (WAP) is a specification for a set ofcommunication protocols to standardise the way wireless devices, such ascellular telephones and radio transceivers, can be used for Internet access.i-MODEi-Mode, the worlds first "smart phone service" wasfirst introduced in Japan.It not only provides colour and video overtelephone sets but can also be used for Webbrowsing.Smart PhoneA cellular telephone that provides digital voice service as well as anycombination of e-mail, text messaging, pager, Web access, voice recognitionas well as picture taking (camera phone).TYPES OF WIRELESSWireless can be divided into four categories. They are:fixed wirelessmobile wirelessportable wirelessIR wirelessFIXED WIRELESSFixed wireless is the operation of wireless devices orsystems in homes and offices. Devices of fixedwireless are connected to the Internet via specialisedmodems.
  • 105. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.105MOBILE WIRELESSMobile wireless is the use of wireless devices orsystems aboard motorised, moving vehicles.Examples of mobile wireless are the automotivecell phone.PORTABLE WIRELESSPortable wireless is the operation of autonomous,battery-powered wireless devices or systemsoutside the office, home or vehicle. An examplesof portable wireless are cell phones.IR WIRELESSIR wireless is the use of devices that convey datavia IR (infrared) radiation and is employed incertain limited-range communications and controlsystems.
  • 106. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.106LESSON 41MOBILE COMPUTINGMobile computing is a generic term usedto describe the ability to use technologyto wirelessly connect to and use centrallylocated information and/or applicationsoftware via small portable and wirelesscomputing and communication devices.Nomadic computing is another name formobile computing. Here, users canaccess the Internet and retrieve datafrom anywhere in the world, usingportable computing devices (such aslaptop and handheld computers) inconjunction with mobile communication technologies.People using such a system are sometimes referred to as technomads, andtheir ability to use that system is referred to as nomadicity.Nomadic ComputingA computing environment which offers its user access to data or informationfrom any device and network while he or she is in on the move.NomadicityThe tendency of a person, or group of people, to move with relativefrequency.DEFINING MOBILE COMPUTINGMobile computing is about the new strategies ofcomputing that utilise portable or mobile devicesand wireless communication networks. Thereare various types of mobile computing devices.They include the notebook computer, tablet PC,handheld computer, PDA and smartphone.Tablet PCA wireless personal computer (PC) that allows a user to takenotes in his/her natural handwriting using a stylus or digitalpen on a touch screen.
  • 107. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.107PDAHandheld computer device used to organise personalinformation such as contacts and schedules. Data canusually be transferred to a desktop computer by cable orwirelesstransmission.SmartphoneA cellular telephone that provides digital voice service aswell as any combination of e-mail, text messaging, pager,Web access, voice recognition as well as picture taking(camera phone).Wireless communication technologies commonly used for mobile computinginclude the wireless LAN technology, WWAN technology, Bluetooth and IrDAinterfaces.Mobile computing can be :Wireless and mobile access to the Internet.Wireless and mobile access to private intranets.Wireless and ad hoc mobile access between mobilecomputers.LANA group of personal computers and/or other devices, such as printers orservers, that are located in a relatively limited area, such as an office, andcan communicate and share information with each other.WWANWireless Wide Area Network (WWAN) is a form of wireless network that usescellular network technologies such as GPRS,CDMA2000, GSM, CDPD andMobitex to transfer data.BluetoothA wireless networking technology using radio waves that enables users tosend data and voice signals between electronic devices over short distances.
  • 108. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.108TYPES OF MOBILE COMPUTING DEVICESNOTEBOOK COMPUTERA notebook computer or notebook is a small mobilepersonal computer, usually weighing from one tothree kilograms. Using the technology fromSymbionics Networks Ltd., a wireless LAN adaptercan be made to fit on a PCMCIA card in a laptop ornotebook computer to provide mobile computing.PCMCIA stands for Personal Computer MemoryCard Industry Association.PCMCIAPersonal Computer Memory Card InternationalAssociation (PMCIA) is an industry group organisedin 1989 to promote standards for a credit card-sizememory or I/O device that would fit into a personalcomputer, usually a notebook or a laptopcomputer.TABLET PCA tablet PC is a notebook or slate-shaped mobile computer.Its digitising tablet technologyallows the user to operate thecomputer using a stylus or digitalpen and a touch screen instead ofthe usual keyboard and mouse.Most Tablet PCs offer built-in support for wireless networks.StylusA writing device similar to a modern ballpoint pen to write text or drawlines on a surface as input to a computer or point to menus.Touch ScreenDisplay overlays which are typically either pressure-sensitive (resistive),electrically-sensitive (capacitive), acoustically-sensitive (SAW - surfaceacoustic wave) or photo-sensitive (infra-red). The user selects, moves anddraws by pointing to, and touching, the relevant part of the screen.
  • 109. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.109PDAPersonal digital assistants or PDAs are handhelddevices that were originally designed as personalorganisers but became much more versatile overthe years.Many PDAs can access the Internet, intranets orextranets via Wi-Fi or Wireless Wide-Area Networksor WWANs.SMART PHONEA smart phone is an electronic handheld devicethat integrates the functionality of a mobile phoneand a personal digital assistant or PDA orother information appliance.This is often achieved by adding telephonefunctions to an existing PDA or PDA Phone orputting smart capabilities such as PDA functionsinto a mobile phone.TECHNOLOGIES FOR MOBILE COMPUTINGWIRELESS LANA wireless LAN is a technology that allownotebook users to connect to a Local AreaNetwork (LAN) through a wireless (radio)connection.The IEEE 802.11 group of standards specifiestechnologies to be used for wireless LANs.WWANWWAN, which stands for Wireless Wide AreaNetwork, is a form of wireless network.Wireless Wide Area Network (WWAN) is aform of wireless network that uses cellularnetwork technologies such as GPRS,CDMA2000, GSM, CDPD and Mobitex totransfer data.
  • 110. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.110BLUETOOTHBluetooth, also known as IEEE 802.15.1, isa telecommunication industry specificationfor wireless Personal Area Networks orPANs. Bluetooth devices operate on a radiocommunication system.For two Bluetooth devices to communicate,they do not have to be in line-of-sight. Infact, they can even be in separate rooms,as long as the received power is highenough.Bluetooth transmits and receives data in a frequency band of 2.45 GHz.THE INFRARED DATA ASSOCIATIONThe Infrared Data Association or IrDAdefines physical specifications ofcommunication protocol standards for shortrange exchange of data over infrared light.This is used in Personal Area Networks(PANs).Among existing uses of IrDA and possibleuses are:sending a document from a notebookcomputer to a printerexchanging business cards between handheld PCscoordinating schedules and telephone books between a desktop andnetwork computers.PANPersonal Area Network (PAN) is a computer network used for communicationamong computer devices (including telephones and personal digitalassistants) close to one person.
  • 111. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.111COMMON SERVICES FOR MOBILE COMPUTINGTo cater to the needs of mobile computing, WirelessService Providers would seek to provide wireless accesspoints for as many wireless network devices as possiblein specified service zones.Services include:Services include:email capabilitiesA variety of software applications for secured communications.Print stationsTracking and navigation systemsInstant mobile messagingMobile secutity servicesMobile data, voive and video systems.Access to satellitte radio and TV.Remote home premise video monitor.
  • 112. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.112LESSON 42INTERNET TECHNOLOGYThe Internet works wonders to those who are in touch with the technology.Communication is made easy, economical and fast with the development inthe Internet technology.Now, we do not have to suffer high telephone bills because of our overseacalls. The Internet allow us to make voice calls for free, like those servicesprovided by Skype and Yahoo Messenger.DEFINITION OF INTERNET TECHNOLOGYInternet Technology is a broad range of technologies for web development,web production, design, networking, telecommunication and e-commerce.VOICE OVER INTERNETPROTOCOL (VoIP)Protocols used to carry voice signals over the IPnetwork are commonly referred to as Voice overIP or VoIP. VoIP is one of the Internettechnologies that allows a user to make telephonecalls using a broadband Internet connectioninstead of a regular (or analog) phone line.VoIP is a method for taking analog audio signals and turning them intodigital data that can be transmitted over the Internet.
  • 113. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.113VoIP SERVICESThere are three different VoIP services in common use today. They areAnalog Telephone Adapter (ATA), IP Phones and computer-to-computer.ANALOG TELEPHONE ADAPTER (ATA)The simplest and most common way isthrough the use of a device called anAnalog Telephone Adapter (ATA). The ATAallows you to connect a standard phone toyour computer or your Internet connectionfor use with VoIP.The ATA is an analog-to-digital converter. Ittakes the analog signal from your traditionalphone and converts it into digital data fortransmission over the Internet.Skype, one VoIP provider, offers free calling locally and between members,and inexpensive long-distance calls to other numbers.
  • 114. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.114IP PHONESIP Phones look just like normal phones with ahandset, a cradle and buttons. IP Phoneshave an RJ-45 Ethernet connector instead ofthe standard RJ-11 phone connectors.IP Phones connect directly to your router andhave all the necessary hardware andsoftware onboard to handle the IP Call. Soon,WiFi IP phones will be available, allowingsubscribing callers to make VoIP calls fromany WiFi hot spot.COMPUTER-TO-COMPUTERComputer-to-computer is certainly theeasiest way to use VoIP. Devices needed toplace a computer-to-computer Internettelephone call:Software, a microphone, speakers orheadphones, a sound card and an Internetconnection preferably a fast one like youwould get through a cable or DSL modem.Except for your normal monthly ISP fee,there is usually no charge for computer-to-computer calls, no matter whatthe distance.ADVANTAGES OF VoIPAs VoIP is digital, it may offer features andservices that are not available with a traditionalphone. If you have a broadband Internetconnection, you need not maintain and pay theadditional cost for a line just to make telephonecalls.With many VoIP plans you can talk for as longas you want with any person in the world. Youcan also talk with many people at the same timewithout any additional cost.
  • 115. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.115DISADVANTAGES OF VoIPSome VoIP services do not work duringpower failures and the service providermay not offer backup power.Not all VoIP services connect directly toemergency services. VoIP providers mayor may not offer directory assistance orwhite page listings.As VoIP uses an Internet connection, it issusceptible to all the problems normallyassociated with home broadbandservices.Phone conversations can become distorted, garbled or lost because oftransmission errors. Some kind of stability in Internet data transfer needs tobe guaranteed before VoIP could truly replace traditional phones.VoIP is susceptible to worms, viruses and hacking, although this is very rareand VoIP developers are working on VoIP encryption to counter this.
  • 116. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.116LESSON 43INTERNET SERVICESBLOGGINGA blog (web log or weblog) is one of the popularactivities on the Internet. Most of these blogs arepublicly shared and the authors frequently updatethe content on a regular basis.A blog is usually referred to the text produced by theauthor about his or her thoughts, experiences orinterests.A blog is usually referred to the text produced by theauthor about his or her thoughts, experiences orinterests.The world of blogging is referred as blogosphere.Another new term is the blogonomics, which refers topeople using the blogosphere to generate money.The posts to a blog are usually arranged in this order, the most recententries will always be on top of the journal.To write a good blog, you need to remember these principles:use a consistent writing style and appropriate tone for your subjectpost often, though your posts are shortallow your readers to eave you comments on your postsIf you would like to search some blogs, you can visit blogarama.com(www.blogarama.com), which categorises blogs into directories. Followingare several top blogging resources you should check out:Blogger (www.blogger.com) - owned by Google, one of the free andeasiest to maintain blogging tool.TypePad (www.typepad.com) - the blog tool that provides morefunctionality for a minimal fee.Movable Type (www.movabletype.org) - if you have your owndomain site and want to put several blogs together, this is the bestchoiceWordpress (wordpress.org) - an open source blogging tool thatneeds a bit of coding to make your blogs more interesting
  • 117. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.117WORLD WIDE WEB (WWW)The World Wide Web or the Web consists of aworldwide collection of electronic documents.Each electronic document on the Web is called aweb page which can contain text, graphics, audioand video.These pages are written in Hypertext MarkupLanguage (HTML).Every website has an address or UniformResource Locator (URL). The URL is formed by theprotocol, domain, directory and the document name.EMAILAn electronic mail or email is the transmission ofmessages and files via a computer network.A user utilises an email program to create, send,receive, forward, store, print and delete emailmessages.Some emails are called web-based email likeYahoo Mail and Hotmail.THE INTERNET RELAY CHAT (IRC)The Internet Relay Chat (IRC) is a system forchatting that involves a set of rules and conventions,and client/server software.A chat is a real-time typed conversation that takesplace on a computer. A chat room is a location on anInternet server that permits users to chat with eachother.Anyone in the chat room can participate in the conversation,which usually is specific to a particular topic.SEARCH ENGINESSearch engines are special websites on the Internet to help youfind information you need. Different search engines will servedifferent purposes, for example:
  • 118. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.118Google Scholar (http://scholar.google.com/) is for searchingauthoritative and scholarly sites.Google (http://www.google.com/) is for searching valuable or relevantsites with rankings.Yahoo News (http://dailynews.yahoo.com) is for searching opinions oncurrent issues.Wikipedia (http://www.wikipedia.org/) it is an open source forencyclopedia
  • 119. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.119LESSON 44ADVANCED NETWORKINGPERSONAL AREA NETWORK (PAN)A Personal Area Network (PAN) is a computer network used forcommunication among computer devices including PCs, laptops, printers,telephones, digital cameras, mobile phones, video game consoles andpersonal digital assistants, close to one person.Personal Area Networks may be wired with USB port, Firewire port, Infrared(IrDA) and Bluetooth technologies. Bluetooth is the popular wireless PANused by most people, especially the mobile phone technologies, and itapplies the IEEE 802.15.1 standards.VIRTUAL PRIVATE NETWORK (VPN)A Virtual Private Network (VPN) is a network that uses a publictelecommunication infrastructure, such as the Internet, to remote offices orindividuals with secure access to their organisations private network.VPN uses tunnelling mechanism to maintain privacy and security of thedata. Tunnelling means transmitting data packets across a public network.VPN is often used by companies to provide access from their internalnetwork resources to their home or mobile workers.
  • 120. 3.0 COMPUTER NETWORKS AND COMMUNICATIONS.120WIRELESS LAN (WLAN)Wireless Local Area Network (WLAN) is a type of LAN that uses high-frequency radio waves to communicate between nodes. WLAN improvesuser mobility, speed and scalability to move around within a broad coveragearea and still be connected to the network.The IEEE standard for Wireless LANs is 802.11WORLDWIDE INTEROPERABILITY FOR MICROWAVEACCESS (WiMAX)Worldwide Interoperability for Microwave Access (WiMAX) is the industryterm for broadband wireless access network that is developed based on theIEEE 802.16 standard.WiMAX is a Wireless Metropolitan Area Network (MAN) technology that willconnect WiFi hotspots to the Internet and provides a wireless extension tocable and DSL for larger broadband access.WiMAX would operate similar toWiFi but at higher speeds, over greaterdistances and for a greater number of users.A WiMAX system will have two major parts:a WiMAX base station, similar in concept to a mobile phone towera WiMAX receiver installed at home