CSC 465 Lecture-1 Notes DAS
CSC 465 Lecture-1 Notes DAS
CSC 465 Lecture-1 Notes DAS
Connectivity:
Connectivity is a concept related to using computer networks to link people and resources. For
example, connectivity means that you can connect your microcomputer to other computers and
information sources almost anywhere. With this connection, you are linked to the world of larger
computersand the Internet. This includes hundreds of thousands of Web servers and their
extensive information resources. Thus, becoming computer competentand knowledgeable
becomes a matter of knowing not only about connectivity through networks to microcomputers,
but also about larger computer systems and their information resources.
The Wireless Revolution:
The single most dramatic change in connectivity and communications in the past few years has
been the widespread use of mobile telephones with wireless Internet connectivity. Students,
parents, teachers, business people, and others routinely talk and communicate with these devices.
It is estimated that over 3 billion mobile telephones are in use worldwide. This wireless
technology allows individuals to stay connected withone another from almost anywhere at any
time.
So what’s the revolution? While wireless technology was originally used primarily for voice
communications, today’s cell phones support e-mail, Web access, and a variety of Internet
applications. In addition, wireless technology allows a wide variety of nearby devices to
IUBAT – International University of Business Agriculture and Technology Fall
CSC 465 – Lecture-1 Notes DAS
communicate with one another without any physical connection. You can share a high-speed
printer, share data files, and collaborate on working documents with a nearby co-worker without
having your computers connected by cables or telephone—wireless communication. High-speed
Internet wireless technology allows individuals to connect to the Internet and share information
from almost anywhere in the world. But is it a revolution? Most experts say yes and that the
revolution is just beginning.
Communication Systems
Communication systems are electronic systems that transmit data from one location to another.
Whether wired or wireless, every communication system has four basic elements. (See Figure 1)
2
IUBAT – International University of Business Agriculture and Technology Fall
CSC 465 – Lecture-1 Notes DAS
displayed on your friend’s computer, the receiving device. (Note: This example presents the
basic communication system elements involved in sending e-mail. It does not and is not intended
to demonstrate all the specific steps and equipment involved in an e-mail delivery system.)
Communication channels
Communication channels are an essential element of every communication system. These
channels actually carry the data from one computer to another. There are two categories of
communication channels. One category connects sending and receiving devices by providing a
physical connection, such as a wire or cable. The other category is wireless.
Physical Connections:
Physical connections use a solid medium to connect sending and receiving devices. These
connections include telephone lines (twisted pair), coaxial cable, and fiber-optic cable.
Twisted-pair cable consists of pairs of copper wire that are twisted together.
Both standard telephone lines and Ethernet cables use twisted-pair. (See 2-a)
Ethernet cables are often used in networks and to connect a variety of components
to the system unit.
Coaxial cable, a high-frequency transmission cable, replaces the multiple wires of
telephone lines with a single solid-copper core. (See Figure 2-b) In terms of the
number of telephone connections, a coaxial cable has over 80 times the
transmission capacity of twisted pair. Coaxial cable is used to deliver television
signals as well as to connect computers in a network.
Fiber-optic cable transmits data as pulses of light through tiny tubes of glass.
(See Figure 2-c) In terms of the number of telephone connections, fiber-optic
cable has over 26,000 times the transmission capacity of twisted-pair cable.
3
IUBAT – International University of Business Agriculture and Technology Fall
CSC 465 – Lecture-1 Notes DAS
Wireless Connections:
Wireless connections do not use a solid substance to connect sending and receiving devices.
Rather, they move data through the air. Primary technologies used for wireless connections are
radio frequency, microwave, satellite, and infrared.
Satellite communication uses satellites orbiting about 22,000 miles above the
earth as microwave relay stations. Many of these are offered by Intelsat, the
International Telecommunications Satellite Consortium, which is owned by 114
governments and forms a worldwide communication system. Satellites rotate at a
precise point and speed above the earth. They can amplify and relay microwave
signals from one transmitter on the ground to another. Satellites can be used to
send and receive large volumes of data. Uplink is a term relating to sending data
to a satellite. Downlink refers to receiving data from a satellite. The major
drawback to satellite communication is that bad weather can sometimes interrupt
the flow of data.
4
IUBAT – International University of Business Agriculture and Technology Fall
CSC 465 – Lecture-1 Notes DAS
Connection Devices
At one time nearly all computer communication used telephone lines. However, because the
telephone was originally designed for voice transmission, telephones typically send and receive
analog signals, which are continuous electronic waves. Computers, in contrast, send and receive
digital signals. (See Figure 3)These represent the presence or absence of an electronic pulse—
the on/off binary signals. To convert the digital signals to analog signals and vice versa, you need
a modem.
Modems
The word modem is short for modulator-demodulator. Modulation is the name of the process of
converting from digital to analog. Demodulation is the process of converting from analog to
digital. The modem enables digital microcomputers to communicate across different media,
including telephone wires, cable lines, and radio waves. The speed with which modems transmit
data varies. This speed, called transfer rate, is typically measured in thousands of bits
(kilobits) per second (Kbps). The higher the speed, the faster you can send and receive
information. For example, transferring an image like Figure 3 might take 5 seconds with a 500
Kbps modem and less than 3 seconds with an 850 Kbps modem. There are four commonly used
types of modems: telephone, DSL, cable, and wireless. (See Figure 4)
5
IUBAT – International University of Business Agriculture and Technology Fall
CSC 465 – Lecture-1 Notes DAS
These devices are usually external and connect to the system unit using either
USB or Ethernet ports.
A cable modem uses the same coaxial cable as your television. Like a DSL
modem, a cable modem creates high-speed connections using the system unit’s
USB or Ethernet port.
A wireless modem is also known as a WWAN (wireless wide area network)
modem. It is usually a small plug-in USB or Express-Card device that provides
very portable high-speed connectivity from virtually anywhere.
Connection Service
For years, large corporations have been leasing special high-speed lines from telephone
companies. Originally, these were copper lines, known as T1 lines that could be combined to
form higher-capacity options known as T3 or DS3 lines. These lines have largely been replaced
by optical carrier (OC) lines, which are substantially much faster. While the special high-speed
lines are too costly for most individuals; Internet service providers do provide affordable
connections. For years, individuals relied on dial-up services using existing telephones and
telephone modems to connect to the Internet. This type of service has been replaced by higher-
speed connection services including DSL, cable, satellite, and cellular services.
6
IUBAT – International University of Business Agriculture and Technology Fall
CSC 465 – Lecture-1 Notes DAS
Data Transmission
Several factors affect how data is transmitted. These factors include bandwidth and protocols.
Bandwidth
Bandwidth is a measurement of the width or capacity of the communication channel.
Effectively, it means how much information can move across the communication channel in a
given amount of time. For example, to transmit text documents, a slow bandwidth would be
acceptable. However, to effectively transmit video and audio, a wider bandwidth is required.
There are four categories of bandwidth.
7
IUBAT – International University of Business Agriculture and Technology Fall
CSC 465 – Lecture-1 Notes DAS
Protocols
For data transmission to be successful, sending and receiving devices must follow a set of
communication rules for the exchange of information. These rules for exchanging data between
computers are known as protocols.
The standard protocol for the Internet is TCP/IP (transmission control protocol/Internet
protocol). The essential features of this protocol involve (1) identifying sending and receiving
devices and (2) breaking information into small parts for transmission across the Internet.
8
IUBAT – International University of Business Agriculture and Technology Fall
CSC 465 – Lecture-1 Notes DAS
Networks
A computer network is a communication system that connects two or more computers so that
they can exchange information and share resources. Networks can be set up in different
arrangements to suit users’ needs. (See Figure 5)
Terms
There are a number of specialized terms that describe computer networks. These terms include:
•Node—any device that is connected to a network. It could be a computer, printer, or data
storage device.
•Client—a node that requests and uses resources available from other nodes. Typically, a
client is a user’s microcomputer.
•Server—a node that shares resources with other nodes. Dedicated servers specialize in
performing specific tasks. Depending on the specific task, they may be called an
application server, communication server, database server, file server, printer server, or
Web server.
9
IUBAT – International University of Business Agriculture and Technology Fall
CSC 465 – Lecture-1 Notes DAS
•Directory server—a specialized server that manages resources, such as user accounts,
for an entire network.
•Host—any computer system that can be accessed over a network.
•Switch—central node that coordinates the flow of data by sending messages directly
between sender and receiver nodes. A hub previously filled this purpose by sending a
received message to all connected nodes, rather than just the intended node.
•Network interface cards (NIC)—these are expansion cards located within the system
unit that connect the computer to a network. Sometimes referred to as a LAN adapter.
•Network operating systems (NOS)—control and coordinate the activities of all
computers and other devices on a network. These activities include electronic
communication and the sharing of information and resources.
•Network administrator—a computer specialist responsible for efficient network
operations and implementation of new networks.
A network may consist only of microcomputers, or it may integrate microcomputers or other
devices with larger computers. Networks can be controlled by all nodes working together equally
or by specialized nodes coordinating and supplying all resources. Networks may be simple or
complex, self-contained or dispersed over a large geographical area.
Network Types
Clearly, different types of channels—wired or wireless—allow different kinds of networks to be
formed. Telephone lines, for instance, may connect communications equipment within the same
building or within a home. Networks also may be citywide and even international, using both
cable and wireless connections. Local area, metropolitan area, and wide area networks are
distinguished by the geographical area they serve.
10
IUBAT – International University of Business Agriculture and Technology Fall
CSC 465 – Lecture-1 Notes DAS
There are a variety of different standards or ways in which nodes can be connected to one
another and ways in which their communications are controlled in a LAN. The most common
standard is known as Ethernet. LANs using this standard are sometimes referred to as Ethernet
LANs.
Home Networks
While LANs have been widely used within organizations for years, they are now being
commonly used by individuals in their homes and apartments. These LANs, called home
networks, allow different computers to share resources, including a common Internet
connection. Computers can be connected in a variety of ways, including electrical wiring,
telephone wiring, and special cables. One of the simplest ways, however, is without
cables, or wireless.
Wireless LAN
A wireless local area network is typically referred to as a wireless LAN (WLAN). It uses
radio frequencies to connect computers and other devices. All communications pass
through the network’s centrally located wireless access point or base station. This
access point interprets incoming radio frequencies and routes communications to the
appropriate devices.
11
IUBAT – International University of Business Agriculture and Technology Fall
CSC 465 – Lecture-1 Notes DAS
A. MAN B. WAN
Figure 7. MAN and WAN
The primary difference between a LAN, MAN, and WAN is the geographical range. Each may
have various combinations of hardware, such as microcomputers, minicomputers, mainframes,
and various peripheral devices.
12
IUBAT – International University of Business Agriculture and Technology Fall
CSC 465 – Lecture-1 Notes DAS
Network architecture:
Network architecture describes how a network is arranged and how resources are coordinated
and shared. It encompasses a variety of different network specifics, including network topologies
and strategies. Network topology describes the physical arrangement of the network. Network
strategies define how information and resources are shared.
Topologies:
A network can be arranged or configured in several different ways. This arrangement is called
the network’s topology. While many different topologies can be used for networks, six basic
categories represent the past and present. Figure 8 shows the different network topologies.
The past is represented by two network topologies that can still be found today but have
beenreplaced in large part by newer, more efficient topologies. These older or legacy networks
are
13
IUBAT – International University of Business Agriculture and Technology Fall
CSC 465 – Lecture-1 Notes DAS
14
IUBAT – International University of Business Agriculture and Technology Fall
CSC 465 – Lecture-1 Notes DAS
The most common network strategies are terminal, client/server, peer-to-peer, and distributed.
In a terminal server network, processing power is centralized in one large computer, with the
capacity to handle a large number of connections. The nodes connected to this host computer are
either terminals with little or no processing capabilities or microcomputers running special
terminal emulation software such as Windows Remote Desktop. (See Figure 9-a)
Many airline reservation systems are terminal server networks. A large central computer
maintains all the airline schedules, rates, seat availability, and so on. Travel agents use terminals
to connect to the central computer and to schedule reservations. Although the tickets may be
printed along with travel itineraries at the agent’s desk, nearly all processing is done at the
central computer.
One advantage of terminal server networks is the centralized location and control of technical
personnel, software, and data. One disadvantage is the lack of control and flexibility for the end
user. Another disadvantage is that terminal server networks do not use the full processing power
available with microcomputers.
Client/server networks use central computers to coordinate and supply services to other nodes
on the network. The server provides access to resources such as Web pages, databases,
application software, and hardware. (See Figure 9-b) This strategy is based on specialization.
Server nodes coordinate and supply specialized services, and client nodes request the services.
Commonly used server operating systems are Windows Server, Mac OS X Server, Linux, and
Solaris.
Client/server networks are widely used on the Internet. For example, each time you open a Web
browser, your computer (the client) sends out a request for a specific Web page. This request is
routed over the Internet to a server. This server locates and sends the requested material back to
your computer.
15
IUBAT – International University of Business Agriculture and Technology Fall
CSC 465 – Lecture-1 Notes DAS
One advantage of the client/server network strategy is the ability to handle very large networks
efficiently. Another advantage is the availability of powerful network management software to
monitor and control network activities. The major disadvantages are the cost of installation and
maintenance.
In a peer-to-peer (P2P) network, nodes have equal authority and can act as both clients and
servers. (See Figure 9-c) The most common way to share games, movies, and music over the
Internet is to use a P2P network. For example, special file-sharing software such as eDonkey or
BitTorrent can be used to obtain files located on another microcomputer and also can provide
files to other microcomputers.
P2P networks are rapidly growing in popularity as people continue to share information with
others around the world. The primary advantage is that they are easy and inexpensive (often free)
to set up and use. One disadvantage of P2P networks is the lack of security controls or other
common management functions. For this reason, few businesses use this type of network to
communicate sensitive information.
In a distributed processing network, processing capability is located and shared at different
nodes or locations. This type of strategy is common for decentralized organizations where
divisional offices have their own computer systems. The computer systems in the divisional
offices are networked to the organization’s main or centralized computer.
Organizational Networks
Computer networks in organizations have evolved over time. Most large organizations have a
complex and wide range of different network configurations, operating systems, and strategies.
These organizations face the challenge of making these networks work together effectively and
securely.
Internet Technologies:
Many organizations today employ Internet technologies to support effective communication
within and between organizations using intranets and extranets.
• An intranet is a private network within an organization that resembles the
Internet. Like the public Internet, intranets use browsers, Web sites, and Web pages.
Typical applications include electronic telephone directories, e-mail addresses, employee
benefit information, internal job openings, and much more. Employees find surfing their
organizational intranets to be as easy and as intuitive as surfing the Internet.
• An extranet is a private network that connects more than one organization. Many
organizations use Internet technologies to allow suppliers and others limited access to
their networks. The purpose is to increase efficiency and reduce costs. For example, an
automobile manufacturer has hundreds of suppliers for the parts that go into making a
car. By having access to the car production schedules, suppliers can schedule and deliver
16
IUBAT – International University of Business Agriculture and Technology Fall
CSC 465 – Lecture-1 Notes DAS
parts as they are needed at the assembly plants. In this way, operational efficiency is
maintained by both the manufacturer and the suppliers.
Network Security:
Large organizations face the challenge of ensuring that only authorized users have access to
network resources, sometimes from multiple geographic locations or across the Internet.
Securing large computer networks requires specialized technology. Three technologies
commonly used to ensure network security are firewalls, intrusion detection systems, and virtual
private networks.
17
IUBAT – International University of Business Agriculture and Technology Fall
CSC 465 – Lecture-1 Notes DAS
matching and heuristics, an IDS system can recognize signs of a network attack
and disable access before an intruder can do damage.
Virtual private networks (VPN) create a secure private connection between a
remote user and an organization’s internal network. Special VPN protocols create
the equivalent of a dedicated line between a user’s home or laptop computer and a
company server. The connection is heavily encrypted and, from the perspective of
the user, it appears that their workstation is actually located on the corporate
network.
18