f4 Networking and Communication
f4 Networking and Communication
Broadcast communication.
Packet- switching
Transmission impairments
Attenuation
Distortion
Noise
Network models
Centralized computer model.
Distributive computing
Collaborative model.
Categories of networks
Peer-to-Peer network.
Server-based networks.
Network Security
Share level security
User-level security
A Network can be defined as a collection of independent entities that are arranged in such
a manner as to exchange data, information or resources.
Examples of networks:
Road network: - this is the interconnection of roads in a country, continent or throughout the world.
Road networks facilitate the transfer of goods & services from one area to another.
Telephone network (voice networks): - it includes the many lines that criss-cross a country, and
enables people to communicate.
Railway network.
Nervous system.
Computer Network
A computer network can be defined as a collection 2 or more computers connected together using
transmission media (e.g., telephone cables, or Satellites) for the purpose of communication and
sharing of resources.
Usually there can be from 2 to hundreds or even thousands of computers on the network.
Apart from computers, other devices such as Printers, plotters, fax machines, modems, etc can
also be connected to the network.
The term Transmission media refers to any physical or non-physical link between 2 or
more computers, and in which a signal can be made to flow from source to destination.
Network Server.
Computer networks usually have one computer reserved as the “Mother” of all the
other computers on the network.
A Server is a powerful computer that provides services (shared resources) to the other
computers on the network. It enables information, resources & network devices to be shared by
users on a computer network.
Network servers;
Get more notes and past papers at www.easyelimu.com. (WhatsApp only +254 700 755976 for more)
i. Have a higher hard disk & main memory (RAM) capacity than the other computers on
the network.
ii. Store & run a special program called the server software (network operating system),
which controls computers on the network.
Clients (workstations)
Clients (also referred to as Workstations) are Personal Computers (PCs) attached to the
network, on which the network users do their work. They are used by network users to send their
requests to the server.
Clients;
i. Are usually less powerful than the server, and use the resources provided by the Server.
ii. Have their own operating systems and files.
The PCs can be IBM or compatible running MS-DOS, OS/2, Windows, etc.
The figure below shows a server on a network.
Data Communication
Data communication refers to the process of transmitting data signal from one place to
another through a communication media.
The basic components of a data transmission system are:
a. A central computer.
b. Terminal devices.
c. Telecommunications link between the central computer & the terminal devices.
Data signal:
A data signal is a voltage level in the circuit which represents the flow of data.
In data communication, there are 2 types of data signals; Digital and Analog.
Analog data is made up of continuous waveforms, while digital data is made up of a noncontinuous
discrete waveform.
This is the process of converting data signals to a form that can be transmitted over a transmission
medium.
E.g., a modem converts a digital signal to an analog signal, which can be transmitted over
analog telephone lines. This process is called modulation. A modem at the receiving end converts
the analog signal into a digital signal, a process known as demodulation.
Multiplexing is the process of sending multiple data signals over the same medium, e.g., a
wire conductor can be made to carry several data signals either simultaneously or at different
times.
Demultiplexing is the process of separating the multiplexed signals at the receiving end.
Illustration:
- Town A has 10 computers which want to communicate with 10 other computers in town B. In a normal
case, it will need a direct cable linking each of the computers in town A to its partner in
town B. However, if multiplexing is used, the computers can be made to share a single cable laid between
the two towns, hence, saving cost.
- The different data signals have different frequencies on the cable; hence, they do not interfere with one
another.
Frequency (f):
Frequency of a wave is the number of cycles made by the wave in 1 second. Frequency
is measured in units called Hertz (Hz); where 1 Hz is equivalent to 1 cycle/second.
Baud:
This is the unit to measure the speed of transmission. Generally, 1BAUD is 1bit/second.
Baud rate:
This is the rate at which data is transferred or transmitted. It is measured in Bits per second (bps).
Band:
Bandwidth:
A Bandwidth is the maximum amount of data that a transmission medium can carry at any
one time. E.g., a certain cable may have a bandwidth of 100 Mbps (Mega bits per second).
Guardband:
Baseband signal:
This is a digital signal that is generated and applied to the transmission medium directly
without modulation.
Note. A baseband signal utilizes the full capacity of the transmission medium; hence, at any
one time, only one signal can be sent. However, multiple signals can be sent at different times,
if they are multiplexed.
Broadband transmission:
This is where an analog signal is sent over the transmission medium using a particular frequency.
This means that, several data signals can be sent at the same time through the same medium,
but at different frequencies so as to prevent them from overlapping.
Attenuation:
Attenuation is the decrease in magnitude and energy of a signal as it progressively moves along
a transmission medium.
If the signal is not boosted, it will totally be lost along the way, and may never reach
the destination.
Attenuation (or signal loss) is usually corrected by placing signal amplifiers (also
called repeater stations) along the medium at appropriate distances in order to receive the weak
signal, clean it, amplify it, then retransmit it.
a. Simplex.
b. Half duplex.
c. Full duplex.
Simplex transmission:
This is where communication is only in one direction (as in radio or television broadcast).
The listener or viewer cannot communicate back through the radio or television receiver back to
the broadcaster.
This is where communication occurs in both directions simultaneously (as in computers that
are sending & receiving data on a network).
Purpose of Networking
Some of the reasons for setting up computer networks include:
1. Resource sharing
A Network resource refers to any component that can be attached to the network for
access by users.
Some of the shared resources include:
i. Application programs.
ii. Network Printers
iii. Data and information.
iv. Fax machines
v. Messages.
vi. Modems
vii. Graphics.
viii. Storage devices (optical drives).
ix. Files.
x. Communication ports.
xi. Computer processing powe
xii. Disk space
Users whose computers are connected to a network can, for example, share their
files, exchange mails, send faxes, schedule meetings, and print documents from any point
on the network. This centralized access to data & information leads to less waste of time,
and hence greater productivity.
2. Remote communications
Distributed processing refers to the act of running the same programs or databases
on different computers, which are on the same network but placed in separate locations.
Each computer has its own local peripherals, e.g., disks, printers, terminals, etc.
For example;
- In a large organization, each branch office has its own server that stores data,
information, and other resources required for their daily operations.
This implies that, files reside on the user’s computer rather than on a central computer,
and are only transmitted periodically to update the central computer.
4. Cost effectiveness
The initial cost of purchasing and laying down of networks components may be expensive.
However, the savings experienced and the value added to service delivery make
networks cost effective.
Networks greatly increase the efficient use of scarce resources. E.g., a large
organization with many stand alone computers will need a printer for each computer.
However, if the computers are networked, only one printer is used.
Computer networks have also enhanced daily communication, i.e., they have made
the flow of information from one place to another easy. Users can send mails (e.g., e-
mails) to each other, without having to bear the cost of stamp duty or delivery charges.
Similarly, company executives can hold electronic video conferences, thus reducing
the traveling costs.
5. Reliability
1. Security issues
Data & information held on a network is open to many people across the world, and
can easily be accessed illegally. In addition, when information is sent over the network
from one place to another, it can be tapped or listened to by unauthorized parties.
The initial cost of buying network hardware & software is very high.
Large networks such as the Internet have chat rooms and messaging services. These
enable underage children to meet peers and adults on the net, some of whom may have
bad intentions.
Access to pornographic and other negative material on the Internet has made the fight
against social problems such as HIV/AIDS, bad sexual behaviour, and drug abuse more
complicated.
The Internet makes it easy for terrorists and drug traffickers to operate. This is because;
they use information networks for their business communications.
5. Over-reliance on networks.
Most organizations have done away with manual operations. This means that, all
business processes, and the society depend on computer networks. Therefore, if by any
chance the network fails or goes down, then many systems in the society will stop working.
This is a computer network that is formed whenever computers are connected together in
a relatively small geographical area, e.g., in one building or a school.
LAN is the smallest size of network & it normally covers an area within the radius of 10M – 3 Km.
Get more notes and past papers at www.easyelimu.com. (WhatsApp only +254 700 755976 for more)
LAN is usually owned by one organization. However, one LAN can be connected to other LANs over
any distance via data transmission lines or wireless media.
A LAN connects several Personal Computers to a Server computer. The server computer
makes available the resources requested by the other computers (workstations) on a network.
In most LANs, each workstation has its own CPU which it uses to execute programs, but still
the workstation user can also access data & devices anywhere on the network.
Advantages of LANs.
1. They enable many users to share expensive devices such as Laser printers, as well as
data. However, the no. of computers that can be connected & the distance to be covered is
limited.
2. Have Low cost (requires less expensive equipment).
3. Enable users to communicate with each other, by sending messages or engaging in chat sessions.
4. LANs transmit data at very fast rates. They are much faster than data transmitted over telephone
lines.
5. Small error counts (low error rates).
Characteristics of MAN
Characteristics of WAN
They cover an unlimited (a very large) geographical area, e.g., can cover the whole world.
They are expensive to build since it requires special equipment for connection.
Their transmission links are also expensive.
Long distance transmission.
Have low data transfer rates compared to LANs (i.e., they are slower than LANs & MANs)
More prone to errors (very high possible error rates compared to LANs and MANs).
A data communication medium is a physical pathway used for carrying data signals & information
from one point to another.
Data communication media can be divided into two:
a. Communication using cable (bound media).
b. Wireless communication (unbounded media).
In bounded media, data signals are transmitted from the source to the destination through a cable.
There are 4 major types of bounded transmission media, namely:
1. Two-wire open lines cables.
2. Twisted pair cables.
3. Coaxial cables.
4. Fibre optic cables.
Two-wire open lines cables are made up of 2 parallel copper wires separated by a plastic insulator.
The Plastic insulator is meant to reduce signal interference called Crosstalk. However, the linear
nature of the wires allows an electromagnetic field to build around them during heavy
data transmission, which may cause interference to the signal.
The wires also capture/pick unwanted environmental frequencies, e.g., radio waves,
hence causing noise in the transmission channel.
Two-wire open lines cables are used in telecommunication network to transmit voice
(analogue) signals.
A twisted pair cable is made up of 2 insulated copper wires twisted around each other in a
spiral pattern.
The twisting prevents electromagnetic fields from developing around the two wires as
Get more notes and past papers at www.easyelimu.com. (WhatsApp only +254 700 755976 for more)
UTP cables do not have a shield that prevents electromagnetic interference (also called
‘Electric noise’) from the environment.
UTP cable is prone to noise & signal interference, and therefore, not suitable for environments that
are electrically ‘noisy’.
Noise may come from lightening sparks, radio signal, or radiations from spark plugs in
motor vehicles.
In STP cables, a braided shield is wrapped around the wires to protect them from noise.
Twisted pair cables are grouped into 5 categories according to the type of data transmitted,
and the maximum rate of transmission.
1. They suffer from high attenuation. Therefore, for every cable length of 90m, a “Repeater”
is needed to amplify (restore) the signal.
2. It is sensitive to electromagnetic interference & eavesdropping.
3. It has low data transmission rates as compared to other cables.
Coaxial cables.
A Coaxial cable resembles the cable that is used to connect television antenna to a television set.
The cable has
1. A central copper core (which is either solid or stranded wires).
- The diameter of the centre core determines the attenuation rate. If the core is thin, then
the attenuation rate will be higher.
2. An insulator (a dielectric material) surrounding the copper core.
3. A hollow braid (mesh conductor) surrounding the insulator. The braid is made of copper
or aluminium, and serves as the ground for the carrier wire.
4. A shield which covers the braid making the core more resistant to
electromagnetic interference.
The braid together with the insulator & the foil shield protects the carrier wire from
Radio Frequency Interference (RFI) and Electromagnetic Interference (EMI).
Coaxial cables have bandwidths of up to 1 Gbps (Gigabits per second). Hence, they can be used to
link/connect different networks between buildings, and route trunk calls in
telecommunication companies.
The Two types of coaxial cables.
i. Thin coaxial cable (Thinnet): - it has 1 dielectric insulator around the core.
ii. Thick coaxial cable (Thicknet): - it has 2 dielectric insulators around the core, and is
thicker than the thinnet.
A fibre optic cable uses light to transmit data signals from one point to another on the network.
A Light Emitting Diode (LED) is used at the source/transmitter (sending computer) to
convert electrical signals to light signals which are then send along the cable. At the receiving
computer, a photosensitive device is then used to convert the light signals back to electric signals
that can be processed by the computer.
A fibre optic cable is made up of;
1. The Core.
- This is the central part of the cable, and is made of a hollow transparent plastic or glass.
2. Cladding.
- This is a single protective layer surrounding the core.
- The Cladding is able to bend light rays, (i.e., when light tries to travel from the core to
the cladding, it is redirected back to the core).
3. Buffer.
- It surrounds the cladding. Its main function is to strengthen the cable.
4. The Jacket.
- It is the outer covering of the cable.
The light signal travels along the core through a process referred to as Total internal reflection.
The process that causes total internal reflection is called Refraction. Refraction is the bending of
light when it crosses the boundary of two mediums that have different densities.
Therefore, when light signal is inserted into the cable, it tries to cross from the core to
the cladding. The light is bent back into the core, hence spreads along the length of the cable.
It has a very low attenuation rate, and is preferred for long distance transmission.
It has a very high bandwidth of 50 Gigabits per second.
It is very expensive, and requires very careful handling during installation.
Get more notes and past papers at www.easyelimu.com. (WhatsApp only +254 700 755976 for more)
A multimode fibre has a thicker centre core than the single mode fibre.
It allows several light signals (rays) to be sent through the cable at the same time. Hence,
there are high chances of the signal being distorted.
It has a high attenuation rate, and is usually used for shorter distance transmission.
Wireless (unbounded) media is a type of media that is used to transmit data from one point
to another without using physical connections.
In this case, a transmitting antenna & a receiver aerial are used to facilitate the communication.
Microwave transmission
Microwave frequencies have a small wavelength, and can easily release their energy in water
as heat. This is why they are used in making domestic kitchen appliances, e.g., microwave ovens.
In networking, microwaves are suitable for point-to-point transmissions, whereby a signal
is directed through a focused beam from the transmitter to the receiver station.
Satellite communication
A Satellite is a microwave relay station. The microwave earth stations have parabolic dishes with
an antenna fixed on them in order to focus a narrow beam towards the satellite in space.
1. Transmitter earth station - it sets up an uplink to the satellite in order to transmit data.
2. A Satellite that is somewhere in an orbit. It receives, amplifies, and retransmits the signal
to a receiving earth station through a downlink frequency.
- The downlink & the uplink frequency are usually different. This is to prevent the
downlink signal from interfering with the uplink signal.
3. Receiving earth station - receives the signal sent by the satellite on the other side of
the globe.
A communication satellite is usually launched into space about 36,000 km above the earth in such
a manner that its speed is almost equal to the rotation speed of the earth. This makes the satellite
appear as if it is stationary in space. Such types of satellites are called geostationary satellites.
1. A satellite is convenient because; it provides a large constant line of sight to earth stations.
Get more notes and past papers at www.easyelimu.com. (WhatsApp only +254 700 755976 for more)
- This means that, there is no need to keep on moving the parabolic dish so as to track the line of
sight.
2. The satellite transmits the signal to many recipient earth stations. This is because; the transmitted
signal spreads out in all directions to form a Point to Multipoint transmission.
A VSAT is a very small satellite dish used both in data, radio, and TV communication.
It can be set up at home or in a small business. It enables direct access to satellite communication
instead of having to go through state-owned or licensed satellite gateways.
The dish has an antenna that receives the satellite signals. The signals are decoded using
a decoder which is plugged directly to a television set or a computer.
Radio communication
The High frequency radio wave signal is transmitted by directing it to the ionosphere of the earth.
The ionosphere reflects it back to the earth’s surface, and the receiver then picks the signal.
Disadvantage of HF communication
They are transmitted along the earth’s surface. However, since the earth is somehow curved,
the signal tends to attenuate at the horizons of mountains and buildings. This means
that, repeater stations have to be built on raised areas in order to receive, amplify, and propagate
the signal from one area to another.
Get more notes and past papers at www.easyelimu.com. (WhatsApp only +254 700 755976 for more)
Note. The range of VHF is limited, however, it is preferred to HF because; it is possible to make a
VHF wave follow a narrower & more direct path to the receiver.
The UHF radiowaves use the line of sight principle used by the VHF waves. This means that, there
should be no barrier between the sending & the receiving aerial. However, they require smaller
aerials.
For example;
The Television aerial for VHF is bigger than the one for UHF radio waves. This is because; UHF radio waves
can be made to follow a narrower & a more direct path to the receiver than
VHF radio waves.
This is a worldwide and short range radio transmission technology that allows all personal,
handheld devices to be able to communicate with each other through wireless technology.
It enables people to use hand-held communication devices such as mobile phones &
Personal Digital Assistants (PDA’s) to access the Internet.
The main component in Bluetooth is a small low power two-way radio transceiver, which can
be inserted in small devices.
Bluetooth enabled devices use a network called the Wireless personal area network (WPAN)
or piconet.
Infrared transmission
For example;
Most mobile phones have an infrared transceiver. Once activated, two people in the same
room can send messages to each other on their mobile phones without going through the
mobile service provider; hence avoid being charged.
In computer networking environment, infrared technology can be used to connect devices in
the same room to each other without the need for cables, e.g., a computer and a printer.
However, the computer’s infrared transceiver must maintain a line of sight with the one for the
printer.
1. Wireless medium is flexible in operation, i.e., devices can be moved around without losing access
to the network.
2. Wireless networks can span large geographical areas easily.
3. Wireless communication can take place via satellite even in very remote areas that do not have
high cost physical infrastructure like telephone lines.
Communication Devices
For a network to be fully operational, communication devices are required, and act as
interfaces between the Terminal devices.
Terminal equipments are the devices at both ends of the communication link, e.g., computers.
Some of the data communication devices are:
1. Network Interface cards (NIC)
- A NIC acts as a physical connection (link/interface) between the computer & a
properly terminated transmission cable.
- A NIC is plugged into an empty expansion slot on the motherboard, and has ports at the
back in which the terminated end of a network cable can be plugged.
3. Hub (Concentrator)
- A Hub is a component that connects computers on a network, and is able to relay
signals from one computer to another on the same network.
- A Hub usually connects networks that have the same set of communication software
usually called Protocols.
- A Hub transmits signals by broadcasting them to all the computers on the network. After
the signal is broadcasted, the computer whose address is on the message then picks the
message from the network.
- Several hubs can be connected together one after another to expand a network.
Intelligent hubs
- Intelligent hubs are able to monitor the way computers are communicating on the
network, and keep the information in their own database called management information
base (MIB). The network server can then use this information to fine-tune the network.
- Intelligent hubs also manage a network by isolating computers that are not
Get more notes and past papers at www.easyelimu.com. (WhatsApp only +254 700 755976 for more)
functioning properly.
4. Bridges
- This is a network device that selectively determines the appropriate network segment
for which a message is meant to be delivered. It does this through address filtering.
7. Gateways
- A Gateway is any device that can be configured to provide access to a Wide Area Network
or the Internet.
Note. A gateway may be a router, or a computer configured to provide access to the
Internet.
8. Switches
- Unlike a hub, a Switch forwards a data packet directly to the terminal equipment on
the network without broadcasting. It does this by connecting the two
Get more notes and past papers at www.easyelimu.com. (WhatsApp only +254 700 755976 for more)
For a long time, networks have been implemented using tangible transmission media like cables.
However, since the cost of wireless technology has gone down & the quality of service increased,
companies & individuals are now using wireless segments in their communications with the aim of
extending the capability of wired networks.
The most common devices (components) used in wireless communication are: Access Points (AP),
and Wireless antennae.
1. Access points (AP)
- An Access point is an entry point into a bounded network.
- It is used by people who have wireless devices such as Personal Digital Assistants
(PDA’s), Laptops, and computers with wireless links.
2. Wireless antennae
- The Access point should have antennae so as to detect wave signals in the surrounding.
The waves may be Radio waves, microwaves or infrared waves.
- Most Access points have 2 antennae so that the one that receives the best signal at
any particular time can be used.
A PCMCIA is a card inserted into a device such as a Personal Digital Assistant (PDA) or a laptop in
order to enable wireless communication between the device and a wired network server.
Get more notes and past papers at www.easyelimu.com. (WhatsApp only +254 700 755976 for more)
Network software
These are operating systems specifically designed to enable the networked computers to
respond to service requests.
Servers run on a network operating system.
- Network OS are normally designed as Multi-user operating systems that run the network server program.
- Examples of network operating systems are:
UNIX - Windows NT
Linux - Windows 2000
Novell NetWare - Windows 2003
Protocols
Protocols are a set of rules and procedures that govern the communication between two
different devices or people.
E.g., a diplomat from a foreign country must adhere to the set rules and procedures
of communication when representing his country in the host country.
In computer networking, Protocols are the rules and technical procedures that
govern communication between the different computers on the network.
The data transmission process over the network is divided into steps, and at each step, a
certain action takes place.
In addition, each step has its own rules and procedures as defined by the network protocols.
The work of these protocols is usually coordinated through protocol layering so as to ensure
that there are no conflicts or incomplete operations.
manufacturers together into a single network requires that the equipment must be able to
communicate and work with each other.
The OSI reference model defines standard (uniform) methods which enable different systems
to interoperate with each other and to be portable across one another.
Network protocols are usually designed using the OSI reference model. To facilitate communication
between application processes located on different computers, the model groups similar computer
communication protocols into 7 layers, each performing specific functions.
Layer Function
7. Application layer This is where user applications are
run. It provides network services
such as file sharing, distributed
processing, file transfer, and
network
management to users. It also
generates requests for
transmission of
data or opening of received
information
6. Presentation layer Defines data formats to be
exchanged & adds formatting,
display
and encryption information to the
data being sent.
5. Session layer Sets up data transmission sessions
between two communicating
devices on the network.
4. Transport layer Manages data transfer over the
network to ensure reliability. It
ensures that data units are
delivered free of errors, in
sequence, and
without loss or duplication.
3. Network layer Serves the Transport layer by
adding address information to the
data
packets, and routing it to its
destination.
2. Data link layer Prepares data for going onto the
communication medium on the
physical layer. Adds error checking
& correction information to the
data.
1. Physical layer Transmits raw data packets via the
network card through the
transmission media in form of bits.
Converts frames to electronic
signals and vice versa.
They provide services to application programs such as the E-mail editor program that
enables composing or reading of e-mail messages.
1. Simple Mail Transfer Protocol (SMTP) - an Internet protocol for transferring e-mails.
2. File Transfer Protocol (FTP) – an Internet protocol for transferring files.
Get more notes and past papers at www.easyelimu.com. (WhatsApp only +254 700 755976 for more)
3. Apple Talk and Apple Share – a networking protocol standard for Apple computers.
1. Transmission Control Protocol (TCP) – enables delivery of sequenced data over the network.
2. Sequential Packet Exchange (SPX) – used in Novell networks for sequenced data.
3. NetBEUI – used in Microsoft and IBM networks to establish communication sessions between
computers in LANs.
4. Apple Transaction Protocol (ATP) – it is a communication session and data transport protocol used
in Apple computers.
They provide link services, e.g., they handle addressing and routing information, error
checking and retransmission of requests.
Network Topologies
The term network Topology refers to the way in which computers, cables, and other devices
havebeen arranged in the network.
It can also refer to how data is passed from one computer to another in the network.
Logical topology deals with the way data passes from one device to the next on the network.
a. Ethernet.
b. Token ring.
Ethernet topology
In Ethernet topology, all computers listen to the network media, and a particular computer
can only send data when none of the others is sending.
In Token ring topology, a special package for data called a token goes around the network.
The computer whose address is on the data held in the token picks it up, reads the data, and
then releases the token. The token can then be captured by another computer which needs to
transmit data.
Get more notes and past papers at www.easyelimu.com. (WhatsApp only +254 700 755976 for more)
Physical topology
a. Star topology.
b. Bus topology.
c. Ring topology.
d. Mesh topology.
e. Tree (Hierarchical) topology.
- The choice of the topology to adopt depends on factors such as Reliability, Expandability,
and Performance.
Star topology
Star topology consists of computers and other devices, each connected to a common
central server called the Hub. However, to connect to the central machine, each computer uses
a separate cable.
Nodes communicate across the network by passing data signals through the hub, i.e., any
two computers (workstations) in the network communicate through the central machine.
When the hub receives data from a transmitting computer, it broadcasts the message to all
the other nodes on the network.
1. If the central switch node (Hub) fails, it may bring down the entire network.
2. It is costly because; each workstation is connected to the central concentrator by is own dedicated
cable (i.e., it requires a lot of cables).
3. Installation is time consuming, because each node forms a segment of its own.
4. May require a special device for signal regeneration across the network.
In Bus topology, all the devices in the network are connected directly, through
appropriate interfacing hardware, to a single transmission cable called the Bus (or Backbone) on
which information is broadcast.
Bus topology uses Coaxial cable as transmission medium. The cable can carry only one message at
a time and each workstation on the network must be able to know when it can and cannot transmit
using this cable.
A Terminator is attached to each end of the cable to avoid signals from bouncing back and forth on
the cable causing signal distortion.
For communication to take place, data is addressed to a particular computer & put in the cable
in the form of electronic signal. As the data passes along the cable, each workstation
checks whether the data is addressed to it. If the address in the data matches that of the machine,
it picks up the data and processes it.
Bus topology doesn’t need any special equipment such as switches or repeaters to amplify
the signal.
1. Easy to install.
2. Inexpensive (less costly) because; it does not require a complete cable length per computer.
3. Can easily be extended.
4. It allows the workstations to communicate independently (separately) of each other.
5. Failure of one station on the network does not affect the operations on the bus.
Ring topology
In a ring topology, the computers are connected to one another in the shape of a closed loop using
Get more notes and past papers at www.easyelimu.com. (WhatsApp only +254 700 755976 for more)
a single cable.
Data flows from one computer to another in one direction, and each computer actively participates
in data transfer from one station to the other. In other words, each workstation acts as a booster
by regenerating and retransmitting the signals around the network to its neighbour.
A token is used to exchange data from one station to another. A token can be viewed as
an envelope or a bag where data is placed for transmission and carried around the network.
1. Failure of one computer or the cable will affect the rest in the entire network.
2. Modification is difficult because; adding or removing a device can disrupt the entire network.
3. Troubleshooting can be difficult.
Mesh topology
Mesh topology uses separate cables to connect each device to every other device on the
network providing a straight communication path.
It is mostly used in Wide Area Networks where there are many paths between different locations.
1. It is fast.
2. Failure on one node will not cause communication breakdown.
3. Easy to troubleshoot cable problems. If two machines are not communicating, the administrator
will only check the cable between them.
4. Enhances flexibility in communication.
5. Enhances fault tolerance provided by redundant/ excessive links.
Get more notes and past papers at www.easyelimu.com. (WhatsApp only +254 700 755976 for more)
This is a hybrid topology where groups of star-configured networks are connected to a linear
bus (backbone).
Point-to-point communication.
In point-to-point, the network contains numerous cables or telephone lines, each one connecting a
pair of computers.
The message is received at each intermediate computer in whole, stored there until the
required output line is free, and then forwarded.
A network using this principle is called a point-to-point or store-and-forward network.
Broadcast communication.
In broadcast, there is a single communication channel shared by all computers. In this case,
the messages sent by any computer are received by all other computers.
Something in the message itself must specify for whom it is intended. After receiving a
message not intended for itself, a computer just ignores it.
Packet- switching
Transmission impairments
Attenuation
Distortion
Various frequency components of a signal will arrive at the receiver at different times causing the
signal to change its form or shape.
Noise
Refers to unwanted signals inserted between the transmitter and receiver such as crosstalk.
Network models
A Network model describes how the computer processes information on the network.
Data can be processed by a Client, a central Server or by all the computers on the network.
Very large computers, usually mainframes, are connected with terminals. The users input & output
data using the terminals, while the processing is done by the central computer (mainframe).
i. Data is kept in one location, ensuring that every user is working with the same information.
ii. It is easier to back up data since the information is stored on only one Server.
iii. Easier to maintain security. It is only the server which needs to be secured since the terminals
have no data.
iv. The terminals do not require floppy drives as all work is stored on a Server.
v. Chances of computer being affected by viruses are very minimal as no diskettes are being used.
vi. It less costly.
- Although the Server has to be very powerful with a lot of storage space, the terminals are
inexpensive as they don’t require real processing or storage capability of their own.
i. It is very slow as it is the server alone, which does all the processing.
ii. In case where the users have varied needs, it would be difficult to meet these needs in
a centralized computing network as each user application needs to be set up separately.
Get more notes and past papers at www.easyelimu.com. (WhatsApp only +254 700 755976 for more)
iii. Connection is difficult. All the computers have to be connected on a central place.
Distributive computing
In this model, data is stored and processed on the local workstation. Computers acting as stand
alone systems are connected together for increased functionality.
A Stand alone is a computer which is not connected to any other computer equipment other than
its own Printer.
i. Each machine processes and stores its data; hence, data is accessed faster.
ii. It doesn’t need powerful and expensive servers for data storage.
iii. It can accommodate users with variety of needs.
i. It is more susceptible to virus, as any user could introduce an infected file and spread it throughout
the network.
ii. It is more difficult to develop an effective back up plan, since each user stores data in his/her
individual system.
iii. File management (organization) is difficult as the files are stored in different locations.
Collaborative model.
In this model, all computers can share processing power across the network. Applications can be
written to use the processing on the computers to complete job more quickly.
i. It is faster to complete a task as users are not limited to processing power of one system.
ii. Variety of users can be accommodated on a collaborative network.
Categories of networks
Peer-to-Peer network.
i. It is difficult to locate information stored in the connected computers due to shared level security.
ii. Difficult to update documents and files.
iii. It is expensive to train staff on how to share resources, as each user is an administrator.
iv. It is difficult to maintain security, as it is the user’s responsibility to ensure that only authorized
individuals can access their data.
v. It is more tedious as the user has to memorize password for resources, and in case of any change,
they have to inform others.
Server-based networks.
In this network, there is usually a Server, e.g. a company which is dedicated to handle files and/or
information for clients, make & service requests from network clients, and ensure security of files
and directories for them.
Server-based networks require a network operating system.
i. There is security since the Server controls the resources the clients need to access.
ii. It can support a large number of users.
iii. The server can be optimized to hand out information as fast as possible.
iv. Fewer connections are required by the clients to get the resources.
v. Easier to maintain backup for files (synchronization of files).
vi. Cost effective as client workstations don’t need large hard disk (storage capacity).
Network Security
In networking, there are several ways of protecting your data and information from intruders.
They include: Share level and User level security.
This model of security is mostly used in peer-to-peer networks. The user can decide
which resources to give for sharing.
Most Windows operating systems such as Windows 9X provide such kind of security.
User-level security