Download as pdf
Download as pdf
You are on page 1of 16
Management Information Systems _DATA CHAPTER 4 When we communicate, we are sharing information. ‘this sharing can be local or remote. Between individuals, § local communications usually occurs face to face, while remote communication takes place over distance. The term telecommunication which includes telephony, telegraphy,. © and television means communication at a distance ( tele is Greek for “far”). The word data refers to information presented in whatever form is agreed upon by the parties and using the data. ° Data communication is the exchange of data between two devices via some form of transmission medium such as wire cable. For data communication to occur, the communicating devices must be part of a communication system made up of a combination of hardware (physical equipment) and software (programs). The effectiveness of a data communication system depends on the three fundamental characteristics: Y Delivery - the system must deliver data to the correct destination. Data must be received by the intended device or user and only by that device or user. Y Accuracy - the system must deliver the data accurately for data that have been altered in transmission and left uncorrected are unusable. v Timeliness - the system must deliver data in a timely manner. Data delivered late are useless. In case of audio and video; timely delivery means delivering data as they are produced, and without significant delay. This kind of delivery is called real-time transmission. BASIC CONCEPTS OF DATA.COMMUNICATION « Bandwidth - amount of data that can be transferred from one point to another in a certain period. * Attenuation ~ loss of. power in a signal as it travels from the sending device to the receiving device * Broadband data transmission - multiple pieces of. data are sent simultaneously to Increase the transmission rate . BASIC COMPONENTS OF DATA COMMUNICATION % Message is an information (data) to be communicated. * & Sender is a device which sends the data. messages. This can be anything from a computer laptop, to a workstation or a mobile phone. 62 Management Information Systems « A Reteiver is pretty much the same, except it is: receiving the information. Generally receivers can also.send, but sometimes they clash in terms of compatibility due to- differences in technology. “ A Modem (short for “modulator-demodulator”) is a device or program. that enables a computer to transmit data over, for example, digital subscriber line (DSL)‘or cable. Computer information is stored digitally, whereas information transmitted over telephone’ lines is transmitted in the form of analog waves. A modem converts between these two forms. “ A Communication Media - also called channels, ‘connect sénder and receiver devices. © Conducted Media provides physical path by which a message travels from sender to receiver. This can be by wire or wireless. These include twisted-pair cable, coaxial cable and fiber optics. o Radiated Media - use an antenna for transmitting data through air or water; some work based on “line of sight”. These include broadcast radio, terrestrial microwave, and satellite. PROCESSING CONFIGURATION + Data communication systems can be used in several different configurations. Over past 60 years, three types of processing configurations have emerged: 1) Centralized Processing - Processing is performed in one computer or in a cluster of coupled computers in ‘a single location. This evolved from the first computers in the 1950’s, which were stand alone with all input and output devices in the same room. o Advantage: being able to’ exercise tight control on system operations and applications “a Disadvantage: lack of responsiveness to users’ needs One Focal Point: With a ‘Global ViP- ‘Support Team 2) Decentralized Processing Each user, department, or division has its own computer for performing processing. o Advantage: more responsive to users o Disadvantage: lack of coordination; high costs; duplication of efforts .3) Distributed Processing . This includes parallel processing in which a single computer uses more than one CPU to execute programs. © Advantages: accessing unused processing Power is possible; computer power can be added or removed; distance and location arén’t. limiting; more compatible with organizational growth; fault tolerance; resources can be sharéd to reduce costs; reliability is improved; more responsive to user needs. 64 Management Information Systems sae 6 Disadvantage: dependence on communication technology; incompatibility between equipment; more challenging network management. “> istributed Processing . a. =| re || Note: date resides a ‘only one ste end ieehared by ether fee Ceeneatieed) © OPEN SYSTEM INTERCONNECTION MODEL (OSI Model) The OSI Model is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard of their underlying internal structure and technology. The model partitions a communication system into abstraction layers. The original version of the model defined seven layers. A layer serves the layer above it and is served by the layer below it. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that comprise the contents of that path. Two instances at the same layer are visualized as connected: by a horizontal connection in that layer. Layer 1: Physical Layer = the lowest layer of the OSI Model, is concerned with the transmission and reception of the unstructured raw bit stream over a physical medium. It provides the hardware means of sending and receiving data‘on a carrier, including defining cables and physical aspects. It describes the electrical/optical, mechanical, and functional interfaces to the physical medium, and carries the signals for all of the higher layers. Layer 2: Data Link Layer = data packets are encoded and decoded into bits, It furnishes transmission protocol knowledge. and management and handles errors in the physical layer, flow control and frame synchronization, The data link layer is divided into two sub-layers: the Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network ‘gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow ntrol and. error checking. : Management Information Systems Layer 3; Network Layer = provides switching and routing technologies, creating logical paths, known as virtual. circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and ‘packet sequencing. Layer 4: Transport Layer = provides transparent transfer of data between end systems or hosts, and is responsible for end-to-end: érror recovery and flow control. It ensures complete data transfer. - Layer 5: Session Layer = establishes, manages and terminates connections between applications. ‘ The. session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination. Layer 6: Presentation Layer = provides independence from differences in data .presentation (e.g. encryption) by translating from application to network format, and. vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom form compatibility problems. It is sometimes called the syntax layer. Layer 7: Application Layer = supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers,’ e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer. Management Information Systems em munt oat SUSAN Reereassig seer rare a BeDtobi Session Layer Bctastcernerton “UPPER LAYERS Hetwork Layer Routes ania te cittecant Eanrsaaihane ser Sr henosn address: ia | Dina Link (MAG) Layer cTranemite puekets {rom ey Tote posed on i isiton saree. LOWER LAYERS Physical Layer Electrios! slgnal# and cabling. TYPES OF NETWORK There are several different types of computer.networks. Computer networks can be characterized by their size as their purpose. The size of a network can be expressed by the geographic area they. occupy and the number of cornputers that are part of the network. Networks ‘can: cover anything from a handful of devices within a single room to- millions of devices spread across thé entire globe. . : A. LOCAL AREA NETWORK A Local Area Network, or LAN, consists of a computer network at a single site, typically an individual office building. A LAN is very useful for sharing resources, such as data storage and printers. LANs can be built with relatively inexpensive hardware, such as hubs, network adapters and Ethernet cables. _ The smallest LAN may only use two computers, while larger LANs can accommodate thousands of computers. A LAN typically relies mostly on wired: connections for increased speed. and security, but wireless connections can also be part of a LAN. High speed and relatively low “cost are the defining characteristics of LANs. 67 Management Information Systems LANs typically used ‘for | sini resources among ther world, Think of an office bal access files on a central ser or more central printers. wireless, it is referred to as gle sites where peo, ple need to share tae fob with the rest of the outside Ne 9 e lere everybody should be able to . or be able to print a document to one a local area network, or LAN, 4s entirely Wireless local area network, or WLAN. B. WIDE AREA NETWORK A wid a cathe Wot ha or WAN, occupies a very large area, such 25 . [AN can contain multiple smaller networks, such as LANs or M eran. IANs. The Internet is the best-known example of.2 public c METROPOLITAN NETWORK A metropolitan area network, or MAN, consists of a computer network across an entire city, college campus or small region. AMAN is larger than a LAN, which is typically limited to a single building or site. Depending on the configuration, this type of network can cover an area from several miles to tens of miles. A MAN is often used to connect several LANs together to form a bigger network, When this type of network is specifically designed ‘for a college campus, it is sometimes referred to as a campus area network, or CAN. NETWORK TOPOLOGY Network Topology refers to a layout of how different nodes in a network are connected to each other and how they communicate. Five common network topologies: In a mesh network, devices are connected with tions between network nodes. In a true mesh tion.to every other node in the network. 1. Mesh Topology- many redundant interconne topology, every node has a connect There are two types of mesh topologies: ; — a fai mesh= occurs when every node has a circuit connecting it is to implement to every other node in a network, It is very expensive but ields the greatest amount of redundancy, so in the event that one of those nodes falls, network traffic can be directed to any of the other nodes. bs partial mes! redundancy than ful i jields less n= Is less expensive to implement and yi II mesh topology. with partial mesh, some Oo nly col ized in a full mesh ‘scheme but other are 0! ane END in the network. Partial mesh topology is commonly found in peripheral networks connected toa full: meshed backbone. 68 Management Information systems ‘Advantage: * . highly reli Disadvantages: ate * costly . . ‘ ° difficult to maintain and to expand Partial Mesh Full Mesti 2. Star Topology In a’star network, devices are connected to a central computer, _ Called a hub. Nodes communicate across the network by passing data through the hub. Advantages: e Cable layouts are easy to modify . * Centralized control makes detecting problems easier e Nodes can be added to the network easily e Better for handling heavy but short bursts of traffic Disadvantages: « Single point of potential failure * Increased cost due to many cables RY, Loy ‘ig i ie | Management information Systems 3. Bus Topology In thi: connects at ork, @ bus Is the central Cable - the main wire — that the backbone, then? (oc2l area network (LAN). It Is also called connections « This Is often used to describe the main network | inexpensive ‘and od the internet, Bus networks are relatively 0 Install fo: systems use a bus topology. . Small networks. Ethernet Advantages: - * Easy to extend * Very reliable * Wiring layout is simple and uses the least amount of cable of any topology Best for handling steady (even) traffic Disadvantages: * Fault diagnosis is difficult #5 .BUS cable can be a bottleneck when network traffic is heavy Bus Network Topology | fia Sera 4. Ring Topology f d in a closed loop. i all of the nodes are connectet Tet ret Drouin the ring, with each node reading those messages addressed to it. One main advantage to a ring network Is that it can span, larger yes of networks, ork, distances than oP regenerates messages as they pass through it. ecaus This is a “hybrid” topology that combines characteristics bus and star topologies. in a tree network, groups of star- configured networks are connected to 2 linear bus backbon: @ @ Advantage: A tree topology is a goad choice for iarge networks as the tree topology divides the whole network that are more easily manageable. Disadvantage: The entire network depends on 2 centrai hub enc & failure of the central hub can cripple the whole netw: Hierarchical Topology a - es > ~~ & & ye & Se & Ga & Na Ls Major Networking Concepts a. Protocols , ratocolion, In information technology, @ protocol (from the Sree a pee peri whlch was a leaf of paper GE "ne end paints In a telecommunicason I set of rule’ , ace SeaReetie ws Specie ey communicate. Protocols exist at sere levels ii a telecommunicatlon connection. J1 ee 3 Management Information systems Transmission Contro} Protocol/Inte, met It is the basic commu nication 4; also be used as a com; ONUaSE OF protoc j m 01 of the intranet or an extranet), MC@tlOn protocol in a private nebo wCatties an Protocol (Tcp. /IP) TCP/IP is a two- age bling of 2 mover DTe8TSM. The higher layer, TEP manages the over the Internet and rece di® into smaller packets that ere ees ns received by a TCP layer that reassembies the packets r layer, IP, handles the iF gets to the right destination. Each pater ss to see where to forward the message. @ are routed differently than TCP/IP communication is imaril i i con Primarily point-to-point, meaning each communication is from one point (or host com ‘i work t another point or host computer. 4 ames) ni We ner ko Many Internet users are familiar with the even higher layer application protocols that use TCP/IP to get to the Internet. These include th ie World Wide Web‘s. Hypertext Transfer Protocol (HTTP), the File Transfer Protocol (FTP), Telnet (Telnet) which lets you logon to remote computers, and the Simple Mail Transfer Protocol (SMTP). These and other protocols are often packaged together with TCP/IP as a “suit”. b. Routing Routing is the process of selecting best paths in a network. In the past, the term routing was also used to mean forwarding network traffic among networks. However, this latter function is much better described as simply forwarding. Routing is performed for many kinds of networks, including the telephone network, electronic data networks (such_ as the Internet), and transportation networks. is data packets between computer fie oor more. data lines from different in on one of the lines, the router reads t to determine Its ultimate destination. ble or routing policy, it directs the packet A router is a networking device networks. A router is connecte networks. When a data packet comes the address information In the packe Then, using information in its routing ta to the next network on its journey. f routers are home 2 office routers that simply eS home computers es Of ‘The most familiar typ ’s cable or DSL n the pass data, such as web pages, emall, a youd ihe he owner and the Internet. An example of a rae and ISP. Touter, which connects to the Internet Applications of router. When routers are used In int information aboot ge erconnected networ| 5 router has interfaces ane aecresses ng a dyneme sg protocol A for different hr ic routing Protocol. A copper cables, fibre optic, of wireless trance nes of Network connections, such as c, Client/server model The client/server mode} 6 pattitions tasks or w arene Ge pouting is a distributed application structure that called servers and service IS between the providers of @ resource or service, communicate over » cog yie testers, called clients. Often cliente aod ee and server may reside | Puter network on ‘Separate hardware, but both client server programs which te Same system. A server host runs one or more share any of it share their resources with clients. A client does not Y of its resources, but requests a server's content or service function. Clients initiate communication si essions wit i i i requests. ith servers which await incoming. Examples of computer applications that use the client-server model are Email, network printing, and the World Wide Web. Clients and servers exchange messages in a request-response messaging pattern. The client sends a request, and the server returns a response. This exchange of messages is an: example of inter-process communication, To. communicate, the computers must have a common language, and they must follow rules so that both the client and the server know what to expect. The language and rules of communication are defined in a communications protocol. All client-server protocols operate:in the application layer. The application layer protocol defines the basic patterns of the dialogue. Wireless and Mobile Networks Computers are very often connected to networks using wireless links: Terrestrial microwave - uses Earth-based transmitters and receivers resembling satellite dishes. 5 - satellites communicate via microwave radio y the Earth’s atmosphere. The typically in geosynchronous orbit - Communications satellite: waves, which are not deflected by satellites are stationed in space, above the equator. i Radio and spread spectrum technologies - wir cal area networks i Pp ps chnologie: ireless lo " high-frequency radio technology similar to digital cellular and a ‘use a : low-frequency radio technology: oe at Management Information systems © qypes of Wireless Networks Wireless Personal a, re within 2 relatively small areat Networks (WPANs) - example, Bluetooth tadio and > interconnecting a headset to a lapton sPle Infrared interconnect devices ; Person's reach. For ight provides a WPAN for Wireless LAN - often internet. A wireless local area distance using @ Wireless distribu " through an access point for Internet access,’ “SUA Providing @ connection Wireless mesh network - a wi » organized in a mesh topology. Each node * nodes. ireless network made up of radio nodes forwards messages on behalf of the other : west Ne MANs ~ are a types of wireless network that connects several Wireless WANs — are wireless networks that typically cover large areas, such as between neighboring towns and cities, or city and suburb. These networks _ can be used to connect branch offices of business or as a public internet access system. . : Cellular Network - is a radio network distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base station. In a cellular network, each cell characteristically uses a different set of radio frequencies from all their immediate neighboring cells to avoid any interference. . Although originally intended: for cell phones, with the development of smart _ phones, cellular telephone networks routinely carry data In addition to telephone - conversations: i icati GSM). The GSM_network is Global System for Mobile Communications ( k divided into three major systems: the switching system, the base oe system, and the operation and, support system. ee eee Teapot eS ion it fase system station which then connects te the II is transferred to where it th itching station where the call needs te eo GSM ig ae common standard and is used for a majority of cell . Phones, i i hat can be — ice (PCS) - is a radio band tl b Personal Communications Serves { SD. aan Sprint happen dito be Sed by mobile phones in No __ the first service to set up a PCS: ‘ Management Information Systems E : —— Digital Advanced Mobile Phon, yersion of AMPS, is being phaseq oO newer GSM networks are repla : je Service (D-AMPS) — an upgraded : ut due to advancement in technology. The cINg the older system, r t # Names, p Ties © NO ERASURES. Pate: I Identification, (x3) St the Model Partitions a co, into abstracti ; mmunication system lon layers, 2. This, Provides ” — $3. It is the exch 4. This Sub-layer con 5. This layer formats an Physical path by which a message travels from sender to receiver, ° lange of data between two devices via some form of transmission medium such as Wire cable, trols how a computer on the network gains €ccess to the data and permission to transmit it, id encrypts data to be sent across a network, Providing freedom form compatibility problems, 6. In this network, devices are connected with it many redundant interconnections between network nodes. 7. — Itis often used to connect several LANs together ° to form a bigger network, 8. _ Is the special set of rules that end points in a eee telecommunication connection use when they ° communicate. 9. It is the process of selecting best paths in a se network, 10. Refers to the central’ computer in a star —— topology. IL. True or False, (x2) ‘trntnely _2. s called syntax layer. Apicat aver provides application sence fr fle transfers, e- Pr fare services, fot! ope th ey ew cost are the defining characteristics of High spee a LANs IP manage: mi that‘are transi Servers initiate Col ich a singk incoming et End includes parallel processing In which a single Distributed Pro he assembling of a message of file into smaller packets 35 the a: et. : tied ne Sa ‘sessions with clients which await 76 Management Information Systems computer uses more than One CPU to execute programs. Modems are also called channels, that connect sender and receiver devices, ____8-_ In a Centralized Processing, the processing is performed in one computer or in a cluster of coupled computers in‘a single location. : 9. Data link layer provides the hardware means of sending and receiving data on a carrier, including defining cables and physical aspects. 10. In a ring network, devices are connected with many redundant interconnections between network nodes. . + Enumeration. 17 Layers of OSI Model ; 8-10 Processing Configurations 11-13 Types of Network a 14-18 Components of Data Communication 19-20 Sub-layers of Data link layer

You might also like