Documente Academic
Documente Profesional
Documente Cultură
LAN WAN
WAN is geographically remote as it covers
LAN covers short distances such as a building
great distances and allow communication
or a site
between different LANs
LAN uses its own communication medium WAN uses third party communication links
such as cables such as telephone lines
WAN is more open to attacks/may have
LAN more secure from hacking
security problems
DISADVANTAGES OF NETWORKS
There are also some issues with linking computers in a network:
it is more difficult to control access to a network and to files that are stored on the network
initial setup cost is high
chances of viruses being spread around the network
hacking
if the network fails then the work will have to be stopped such as file server is down
Need to have a technical expert such as a network administrator
-1-
Chapter 5: Data Transmission and Networking AS Computing 9691/01 1
SUMMARY
Computers can be linked together to form networks
If the distances are short, typically in the same building, the network is called a LAN, but if distances are
longer; regional, national or global, the network is a WAN
Networks allow computers to communicate
Networks allow the sharing of both hardware and software.
1.5 (b) Network Hardware and Software
HARDWARE
In order to connect computers in a LAN there are a number of hardware devices required:
1. Network Interface Card: It is a special piece of hardware attached to the processor. It allows a computer
on a network to communicate with other computers.
2. Network Cable: It allows the computers to be connected in a network.
3. Server: It is a computer whose job is to control the network. It is known as a server or a network server.
There are many roles the server must carry out:
A file server is responsible for the storage of program files, the network operating system and
users data files.
A domain controller server is responsible for the authentication of user log-ons.
A print server is responsible for the management of shared devices.
On many LANs typically in a small business environment these server functions are all carried out by a single
network server.
For wireless communication on a WLAN Wireless Local Area Network
Router: A device that broadcasts a signal to which the computers on the network can connect.
On a WAN the distances involved tend to be far greater than for a LAN so it is not possible to connect all the
computers by a cable or by a wireless signal. The telephone system cables exist to do this.
Modem: a device that coverts digital signals produced by the computer into analogue signals to be
transmitted over the public telephone line and vice versa.
SOFTWARE
A network operating system provides instructions that the network must follow.
1.5 (c) Network Topologies
The term topology refers to the arrangement or physical layout of computers, cables, and other components on
the network.
"Topology" is the standard term that most network professionals use when they refer to the network's basic
design.
There are two types of network topologies: physical and logical. Physical topology emphasizes the physical layout
of the connected devices and nodes. Logical topology focuses on the pattern of data transfer between network
nodes.
-2-
Chapter 5: Data Transmission and Networking AS Computing 9691/01 1
ADVANTAGES DISADVANTAGES
Simple and easy to set up causing less disruption If there is a fault in the central cable, whole system
to the network affected
Cheapest network because less cable is required Network performance degrades/Doesnt work well
than other topologies under heavy loading
Less secure as data can be intercepted by other
Easy to add a device/node as wiring is simple
terminals
Well suited for temporary or small networks not
Cable failure is difficult to isolate
requiring high speeds
Difficult to identify the problem if the entire
network shuts down
2. RING TOPOLOGY
All nodes/terminals are lined by a single cable in a closed loop. The data signals travel around the loop in
one direction, passing through each computer.
Ring topology is an active topology because each computer repeats (boosts) the signal before passing it on
to the next computer.
One method transmitting data around a ring is called token passing. The token is passed from computer to
computer until it gets to a computer that has data to send.
-3-
Chapter 5: Data Transmission and Networking AS Computing 9691/01 1
ADVANTAGES DISADVANTAGES
Works well under heavy loading due to high
Faulty connection can cause whole network to fail
transmission rates
It is difficult to expand this type of network as new
Possible to form very large networks computer has to be placed between existing two
computers
Less secure because data passes through all
Can be used for wide area networks
computers
No server needed as each terminal controls
If any computer fails the entire network fails
transmission to and from itself
3. STAR TOPOLOGY
All nodes/terminals are connected separately to a central device such as a hub switch or a computer
through their own individual cable with a point to point connection.
The central device acts as a router to transmit messages and as a junction to connect different
nodes/terminals.
All the data passes through the central device before reaching the intended destination.
Central device also manages and controls whole of the network.
This topology needs a server to centralize data.
It is easy to share peripherals like printers
Twisted pair cables are typically used in star topologies as they are not as immune to interferences as
coaxial cable
-4-
Chapter 5: Data Transmission and Networking AS Computing 9691/01 1
ADVANTAGES DISADVANTAGES
-5-
Chapter 5: Data Transmission and Networking AS Computing 9691/01 1
Device 1 1 Device 2
011 0 1 01
Advantages:
It can be used over long distances as it is cheap.
It is simple and reliable because the next bit is not transmitted until the current one has arrived
at its destination.
Less chance of corruption as it does not suffer from skew (less chance of bits having order
changed).
Disadvantages:
The speed of transmission is slow as only one bit can be transmitted at a time.
Note: Internet and USB devices use serial transmission.
PARALLEL TRANSMISSION OF DATA
Data is transmitted in group of bits usually 8 or more along several wires at a time.
Device 1 Device 2
0 0
1 1
1 1
0 0
1 1
1 1
0 0
1 1
Advantages:
The speed of transmission is fast as several bits are traveling at the same time.
Disadvantages:
It cant be used over long distances as it is expensive.
It is less reliable as the bits can become muddled due to interferences during transmission.
Note: Printer with parallel port and transfer of data between primary memory and secondary storage use parallel
transmission.
-6-
Chapter 5: Data Transmission and Networking AS Computing 9691/01 1
Transmitter Receiver
2. HALF DUPLEX
Transmission of data is in both directions, but only in any one direction at a time. E.g. ATM, CB Radio and fax-
machine.
Device 1 Device 2
3. DUPLEX
Transmission of data takes place in both directions, simultaneously at the same time. E.g. telephone conversation,
internet and satellite communication.
Device 1 Device 2
-7-
Chapter 5: Data Transmission and Networking AS Computing 9691/01 1
Text files are smaller in size as they contain printable characters organized on a line by line basis and each
character is of minimum one byte.
Non-text files contain binary codes of non-printable characters, each of which is of minimum three bytes.
So if text files are being transmitted, e.g. on the Internet, keeping the bit rate low will not take long as text files
can seemingly be sent much more quickly than other forms of data. However, if non-text files are to transmitted
then the bit rate has to be kept higher in order to make sure that the file is transmitted in a reasonable time and
does not cause a long delay at the receiving end.
This means that many pages of text can be sent in the same amount of time that it takes to transmit a single
image, so it seems that text is transmitted more quickly.
Speeding up the transmission of the information by reducing the amount of data that is sent is known as
COMPRESSION.
The size of the transmitted file is not an issue as long as we have time to wait for it to be downloaded or uploaded.
If the file of data is a text file which the recipient will read after they have finished another task, then the two
minutes taken to transmit the file does not matter; it does not make the file less useful.
If the file is a video clip, transmission time does not matter if the file is going to be watched at a later time after it
has been downloaded.
However, if the file is a video that the recipient wants to watch as it is being transmitted. This technique is called
streaming. For streaming, it is important that the file can be transmitted quickly enough and the bit rate has to be
high, to let the person watch the video as it is being transmitted. If the bit rate is not high enough then the video
will appear to judder, or even to freeze, while the computer waits for the next download of data.
If a file is going to be watched in real time as it is received then the data are said to be time sensitive. Time-
sensitive files need a high bit rate, not necessarily just large files.
If data being communicated is to be stored at receiver for future use, then the bit rate can be slow.
If data being communicated is to be used immediately upon arrival then the bit rate used for
communication must be faster than the rate at which the data is used.
Why text based files do not cause problems while graphic (non-text) files download slowly?
Text based files are relatively smaller in size as each character used to store information takes only one
byte.
Graphics/Non-text files are larger in size as each character used to store information takes up to 3 bytes.
Explain why the bit rate is an important part of any protocol
to enable standardisation
to enable one layer to be altered without altering the entire protocol
enables manufacturers to design hardware and software for a particular layer
Relationship between bit rates and the use of data content in a network
Bit Rate is the number of bits per second that can be sent across the communication medium.
If data that is being transmitted is to be stored at receiver for future use, then the bit rate can be kept slow.
If data that is being transmitted is to be used immediately upon arrival then the bit rate used for
communication must be kept high i.e. faster than the rate at which the data is used.
-8-
Chapter 5: Data Transmission and Networking AS Computing 9691/01 1
-9-
Chapter 5: Data Transmission and Networking AS Computing 9691/01 1
Broadband bandwidth is used for direct communication between very high speed computers (e.g. large mainframe
computers). This bandwidth includes microwave, satellite, coaxial cable, and fiber-optic media.
The term broadband is used to describe a type of data transmission in which a single medium (wire) can carry
several channels at once. For signals to be both sent and received, the transmission media must be split into two
channels.
A user with a broadband Internet connection has a much faster and more enjoyable experience while on the
Internet when compared to someone with a dial-up connection. Broadband users can also purchase a network
router and share their broadband connection between multiple computers in their home.
-
Chapter 5: Data Transmission and Networking AS Computing 9691/01 1
Note:
Parity is used not only during data transfer between devices but also when data are transferred between
different components of the CPU.
If two mistakes are made in the same byte, they cancel each other out and the faulty data are accepted.
This problem can be overcome and a clever way of identifying mistakes can be implemented by using
Parity Blocks.
A byte can represent a character code in eight bits, giving potentially 256 different characters. However, an
ASCII character reserves one of the bits for a parity bit. This leaves seven bits for the character code,
reducing the number of different characters to 128.
PARITY BLOCKS
A further check can be made on the data bytes which are transmitted. An additional byte, called the parity byte, is
calculated and transmitted for each group of bytes. The data bytes and parity byte together are called a parity
block. Parity block is like a rectangle made up of rows and columns. The last bit in each row, i.e. in each data byte,
is the parity bit, which checks if there is an error in the byte. One possible problem with a parity bit check is that
two errors in the same byte are not picked up by the parity bit check. They are however detected by the check
which the parity byte performs.
Think of the parity byte not as data but as a whole row of parity bits, each of which is there to check the column of
bits above it in the grid.
Consider the following transmission in which four data bytes are followed by the parity byte using odd parity. The
correctly transmitted parity block (four data bytes followed by the parity byte) is shown below.
1 1 0 0 1 1 0 1 Parity Bits
0 0 1 0 0 0 0 0
1 0 1 1 1 1 0 0
1 1 0 0 0 0 1 0
Parity Byte 0 1 1 0 1 1 0 0
Assume that there was an error in the transmission and the bytes shown in the figure below were received by the
device. The parity bit for data byte three is calculated as 1. A 0 bit was received, so the conclusion is that there
must be an error with it. The parity byte shows that there is an error with the calculation in column three. The
conclusion is that the incorrect bit in byte three must be the one in column 3, so change this from 0 to 1.
1 1 0 0 1 1 0 1
0 0 1 0 0 0 0 0
1 0 0 1 1 1 0 0
1 1 0 0 0 0 1 0
0 1 1 0 1 1 0 0
Note:
It is claimed that checking the parity bits and using a parity block check will identify 99% of all transmission errors.
-
Chapter 5: Data Transmission and Networking AS Computing 9691/01 1
B
A C
D
E
In the network shown, it would be easy to send a message from A to D or from A to B because A is directly
connected to both of them. However, sending a message from A to C is much more difficult because there is no
direct route.
There are two ways that the message can be sent:
1. PACKET SWITCHING
In packet switching, the message is split into a number of equal-sized packets (or datagrams). Each packet
has a label its destination address and a packet sequence number. These packets are sent along
communication lines towards the destination. Each time a packet reaches a node (a point of intersection)
on the network, the node decides which direction to send it on. So, one packet in the message from A
reaches node D. The obvious route to take is the one directly to C, but it is already in use for another
message, so D decides to send it to E instead. The next packet arrives at D and, this time, the line to C is
free, so the packet is sent direct to C. When the message has all arrived at C it has to be reassembled in
the correct order.
Advantages:
Packet switching allows optimum use of the connections around the network because as many
routes are in use at one time as possible.
It maximises the number of routes in use at any one time.
It becomes almost impossible to intercept a whole message and therefore messages are more
secure.
A path/route is not dedicated for the transmission of one message.
Disadvantages:
Message is only received as fast as the slowest packet.
Packets need to be reordered on arrival in order to re-create the original message.
2. CIRCUIT SWITCHING
The whole message is sent on a pre-decided single path/route reserved by the network. So the message
can then be sent directly from A to C and will not need to be reordered when it gets there.
Advantages:
The whole message is kept together so it does not need to be reassembled at the destination.
Packets do not need to be reordered at receiving end.
It is faster as it allows greater bandwidth.
-
Chapter 5: Data Transmission and Networking AS Computing 9691/01 1
Disadvantages:
It ties up a large part of the network for the duration of the transmission.
The path must be set up which takes time.
Circuit switching involves setting up the route before the message is sent.
Packet involves sending the message in packets of equal size, each of which finds a different route to the
destination.
1.5 (k) Protocols
The set of rules that needs to be established to allow the transfer of data to be carried out is known as a protocol.
OR
A set of rules or instructions, that governs or defines how communication is to be carried out/controlled between
different communicating devices.
OR
A uniform set of rules that enable two devices to connect and transmit data to one another. Protocols determine
how data are transmitted between computing devices and over networks.
There are a number of protocols, e.g. HTTP, HTTPS, FTP, SMTP, VOIP, or TCP/IP. Without protocols, devices
wouldnt know what format to expect data in. Typical rules would define:
Type of data transmission (the wire connecting the two parts of the system): whether the data
transmission is serial or parallel. For example errors would occur if one device has a serial connection and
the other device expects a parallel connection.
Mode of data transmission: whether the data transmission is full duplex, half duplex or simplex.
Bit rate used: if one device sent data at a particular bit rate and the other device was set to receive at a
different rate, the message would not be received correctly (bits may be missed or counted twice)
Method of error detection: whether the parity is odd or even, whether echoing back is used or whether
check sums are used.
Parity used: if one device used even parity and the other device used odd parity then no correctly sent
byte of information would ever be accepted.
Agreed method to tell the receiving machine that the sending machine has finished sending all of the
data.
Method or signal to tell the sender that the data has arrived correctly at its destination e.g. echo back
If the data is compressed before sending it to other computer then does the protocol allow this to take
place and if so then what method does it use?
HANDSHAKE SIGNAL
When two devices need to communicate, the initial contact between them is a signal called the handshake signal.
This involves an exchange of data between the two devices to establish that they are both ready for the
communication to start and that they agree on the rules that are going to be used for the communication.
Why handshaking process is necessary between a computer and the file server before use?
To ensure that both are on and ready for communication
To ensure that both are using same protocol
-
Chapter 5: Data Transmission and Networking AS Computing 9691/01 1
Explain the need for a handshake as part of a protocol, giving examples of what occurs during a handshake
Handshake ensures that both parties are ready to communicate
Must agree on the format of the medium for communication e.g. serial
Must agree error checking e.g. parity
Must agree form of data to be used e.g. character set
-
Chapter 5: Data Transmission and Networking AS Computing 9691/01 1
2. Also allows manufacturers to develop communication systems and software which use standard
protocols.
For Example: If a manufacturer was to design a new network card, they would only need to design the
way it communicates with the data link layer. If layered interfaces were not used, these manufacturers
would have to design all the components of the interface.
3. Layering allows each layer to be treated independently and enables security measures to be used for
data transmission.
Why is a protocol arranged in a layered fashion or why a protocol consists of a number of layers?
Sending Receiving
Computer Network Transmission Medium Computer
-
Chapter 5: Data Transmission and Networking AS Computing 9691/01 1
function. These seven layers are described below and their individual l names and de tails of working are not
required to be remembered for an A level co mput ing 9691 student.
In the early days of personal computing, it was important to buy all the hardware from
the same manufacturer. Devices from different manufacturers were not necessarily able
to operate together. There were difficulties in establishing an interface between different
parts of the system. Layered interfaces make such communication possible.
Each layer knows how to communicate with the upper and lower layer as they can only talk to layers above or
below them.
Some common protocols are:
HTTP Hyper Text Transfer Protocol
HTTPS Hyper Text Transfer Protocol over Secure Socket Layer
FTP File Transfer Protocol
SMTP Simple Mail Transfer Protocol
POP3 Post Office Protocol 3
TCP/IP Transmission Control Protocol / Internet Protocol
-
Chapter 5: Data Transmission and Networking AS Computing 9691/01 1
EXAMINATION QUESTIONS
3. A finished website will be made available across the internet or on a local area network or both.
Explain the relationship between the bit rates available on the network and the types of output format
used on the website.
The bit rate is a measure of the rate that data can be sent across the communication medium.
Different communication media have different bit rates.
For simple text/still pictures, a low bit rate connection, is adequate because volume of data per page is
low and fixed that will be downloaded easily in a reasonable time.
For (live) video/sound the bit rate needs to be high because there is large volume of data which must
be downloaded in real time because information is time sensitive.
4. When a video file is accessed on a network it can be watched as it is downloading or it can be stored for
watching at a later date.
Explain the relationship between the required bit rates and the data being transmitted.
Video files contain large volumes of data. If watched at a later time then it does not matter how long
download it takes therefore bit rate can afford to be low.
However, if video is to be watched as it is downloaded then the bit rate must be high as it is to be
transmitted in a reasonable time and not cause a delay, otherwise the video will not run without
jerking/losing quality.
5. Why text based files do not cause problems while graphic (non-text) files download slowly?
Text based files are relatively smaller in size as each character used to store information takes only one
byte.
Graphics/Non-text files are larger in size as each character used to store information takes up to 3
bytes.
-
Chapter 5: Data Transmission and Networking AS Computing 9691/01 1
6. Some computers are used in the offices for clerical tasks like word processing and accounting. Some are
in the showroom so that customers can see details of cars and videos of them being driven. The
computers used at the garage are networked and all data is stored on a central server.
Use examples from this application to explain the relationship between bit rates and the way that the
data in the files is used.
Bit rate is the number of bits transferred in a given time period
Different communication media have different bit rates.
Word processing uses text files requiring a low bit rate as because of non time sensitive transfer of
data
However, video is time sensitive transfer of data that requires a large/high bit rate
7. Why text based files do not cause problems while graphic (non-text) files download slowly?
Text based files are relatively smaller in size as each character used to store information takes only one
byte.
Graphics/Non-text files are larger in size as each character used to store information takes up to 3
bytes.
8. Explain the relationship between bit rates and the use of data content in a network
Bit Rate is the number of bits per second.
If data that is being transmitted is to be stored at receiver for future use, then the bit rate can be kept
slow.
If data that is being transmitted is to be used immediately upon arrival then the bit rate used for
communication must be faster than the rate at which the data is used.