twisted pair
Uses in society
LAN cables are certified as either Cat 5e (up to 1GB connection)
Cat 6 (up to 10GB connection)
Cost to install/buy hardware
Very cheap to buy and install. Cost is less than 10c per meter, terminations are also very cheap.
Data flow is via electrons traveling along with the cables. The twisting acts as a form of natural protection to incoming interference.
Properties and Limitations
100m maximum draw and then there is a need for repeater units.
Subject to magnetic interference from strong magnetic sources (magnets, mobile phones, televisions, microwave ovens etc)
coaxial cable
Uses in Society
computer network internet connections.
Price to install:
4c per meter
limit tgations:
it is more vulnerable to high frequency
Properties: transmits data, internet, video and voice communicaion
optic fibre
Uses in Society:
Tv connection, audio connection
Price:
1 foot is 1-6 dollars
Properties Limitations:
transits connection. By rebounding data off the wire
microwave
Uses in society
Satteleite communication deep space radio coms and navigation
Price:
$25000 and up
Properties limitations:
large range communication using 1ghz to 1000ghz
Shorter wavelengths
The connection needs to be in sight of the coms that it wants to connect to
satellite
Uses in society:
Connecting to products
Reading heat temperatures
Price:
Properties and limitations
Properties
It can connect to any other products that have the same infrared
Limitations:
Infrared can be affected by hard properties
radio
infrared
communication protocols, including:
http:
http means hypertext transfer protocol and is an application layer protocol that is designed to transfer information between network devices and run on top of other layers of the network.
smtp:
Simple mail transfer protocol is a internet communication protocol for electronic mail transmision. Mail severs and other messege transfer aents use SMTP
SSL: Secure socket layer it is a technbnology for keeping internet connection secure and safe with any sensitivce datra.
OSI SESSION Layer - This is where communication with the network is established. It also includes security to ensure a user has the appropriate access rights.
OSI Transport Layer - This layer ensures that packets failing to reach their destination are retransmitted. (Protocol = TCP )
OSI Network Layer- Packets are directed to their destination. IP – operates here – its job is to address and forward packets to their destination.
TCP: Responsible for breaking data down into IP packets before they are sent, and for assembling the packets when they arrive
IP: Responsible for ‘routing’ each packet to the correct destination.
Ethernet
Token ring
star- In the star topology, all the computers connect with the help of a hub. This cable is called a central node, and all other nodes are connected using this central node. It is most popular on LAN networks as they are inexpensive and easy to install.
bus- Bus topology uses a single cable which connects all the included nodes. The main cable acts as a spine for the entire network. One of the computers in the network acts as the computer server. When it has two endpoints, it is known as a linear bus topology.
ring- In a ring network, every device has exactly two neighboring devices for communication purpose. It is called a ring topology as its formation is like a ring. In this topology, every computer is connected to another computer. Here, the last node is combined with a first one.
hybrid- Hybrid topology combines two or more topologies. You can see in the above architecture in such a manner that the resulting network does not exhibit one of the standard topologies. For example, as you can see in the above image that in an office in one department, Star and P2P topology is used. A hybrid topology is always produced when two different basic network topologies are connected.
wireless networks-
hubs and switches- A Hub is a networking device that allows one to connect multiple PCs to a single network. Hubs may be based on Ethernet, Firewire, or USB connections. A switch is a control unit that turns the flow of electricity on or off in a circuit.
routers- A router connects your devices to each other and, in hard-wired connection setups, to the modem. The router connects to your modem and then to your devices (laptops, smart TVs, printers, etc.) via either an Ethernet cable or, in the case of a wireless router, WiFi signal.
modems- A modem is typically given by your internet service provider like Telstra and receives the information from them through phone lines, optical fibre, or coaxial cable in your home and then converts it into a digital signal. A modem also contains switches, routers, gateways and wireless access points. The modem and router can’t communicate with each other directly because they transmit different signals types, making the modem's job important in converting and translating signals to ones that the router can communicate with. The sole purpose of the modem is to provide you with internet access. If you were to only have one internet-connected device with an Ethernet port (such as a desktop computer), you could connect the modem directly to your computer with no need for a router.
bridges and gateways- Bridge is a network device which works in data link layer. Bridge connects two different LAN working on same protocol. The gateway converts information, data or other communications from one protocol or format to another.
Network Interface Cards (NIC)- A network interface controller is a computer hardware component that connects a computer to a computer network.
mobile phones-
cables-
wireless access points- is a networking hardware device that allows other Wi-Fi devices to connect to a wired network
Bluetooth devices-Bluetooth relies on short-range radio frequency, and any device that incorporates the technology can communicate as long as it is within the required distance.
(read more)
All computers process data using transistors to distinguish between the only two values they know, charged or discharged (1s and 0s). The change between these two values is a change from a higher pitch to a lower pitch, sometimes with certain communication systems, disturbances can mess with the signal and distort transmitted values, therefore error detection methods are implemented to fix them, these include: Parity, Checksum, and Cyclic Redundancy Check (CRC). These are gone into depth below and can be either:
Asynchronous - uses start and stop bits
Synchronous - No start/stop bit
Parity is the method used to check data in asynchronous transmission, where one character is checked at a time. The eighth bit of the byte is the parity bit, which is used to check the accuracy of transmission. The parity checking can be either odd or even.
When the even or odd type rule is broken, the error will be detected and the data packet would be resent to fix the error.
Limited because the data doesn't have to be the same, only an even number of 1s are needed for it to be perceived as correct. Also, the parity bit makes the transfer 12.5% slower
If the 1 digits of a binary code are added they give a total which is called a checksum. The receiving computer calculates the checksum and compares it to the transmitted checksum, and if they do not match, an error is detected.
Breaks it into packets (256 Kilobytes)
Counts the 1st in the packet
Attaches a checksum value to data
The receiving computer calculates the checksum and compares the checksum values.
The following images are what is seen from the sender's side:
The transmitted data is treated as one large binary sum (similar to checksum). The sum is then divided by a (polynomial) constant and the remainder is sent to the receiver. The receiver then works out the sum of the transmitted data, divides it by the same constant and compares the remainder with the transmitted data. CRC has the highest probability of detecting errors.
similarities and differences between the Internet, intranets and extranets