Computer Science For Business
Computer Science For Business
a. Binary to Octal
Step1: make groups of three bits starting from the least significant bit a. Binary to Hexadecimal
and move towards the most significant bit. Step1: make groups of four bits starting from the least significant bit
Step 2: replace each group of bits by its octal representation. and move towards the most significant bit.
Step 2: replace each group of bits by its hexadecimal value
Example: 1. Convert 100110 to base 8 representation.
100110 = 100 110 Example 1: Convert 100110 to base 16
100 = 4 , 110 = 6 100110 = 0010 0110
∴ 100110 = 46 0010 = 2 , 0110 = 6
Bus topology
wireless connection is around 3-10km.WiMax service providers are
now just entering the market, offering customers an alternative to a
1.3. Network Standards DSL Internet connection.
1.3.1. EthernetNetwork 2.1.1. Buffering
Ethernet (IEEE 802.3 standard) is the most common and widely used A buffer is an area of memory used to temporarily store data while it is
technology to establish a local area network. An Ethernet network is being moved from one place to another. Buffers are used to
formed by physically connecting the individual computer units to each compensate for differences in rate of flow of data or time of
other in a bus topology or a star topology. Ethernet’s media access occurrence of events, when transferring data from one device to
policy is CSMA/CD (Carrier Sense MultIPle Access with Collision another. Routers use buffers to route data packets on the Internet.
Detection). When a packet is sent from one router to
CS: means that a station listens to (senses) the medium and another via one or more intermediate routers, the packet is received at
transmits only if medium is idle each intermediate router in its entirety, stored there until the required
MA: means that any station can use (access) the medium output line is free, then the packet is forwarded.
CD: means that each station stops transmitting immediately it 1.4. Network Architectures
senses a collision. 1.4.1. Client/ServerArchitecture
When a collision is detected, the two stations involved will retransmit Client/server is a network architecture in which a more powerful
after a random time wait created by a back off algorithm. computer called server is dedicated to serving less powerful
1.3.2. Token Ring Network computers called clients. Servers hold shared resources like files,
Token ring (IEEE 802.5 standard) is a network technology developed programs and the network operating system. They provide access to
by IBM in which computers are connected together in a ring. Token network resources to all the users of the network. There are many
ring’s media-access method is called token passing. A special different kinds of servers, and one server can provide several
message, called token, circulates along the ring from one computer to functions. For example, there are file servers, print servers, mail
another and each computer can transmit only while it is holding the servers, database servers and Web servers. Users run applications on
token. Information flows in one direction along the ring from source to client workstations which rely on servers for resources such as files,
destination and back to source. When a station wishes to transmit, it devices and even processing power.
waits for the empty token to pass by. It seizes it and inserts data into it Internet services are organized according to a client/server
and then releases it to the medium. The token circulates until it gets to architecture. Client programs, such as Web browsers and file transfer
the destination computer that picks it and retrieves the data. After programs create connections to servers, such as Web and FTP servers.
retrieving the data, it regenerates the token and sends it back to the The clients make requests and the server responds to the requests by
medium. providing the services requested by the client.
A B
Analogue signal
2.4.3. FullDuplex thinnet and
In full duplex mode, signals can be transmitted in both directions thicknet.
simultaneously. The communicating devices can transmit at the same
time. The flow of information is bidirectional. It is suitable for
interactive systems. An example is the telephone.
A B
Coaxial cable
2.4.4. ParallelTransmission To connect coaxial cable to devices, we need coaxial connectors. The
Parallel transmission is the method of transferring several bits at the most common type of connectors used today is the Bayone-Neill-
same time over separate wires. For example, eight separate channels Concelman, or BNC connector.
will be required if a block of eight bits is to be transmitted in parallel.
Parallel transmission is fast but it is suited only for short distances as b. Twisted Pair Cable
cabling for long distances will be expensive. It is mainly used for Twisted-pair cable is the most common type of cabling used in LAN
connections within the computer and for connecting the computer to networks today. It consists of a pair or pairs of insulated wires twisted
the printer. together. Cable twisting helps reduce noise pickup from outside
2.4.5. Serial Transmissions sources and crosstalk on multi-pair cables. There are two types of
Serial transmission is the method of transferring data one bit at a time twisted pair cables: shielded twisted pairs (STP) and unshielded
through the same channel. If a block of 8 bits is to be transmitted in twisted pairs (UTP).
series, the bits will be transmitted one after the other on the same
channel. Serial transmission can be asynchronous or synchronous. Twisted pair cable uses RJ-14
a. Asynchronous Serial Transmission and RJ-45 connectors
Asynchronous transmission describes the process where transmitted
data is encoded with start and stop bits, specifying respectively the
beginning and end of each character. Data is sent character by
character with each character preceded by a start bit and a stop bit is Twisted pair cable
added to the end. Other control bits like the parity bit are added to the
group before the stop bit and small gabs are inserted to distinguish Unshielded Twisted Pair
each group. UTP cables consist of 2 or 4 pairs of twisted cable. Cable with 2 pair
b. Synchronous Serial Transmission use RJ-11 connector and 4 pair cable use RJ-45 connector. RJ stands
Synchronous transmissiondescribes a continuous and consistent for registered jack. There are five levels of UTP:
timed transfer of data blocks. Data is sent as one long bit stream or Category 1: These are used in telephone lines and low speed data
block of data without start or stop bits and with no gabs. Upon cable.
reception, the receiver counts the bits and reconstructs bytes. It is Category 2: These cables can support up to 4 mps implementation.
essential that the same timing is maintained by both sender and Category 3: These cable supports up to 16 mps and are mostly used in
receiver as there are no start and stop bits and no gaps. Another 10 mps.
channel is therefore used to transfer timing signals to keep the both Category 4: These are used for large distance and high speed. It can
parties synchronized. Accuracy is dependent on the receiver keeping support 20mps.
an accurate count of the bits as they arrive. Category 5: This is the highest rating for UTP cable and can support up
to 100mps.
2.1. TransmissionMedia a. Fiber Optic Cable
A transmission medium is the physical pathway that connects Fiber optic cables use optical fibers that carry digital data signals in
computers and other devices on a network. Each transmission medium the form of modulated light pulses. An optic fiber consists of an
requires specialized network hardware that is compatible with that extremely thin cylinder of glass, called the core, surrounded by a
medium, and most networks need to use a combination of concentric layer of glass, known as the cladding. Each cable has two
transmission media types selected based on the network's fibers - one to transmit and one to receive.
needs.There are two categories of transmission media: guided and There are two types of optic fibers:
unguided media. A single mode fiber (SMF) uses a single ray of light to carry
2.1.1. Guided Media transmissions over long distances.
Guided media are the physical links through which signals are A multi-mode fiber (MMF) uses multIPle rays of light
confined to narrow path. They are made up of an internal conductor simultaneously with each ray of light running at a different
bounded by jacket material. They are also called bounded or reflection angle to carry transmissions over short distances.
conducted media. Three common types of guided media are coaxial 2.4.6. UnguidedMedia
cable, twisted pair cable and fiber optical cable. Unguided media do not use physical means to define the path to be
a. Coaxial Cable taken. They provide a means for transmitting electromagnetic waves
Coaxial cable consists of an inner core and an outer flexible braided but do not guide them. They are also called unbounded media.
shield, both of conductive material separated by an insulator. The Examples of unguided media are infrared waves, radio wavesand
braided shield prevents the cable from picking up or emitting electrical microwaves.
noise. There are two types of coaxial cable:
2.4.7. The OSI Reference Model
a. Infrared The Open Systems Interconnection (OSI) reference model or more
Infrared uses transmitters/receivers (transceivers) that modulate non- commonly the OSI model is an ISO standard that defines how network
coherent infrared light. Infrared signals do not penetrate walls as such communications take place by providing a framework for
transceivers must be within line-of-sight either directly or via standardization. The OSI model divides network communications into
reflection. Line of sight is a type of propagation that can transmit and seven layers. Each layer is responsible for carrying out specific
receive data only where transmit and receive stations are in view of functions when transmitting data on the network. The table below
each other without any sort of an obstacle between them. shows the layered architecture of the OSI reference model.
b. Radio waves
Radio wave systems transmit signals by modulation of These
7 Application Layer
electromagnetic waves with frequencies below that of visible light. layers can
Radio waves carry information by systematically changing some 6 Presentation Layer be recalled
property of the radiated waves such as amplitude (AM radio), using the
frequency (FM radio) and phase. Radiowaves are omnidirectional.This 5 Session Layer following
means that signals spread out in all directions and can be received by mnemonic
4 Transport Layer
many antennas. s:
c. Microwaves 3 Network Layer All People
Microwaves are electromagnetic radiations beyond the frequency Seem To
range of radio and television. There are two types of microwave 2 Data Link Layer
Need Data
systems: terrestrial microwave systems and satellite systems. Processing
1 Physical Layer
Terrestrial microwavesystemsare land-based. Microwaves being . (Layers 7
line-of-sight and - 1)
OSI Reference Model
Traveling in a straight line, the earth’s curvature poses a
problem to long distance microwave transmissions. As such,long Layer 7: Application
distance transmissions antennas (repeaters)to be used at intervals of It provides network services directly to the user’s applications such as
25 to 30 kilometers between the transmitting and receiving end. a web browser or e-mail client. This layer is said to be “closest to the
user”. Examples of protocols that operate at this layer are: TELNET,
Satellite systems use communication satellites to solve the HTTP, FTP, SMTP and POP.
problem posed by the earth’s curvature to terrestrial microwave
systems. A communication satellite is a microwave relay station Layer 6: Presentation
placed in outer space. A microwave signal is transmitted from earth to The Presentation layer represents the data in a particular format to the
the satellite which amplifies the signal and sends it back to earth. The Application layer. It defines encryption, compression, conversion and
earth station transmits the signal to the satellite on an up-link, on one other coding functions. Examples of specifications defined at this layer
frequency and the satellite repeats those signals on a down link which are: GIF, JPEG, MPEG, MIME and ASCII.
is on another frequency.
Layer 5: Session
It establishes, maintains and terminates end-to-end connections
(session) between two applications on two network nodes. It controls
the dialogue between the source and destination nodes, which node
can send when and for how long. Examples of protocols that operate
on this layer are: RPC, NETBIOS and X.225
Layer 4: Transport
It is responsible for end-to-end delivery of entire messages. It allows
data to be transferred reliably and uses sequencing to guarantee that
Advantages of microwave systems it will be delivered in the same order it was sent. It also provides
oNo cables needed services such as error checking and flow control. Examples of
oMultIPle channels available protocols at this layer are: TCP, UDP, NETBEUI and SPX.
oWide bandwidth
Disadvantages Layer 3: Network
o Line-of-sight will be disrupted if any obstacle, such as new It is responsible for path determination, routing, and the delivery of
buildings, are in the way packets across internetworks. It is also responsible for addressing
o Signal absorption by the atmosphere. Microwaves suffer (also known as logical addressing) for example IP addressing.
from attenuation due to atmospheric conditions. Examples of protocols at this layer are: IP, IPX and ICMP.
o Towers are expensive to build Examples of devices that operate at this level are Layer-3 switches and
routers. WAPs (wireless access points) with built-in routing
capabilities also act at this layer.
Layer 2: Data Link and the second bit set to 0 in dotted decimal notation i.e. 128.0.0.0
It is responsible for reassembling bits taken off the wire by the physical and loopback. E.g. 135.58.24.17.
layer to frames and makes sure they are in the correct order and The need for a protocol is obvious: it allows different computers from
requests retransmission of frames in case an error occurs. It provides different vendors and with different operating characteristics to ‘speak
error checking by adding CRC to the frame. Examples of protocols at the same language’. The same protocols must be followed by each
this layer are: Ethernet machine involved in the communication in order for the receiving host
t, Token Ring, PPP and ISDN. to be able to understand the message. A protocol may be physical or
Examples of devices that operate at this layer are: switches, bridges, logical.
NICs and WAPs (Wireless Access Points). 2.1.1. Physical Protocols
Physical protocols are concerned with how a device connects toa
Layer 1: Physical medium. They ensure that a device connected to a medium can
This layer communicates directly with the communication medium. It transmit through the medium. They make sure that the layout of pins
is responsible for activating, maintaining and deactivating the physical on the connectors is the same and that devices are correctly
link. It defines electrical and optical signaling, voltage levels, data connected and configured. Few examples of physical protocols are
transmission rates, as well as mechanical specifications such as cable 802.11 for Wi-Fi connections and DSL for broadband.
lengths, and connectors, the amount of pins and their functions.
Examples of devices that operate at this layer are: hubs, repeaters,
2.1.2. Logical Protocols
and NICs. Logical protocols are concerned with data handling. They ensure that
These layers can be recalled using the following mnemonics: All data are in the right format for the application, the bit rates match at
People Seem To Need Data Processing. (Layers 7 - 1) both ends, and the same error correction is used. Examples of logical
protocols are TCP/IP, HTTP, POP3, FTP, SMTP and WAP.
4. The Internet Types of Network Protocols
3.1. Brief History a. Internet Protocol
Many years ago, the military of the United States of America desired to Internet Protocol (IP) specifies the format of packets and the
interconnect or link their computers in order to better understand and addressing scheme. All computer devices (desktops, laptops, PDAs,
manage information and communication with respect to enemy phones, tablets) connected to the Internet, have IP addresses by which
attacks in times of crisis. In the year 1969 the Department of Defense they are identified.
(DoD) then developed an experimental network called the Advanced
Research Project Agency Network (ARPANet) Definition: An IP address is a unique identifying number given to every
In the year 1980, the National Science Foundation of the United single computer on a TCP/IP network.
States of America then developed the technology of ARPANet to Two versions of IP addresses are available: IPv4 that uses 32 bits and
produce the National Science Foundation Network (NSFNet) which IPv6 that uses 128 bits.
now enabled universities and other school establishments in the USA An IPv4 is made up of four sets of numbers separated by dots
to be interconnected. After a great deal of work, a network which such as 123.23.168.22. This notation is known as dotted
enabled the transfer of large amounts of information at very high decimal notation. Each of the four numbers separated by dots
speed which is today called the Internet was developed. can be any number from 0 to 255, making for a total of 4.3
The Internet can be defined as a worldwide/global system of billion potential IPv4 addresses (i.e. 255×255×255×255).
interconnected computer networks. It is the network of networks in
which users can view information on the World Wide Web, exchange An IPv6 has eight sets of numbers separated by colons such
electronic mail, particIPate in electronic discussion forums as 3ffe:1900:4545:3:200:f8ff:fe21:67cf.
(newsgroups), send files from any computer to any other and even use IP addresses are assigned manually (by an administrator) or
each other’s computers directly if they have appropriate passwords. automatically (by DHCP or APIPA). An IP address is also known as a
Another name for the Internet is information superhighway. logical address.
2.1. CommunicationProtocols b. Address Resolution Protocol
For proper communication in a network, different entities must speak ARP resolves IP addresses to MAC addresses.
the same language. There must be mutually acceptable conventions
and rules about the content, timing and underlying mechanisms. Assignment: Differentiate between an IP address and a MAC address.
These conventions and associated rules are referred as protocols.
Definition: A protocol is a set of rules and conventions that govern how c. Internet Control Message Protocol
devices on a network communicate. ICMP isresponsible for diagnostics and error reporting during message
CLASSES OF IP. sending.
IP addresses are classified into different classes based on the size of d. Internet Group Management Protocol
network, the leading bit/ start address. They are various classes of IP IGMP is responsible for management of group multicast.
addresses ranging from class a, to class E.
Class A: it’s a category of IP whose first eight bits or the first dotted
decimal, is the Network part of the address while the rest of the bits
represents the host address, ranging from 0.0.0.0 to 127.0.0.0 and
loopback. E.g. 2.134.213.2.
Class B: it’s a category of IP whose first 16 bits represents the
Network part of the address. All class b IP’s have their first bit set to 1
3.1.1. Transport Layer i) IMAP
The transport layer is responsible for sequencing and transmission of ii) RIP
packets, acknowledgment of receipts, recovery of packets and flow iii) DNS
control. In essence, it engages in host-to-host transportation of data iv)
packets and the delivery of them to the application layer. A transport 3.2. TCP/IP Ports
layer PDU is called segment. A computer has a single physical connection to the network. All data
Core protocols at this layer are TCP and UDP. destined for a particular computer arrives through that connection.
However, the data may be intended for different applications running
a. Transmission Control Protocol on the computer. To identify the application for which the data is
TCP is aconnection-orientedreliable protocol used in the accurate intended, TCP requires port numbers on the host and destination for
transmission of large amounts of data. Data packets are verified using communication.
checksums and retransmitted if they are missing or corrupted. The Definition: A communication port is a 16-bit number that identifies an
application plays no part in validating the transfer. application on the Internet or TCP/IP network.
Popular Internet application protocols are associated with well-
b. User Datagram Protocol knownportsassigned by the Internet Assigned Number Authority
UDPis a connectionless unreliable protocol used for the transmission (IANA). Sample TCP port numbers are:
of small amounts of data. Data packets are sent without testing to
Port number Protocol
verify whether they actually arrive at the destination, nor whether they
were corrupted in transit. It is up to the application to determine these 20 FTP data channel
factors and request retransmissions. UDP is faster compared to TCP.
21 FTP control channel
110 POP
a. Hypertext Transfer Protocol
HTTPis a standard method of publishing information as hypertext in Ports are usually combined with IP addresses to form a socket. For
HTML format on the Internet. It provides the ability to supply web example 127.102.10.0:80.
pages between a browser and the server. HTTPS is a secure version of
HTTP used for accessing secure web servers, whereby all data
transferred are encrypted.
c. Business-to-Government
B2G is a derivative of B2B marketing. B2G sites provide a platform for
businesses to bid on government opportunities which are presented as
solicitations requests for proposal (RFPs) to tender.
d. M-Commerce
M-commerce refers to the use of mobile devices for conducting
transactions. The mobile device holders can contact each other and
can conduct the business. Even the web design
and development companies optimize the websites to be viewed
correctly on mobile devices.