0% found this document useful (0 votes)
12 views91 pages

Communication and Internet Technologies

Uploaded by

IT Dept GMIS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views91 pages

Communication and Internet Technologies

Uploaded by

IT Dept GMIS
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 91

COMMUNICATION AND

INTERNET
TECHNOLOGIES
LEARNING OUTCOMES
Understand what is meant by Data Transmission
Difference between Serial and Parallel Transmission
Different methods of error checking and error detection
Understand the security risks when using the Internet
Explain how antivirus software help to protect a user from security risks
Understand the role of Internet browser and Internet Service Provider(ISP)
Understand what is meant by HTML and HTTP
Understand the concepts of MAC Address, IP Address, URL and Cookies
What is
Internet??
DATA
TRANSMIS
SION
DATA TRANSMISSION
Data transmission is the process of
sending data over a communication
medium to one or more computing,
network, communication or electronic
devices
Direction of data
transmission (one way or
two way)
THREE
FACTORS Method of
OF DATA transmission(how many bits
TRANSMI are sent at the same time)
SSION
Method of
synchronization between
two devices
Printer
Compute
r

Unidirectional/One way

SIMPLEX DATA television broadcasting,


television and remote,
TRANSMISSION keyboard and monitor etc.
HALF DUPLEX
TRANSMISSION Both directions
but
Example of half duplex is a walkie- talkie
in which message is sent one at a time
one at a time
but messages are sent in both the
FULL
DUPLEX
TRANSMI
SSION
Example of Full Duplex is a Telephone
Network in which there is
communication between two persons
Both directions
by a telephone line, using which both
can talk and listen at the same time
at the same time.
Simple
Full x Direction of data
Duplex
Half
transmission (one way or
Duplex two way)
THREE
FACTORS Method of
OF DATA transmission(how many bits
TRANSMI are sent at the same time)
SSION
Method of
synchronization between
two devices
Note that the bits
can be transferred
SERIAL
as simplex, halfTRANSMISSION
duplex or full duplex
WHERE IS SERIAL
TRANSMISSION USED
1. long-distance data transfer

2. used in cases where the amount of data being sent is


small.

3. Usually between two computers or from a computer


to an external device located some distance away.
Note that the bits
can be transferred
as simplex, half PARALLEL
TRANSMISSION
duplex or full duplex
WHERE IS PARALLEL
TRANSMISSION USED
a large amount of data is being sent;
the data being sent is time-sensitive;
and the data needs to be sent quickly.
Works well in short distances.

Example – Video Streaming, sending data to a


printer from a computer using a ribbon connector.
DIFFERE
NCE
BETWEE
N SERIAL
AND
PARALLE
L DATA
TRANSMI
SSION
Simple
Full x Direction of data
Duplex
Half
transmission (one way or
Duplex two way)
THREE
FACTORSSerial Method of
OF DATA transmission(how many bits
TRANSMIl
Paralle are sent at the same time)
SSION
Method of
synchronization between
two devices
USE OF SERIAL AND PARALLEL
DATA TRANSMISSION
Serial Data Transmission – USB
Parallel Data Transmission – Used in the internal electronics of the computer.

Control Bus, Memory Bus, Address Bus – wires – High Speed , short distances
Data is
sent in
agreed
bit
patterns
SYNCHRONOUS
COMMUNICATION

Data is sent as a continuous flow of 0s and 1s.


The data is accompanied by timing signals
generated by an internal clock.
USB – Universal Serial Bus

Asynchronous Serial Data Transmission


WHEN A DEVICE IS PLUGGED
INTO ONE OF THE USB PORTS
1. Computer automatically detects that a device is
present(this is due to a small change in voltage
level on the data signal wires in the cable)

2. The device is automatically recognized and an


appropriate DEVICE DRIVER is loaded up so
that the device and the computer can communicate.
ADVANTAGES OF USING USB
Devices plugged into the computer are automatically detected.
Since it has become a industry standard, a lot of support is available.
The connections can only fit one way, so it prevents incorrect
connections to be made
Several different data transmission rates are supported
Newer USB standards are backward compatible with older standards.
https://www.electronics-notes.com/articles/connectivity/usb-universal-s
erial-bus/standards.php
DRAWBACKS
The maximum cable length at present is 5 metres.
The present transmission rate is limited to 4.8 gigabytes
per second.
The oldest USB standard(1.1) may not be supported in
the near future.
Easy to lose because of small size.
Can get damaged easily due to soft plastic outer coating.
Aoccdrnig to rscheearch at Cmabrigde
Uinervtisy, it deosn't mttaer in waht
oredr the ltteers in a wrod are, the
olny iprmoetnt tihng is taht the frist
and lsat ltteer be at the rghit pclae.
The rset can be a toatl mses and you
can sitll raed it wouthit a porbelm. Tihs
is bcuseae the huamn mnid deos not
raed ervey lteter by istlef, but the wrod
as a wlohe.
ERROR CHECKING
METHODS
PARITY CHECKING
PARITY CHECKING is one method used to check
whether data has been changed or corrupted following
transmission from one device or medium to another
device or medium.
A byte of data, for example, is allocated a PARITY BIT.
This is allocated before transmission takes place. Systems
that use EVEN PARITY have an even number of 1-bits;
systems that use ODD PARITY have an odd number of 1-
bits.
PARITY CHECKING
1 1 1 0 1 1 0 1 Even Parity

0 0 0 0 1 1 1 1 Even Parity

1 0 1 1 1 0 0 0 Even Parity

0 1 0 1 1 0 1 1 Odd Parity
Sender’s
0 1 0 1 1 1 0 0 Byte

Receiver’s
0 1 0 0 1 1 0 0 Byte

If a byte has been transmitted from 'A' to 'B', and even parity is
used, an error would be flagged if the byte now had an odd number
of I-bits at the receiver’s end.
ARQ –
AUTOMATI
C REPEAT
REQUEST
CHECKSUM
CHECKSUM is an error checking method to check if data
has been changed or corrupted during or after data
transmission. Data is sent in blocks and an additional
value, the checksum, is also sent at the end of the block of
data.
256 128 64 32 16 8 4 2

28 27 26 25 24 23 22 21

0 0 0 0 0 0 0 0

1 0 0 1 0 0 0 0
ECHO CHECK
With ECHO CHECK, when data is sent to another device, this data is sent back
again to the sender. The sender compares the two sets of data to check if any errors
occurred during the transmission process.

Not very reliable as there is no way to find out if the error occurred while sending
data to the receiver or while sending data back to the sender.
INTERNET
TECHNOLOGIES
What is Internet
INTERNET SERVICE
PROVIDERS
WEB BROWSER
A web browser is a software for accessing
information on the internet.
WEB SERVER
A computer that hosts a website or many websites is known
as a web server.
IP ADDRESS – INTERNET
PROTOCOL ADDRESS
• IP Address is your passport to the internet.

• It’s a unique address assigned by the ISP for a particular


Internet session. Example:- 1.160.10.240

• IP Addresses are not permanent.

• Use the ipconfig command to see your IP address.


HTML- HYPER TEXT MARKUP
LANGUAGE
• HTML is a mark up language used to develop web pages.

• HTML uses tags which are used to bracket pieces of code.

• HTML document must have STRUCTURE AND PRESENTATION.

.html file .css file


INTERNET PROTOCOLS
Protocols are a set of rules which govern the transmission of data
over the internet.

HTTP – Hyper
Text Transfer TCP – Transmission
Protocol Control Protocol
HTTP – HYPER TEXT
TRANSFER PROTOCOL
COOKIES
Aaron Swartz
Internet’s Own Boy

November 8, 1986
to
January 11, 2013
WHO WAS AARON
SWARTZ??
• American Computer programming
Expert
• Political Activist
• Founder of RSS, REDDIT, CREATIVE
COMMONS
WHAT DID HE FIGHT FOR?

Open Access
WHAT DID HE FIGHT
FOR??
…  We need to take information, wherever it is
stored, make our copies and share them with
the world. … We need to download scientific
journals and upload them to file sharing
networks. We need to fight for Open Access.
WHAT HE DID??
He hacked into JSTOR, an online
database of scholarly articles
containing research on history,
geography, sciences, musicology etc.
WHAT HAPPENED TO AARON
SWARTZ
• He was pressed with criminal charges
worth 35 years of jail and fine up to 1
million dollars.

• After two years of criminal charges, he


killed himself. He hanged himself in his
apartment. He was 26.
4x1 + 2x2 + 4x 3 + 1x4 +5x5 + 0x6 + 8x
7 = 105

105/11 = 6

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy