Professional Documents
Culture Documents
Data Comm (1) .
Data Comm (1) .
Data Comm (1) .
Ans. Evolution of Data Communication: The 1970s and 1980s saw a merger of the fields of
computer science and data communications which has profoundly changed the technology and
products. The revolutionary merger has resulted in a new combined computer- communications
industry.
The computer communications revolution has lead to the following significant results:
There is no fundamental difference between data processing (computers) and data
communications (transmission and switching equipment).
There are no fundamental differences among data, voice and video communications.
The distinction among single- processor computer, multiprocessor computer, local
network, metropolitan network, and long- haul network has blurred.
The major effect of these trends is as follows:
There has been a growing overlap of the computer and communications industries,
from component fabrication to system integration.
The development of integrated systems that transmit and process all types of data
and information.
Both the technology and the technical standards organizations are driving toward
integrated public systems that make virtually a data and information sources around
the world easily and uniformly accessible.
Elements of Data Communication system: The key elements of the data communication system
are as follows:
Source: This device generates the data to be transmitted; examples are telephones and
personal computers.
Transmitter: Usually, the data generated by a source system are not transmitted directly in
the form in which they were generated. Rather, a transmitter transforms and encodes the
information in such a way as to produce electro- magnetic signals that can be transmitted
across some sort of transmission system.
2. Explain the following:
♦ Analog and Data Transmission
♦ Transmission Impairments
Ans. Analog and Data Transmission: In transmitting data from a source to a destination, one
must be concerned with the nature of data, actual physical means used to propagate the data, and
what processing or adjustments may be required along the way to assure that the received data are
intelligible. For all of these considerations, the crucial point is whether we are dealing with analog or
digitals entities.
The terms analog and digital correspond, roughly, to continuous and discrete, respectively. These
two terms are used frequently in data communications in at least three contexts:
• Data
• Signaling
• Transmission
Transmission Impairments: With any communications system, the signal that is received
may differ from the signal that is transmitted due to various transmission impairments. For analog
signals, these impairments can degrade the signal quality. For digital signals; bit errors may be
introduced: A binary 1 is transformed into a binary 0 and vice versa.
3. Explain the following with respect to Transmission Media:
♦ Guided Transmission Media
♦ Un-Guided or Wireless Transmission Media
Ans. Guided Transmission Media: Guided media provide a physical path along which the
signals are propagated. With guided media, the waves are guided along a solid medium; these
include copper twisted pair, copper coaxial cable, and optical fiber.
Unguided or Wireless Transmission Media: Unguided media employ an antenna for
transmitting through air, vacuum, or water. The atmosphere and outer space are examples of
unguided media, which provide a means of transmitting electromagnetic signal but do not guide
them; this form of transmission is usually referred as wireless transmission. Unguided transmission
techniques commonly used for information communications included broadcast radio, terrestrial
microwave, and satellite. Infrared transmission is used in some LAN applications.
Ans. Network Access Technologies: There are various types of technologies in use today for
networking like Token Ring Ethernet, Fast Ethernet, Fiber Distributed Data Interface (FDDI) and
Asynchronous Transfer Mode (ATM). However Ethernet is the most popular LAN technology in use
today covering more than 85% of the networks.
Networking Devices: The mainly used networking devices are as follows:
• Repeaters
• Hubs
• Bridges
• Switches
• Routers
• Gateways
All of these devices are in common use, but they all differ in subtle and not so-subtle ways.
All these devices operate in different layers.
X.25: X.25 is an example of a connection- oriented network. It was the firs public data
network. It was deployed in the 1970s at a time when telephone service was a monopoly
everywhere and the telephone company in each country expected to have their own data networks.
To use x.25, a computer first establishes a connection to the remote computer. X.25 standard
specifies an interface between a host system and a packet switching network. This standard is
almost universally used for interfacing to packet switching networks and is employed for packet
switching in ISDN.
Frame Relay: In the 1980s, the x.25 networks were largely replaced by a new kind of
network called frame relay. The essence of frame relay is that it is a connection- oriented network
with no error control and no flow control. Because it was connection- oriented, packets were
delivered in order. The properties of in-order delivery, no error control, and no flow control make
frame relay akin to a wide area LAN.
Data Communication and Computer Assignment No: 02
106 105 104 103 102 101 100 10-1 10-2 10-3 10-4 10-5 10-6
Wavelength in space (meters)
ELF=Extremely Low Frequency MF= Medium Frequency UHF= Ultra High Frequency
VF= Voice Frequency HF= High Frequency SHF= Super High Frequency
VLF= Very Low Frequency VHF= Very High Frequency EHF= Extremely High Frequency
LF= Low Frequency
Fig. Electromagnetic spectrum for Telecommunications
3. Explain the following:
♦ Digital Signatures
♦ Firewalls
♦ E-Mail and Web Security
Ans. Digital Signatures:-the authenticity of many legal, financial, and other documents is
determined by the presence or absence of an authorized handwritten signature and photocopies do
not count. Basically what is needed is a system by which one party can send a signed message to
another party in such a way that the following conditions hold.
• The receiver can verify the claimed identity of the sender.