Data communication involves the exchange of data between devices via transmission mediums like wires or cables. For effective data communication, systems must reliably deliver data to the correct destination in a timely manner without errors or jitter. Network topologies determine how data is transmitted between devices and include star, bus, ring, mesh, and tree configurations. Multiplexing techniques like frequency division multiplexing and time division multiplexing allow multiple signals to be combined and transmitted over a single communication line by allocating bandwidth or time slots.
Data communication involves the exchange of data between devices via transmission mediums like wires or cables. For effective data communication, systems must reliably deliver data to the correct destination in a timely manner without errors or jitter. Network topologies determine how data is transmitted between devices and include star, bus, ring, mesh, and tree configurations. Multiplexing techniques like frequency division multiplexing and time division multiplexing allow multiple signals to be combined and transmitted over a single communication line by allocating bandwidth or time slots.
Data communication involves the exchange of data between devices via transmission mediums like wires or cables. For effective data communication, systems must reliably deliver data to the correct destination in a timely manner without errors or jitter. Network topologies determine how data is transmitted between devices and include star, bus, ring, mesh, and tree configurations. Multiplexing techniques like frequency division multiplexing and time division multiplexing allow multiple signals to be combined and transmitted over a single communication line by allocating bandwidth or time slots.
DATA COMMUNICATION: Data communications are the Topology - In computer networking, a topology refers to the Multiplexing is the sharing
ultiplexing is the sharing of a medium or bandwidth. It is
exchange of data between two devices via some form of layout or arrangement of connected devices on a network. the process in which multiple signals coming from multiple transmission medium such as a wire cable. For data The topology of a network determines how data is sources are combined and transmitted over a single communications to occur, the communicating devices transmitted between devices, and can have a significant communication/physical line must be part of a communication system made up of a impact on the performance and reliability of the network. combination of hardware (physical equipment) and There are several common types of network topologies, Types ofMultiplexing - 1. Frequency Division Multiplexing software (programs). The effectiveness of a data including: Star topology: In this type of topology, all devices :Frequency division multiplexing is defined as a type of communications system depends on four fundamental are connected to a central hub or switch. The hub acts as a multiplexing where the bandwidth of a single physical characteristics: delivery, accuracy, timeliness, and jitter. central point of communication for all devices on the medium is divided into a number of smaller, independent Delivery: The system must deliver data to the correct network, forwarding data packets between them as needed. frequency channels. Frequency Division Multiplexing is destination. Data must be received by the intended device This topology is easy to set up and manage, but can be used in radio and television transmission. In FDM, we can or user and only by that device or user. Accuracy: The vulnerable to failure if the hub goes down. Bus topology: In observe a lot of inter-channel cross-talk, due to the fact that system must deliver the data accurately. Data that have this type of topology, all devices are connected to a single in this type of multiplexing the bandwidth is divided into been altered in transmission and left uncorrected are cable, called the bus. The bus acts as the central frequency channels. In order to prevent the inter-channel unusable. Timeliness: The system must deliver data in a communication channel for all devices on the network, and cross talk, unused strips of bandwidth must be placed timely manner. Data delivered late are useless. In the case data is transmitted by sending a signal down the bus. This between each channel. These unused strips between each of video and audio, timely delivery means delivering data as topology is simple to implement and can be cost-effective, channel are known as guard bands. 2. Time Division they are produced, in the same order that they are but is vulnerable to failure if the bus is damaged or Multiplexing : Time-division multiplexing is defined as a produced, and without significant delay. This kind of experiences congestion. Ring topology: In this type of type of multiplexing wherein FDM, instead of sharing a delivery is called real-time transmission, Jitter: Jitter refers topology, all devices are connected in a circular portion of the bandwidth in the form of channels, in TDM, to the variation in the packet arrival time. It is the uneven configuration, with each device connected to two other time is shared. Each connection occupies a portion of time delay in the delivery of audio or video packets. For example, devices. Data travels in a single direction around the ring, in the link. In Time Division Multiplexing, all signals operate let us assume that video packets are sent every 30 ms. If with each device acting as a repeater to amplify the signal with the same frequency (bandwidth) at different times. | some of the packets arrive with 30-ms delay and others as it travels. This topology is relatively resilient to failure, There are two types of Time Division Multiplexing : with 40-ms delay. an uneven quality in the video is the but can be slower than other topologies due to the need for Synchronous TDM : Synchronous TDM is a type of Time result. data to travel around the entire ring before reaching its Division Multiplexing where the input frame already has a destination. Mesh topology: In this type of topology, every slot in the output frame. Time slots are grouped into device on the network is connected to every other device. DATA FLOW: Communication between two devices can be frames. One frame consists of one cycle of time slots. This creates multiple paths for data to travel, making the simplex, half-duplex, or full-duplex. Simplex: In simplex Synchronous TDM is not efficient because if the input network highly resilient to failures. However, the large mode, the communication is unidirectional, as on a one- frame has no data to send, a slot remains empty in the number of connections required in a mesh topology can way street. Only one of the two devices on a link can output frame.In synchronous TDM, we need to mention the make it more complex and costly to implement. Tree transmit, the other can only receive Keyboards and synchronous bit at the beginning of each frame. | topology: In this type of topology, the network is organized traditional monitors are examples of simplex devices. The Statistical TDM : Statistical TDM is a type of Time Division in a hierarchy, with a central hub or root node connected to keyboard can only introduce input; the monitor can only Multiplexing where the output frame collects data from the multiple levels of nodes. This topology is often used in accept output. The simplex mode can use the entire input frame till it is full, not leaving an empty slot like in large networks where it is important to organize devices capacity of the channel to send data in one direction.half- Synchronous TDM. In statistical TDM, we need to include into logical groups. It offers some of the benefits of both duplex: In half-duplex mode, each station can both transmit the address of each particular data in the slot that is being bus and star topologies, but can be more complex to set up and receive, but not at the same time.When one device is sent to the output frame. Statistical TDM is a more efficient and manage. sending, the other can only receive, and vice versa. Walkie- type of time-division multiplexing as the channel capacity is talkies and CB (citizens band) radios are both half-duplex fully utilized and improves the bandwidth efficiency. 3. systems. The half-duplex mode is used in cases where ISO - is a multinational body dedicated to worldwide Wavelength Division Multiplexing : Wavelength Division there is no need for communication in both directions at agreement on international standards. An ISO standard that Multiplexing is used on fiber optics to increase the capacity the same time, the entire capacity of the channel can be covers all aspects of network communications is the Open of a single fiber. It is an analog multiplexing technique. utilized for each direction. Full Duplex: in full-duplex mode Systems Interconnection model. | Purpose - •To show how Optical signals from the different sources are combined to (also called duplex), both stations can transmit and receive to facilitate communication between different systems form a wider band of light with the help of multiplexers. At simultaneously. full duplex: in full-duplex mode, signals without requiring changes to the logic of the underlying the receiving end, the demultiplexer separates the signals going in one direction share the capacity of the link: with hardware and software. •The OSI model is not a protocol; it to transmit them to their respective destinations. signals going in the other direction This sharing can occur is a model for understanding and designing a network in two ways: Either the link must contain two physically architecture that is flexible, robust, and interoperable. •The Cryptography - Cryptography is the practice of using separate transmission paths, one for sending and the other OSI model is a layered framework for the design of network mathematical techniques to secure communication. It for receiving; or the capacity of the channel is divided systems that allows communication between all types of involves the use of algorithms, or "ciphers," to encrypt and between signals travelling in both directions computer systems. It consists of seven separate but decrypt data. The main goal of cryptography is to protect related layers | LAYERS IN THE OSI MODEL: Physical Layer: the confidentiality, integrity, and authenticity of information. The physical layer coordinates the functions required to The TCP/IP (Transmission Control Protocol/Internet carry a bit stream over a physical medium. It deals with the Protocol) protocol suite is the set of communication There are several different functionalities of cryptography: mechanical and electrical specifications of the interface protocols that allows computers to connect and exchange Confidentiality: This refers to the ability to keep and transmission medium. It also defines the procedures information over a network. It is the foundation of the information private and prevent it from being accessed by and functions that physical devices and interfaces have to internet and is used by nearly all modern networks, unauthorized parties. Cryptography can be used to protect perform for transmission to Occur. Data Link Layer: The including the internet, local area networks (LANs), and wide the confidentiality of sensitive data, such as financial data link layer transforms the physical layer, a raw area networks (WANs). | TCP is a transport-layer protocol information or personal identification. Integrity: This refers transmission facility, to a reliable link. It makes the physical that ensures reliable delivery of data packets between to the ability to ensure that information has not been layer appear error- free to the upper layer (network layer). computers. It does this by providing error checking, altered or tampered with during transmission. responsibilities of the data link layer: Framing Physical retransmission of lost packets, and flow control to prevent Cryptography can be used to ensure the integrity of data by addressing Flow control Error control Access control. overloading the receiving computer. | IP is a network-layer using techniques such as message authentication codes NETWORK LAYER: The network layer is responsible for the protocol that is responsible for routing data packets from (MACs) and digital signatures. Authentication: This refers source-to-destination delivery of a packet, possibly across the source computer to the destination computer. It does to the ability to verify the identity of a sender or receiver of multiple networks (links). Whereas the data link layer this by providing a unique address for each device on the information. Cryptography can be used to authenticate the oversees the delivery of the packet between two systems network (an IP address) and routing data packets based on identity of a sender or receiver by using techniques such as on the same network (links), the network layer ensures that these addresses. | Together, TCP and IP provide a reliable, digital certificates and public key infrastructure (PKI). Non- each packet gets from its paint of origin to its final efficient, and flexible way for computers to communicate repudiation: This refers to the ability to prevent someone destination. If two systems are connected to the same link, over a network. They are the foundation of the internet and from denying that they sent or received certain information. there is usually no need for a network layer. However, if the have played a crucial role in the rapid growth and Cryptography can be used to provide non-repudiation by two systems are attached to different networks (links) with development of the internet over the past several decades. using techniques such as digital signatures and PKI. connecting devices between the networks (links), there is often a need for the network layer to accomplish source-to- In Guided media, signals are transmitted through a physical destination delivery.TRANSPORT LAYER: The transport Cryptography is used in a variety of applications, including path. The features of guide media are high speed and layer is responsible for process-to-process delivery of the secure communication over the Internet, protecting data security. Guided media also known as Wired or Bounded entire message. A process is an application program stored on computers and devices, and securing financial transmission media.There are three types of Guided running on a host. Whereas the network layer oversees transactions. media:Twisted pair,Coaxial cable,Optical fiber cable source-to-destination delivery of individual packets, it does Unguided media does not use physical medium to transmit not recognize any relationship between those packets. It the data from source to destination. We already know that treats each one independently, as though each piece the Guided media uses physical medium such as cables belonged to a separate message, whether or not it does. and wires to transfer the data from source to destination. The transport layer,on the other hand, ensures that the However unlike guided media, the Unguide media uses air whole message arrives intact and in order, overseeing both as a transmission medium to transfer the data. Thus, it is error control and flow control at the source-to-destination called wireless transmission media.Types of Unguided level. SESSION LAYER: The services provided by the first media:Microwave,Transmission,RadioTransmission three layers (physical, data link, and network! are not ,Infrared Transmission sufficient for some processes. The session layer is the network dialog controller. It establishes, maintains, and synchronizes the interaction among communicating systems.