Professional Documents
Culture Documents
1.1 Introduction To Data Communication
1.1 Introduction To Data Communication
1.1 Introduction To Data Communication
Introduction - Network Models: OSI Model - TCP/ IP Protocol Suite – Addressing. Data and
Signals: Analog and Digital Signals - Transmission Impairment.
Introduction:
Communication means sharing information.
The term telecommunication, which includes telephony, telegraphy, and television,
means communication at a distance (tele is Greek for "far").
The word data refers to information presented in whatever form is agreed upon by
the parties creating and using the data.
Data communications are the exchange of data between two devices via some
form of transmission medium such as a wire cable.
The effectiveness of a data communications system depends on four fundamental
characteristics:
1. Delivery. The system must deliver data to the correct destination. Data
must be received by the intended device or user and only by that device or user.
2. Accuracy. The system must deliver the data accurately. Data that have
been altered in transmission and left uncorrected are unusable.
3. Timeliness. The system must deliver data in a timely manner. Data
delivered late are useless. In the case of video and audio, timely delivery means
delivering data as they are produced, in the same order that they are produced,
and without significant delay. This kind of delivery is called real-time transmission.
4. Jitter refers to the variation in the packet arrival time. It is the uneven
delay in the delivery of audio or video packets.
For example, let us assume that video packets are sent every 3D ms. If
some of the packets arrive with 3D-ms delay and others with 4D-ms delay, an
uneven quality in the video is the result
Components :
A data communications system has five components:
Data Representation :
Information today comes in different forms such as text, numbers, images, audio, and video.
1.Text.
In data communications, text is represented as a bit pattern, a sequence of bits (0s
or 1s).
Different sets of bit patterns have been designed to represent text symbols. Each set
is called a code, and the process of representing symbols is called coding.
2. Numbers
Numbers are also represented by bit patterns. However, a code such as ASCII
is not used to represent numbers; the number is directly converted to a binary number to
simplify mathematical operations.
3. Images
Images are also represented by bit patterns. In its simplest form, an image is
composed of a matrix of pixels (picture elements), where each pixel is a small dot. The
size of the pixel depends on the resolution. For example, an image can be divided into
1000 pixels or 10,000 pixels.
There are several methods to represent color images. One method is called RGB, so
called because each color is made of a combination of three primary colors: red,
green, and blue. The intensity of each color is measured, and a bit pattern is assigned
to it.
Another method is called YCM, in which a color is made of a combination of three
other primary colors: yellow, cyan, and magenta.
4.Audio
5.Video
Video refers to the recording or broadcasting of a picture or movie.
Video can either be produced as a continuous entity (e.g., by a TV camera), or it can
be a combination of images, each a discrete entity, arranged to convey the idea of motion.
Data Flow :
Communication between two devices can be simplex, half-duplex, or full-duplex.
Prepared By: T.Santhini AP/CA Page 3
DEPARTMENT NAME:MASTER OF COMPUTER APPLICATIONS
Class: I MCA Batch: 2023-2025
Course code:23CAR08 Course Title: DATA COMMUNICATION
AND NETWORKS
Simplex:
In simplex mode, the communication is unidirectional, as on a one-way street. Only
one of the two devices on a link can transmit; the other can only receive.
Half-Duplex:
In half-duplex mode, each station can both transmit and receive, but not at the same
time. : When one device is sending, the other can only receive, and vice versa .
Full-Duplex:
In full-duplex mode (also called duplex), both stations can transmit and receive
simultaneously.
1.2 NETWORKS
Distributed Processing
Most networks use distributed processing, in which a task is divided among multiple
computers. Instead of one single large machine being responsible for all aspects of a
process, separate computers handle a subset.
Network Criteria
A network must be able to meet a certain number of criteria. The most important of
these are performance, reliability, and security.
Performance
Performance can be measured in many ways, including transit time and response
time. Transit time is the amount of time required for a message to travel from one device to
another.
Reliability
Security
Network security issues include protecting data from unauthorized access, protecting
data from damage and development, and implementing policies and procedures for recovery
from breaches and data losses.
Physical Structure
For visualization purposes, it is simplest to imagine any link as a line drawn between
two points.
Type of Connection:
Point-to-Point :
A point-to-point connection provides a dedicated link between two devices. The entire
capacity of the link is reserved for transmission between those two devices.
Multipoint :
A multipoint (also called multidrop) connection is one in which more than two specific
devices share a single link.
Topology:
Topology defines the structure of the network of how all the components are
interconnected to each other. There are two types of topology: physical and logical topology.
Physical topology is the geometric representation of all the nodes in a network. There
are six types of network topology which are Bus Topology, Ring Topology, Tree Topology,
Star Topology, Mesh Topology, and Hybrid Topology.
1) Bus Topology
o The bus topology is designed in such a way that all the stations are connected through
a single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or directly
connected to the backbone cable.
o When a node wants to send a message over the network, it puts a message over the
network. All the stations available in the network will receive the message whether it
has been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.
o The configuration of a bus topology is quite simpler as compared to other topologies.
o The backbone cable is considered as a "single lane" through which the message is
broadcast to all the stations.
o The most common access method of the bus topologies is CSMA (Carrier Sense
Multiple Access).
CSMA: It is a media access control used to control the data flow so that data integrity is
maintained, i.e., the packets do not get lost. There are two alternative ways of handling the
problems that occur when two nodes send the messages simultaneously.
o CSMA CD: CSMA CD (Collision detection) is an access method used to detect the
collision. Once the collision is detected, the sender will stop transmitting the data.
Therefore, it works on "recovery after the collision".
o CSMA CA: CSMA CA (Collision Avoidance) is an access method used to avoid the
collision by checking whether the transmission media is busy or not. If busy, then the
Prepared By: T.Santhini AP/CA Page 7
DEPARTMENT NAME:MASTER OF COMPUTER APPLICATIONS
Class: I MCA Batch: 2023-2025
Course code:23CAR08 Course Title: DATA COMMUNICATION
AND NETWORKS
sender waits until the media becomes idle. This technique effectively reduces the
possibility of the collision. It does not work on "recovery after the collision".
o Low-cost cable: In bus topology, nodes are directly connected to the cable without
passing through a hub. Therefore, the initial cost of installation is low.
o Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-based
networks that support upto 10 Mbps.
o Familiar technology: Bus topology is a familiar technology as the installation and
troubleshooting techniques are well known, and hardware components are easily
available.
o Limited failure: A failure in one node will not have any effect on other nodes.
o Extensive cabling: A bus topology is quite simpler, but still it requires a lot of cabling.
o Difficult troubleshooting: It requires specialized test equipment to determine the
cable faults. If any fault occurs in the cable, then it would disrupt the communication
for all the nodes.
o Signal interference: If two nodes send the messages simultaneously, then the
signals of both the nodes collide with each other.
o Reconfiguration difficult: Adding new devices to the network would slow down the
network.
o Attenuation: Attenuation is a loss of signal leads to communication issues. Repeaters
are used to regenerate the signal.
2) Ring Topology
o It has no terminated ends, i.e., each node is connected to other node and having no
termination point.
o The data in a ring topology flow in a clockwise direction.
o The most common access method of the ring topology is token passing.
o Token passing: It is a network access method in which token is passed from
one node to another node.
o Token: It is a frame that circulates around the network.
o A token moves around the network, and it is passed from computer to computer until it
reaches the destination.
o The sender modifies the token by putting the address along with the data.
o The data is passed from one device to another device until the destination address
matches. Once the token received by the destination device, then it sends the
acknowledgment to the sender.
o In a ring topology, a token is used as a carrier.
o Network Management: Faulty devices can be removed from the network without
bringing the network down.
o Product availability: Many hardware and software tools for network operation and
monitoring are available.
o Cost: Twisted pair cabling is inexpensive and easily available. Therefore, the
installation cost is very low.
o Reliable: It is a more reliable network because the communication system is not
dependent on the single host computer.
3) Star Topology
o A Central point of failure: If the central hub or switch goes down, then all the
connected nodes will not be able to communicate with each other.
o Cable: Sometimes cable routing becomes difficult when a significant amount of
routing is required.
4) Tree topology
o Tree topology combines the characteristics of bus topology and star topology.
o A tree topology is a type of structure in which all the computers are connected with
each other in hierarchical fashion.
o The top-most node in tree topology is known as a root node, and all other nodes are
the descendants of the root node.
o There is only one path exists between two nodes for the data transmission. Thus, it
forms a parent-child hierarchy.
o Difficult troubleshooting: If any fault occurs in the node, then it becomes difficult to
troubleshoot the problem.
o High cost: Devices required for broadband transmission are very costly.
o Failure: A tree topology mainly relies on main bus cable and failure in main bus cable
will damage the overall network.
o Reconfiguration difficult: If new devices are added, then it becomes difficult to
reconfigure.
5) Mesh topology
A computer network is a group of computers linked to each other that enables the computer
to communicate with another computer and share their resources, data, and applications.
Internet
o The first question that pops into your mind is probably, “Who started the internet?”.
o The Internet was developed by Bob Kahn and Vint Cerf in the 1970s.
o They began the design of what we today know as the „internet.‟ It was the result of
another research experiment which was called ARPANET, which stands for Advanced
Research Projects Agency Network.
o This was initially supposed to be a communications system for the Defense Team of
the United States of America - a network that would also survive a nuclear attack.
o It eventually became a successful nationwide experimental packet network.
o But when was the first Internet started? It is believed that on 6 August 1991, when the
World Wide Web opened to the public.
o Computers that we use every day are called clients because they are indirectly
connected to the Internet through an internet service provider.
o When you open a webpage on your computer, you connect to the webpage, and then
you can access it.
o Computers break the information into smaller pieces called packets, which are
reassembled in their original order.
o If we put the right address on a packet and send it to any computer which is connected
as part of the internet, each computer would figure out which cable to send it down
next so that it would get to its destination.
o With several computers on a network, it may create confusion even with unique
addresses.
o This transfer of messages is handled by the Packet Routing Network, and hence a
router is required to set up.
o The Transfer Control Protocol is another system that makes sure no packet is lost or
left behind because it might create a disrupted message at the receiving end.
The below are the steps for how the message is transferred.
3. These small pieces- packets are transferred concerning Transfer Protocol so that the
quality is maintained.
4. Finally, these small pieces- packets reach Computer2 and are reassembled at their IP
address.
The Internet works in a more complex manner than these above-given steps, but this might
give a basic idea of how the internet works.
o Tim Berners-Lee was the man, who led the development of the World Wide Web, the
defining of HTTP (HyperText Transfer Protocol), HTML (hypertext markup language)
used to create web pages, and URLs (Universal Resource Locators).
o The development of WWW, HTTP, HTML and URLs took place between 1989 and
1991.
o Tim Berners-Lee was born in London and he graduated in Physics from Oxford
University in 1976. Currently, Tim Berners-Lee is the Director of the World Wide Web
Consortium, the group that sets technical standards for the web.
o Tim Berners-Lee, Vinton Cerf is also named as an internet daddy other than Tim
Berners-Lee.
o After being out for 10 years from high school, he began co-designing and co-
developing the protocols and structure of what became the internet.
o Computer networks are dependent on protocols and standards which plays a vital
role, which enables communication between different devices and systems with one
another and share data seamlessly.
o Network protocol ensures that different technologies and components of the network
are compatible with one another, reliable, and able to function together.
Overview of Protocol
Standards
Standards are the set of rules for data communication that are needed for exchange of
information among devices. It is important to follow Standards which are created by
various Standard Organization like IEEE , ISO , ANSI etc.
Types of Standards
De Facto Standard.
De Jure Standard.
For example : Apple and Google are two companies which established their own rules
on their products which are different . Also they use some same standard rules for
manufacturing for their products.
De Jure Standard : The meaning of the word “De Jure” is “By Law” or
“By Regulations”.Thus , these are the standards that have been approved by officially
recognized body like ANSI , ISO , IEEE etc. These are the standard which are important to
follow if it is required or needed.
For example : All the data communication standard protocols like SMTP , TCP ,
IP , UDP etc. are important to follow the same when we needed them.
Types of Protocol
Network Layer Protocols : Network layer protocols operate in the network layer which
is also known as the Layer 3 of the network architecture. Network layer protocols are
responsible for packet routing, forwarding and addressing of data packets throughout
the network . IP and ICMP are the network layer protocols.
Transport layer Protocols : Transport layer protocols works in transport layer which
provides end-to-end service ensuring data transfer across apps on different
devices. TCP and UDP are the most popular transport layer protocols.
Application Layer Protocol : Application layer protocol working in the application layer
of the network architecture provides communication between applications running on
different devices. The application layer protocols enable cross-device communication.
They format, exchange, and interpret application data. HTTP, FTP, and SMTP are
examples.
Protocol and standard compliance protects data, resources, and networks. Protocol and
standard compliance are crucial to network security for these reasons:
Security Baseline : Protocols and standards contain security principles and best
practices that help secure network infrastructure. These protocols allow organizations to
protect sensitive data via encryption, authentication, and access controls.
Internet Standards