SlideShare a Scribd company logo
1 of 11
COMPUTER COMMUNICATION AND
NETWORKS
Books: Data Communication, by William Stallings
Data Communication and networking by Behrouz A.
Forouzan
1
INTRODUCTION
DATA COMMUNICATIONS:
The term telecommunication means communication
at a distance. The word data refers to information
presented in whatever form is agreed upon by the
parties creating and using the data. Data
communications are the exchange of data between
two devices via some form of transmission medium
such as a wire cable.
2
DATA COMMUNICATION COMPONENTS
Five components of data communication
3
 1. Message:
The massage is the information (data) to be communicated
for example. Text, number, pictures, Audio, Vedio etc.
2. Sender:
The sender is the device that sends the data
massage.
3.Reciever:
The receiver is the device which receive the
massage.
4.transmission medium:
The transmission medium is the physical path by
which a message travels from sender to reciever.
4
CONTINUE:
5.Protocols:
A protocol is the set of rules that governs
data communication.
it represents an agreement between the
communication devices.
Without protocols two devices may be connected
but not communication.
5
DATA FLOW:
 Data flow (simplex, half-duplex, and full-duplex)
6
CONT:
7
NETWORKS:
 A network is a set of devices (often referred to as
nodes) connected by communication links. A
node can be a computer, printer, or any other
device capable of sending and/or receiving data
generated by other nodes on the network.
8
TYPES OF CONNECTIONS:
Point-to-Point:
 In telecommunications, a point-to-point connection
refers to a communications connection between two
nodes or endpoints.
 The entire capacity of the link is reserved for
transmission between two devices.
 Communication link may be wire or microwave or
satellite link.
 An example is a telephone call, in which one telephone is
connected with one other, and what is said by one caller
can only be heard by the other. 9
MULTIPOINTS
 A multipoint connection is a connection in which
more than two terminals share one communications
link.
 In multipoint environment the capacity of the
channel is shared.
 if several devices can use the link
simultaneously, then it is spatially share connection.
 If user take turns .it is timeshared connection.
10
11

More Related Content

What's hot

Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networkingkieshore
 
wired and wireless networks
wired and wireless networkswired and wireless networks
wired and wireless networksKavitha Ravi
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingRozitarmizi Mohammad
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data CommunicationKamal Acharya
 
Guided and unguided media
Guided and unguided mediaGuided and unguided media
Guided and unguided mediaHassan Osama
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12LakshyaT
 
Assignment 1,computer networks-317
Assignment 1,computer networks-317Assignment 1,computer networks-317
Assignment 1,computer networks-317Khondoker Sadia
 
Computer networks and it's applications
Computer networks and it's applicationsComputer networks and it's applications
Computer networks and it's applicationsvarun arora
 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsritajindal2
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking FundamentalsManjit Chavda
 

What's hot (20)

Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
wired and wireless networks
wired and wireless networkswired and wireless networks
wired and wireless networks
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Network and it's Uses
Network and it's UsesNetwork and it's Uses
Network and it's Uses
 
Guided and unguided media
Guided and unguided mediaGuided and unguided media
Guided and unguided media
 
Network devices
Network devicesNetwork devices
Network devices
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
Assignment 1,computer networks-317
Assignment 1,computer networks-317Assignment 1,computer networks-317
Assignment 1,computer networks-317
 
Computer networks and it's applications
Computer networks and it's applicationsComputer networks and it's applications
Computer networks and it's applications
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Presentation on modem
Presentation on modemPresentation on modem
Presentation on modem
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Computer Network
Computer NetworkComputer Network
Computer Network
 

Viewers also liked

Computer communications and networks
Computer communications and networksComputer communications and networks
Computer communications and networksVarun Jain
 
Computer communication
Computer communicationComputer communication
Computer communicationMukul Kumar
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1Zafar Ayub
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answersmkengkilili2011
 
Computer communication and internet
Computer communication and internetComputer communication and internet
Computer communication and interneteVidhya
 
Computer and Communication Networks in ODL
Computer and Communication Networks in ODLComputer and Communication Networks in ODL
Computer and Communication Networks in ODLSanjaya Mishra
 
COMMUNICATION & COMPUTER SKILLS
COMMUNICATION & COMPUTER SKILLSCOMMUNICATION & COMPUTER SKILLS
COMMUNICATION & COMPUTER SKILLSMakaha Rutendo
 
COMPUTER COMMUNICATION NETWORKS AND INTERNET
COMPUTER COMMUNICATION NETWORKS AND INTERNETCOMPUTER COMMUNICATION NETWORKS AND INTERNET
COMPUTER COMMUNICATION NETWORKS AND INTERNETDr. Ghanshyam Singh
 
Telecommunication
TelecommunicationTelecommunication
Telecommunicationchmusman
 
Fundamentals of Telecommunication
Fundamentals of TelecommunicationFundamentals of Telecommunication
Fundamentals of TelecommunicationMohammed Eldaw
 
Wmcn ch.1
Wmcn ch.1Wmcn ch.1
Wmcn ch.1Alaa2
 
Data communication computer_network_tutorial
Data communication computer_network_tutorialData communication computer_network_tutorial
Data communication computer_network_tutorialMaulen Bale
 
Introduction to-telecommunication-rf
Introduction to-telecommunication-rfIntroduction to-telecommunication-rf
Introduction to-telecommunication-rfTerra Sacrifice
 
Communication through computer networks
Communication through computer networksCommunication through computer networks
Communication through computer networksIvin Sebastian
 
Kerja Kursus ICT(open source)
Kerja Kursus ICT(open source)Kerja Kursus ICT(open source)
Kerja Kursus ICT(open source)Zul Azmi
 
wireless communication and networking Chapter 1
wireless communication and networking Chapter 1wireless communication and networking Chapter 1
wireless communication and networking Chapter 1Senthil Kanth
 
Lesson 5: Branding, Packaging and Labels
Lesson 5: Branding, Packaging and LabelsLesson 5: Branding, Packaging and Labels
Lesson 5: Branding, Packaging and LabelsNia Noelle
 
Development of computers
Development of computersDevelopment of computers
Development of computersDeepak Kumar
 

Viewers also liked (20)

Computer communications and networks
Computer communications and networksComputer communications and networks
Computer communications and networks
 
Computer communication
Computer communicationComputer communication
Computer communication
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answer
 
Computer communication and internet
Computer communication and internetComputer communication and internet
Computer communication and internet
 
Computer and Communication Networks in ODL
Computer and Communication Networks in ODLComputer and Communication Networks in ODL
Computer and Communication Networks in ODL
 
COMMUNICATION & COMPUTER SKILLS
COMMUNICATION & COMPUTER SKILLSCOMMUNICATION & COMPUTER SKILLS
COMMUNICATION & COMPUTER SKILLS
 
COMPUTER COMMUNICATION NETWORKS AND INTERNET
COMPUTER COMMUNICATION NETWORKS AND INTERNETCOMPUTER COMMUNICATION NETWORKS AND INTERNET
COMPUTER COMMUNICATION NETWORKS AND INTERNET
 
Telecommunication
TelecommunicationTelecommunication
Telecommunication
 
Fundamentals of Telecommunication
Fundamentals of TelecommunicationFundamentals of Telecommunication
Fundamentals of Telecommunication
 
Wmcn ch.1
Wmcn ch.1Wmcn ch.1
Wmcn ch.1
 
Data communication computer_network_tutorial
Data communication computer_network_tutorialData communication computer_network_tutorial
Data communication computer_network_tutorial
 
Introduction to-telecommunication-rf
Introduction to-telecommunication-rfIntroduction to-telecommunication-rf
Introduction to-telecommunication-rf
 
OOP in JavaScript
OOP in JavaScriptOOP in JavaScript
OOP in JavaScript
 
Communication through computer networks
Communication through computer networksCommunication through computer networks
Communication through computer networks
 
Kerja Kursus ICT(open source)
Kerja Kursus ICT(open source)Kerja Kursus ICT(open source)
Kerja Kursus ICT(open source)
 
wireless communication and networking Chapter 1
wireless communication and networking Chapter 1wireless communication and networking Chapter 1
wireless communication and networking Chapter 1
 
Lesson 5: Branding, Packaging and Labels
Lesson 5: Branding, Packaging and LabelsLesson 5: Branding, Packaging and Labels
Lesson 5: Branding, Packaging and Labels
 
Development of computers
Development of computersDevelopment of computers
Development of computers
 
HISTORY OF COMPUTERS
HISTORY OF COMPUTERSHISTORY OF COMPUTERS
HISTORY OF COMPUTERS
 

Similar to Computer communication and networks

Basic introduction on data communication
Basic introduction on data communicationBasic introduction on data communication
Basic introduction on data communicationMd. Mujahiduzzaman
 
Data Communication-1
Data Communication-1Data Communication-1
Data Communication-1nadirzaman1
 
Lecture 1 data communication
Lecture 1 data communicationLecture 1 data communication
Lecture 1 data communicationmohanad6
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptxsairakesh41
 
Networking notes
Networking notesNetworking notes
Networking notes0718928964
 
computer network notes with full details
computer network notes with  full detailscomputer network notes with  full details
computer network notes with full detailsKajalSingh958233
 
Internet tybcom
Internet tybcomInternet tybcom
Internet tybcomAditya
 
Unit 1_ Network Hardware session 1.pptx
Unit 1_ Network Hardware session 1.pptxUnit 1_ Network Hardware session 1.pptx
Unit 1_ Network Hardware session 1.pptxAsst.prof M.Gokilavani
 
network.pptx
network.pptxnetwork.pptx
network.pptxGeyado
 
waleed khaliqi DataCommunication Lec !
waleed khaliqi DataCommunication Lec !waleed khaliqi DataCommunication Lec !
waleed khaliqi DataCommunication Lec !Ahmad Waleed Khaliqi
 
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptx
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptxUnit1-INTRODUCTION AND PHYSICAL LAYER.pptx
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptxLAVANYAsrietacin
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Dr. SELVAGANESAN S
 
Dc ass-2-1834902082 md.ismail.pptm
Dc ass-2-1834902082 md.ismail.pptmDc ass-2-1834902082 md.ismail.pptm
Dc ass-2-1834902082 md.ismail.pptmMdISMAIL97
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Sehrish Rafiq
 
Lecture1 introductiontonetwork
Lecture1 introductiontonetworkLecture1 introductiontonetwork
Lecture1 introductiontonetworkH K
 

Similar to Computer communication and networks (20)

Basic introduction on data communication
Basic introduction on data communicationBasic introduction on data communication
Basic introduction on data communication
 
Data Communication-1
Data Communication-1Data Communication-1
Data Communication-1
 
Lecture 1 data communication
Lecture 1 data communicationLecture 1 data communication
Lecture 1 data communication
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptx
 
Networking notes
Networking notesNetworking notes
Networking notes
 
Presentation1 Networking.pptx
Presentation1 Networking.pptxPresentation1 Networking.pptx
Presentation1 Networking.pptx
 
computer network notes with full details
computer network notes with  full detailscomputer network notes with  full details
computer network notes with full details
 
Unit-1.docx
Unit-1.docxUnit-1.docx
Unit-1.docx
 
Internet tybcom
Internet tybcomInternet tybcom
Internet tybcom
 
Unit 1_ Network Hardware session 1.pptx
Unit 1_ Network Hardware session 1.pptxUnit 1_ Network Hardware session 1.pptx
Unit 1_ Network Hardware session 1.pptx
 
network.pptx
network.pptxnetwork.pptx
network.pptx
 
network.pdf
network.pdfnetwork.pdf
network.pdf
 
waleed khaliqi DataCommunication Lec !
waleed khaliqi DataCommunication Lec !waleed khaliqi DataCommunication Lec !
waleed khaliqi DataCommunication Lec !
 
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptx
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptxUnit1-INTRODUCTION AND PHYSICAL LAYER.pptx
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptx
 
Physical Layer.pdf
Physical Layer.pdfPhysical Layer.pdf
Physical Layer.pdf
 
#1 Physical Layer.pdf
#1 Physical Layer.pdf#1 Physical Layer.pdf
#1 Physical Layer.pdf
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
Dc ass-2-1834902082 md.ismail.pptm
Dc ass-2-1834902082 md.ismail.pptmDc ass-2-1834902082 md.ismail.pptm
Dc ass-2-1834902082 md.ismail.pptm
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
 
Lecture1 introductiontonetwork
Lecture1 introductiontonetworkLecture1 introductiontonetwork
Lecture1 introductiontonetwork
 

Recently uploaded

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 

Recently uploaded (20)

Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 

Computer communication and networks

  • 1. COMPUTER COMMUNICATION AND NETWORKS Books: Data Communication, by William Stallings Data Communication and networking by Behrouz A. Forouzan 1
  • 2. INTRODUCTION DATA COMMUNICATIONS: The term telecommunication means communication at a distance. The word data refers to information presented in whatever form is agreed upon by the parties creating and using the data. Data communications are the exchange of data between two devices via some form of transmission medium such as a wire cable. 2
  • 3. DATA COMMUNICATION COMPONENTS Five components of data communication 3
  • 4.  1. Message: The massage is the information (data) to be communicated for example. Text, number, pictures, Audio, Vedio etc. 2. Sender: The sender is the device that sends the data massage. 3.Reciever: The receiver is the device which receive the massage. 4.transmission medium: The transmission medium is the physical path by which a message travels from sender to reciever. 4
  • 5. CONTINUE: 5.Protocols: A protocol is the set of rules that governs data communication. it represents an agreement between the communication devices. Without protocols two devices may be connected but not communication. 5
  • 6. DATA FLOW:  Data flow (simplex, half-duplex, and full-duplex) 6
  • 8. NETWORKS:  A network is a set of devices (often referred to as nodes) connected by communication links. A node can be a computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the network. 8
  • 9. TYPES OF CONNECTIONS: Point-to-Point:  In telecommunications, a point-to-point connection refers to a communications connection between two nodes or endpoints.  The entire capacity of the link is reserved for transmission between two devices.  Communication link may be wire or microwave or satellite link.  An example is a telephone call, in which one telephone is connected with one other, and what is said by one caller can only be heard by the other. 9
  • 10. MULTIPOINTS  A multipoint connection is a connection in which more than two terminals share one communications link.  In multipoint environment the capacity of the channel is shared.  if several devices can use the link simultaneously, then it is spatially share connection.  If user take turns .it is timeshared connection. 10
  • 11. 11