SlideShare a Scribd company logo
1 of 22
Snehal Kulthe
Department of Management Science
 Data communication refers to the
transmission of the digital data between two
or more computers The physical connection
between networked computing devices is
established using either cable media or
wireless media. The best-known computer
network is the Interne
 A workstation (WS) is a computer dedicated
to a user or group of users engaged in
business or professional work. It includes
one or more high resolution displays and a
faster processor than a personal computer
(PC). A workstation also has greater
multitasking capability because of
additional random access memory (RAM),
drives and drive capacity. A workstation may
also have a higher-speed graphics adapters
and more connected peripherals.
 The term workstation also has been used to
reference a PC or mainframe terminal on a
local area network (LAN). These
workstations may share network resources
with one or more large client computers and
network servers.
 In Computer science, client-server is a software
architecture model consisting of two parts, client systems
and server systems, both communicating over a computer
network or on the same computer. A client-server
application is a distributed systemmade up of both client
and server software. Client server application provide a
better way to share the workload.The
client process always initiates a connection to the server,
while the server process always waits for requests from
any client. When both the client process and
server process are running on the same computer, this is
called a single seat setup.
 Another type of related software architecture is known
as peer-to-peer, because each host
or application instance can simultaneously act as both a
client and a server (unlike centralized servers of
the client-server model) and because each has equivalent
responsibilities and status. Peer-to-peer architectures are
often abbreviatedusing the acronym P2P.
 The client-server relationship describes the relation
between the client and how it makes a service request to the
server, and how the server can accept these requests, process
them, and return the requested information to the client. The
interaction between client and server is often described
using sequence diagrams. Sequence diagrams are
standardized in the Unified Modeling Language.
 Both client-server and P2P architectures are in wide usage
today.
 The basic type of client-server software architecture employs
only two types of hosts: clients and servers. This type of
architecture is sometimes referred to as two-tier. The two-
tier architecture means that the client acts as one tier
and server process acts as the other tier.
 The client-server software architecture has become one of
the basic models of network computing. Many types of
applications have been written using the client-server model.
Standard networked functions such as E-
mail exchange, webaccess and database access, are based on
the client-server model. For example, a web browser is a
client program at the user computer that may access
information at any web server in the world.
 A computer network is a set
of computers connected
together for the purpose of
sharing resources. The most
common resource shared
today is connection to the
Internet. Other shared
resources can include a
printer or a file server. The
Internet itself can be
considered a computer
network.
 A network protocol defines rules and conventions for
communication between network devices. Network
protocols include mechanisms for devices to identify and
make connections with each other, as well as formatting
rules that specify how data is packaged into messages
sent and received. Some protocols also support
message acknowledgment and data compression designed
for reliable and/or high-performance network
communication.
 Modern protocols for computer networking all generally
use packet switching techniques to send and receive
messages in the form of packets —messages subdivided
into pieces that are collected and re-assembled at their
destination. Hundreds of different computer network
protocols have been developed each designed for
specific purposes and environments
 Internet Protocols
The Internet Protocol family contains a set of related (and among
the most widely used) network protocols. Beside Internet Protocol
(IP) itself, higher-level protocols like TCP, UDP, HTTP, and FTP all
integrate with IP to provide additional capabilities. Similarly, lower-
level Internet Protocols like ARP and ICMP also co-exist with IP. In
general, higher level protocols in the IP family interact more closely
with applications like Web browsers while lower-level protocols
interact with network adapters and other computer hardware.
 Wireless Network Protocols
Thanks to Wi-Fi, Bluetooth and LTE, wireless networks have become
commonplace. Network protocols designed for use on wireless
networks must support roaming mobile devices and deal with issues
such as variable data rates and network security.
 Network Routing Protocols
Routing protocols are special-purpose protocols designed
specifically for use by network routers on the internet. A routing
protocol can identify other routers, manage the pathways
(called routes) between sources and destinations of network
messages, and make dynamic routing decisions. Common routing
protocols include EIGRP, OSPF, and BGP.
 TCP/IP, or the Transmission Control
Protocol/Internet Protocol, is a suite of
communication protocols used to
interconnect network devices on the internet.
TCP/IP can also be used as a communications
protocol in a private network (an intranet or
an extranet).
 Short for transmission control protocol/Internet
protocol, TCP/IP is a set of rules (protocols)
governing communications among all computers on
the Internet. More specifically, TCP/IP dictates how
information should be packaged (turned into
bundles of information called packets), sent, and
received, as well as how to get to its destination.
TCP/IP was developed in 1978 and driven by Bob
Kahn and Vint Cerf.
LAN MAN WAN
A LAN (local area network)
is a group of computers
and network devices
connected together,
usually within the same
building. By definition, the
connections must be high
speed and relatively
inexpensive (e.g., token
ring or Ethernet). Most
Indiana University
Bloomington departments
are on LANs.
A LAN connection is a
high-speed connection to a
LAN. On the IUB campus,
most connections are
either Ethernet (10 Mbps)
or Fast Ethernet (100
Mbps), and a few locations
have Gigabit Ethernet
(1000 Mbps) connections.
A MAN (metropolitan area
network) is a larger
network that usually spans
several buildings in the
same city or town. The IUB
network is an example of a
MAN.
A WAN (wide area
network), in comparison to
a MAN, is not restricted to
a geographical location,
although it might be
confined within the
bounds of a state or
country. A WAN connects
several LANs, and may be
limited to an enterprise (a
corporation or an
organization) or accessible
to the public. The
technology is high speed
and relatively expensive.
The Internet is an example
of a worldwide public
WAN.
 A network topology is the arrangement of a
network, including its nodes and connecting
lines. There are two ways of defining
network geometry: the physical topology and
the logical (or signal) topology.
 The physical topology of a network is the
actual geometric layout of workstations.
There are several common physical
topologies, as described below and as shown
in the illustration.
1. In the bus network topology, every workstation is
connected to a main cable called the bus.
Therefore, in effect, each workstation is directly
connected to every other workstation in the
network.
2. In the star network topology, there is a central
computer or server to which all the workstations
are directly connected. Every workstation is
indirectly connected to every other through the
central computer.
3. In the ring network topology, the workstations are
connected in a closed loop configuration. Adjacent
pairs of workstations are directly connected. Other
pairs of workstations are indirectly connected, the
data passing through one or more intermediate
nodes.
4. If a Token Ring protocol is used in a star or ring
topology, the signal travels in only one direction,
carried by a so-called token from node to node.
5. The mesh network topology employs either of two
schemes, called full mesh and partial mesh. In the full
mesh topology, each workstation is connected directly
to each of the others. In the partial mesh topology,
some workstations are connected to all the others,
and some are connected only to those other nodes
with which they exchange the most data.
6. The tree network topology uses two or more star
networks connected together. The central computers
of the star networks are connected to a main bus.
Thus, a tree network is a bus network of star
networks.
7. Logical (or signal) topology refers to the nature of
the paths the signals follow from node to node. In
many instances, the logical topology is the same as
the physical topology. But this is not always the case.
For example, some networks are physically laid out in
a star configuration, but they operate logically as bus
or ring networks.
 The Open Systems Interconnection model (OSI model) is
a conceptual model that characterizes and standardizes
the communication functions of a telecommunication or
computing system without regard to its underlying internal
structure and technology. Its goal is the interoperability of
diverse communication systems with standard protocols.
The model partitions a communication system
into abstraction layers. The original version of the model
defined seven layers.
 A layer serves the layer above it and is served by the layer
below it. For example, a layer that provides error-free
communications across a network provides the path
needed by applications above it, while it calls the next
lower layer to send and receive packets that comprise the
contents of that path. Two instances at the same layer are
visualized as connected by a horizontalconnection in that
layer.
 Application (Layer 7)
OSI Model, Layer 7, supports application and end-user processes.
Communication partners are identified, quality of service is identified,
user authentication and privacy are considered, and any constraints on
data syntax are identified. Everything at this layer is application-specific.
This layer provides application services for file transfers, e-mail, and
other network software services. Telnet and FTP are applications that
exist entirely in the application level. Tiered application architectures
are part of this layer.
Layer 7 Application examples include WWW browsers, NFS, SNMP,
Telnet, HTTP, FTP
 Presentation (Layer 6)
This layer provides independence from differences in data
representation (e.g., encryption) by translating from application to
network format, and vice versa. The presentation layer works to
transform data into the form that the application layer can accept. This
layer formats and encrypts data to be sent across a network, providing
freedom from compatibility problems. It is sometimes called the syntax
layer.
Layer 6 Presentation examples include encryption, ASCII, EBCDIC,
TIFF, GIF, PICT, JPEG, MPEG, MIDI.
 Session (Layer 5)
This layer establishes, manages and terminates
connections between applications. The session layer
sets up, coordinates, and terminates conversations,
exchanges, and dialogues between the applications
at each end. It deals with session and connection
coordination.
Layer 5 Session examples include NFS, NetBios
names, RPC, SQL.
are protocols with physical layer components.
 Transport (Layer 4)
OSI Model, Layer 4, provides transparent transfer
of data between end systems, or hosts, and is
responsible for end-to-end error recovery and flow
control. It ensures complete data transfer.
Layer 4 Transport examples include SPX, TCP, UDP.
 Network (Layer 3)
Layer 3 provides switching and routing technologies, creating logical
paths, known as virtual circuits, for transmitting data from node to node.
Routing and forwarding are functions of this layer, as well
as addressing, internetworking, error handling, congestion control and packet
sequencing.
Layer 3 Network examples include AppleTalk DDP, IP, IPX.
 Data Link (Layer 2)
At OSI Model, Layer 2, data packets are encoded and decoded into bits. It
furnishes transmission protocolknowledge and management and handles
errors in the physical layer, flow control and frame synchronization. The data
link layer is divided into two sub layers: The Media Access Control (MAC) layer
and the Logical Link Control(LLC) layer. The MAC sub layer controls how a
computer on the network gains access to the data and permission to transmit
it. The LLC layer controls frame synchronization, flow control and error
checking.
Layer 2 Data Link examples include PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE
802.3/802.2, HDLC, Frame Relay.
 Physical (Layer 1)
OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or
radio signal — through the network at the electrical and mechanical level. It
provides the hardware means of sending and receiving data on a carrier,
including defining cables, cards and physical aspects. Fast Ethernet, RS232,
and ATM

More Related Content

What's hot

1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingmartuj
 
Network protocols
Network protocolsNetwork protocols
Network protocolsHemnath R.
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2Sohail Gohir
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.mvenkat2016
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture NotesFellowBuddy.com
 
P2P Lookup Protocols
P2P Lookup ProtocolsP2P Lookup Protocols
P2P Lookup ProtocolsZubin Bhuyan
 
What is network architecture (full)
What is network architecture (full)What is network architecture (full)
What is network architecture (full)Sorcia D'Arceuil
 
What is computer network
What is computer networkWhat is computer network
What is computer networkMir Imad
 
COMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEMCOMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEMprapti borthakur
 
Data communication
Data communication Data communication
Data communication Awaisch3
 
Introduction to-computer-networking
Introduction to-computer-networkingIntroduction to-computer-networking
Introduction to-computer-networkingArdit Meti
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 
Network communication standards
Network communication standardsNetwork communication standards
Network communication standardsAdeel Khurram
 

What's hot (20)

1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Iap final
Iap finalIap final
Iap final
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Computer network answer
Computer network answerComputer network answer
Computer network answer
 
Introduction to Networks_v0.2
Introduction to Networks_v0.2Introduction to Networks_v0.2
Introduction to Networks_v0.2
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
P2P Lookup Protocols
P2P Lookup ProtocolsP2P Lookup Protocols
P2P Lookup Protocols
 
What is network architecture (full)
What is network architecture (full)What is network architecture (full)
What is network architecture (full)
 
What is computer network
What is computer networkWhat is computer network
What is computer network
 
COMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEMCOMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEM
 
Data communication
Data communication Data communication
Data communication
 
Introduction to-computer-networking
Introduction to-computer-networkingIntroduction to-computer-networking
Introduction to-computer-networking
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Digital data communications
Digital data communicationsDigital data communications
Digital data communications
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Network communication standards
Network communication standardsNetwork communication standards
Network communication standards
 

Similar to Bacis Concept of Communication and Networking

1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingMayank Jain
 
A Network Of Networks For Slide Share
A Network Of Networks For Slide ShareA Network Of Networks For Slide Share
A Network Of Networks For Slide Shareitsvineeth209
 
7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basicsfasywan
 
Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)VrundaBhavsar
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingAnuja Lad
 
Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Renee Jones
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKINGbwire sedrick
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M HSachidananda M H
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networkingisma ishak
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingRozitarmizi Mohammad
 
1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slidenextgencyber cafe
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networkingSithu PM
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3Raghu nath
 
1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.pptjeronimored
 
What is networking
What is networkingWhat is networking
What is networkingbabyparul
 
Computer network
Computer networkComputer network
Computer networkAnupan Jain
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 

Similar to Bacis Concept of Communication and Networking (20)

1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
A Network Of Networks For Slide Share
A Network Of Networks For Slide ShareA Network Of Networks For Slide Share
A Network Of Networks For Slide Share
 
7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics
 
Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKING
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M H
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networking
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Network essentials chapter 3
Network essentials  chapter 3Network essentials  chapter 3
Network essentials chapter 3
 
1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt
 
What is networking
What is networkingWhat is networking
What is networking
 
Computer network
Computer networkComputer network
Computer network
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 

Recently uploaded

Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett SquareIsiahStephanRadaza
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaPraksha3
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfnehabiju2046
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trssuser06f238
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PPRINCE C P
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxAArockiyaNisha
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
The Black hole shadow in Modified Gravity
The Black hole shadow in Modified GravityThe Black hole shadow in Modified Gravity
The Black hole shadow in Modified GravitySubhadipsau21168
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.PraveenaKalaiselvan1
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 sciencefloriejanemacaya1
 

Recently uploaded (20)

Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Mayapuri Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett Square
 
The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdf
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 tr
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
The Black hole shadow in Modified Gravity
The Black hole shadow in Modified GravityThe Black hole shadow in Modified Gravity
The Black hole shadow in Modified Gravity
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
 
Boyles law module in the grade 10 science
Boyles law module in the grade 10 scienceBoyles law module in the grade 10 science
Boyles law module in the grade 10 science
 

Bacis Concept of Communication and Networking

  • 1. Snehal Kulthe Department of Management Science
  • 2.  Data communication refers to the transmission of the digital data between two or more computers The physical connection between networked computing devices is established using either cable media or wireless media. The best-known computer network is the Interne
  • 3.  A workstation (WS) is a computer dedicated to a user or group of users engaged in business or professional work. It includes one or more high resolution displays and a faster processor than a personal computer (PC). A workstation also has greater multitasking capability because of additional random access memory (RAM), drives and drive capacity. A workstation may also have a higher-speed graphics adapters and more connected peripherals.  The term workstation also has been used to reference a PC or mainframe terminal on a local area network (LAN). These workstations may share network resources with one or more large client computers and network servers.
  • 4.  In Computer science, client-server is a software architecture model consisting of two parts, client systems and server systems, both communicating over a computer network or on the same computer. A client-server application is a distributed systemmade up of both client and server software. Client server application provide a better way to share the workload.The client process always initiates a connection to the server, while the server process always waits for requests from any client. When both the client process and server process are running on the same computer, this is called a single seat setup.  Another type of related software architecture is known as peer-to-peer, because each host or application instance can simultaneously act as both a client and a server (unlike centralized servers of the client-server model) and because each has equivalent responsibilities and status. Peer-to-peer architectures are often abbreviatedusing the acronym P2P.
  • 5.
  • 6.  The client-server relationship describes the relation between the client and how it makes a service request to the server, and how the server can accept these requests, process them, and return the requested information to the client. The interaction between client and server is often described using sequence diagrams. Sequence diagrams are standardized in the Unified Modeling Language.  Both client-server and P2P architectures are in wide usage today.  The basic type of client-server software architecture employs only two types of hosts: clients and servers. This type of architecture is sometimes referred to as two-tier. The two- tier architecture means that the client acts as one tier and server process acts as the other tier.  The client-server software architecture has become one of the basic models of network computing. Many types of applications have been written using the client-server model. Standard networked functions such as E- mail exchange, webaccess and database access, are based on the client-server model. For example, a web browser is a client program at the user computer that may access information at any web server in the world.
  • 7.  A computer network is a set of computers connected together for the purpose of sharing resources. The most common resource shared today is connection to the Internet. Other shared resources can include a printer or a file server. The Internet itself can be considered a computer network.
  • 8.  A network protocol defines rules and conventions for communication between network devices. Network protocols include mechanisms for devices to identify and make connections with each other, as well as formatting rules that specify how data is packaged into messages sent and received. Some protocols also support message acknowledgment and data compression designed for reliable and/or high-performance network communication.  Modern protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets —messages subdivided into pieces that are collected and re-assembled at their destination. Hundreds of different computer network protocols have been developed each designed for specific purposes and environments
  • 9.  Internet Protocols The Internet Protocol family contains a set of related (and among the most widely used) network protocols. Beside Internet Protocol (IP) itself, higher-level protocols like TCP, UDP, HTTP, and FTP all integrate with IP to provide additional capabilities. Similarly, lower- level Internet Protocols like ARP and ICMP also co-exist with IP. In general, higher level protocols in the IP family interact more closely with applications like Web browsers while lower-level protocols interact with network adapters and other computer hardware.  Wireless Network Protocols Thanks to Wi-Fi, Bluetooth and LTE, wireless networks have become commonplace. Network protocols designed for use on wireless networks must support roaming mobile devices and deal with issues such as variable data rates and network security.  Network Routing Protocols Routing protocols are special-purpose protocols designed specifically for use by network routers on the internet. A routing protocol can identify other routers, manage the pathways (called routes) between sources and destinations of network messages, and make dynamic routing decisions. Common routing protocols include EIGRP, OSPF, and BGP.
  • 10.  TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet. TCP/IP can also be used as a communications protocol in a private network (an intranet or an extranet).  Short for transmission control protocol/Internet protocol, TCP/IP is a set of rules (protocols) governing communications among all computers on the Internet. More specifically, TCP/IP dictates how information should be packaged (turned into bundles of information called packets), sent, and received, as well as how to get to its destination. TCP/IP was developed in 1978 and driven by Bob Kahn and Vint Cerf.
  • 11. LAN MAN WAN A LAN (local area network) is a group of computers and network devices connected together, usually within the same building. By definition, the connections must be high speed and relatively inexpensive (e.g., token ring or Ethernet). Most Indiana University Bloomington departments are on LANs. A LAN connection is a high-speed connection to a LAN. On the IUB campus, most connections are either Ethernet (10 Mbps) or Fast Ethernet (100 Mbps), and a few locations have Gigabit Ethernet (1000 Mbps) connections. A MAN (metropolitan area network) is a larger network that usually spans several buildings in the same city or town. The IUB network is an example of a MAN. A WAN (wide area network), in comparison to a MAN, is not restricted to a geographical location, although it might be confined within the bounds of a state or country. A WAN connects several LANs, and may be limited to an enterprise (a corporation or an organization) or accessible to the public. The technology is high speed and relatively expensive. The Internet is an example of a worldwide public WAN.
  • 12.
  • 13.  A network topology is the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the logical (or signal) topology.  The physical topology of a network is the actual geometric layout of workstations. There are several common physical topologies, as described below and as shown in the illustration.
  • 14.
  • 15. 1. In the bus network topology, every workstation is connected to a main cable called the bus. Therefore, in effect, each workstation is directly connected to every other workstation in the network. 2. In the star network topology, there is a central computer or server to which all the workstations are directly connected. Every workstation is indirectly connected to every other through the central computer. 3. In the ring network topology, the workstations are connected in a closed loop configuration. Adjacent pairs of workstations are directly connected. Other pairs of workstations are indirectly connected, the data passing through one or more intermediate nodes.
  • 16. 4. If a Token Ring protocol is used in a star or ring topology, the signal travels in only one direction, carried by a so-called token from node to node. 5. The mesh network topology employs either of two schemes, called full mesh and partial mesh. In the full mesh topology, each workstation is connected directly to each of the others. In the partial mesh topology, some workstations are connected to all the others, and some are connected only to those other nodes with which they exchange the most data. 6. The tree network topology uses two or more star networks connected together. The central computers of the star networks are connected to a main bus. Thus, a tree network is a bus network of star networks. 7. Logical (or signal) topology refers to the nature of the paths the signals follow from node to node. In many instances, the logical topology is the same as the physical topology. But this is not always the case. For example, some networks are physically laid out in a star configuration, but they operate logically as bus or ring networks.
  • 17.  The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology. Its goal is the interoperability of diverse communication systems with standard protocols. The model partitions a communication system into abstraction layers. The original version of the model defined seven layers.  A layer serves the layer above it and is served by the layer below it. For example, a layer that provides error-free communications across a network provides the path needed by applications above it, while it calls the next lower layer to send and receive packets that comprise the contents of that path. Two instances at the same layer are visualized as connected by a horizontalconnection in that layer.
  • 18.
  • 19.
  • 20.  Application (Layer 7) OSI Model, Layer 7, supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer. Layer 7 Application examples include WWW browsers, NFS, SNMP, Telnet, HTTP, FTP  Presentation (Layer 6) This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer. Layer 6 Presentation examples include encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG, MPEG, MIDI.
  • 21.  Session (Layer 5) This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination. Layer 5 Session examples include NFS, NetBios names, RPC, SQL. are protocols with physical layer components.  Transport (Layer 4) OSI Model, Layer 4, provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer. Layer 4 Transport examples include SPX, TCP, UDP.
  • 22.  Network (Layer 3) Layer 3 provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing. Layer 3 Network examples include AppleTalk DDP, IP, IPX.  Data Link (Layer 2) At OSI Model, Layer 2, data packets are encoded and decoded into bits. It furnishes transmission protocolknowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control(LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking. Layer 2 Data Link examples include PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame Relay.  Physical (Layer 1) OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio signal — through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM