SlideShare a Scribd company logo
1 of 17
Download to read offline
Communication
Networks
- Overview of Data
Communication
[Part 2]
What you will learn in this video
•Effectiveness of
Data
Communication
•Components of
Data
Communication
Data
Communication
•Text
•Numbers
•Audio
•Video
Data
Representation
•Simplex
•Half Duplex
•Full Duplex
Flow of Data
•Requirements
•Physical Structure
•Topology
•Types of Network
Network Basics
Networks
A network is the
interconnection of a set
of devices capable of
communication
Criteria for Network:
A network must be able
to meet a certain
number of criteria. The
most important of these
are
• Performance,
• Reliability,
• Security.
Requirements of a Network
• Generally we can measure the performance using 2 factors
• Throughput - network throughput refers to how much data can
be transferred from source to destination within a given
timeframe. Throughput measures how many packets arrive at
their destinations successfully
• Delay – total time taken for a packet to reach the destination
from source.
Performance
• Network reliability is measured by the frequency of failure, the
time it takes a link to recover from a failure, and the network’s
robustness in a catastrophe.
Reliability
• Network security issues include protecting data from
unauthorized access, protecting data from damage and
development, and implementing policies and procedures for
recovery from breaches and data losses.
Security
Structure of a Network
• A network is two or more devices connected through links. A link is
a communications pathway that transfers data from one device to
another.
• There are two possible types of connections:
• Point-to-Point
• A point-to-point connection provides a dedicated link between two devices. The
entire capacity of the link is reserved for transmission between those two devices.
• Multipoint
• A multipoint (also called multidrop) connection is one in which more than two
specific devices share a single link. In a multipoint environment, the capacity of the
channel is shared, either spatially or temporally.
Network Topology
• The term physical topology refers to the way in which a network is
laid out physically.
• The topology of a network is the geometric representation of the
relationship of all the links and linking devices (usually called nodes)
to one another.
• There are four basic topologies possible:
Bus Star Ring Mesh
Bus Topology
• One long cable acts as a
backbone to link all the devices in
a network. Nodes are connected
to the bus cable by drop lines and
taps.
• A tap is a connector that either
splices into the main cable or
punctures the sheathing of a
cable to create a contact with the
metallic core.
• A drop line is a connection
running between the device and
the main cable.
Advantages of Bus Topology
1. Ease of installation.
2. Less cabling is required when compared to other
topologies
Disadvantages of Bus Topology
1. Difficult for reconnection and Fault Isolation
2. Adding of new devices is tedious
3. Degradation of signal quality due to taps
4. Cable termination is needed so as to avoid signal
reflection.
Star Topology
• In a star topology, each device
has a dedicated point-to-point
link only to a central controller,
usually called a hub.
• The devices are not directly
linked to one another. Star
topology does not allow direct
traffic between devices.
• The controller acts as an
exchange: If one device wants to
send data to another, it sends the
data to the controller, which then
relays the data to the other
connected device.
Advantages of Star Topology:
1. Less expensive.
2. Each device needs only one link and one I/O port to connect
it to a network.
3. Easy to install and reconfigure.
4. Less cabling is required
5. Robustness is high. If one link fails, only that link is
affected. All other links remain active.
Disadvantages of Star Topology:
1. Whole Topology depends on HUB. If the HUB goes down
then the entire network is down.
Ring Topology
❖In a ring topology, each device has
a dedicated point-to-point
connection with only the two devices
on either side of it.
❖A signal is passed along the ring in
one direction, from device to device,
until it reaches its destination.
❖Each device in the ring incorporates
a repeater.
❖When a device receives a signal
intended for another device, its
repeater regenerates the bits and
passes them along.
Advantages of Ring Topology:
1. Easy to install and reconfigure
2. Addition or deletion of a system in topology
only requires alteration at 2 points
3. Fault Identification is easier
Disadvantages of Ring Topology:
1. Supports only Unidirectional Traffic
2. Any break in the ring can disable the entire
network.
Mesh Topology
• In a mesh topology, every device has a
dedicated point-to-point link to every other
device.
• The term dedicated means that the link carries
traffic only between the two devices it
connects.
• The number of physical links in a fully
connected mesh network with n nodes, we need
n (n – 1) physical links (Simplex Links).
• However, if each physical link allows
communication in both directions (duplex
mode), we need n (n – 1) / 2 duplex-mode
links.
• To accommodate that many links, every device
on the network must have n – 1 input/output
(I/O) ports to be connected to the other n – 1
station.
Advantages of Mesh Topology:
1. Dedicated Links can carry their own load,
Sharing reduces the link capacity
2. Robust – Data is still delivered even if one
link is down.
3. Privacy and Security – No eavesdropping
4. Fault Identification is easier
Disadvantages of Mesh Topology:
1. Installation is difficult due to complex wiring
2. Requires more IO Ports to connect the
systems.
Network Topology - Summary
Bus Star Ring Mesh
Types of Networks
WAN
Wide Area Network
Hundreds and Thousands of Kilo Meters
MAN
Metropolitan Area Network
Tens of Kilo Meters
LAN
Local Area Network
Hundreds of Meters
PAN
Personal Area Network
Few Square Meters
Classification Based
on Size and Coverage
Classification Based
on Switching
Switching represents that how the message is
forwarded to the destination network or system
Circuit Switched
Network
Packet Switched
Network
Circuit Switched Networks
• They are widely used in the telephone networks.
• It first establishes a dedicated circuit across a sequence of links
• Then it allows source node to send a stream of bits across this circuit
to a destination
Packet Switched Networks
• These networks are widely used in most of the applications
• Messages are transmitted as packets
• They follow store and forward concept of transferring
packets
• Packets may take any route and they are routed by the
intermediate routers.
• These packets are rearranged at the receiver side.
• Many discrete networks are interconnected together to
form a internetwork or INTERNET.
• Nodes are addressed logically so that they can be
identified by the neighbouring devices in the network
• Packet transmission occurs in 3 modes, they are:
1. Unicast
2. Multicast
3. broadcast
Circuit Switched Vs Packet Switched
All the systems are connected
as Single network
Interconnections of Multiple
Networks
A heterogeneous network made of four
WANs and three LANs
References:
• Behrouz A. Forouzan, ―Data communication and Networking, Fifth
Edition, Tata McGraw – Hill, 2013
• Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems
Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011.
• Few online References (Will be Mentioned in the description Section)
Thank You…

More Related Content

What's hot

What's hot (20)

Chapter 2 - Network Models
Chapter 2 - Network ModelsChapter 2 - Network Models
Chapter 2 - Network Models
 
Wireless Communication and Networking by WilliamStallings Chap2
Wireless Communication and Networking  by WilliamStallings Chap2Wireless Communication and Networking  by WilliamStallings Chap2
Wireless Communication and Networking by WilliamStallings Chap2
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Computer network
Computer networkComputer network
Computer network
 
Tcp IP Model
Tcp IP ModelTcp IP Model
Tcp IP Model
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Mobile computing notes and material
Mobile computing notes and materialMobile computing notes and material
Mobile computing notes and material
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
2.8 bluetooth ieee 802.15
2.8 bluetooth   ieee 802.152.8 bluetooth   ieee 802.15
2.8 bluetooth ieee 802.15
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Port numbers
Port numbersPort numbers
Port numbers
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
 
Data Communication And Networking - DATA & SIGNALS
Data Communication And Networking - DATA & SIGNALSData Communication And Networking - DATA & SIGNALS
Data Communication And Networking - DATA & SIGNALS
 
Data communications
Data communicationsData communications
Data communications
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Network topology And Its type
Network topology And Its typeNetwork topology And Its type
Network topology And Its type
 

Similar to 3. overview of data communication part 2

lecture 2,3.pdf
lecture 2,3.pdflecture 2,3.pdf
lecture 2,3.pdfuseless45
 
Network topologies
Network topologiesNetwork topologies
Network topologiesNorah Saad
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005SOLOMONCHINAEMEUCHEA
 
network topology _computer networks.pptx
network  topology _computer networks.pptxnetwork  topology _computer networks.pptx
network topology _computer networks.pptxManimegalaM3
 
networktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdfnetworktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdfamanchaube0143
 
networktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdfnetworktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdfamanchaube0143
 
05 network typologies
05 network typologies05 network typologies
05 network typologiesJadavsejal
 
networktopology.pptx
networktopology.pptxnetworktopology.pptx
networktopology.pptxmani651780
 
Network topology
Network topologyNetwork topology
Network topologyAnindyaNag5
 
Topology in Computer Network.pptx
Topology in Computer Network.pptxTopology in Computer Network.pptx
Topology in Computer Network.pptx454Saif
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBdhanashrisabale1
 
Introduction to data communications
Introduction to data communicationsIntroduction to data communications
Introduction to data communicationsArunaSekar1
 
networktopology-final.pptx
networktopology-final.pptxnetworktopology-final.pptx
networktopology-final.pptxBhuvanaR13
 

Similar to 3. overview of data communication part 2 (20)

lecture 2,3.pdf
lecture 2,3.pdflecture 2,3.pdf
lecture 2,3.pdf
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
 
network topology _computer networks.pptx
network  topology _computer networks.pptxnetwork  topology _computer networks.pptx
network topology _computer networks.pptx
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
networktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdfnetworktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdf
 
networktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdfnetworktopology-130710013533-phpapp01 (1).pdf
networktopology-130710013533-phpapp01 (1).pdf
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
Topology
TopologyTopology
Topology
 
05 network typologies
05 network typologies05 network typologies
05 network typologies
 
line coding.ppt
line coding.pptline coding.ppt
line coding.ppt
 
networktopology.pptx
networktopology.pptxnetworktopology.pptx
networktopology.pptx
 
Networks PPT
Networks PPTNetworks PPT
Networks PPT
 
Network topology
Network topologyNetwork topology
Network topology
 
Topology in Computer Network.pptx
Topology in Computer Network.pptxTopology in Computer Network.pptx
Topology in Computer Network.pptx
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMB
 
Chapter 1 ppt by dmb
Chapter 1 ppt by dmbChapter 1 ppt by dmb
Chapter 1 ppt by dmb
 
Introduction to data communications
Introduction to data communicationsIntroduction to data communications
Introduction to data communications
 
networktopology-final.pptx
networktopology-final.pptxnetworktopology-final.pptx
networktopology-final.pptx
 

More from JAIGANESH SEKAR

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma caJAIGANESH SEKAR
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnettingJAIGANESH SEKAR
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnettingJAIGANESH SEKAR
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4JAIGANESH SEKAR
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switchingJAIGANESH SEKAR
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methodsJAIGANESH SEKAR
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methodsJAIGANESH SEKAR
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cdJAIGANESH SEKAR
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1JAIGANESH SEKAR
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming codeJAIGANESH SEKAR
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crcJAIGANESH SEKAR
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksumJAIGANESH SEKAR
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressingJAIGANESH SEKAR
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1JAIGANESH SEKAR
 

More from JAIGANESH SEKAR (20)

Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
2.3b access control random access methods - part 3 - csma ca
2.3b access control   random access methods - part 3 - csma ca2.3b access control   random access methods - part 3 - csma ca
2.3b access control random access methods - part 3 - csma ca
 
2.10b network layer services i pv4 - variable length subnetting
2.10b network layer services  i pv4 - variable length subnetting2.10b network layer services  i pv4 - variable length subnetting
2.10b network layer services i pv4 - variable length subnetting
 
2.10a network layer services i pv4 - fixed length subnetting
2.10a network layer services  i pv4 - fixed length subnetting2.10a network layer services  i pv4 - fixed length subnetting
2.10a network layer services i pv4 - fixed length subnetting
 
2.10 network layer services i pv4
2.10 network layer services  i pv42.10 network layer services  i pv4
2.10 network layer services i pv4
 
2.9 network layer services packet switching
2.9 network layer services   packet switching2.9 network layer services   packet switching
2.9 network layer services packet switching
 
2.7 wlan ieee 802.11
2.7 wlan   ieee 802.112.7 wlan   ieee 802.11
2.7 wlan ieee 802.11
 
2.6 ethernet ieee 802.3
2.6 ethernet   ieee 802.32.6 ethernet   ieee 802.3
2.6 ethernet ieee 802.3
 
2.5 access control channelization methods
2.5 access control   channelization methods2.5 access control   channelization methods
2.5 access control channelization methods
 
2.4 access control controlled access methods
2.4 access control   controlled access methods2.4 access control   controlled access methods
2.4 access control controlled access methods
 
2.3a access control random access methods - part 2 - csma cd
2.3a access control   random access methods - part 2 - csma cd2.3a access control   random access methods - part 2 - csma cd
2.3a access control random access methods - part 2 - csma cd
 
2.3 access control random access methods - part 1
2.3 access control   random access methods - part 12.3 access control   random access methods - part 1
2.3 access control random access methods - part 1
 
2.2 flow control
2.2 flow control2.2 flow control
2.2 flow control
 
2.1 framing
2.1 framing2.1 framing
2.1 framing
 
9. data link layer error correction codes - hamming code
9. data link layer   error correction codes - hamming code9. data link layer   error correction codes - hamming code
9. data link layer error correction codes - hamming code
 
8. data link layer error detection and correction codes - crc
8. data link layer   error detection and correction codes - crc8. data link layer   error detection and correction codes - crc
8. data link layer error detection and correction codes - crc
 
7. data link layer error detection and correction codes - parity and checksum
7. data link layer   error detection and correction codes - parity and checksum7. data link layer   error detection and correction codes - parity and checksum
7. data link layer error detection and correction codes - parity and checksum
 
6. data link layer physical addressing
6. data link layer   physical addressing6. data link layer   physical addressing
6. data link layer physical addressing
 
5. protocol layering
5. protocol layering5. protocol layering
5. protocol layering
 
2. overview of data communication part 1
2. overview of data communication   part 12. overview of data communication   part 1
2. overview of data communication part 1
 

Recently uploaded

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 

Recently uploaded (20)

(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 

3. overview of data communication part 2

  • 1. Communication Networks - Overview of Data Communication [Part 2]
  • 2. What you will learn in this video •Effectiveness of Data Communication •Components of Data Communication Data Communication •Text •Numbers •Audio •Video Data Representation •Simplex •Half Duplex •Full Duplex Flow of Data •Requirements •Physical Structure •Topology •Types of Network Network Basics
  • 3. Networks A network is the interconnection of a set of devices capable of communication Criteria for Network: A network must be able to meet a certain number of criteria. The most important of these are • Performance, • Reliability, • Security.
  • 4. Requirements of a Network • Generally we can measure the performance using 2 factors • Throughput - network throughput refers to how much data can be transferred from source to destination within a given timeframe. Throughput measures how many packets arrive at their destinations successfully • Delay – total time taken for a packet to reach the destination from source. Performance • Network reliability is measured by the frequency of failure, the time it takes a link to recover from a failure, and the network’s robustness in a catastrophe. Reliability • Network security issues include protecting data from unauthorized access, protecting data from damage and development, and implementing policies and procedures for recovery from breaches and data losses. Security
  • 5. Structure of a Network • A network is two or more devices connected through links. A link is a communications pathway that transfers data from one device to another. • There are two possible types of connections: • Point-to-Point • A point-to-point connection provides a dedicated link between two devices. The entire capacity of the link is reserved for transmission between those two devices. • Multipoint • A multipoint (also called multidrop) connection is one in which more than two specific devices share a single link. In a multipoint environment, the capacity of the channel is shared, either spatially or temporally.
  • 6. Network Topology • The term physical topology refers to the way in which a network is laid out physically. • The topology of a network is the geometric representation of the relationship of all the links and linking devices (usually called nodes) to one another. • There are four basic topologies possible: Bus Star Ring Mesh
  • 7. Bus Topology • One long cable acts as a backbone to link all the devices in a network. Nodes are connected to the bus cable by drop lines and taps. • A tap is a connector that either splices into the main cable or punctures the sheathing of a cable to create a contact with the metallic core. • A drop line is a connection running between the device and the main cable. Advantages of Bus Topology 1. Ease of installation. 2. Less cabling is required when compared to other topologies Disadvantages of Bus Topology 1. Difficult for reconnection and Fault Isolation 2. Adding of new devices is tedious 3. Degradation of signal quality due to taps 4. Cable termination is needed so as to avoid signal reflection.
  • 8. Star Topology • In a star topology, each device has a dedicated point-to-point link only to a central controller, usually called a hub. • The devices are not directly linked to one another. Star topology does not allow direct traffic between devices. • The controller acts as an exchange: If one device wants to send data to another, it sends the data to the controller, which then relays the data to the other connected device. Advantages of Star Topology: 1. Less expensive. 2. Each device needs only one link and one I/O port to connect it to a network. 3. Easy to install and reconfigure. 4. Less cabling is required 5. Robustness is high. If one link fails, only that link is affected. All other links remain active. Disadvantages of Star Topology: 1. Whole Topology depends on HUB. If the HUB goes down then the entire network is down.
  • 9. Ring Topology ❖In a ring topology, each device has a dedicated point-to-point connection with only the two devices on either side of it. ❖A signal is passed along the ring in one direction, from device to device, until it reaches its destination. ❖Each device in the ring incorporates a repeater. ❖When a device receives a signal intended for another device, its repeater regenerates the bits and passes them along. Advantages of Ring Topology: 1. Easy to install and reconfigure 2. Addition or deletion of a system in topology only requires alteration at 2 points 3. Fault Identification is easier Disadvantages of Ring Topology: 1. Supports only Unidirectional Traffic 2. Any break in the ring can disable the entire network.
  • 10. Mesh Topology • In a mesh topology, every device has a dedicated point-to-point link to every other device. • The term dedicated means that the link carries traffic only between the two devices it connects. • The number of physical links in a fully connected mesh network with n nodes, we need n (n – 1) physical links (Simplex Links). • However, if each physical link allows communication in both directions (duplex mode), we need n (n – 1) / 2 duplex-mode links. • To accommodate that many links, every device on the network must have n – 1 input/output (I/O) ports to be connected to the other n – 1 station. Advantages of Mesh Topology: 1. Dedicated Links can carry their own load, Sharing reduces the link capacity 2. Robust – Data is still delivered even if one link is down. 3. Privacy and Security – No eavesdropping 4. Fault Identification is easier Disadvantages of Mesh Topology: 1. Installation is difficult due to complex wiring 2. Requires more IO Ports to connect the systems.
  • 11. Network Topology - Summary Bus Star Ring Mesh
  • 12. Types of Networks WAN Wide Area Network Hundreds and Thousands of Kilo Meters MAN Metropolitan Area Network Tens of Kilo Meters LAN Local Area Network Hundreds of Meters PAN Personal Area Network Few Square Meters Classification Based on Size and Coverage Classification Based on Switching Switching represents that how the message is forwarded to the destination network or system Circuit Switched Network Packet Switched Network
  • 13. Circuit Switched Networks • They are widely used in the telephone networks. • It first establishes a dedicated circuit across a sequence of links • Then it allows source node to send a stream of bits across this circuit to a destination
  • 14. Packet Switched Networks • These networks are widely used in most of the applications • Messages are transmitted as packets • They follow store and forward concept of transferring packets • Packets may take any route and they are routed by the intermediate routers. • These packets are rearranged at the receiver side. • Many discrete networks are interconnected together to form a internetwork or INTERNET. • Nodes are addressed logically so that they can be identified by the neighbouring devices in the network • Packet transmission occurs in 3 modes, they are: 1. Unicast 2. Multicast 3. broadcast
  • 15. Circuit Switched Vs Packet Switched All the systems are connected as Single network Interconnections of Multiple Networks
  • 16. A heterogeneous network made of four WANs and three LANs
  • 17. References: • Behrouz A. Forouzan, ―Data communication and Networking, Fifth Edition, Tata McGraw – Hill, 2013 • Larry L. Peterson, Bruce S. Davie, ―Computer Networks: A Systems Approach, Fifth Edition, Morgan Kaufmann Publishers, 2011. • Few online References (Will be Mentioned in the description Section) Thank You…