SlideShare a Scribd company logo
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Networks ,[object Object],Introdution to Computer Networks
Applications of Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Introduction to Computer Networks
Data Communication System Components
Basic Concepts ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
Point-to-Point Line Configuration
Point-to-Point Line Configuration
Point-to-Point Line Configuration
Multipoint Line Configuration
 
Simplex
Half-Duplex
Full-Duplex
 
LAN, MAN & WAN ,[object Object],[object Object],[object Object]
Local Area Network
Local Area Network
Metropolitan Area Network
Wide Area Network
Figure 2-19 WCB/McGraw-Hill    The McGraw-Hill Companies, Inc., 1998 Internetwork  (Internet)
Network Topology ,[object Object],Introduction to Comuter Networks
Mesh Topology ,[object Object],[object Object],[object Object],Introduction to Computer Networks
Mesh Topology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Star & Tree Topology ,[object Object],[object Object],[object Object],Itroduction to Computer Networks
Star & Tree Topology ,[object Object],[object Object],[object Object],[object Object],[object Object]
Ring Topology ,[object Object],[object Object],[object Object],[object Object],Introduction to Computer Networks
Ring topology ,[object Object],[object Object],[object Object],[object Object],[object Object]
Bus Topology ,[object Object]
Bus Topology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

UTP and STP
UTP and STPUTP and STP
UTP and STP
Subrata Kumer Paul
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
muhammad amir
 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codes
Revathi Subramaniam
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
Shahzad Rashid
 
Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 
Congestion control
Congestion controlCongestion control
Congestion control
Aman Jaiswal
 
1.1.1 binary systems By Zak
1.1.1 binary systems By Zak1.1.1 binary systems By Zak
1.1.1 binary systems By Zak
Tabsheer Hasan
 
Network topologies
Network topologiesNetwork topologies
Network topologies
Norah Saad
 
networking
networkingnetworking
networking
Pooja Dhiman
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home networkclcewing
 
Binary number systems multiplication
Binary number systems multiplicationBinary number systems multiplication
Binary number systems multiplication
Ravi Ramchandani
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
vasanthimuniasamy
 
Network Topology
Network TopologyNetwork Topology
Network Topology
VimalChaudhary12
 
Network topology by ananya shukla
Network topology by ananya shuklaNetwork topology by ananya shukla
Network topology by ananya shukla
ananya_shukla
 
Classes of ip addresses
Classes of ip addressesClasses of ip addresses
Classes of ip addresses
NetProtocol Xpert
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correctionSisir Ghosh
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.
mvenkat2016
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Online
 

What's hot (20)

UTP and STP
UTP and STPUTP and STP
UTP and STP
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
 
Error detection & correction codes
Error detection & correction codesError detection & correction codes
Error detection & correction codes
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Congestion control
Congestion controlCongestion control
Congestion control
 
1.1.1 binary systems By Zak
1.1.1 binary systems By Zak1.1.1 binary systems By Zak
1.1.1 binary systems By Zak
 
An overwiew of cdma
An overwiew of cdmaAn overwiew of cdma
An overwiew of cdma
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
networking
networkingnetworking
networking
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home network
 
Binary number systems multiplication
Binary number systems multiplicationBinary number systems multiplication
Binary number systems multiplication
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Network topology by ananya shukla
Network topology by ananya shuklaNetwork topology by ananya shukla
Network topology by ananya shukla
 
Classes of ip addresses
Classes of ip addressesClasses of ip addresses
Classes of ip addresses
 
Error detection and correction
Error detection and correctionError detection and correction
Error detection and correction
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similar to Data Communication

Data communication part1
Data communication part1Data communication part1
Data communication part1
Abubakkar Howladar
 
Networking presentation
Networking presentationNetworking presentation
Networking presentationGajan Hai
 
basic networking
basic networkingbasic networking
basic networkingAnmol Bagga
 
NETWORKING
NETWORKINGNETWORKING
NETWORKING
junaid abbasi
 
Computer network
Computer networkComputer network
Computer network
Nandini Sahu
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingBesar Limani
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
avocado1111
 
07computer network.ppt
07computer network.ppt07computer network.ppt
07computer network.ppt
yogadeepan
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)
Shweta Kumari
 
Network topologies
Network topologiesNetwork topologies
Network topologieszirram
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
Raj vardhan
 
Networking
NetworkingNetworking
Networking
RajThakuri
 
Network topology And Its Types
Network topology And Its Types Network topology And Its Types
Network topology And Its Types
Jaypee Institute of Information Technology
 
Best Topology
Best TopologyBest Topology
Best Topology
ami872
 
454548 634160871407732500
454548 634160871407732500454548 634160871407732500
454548 634160871407732500prabh_in
 
Tata Chuna
Tata Chuna Tata Chuna
Tata Chuna
Ramesh Sibal
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
SadamoTaga
 
Networktopology xii
Networktopology xiiNetworktopology xii
Networktopology xii
saltyp
 

Similar to Data Communication (20)

Data communication part1
Data communication part1Data communication part1
Data communication part1
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 
Arvind Singh
Arvind SinghArvind Singh
Arvind Singh
 
basic networking
basic networkingbasic networking
basic networking
 
NETWORKING
NETWORKINGNETWORKING
NETWORKING
 
Computer network
Computer networkComputer network
Computer network
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
 
07computer network.ppt
07computer network.ppt07computer network.ppt
07computer network.ppt
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Networking
NetworkingNetworking
Networking
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Network topology And Its Types
Network topology And Its Types Network topology And Its Types
Network topology And Its Types
 
Best Topology
Best TopologyBest Topology
Best Topology
 
454548 634160871407732500
454548 634160871407732500454548 634160871407732500
454548 634160871407732500
 
Tata Chuna
Tata Chuna Tata Chuna
Tata Chuna
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Networktopology xii
Networktopology xiiNetworktopology xii
Networktopology xii
 

More from Mahesh Kumar Attri (20)

Mac
MacMac
Mac
 
Web technologies
Web technologiesWeb technologies
Web technologies
 
Plant layout
Plant layoutPlant layout
Plant layout
 
application layers
application layersapplication layers
application layers
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Ch08 1
Ch08 1Ch08 1
Ch08 1
 
Lect21 09-11
Lect21 09-11Lect21 09-11
Lect21 09-11
 
work measurement
work measurementwork measurement
work measurement
 
production management
production managementproduction management
production management
 
Fom (pm)
Fom (pm)Fom (pm)
Fom (pm)
 
Errror Detection and Correction
Errror Detection and CorrectionErrror Detection and Correction
Errror Detection and Correction
 
Lecture 5
Lecture 5Lecture 5
Lecture 5
 
International marketing
International marketingInternational marketing
International marketing
 
Ch01
Ch01Ch01
Ch01
 
OSI models
OSI modelsOSI models
OSI models
 
1.prallelism
1.prallelism1.prallelism
1.prallelism
 
As department
As departmentAs department
As department
 
2.computer org.
2.computer org.2.computer org.
2.computer org.
 
1.prallelism
1.prallelism1.prallelism
1.prallelism
 
Staffing & manpower planning(9)
Staffing & manpower planning(9)Staffing & manpower planning(9)
Staffing & manpower planning(9)
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Data Communication