SlideShare a Scribd company logo
Communication and
computer networks
Presented by: Rabail Hyder ali.
Outlines
 A brief history
 Introduction
 Computer networks
 Wide area network
 Local/Metropolitan area network
 Allocation of resources
 Challenges and issues
A BRIEF HISTORY:
smoke signals
Beating of drum
INTRODUCTION
 A typical communication system consist of following parts:
INFORMATION
 Analog
 Digital
 Transmission of the information can be analog or digital .therefore we have four possibilities:
1. Analog information transmitted as an analog signal.
2. Analog information transmitted as a digital signal.
3. Digital information transmitted as an analog signal.
4. Digital information transmitted as a digital signal
 When a signal carrying information is transmitted, it looses its energy and strength and gathers
some interference (noise) as it propagates away from the
transmitter.
BOOSTED / AMPLIFIED
 Boost energy and strength of a signal, it must be amplified (in case of analog signals)
 rebuilt (in case of digital signals)
MAJOR ISSUE
NOISE AMPLIFICATION in Analog Signal
Why Digital Signal is preferred over Analog Signal in communication?
• FILTERED OUT of noise in Digital Signal
• processing of information for error detection and correction, applying encryption and
decryption techniques to sensitive information.
COMPUTER NETWORKS
 Interconnection of computers.
 The interconnection forms a facility that provides reliable and efficient means of
communication among users and other devices.
 Computer networks are also referred to as computer communication networks.
 Interconnection among computers may be via wired or wireless transmission
medium
 Two broad categories
1. Wide area networks
2. Local/metropolitan area networks
(a) A typical WAN. (b) A typical local/metropolitan area network. (c) A typical
local/metropolitan area communication ring network
• Users will be sharing the transmission link to exchanging their information.
Users will also share
• the processing power of the computers.
• buffering capacity to store the information.
• and any other resources that are connected to the computer network.
• The information from one user to another may need to pass through several switching
nodes and transmission links before reaching its destination.
• If one path is not available, not feasible, or not functional, some other path may be used
• Exchange of Large Quantity of Information via a Packets of information.
TRANSPORTION OF NFORMATION :
Major aspects are
 Addressing mechanism to identify users.
 Addressing mechanism for information packets to identify their source and destination
 Establishing a connection between sender and receiver and maintaining it
 Choosing a path or a route to carry the information from a sender to a receiver
 Implementing a selected route or path.
 Checking information packets.
 Encryption and decryption of information
 Controlling the flow of information.
 Informing the sender.
 Billing for the use of resources
 Ensuring that different computers running different applications and operating systems can exchange
information
 Preparing information appropriately for transmission .
.
OSI (open system interconnection) Model
The International Organization for Standardization (ISO) established the Open
Systems Interconnection (OSI) Reference Model
Each layer deals with a particular aspect of network communication.
WIDE AREA COMPUTER NETWORKS:
 A WAN consist of switching nodes and transmission links.
 Layout of the switching nodes and transmission links is based on the traffic pattern and expected
volume of traffic flow from one site to another site.
 When a user is ready to transmit information
1. Connection oriented service
2. connectionless service
TRAFFIC MANAGEMENT IN WAN
REACTIVE TECHNIQUES
(in late 1960 and early
1970)
WINDOW SCHEME
OPTICAL FIBER
BISDNs (Broadband Integrated Services Digital
Networks)
 Transmit voice, video and data at the same time over fiber optic telephone lines.
Broadband ISDN can support data rates of 1.5 million bits per second (bps)
 Asynchronous transfer mode (ATM) is expected to be used as a transfer mechanism
in BISDNs where information is transmitted into the form of the cell
LOCAL & METROPOLITAN AREA NETWORK
 LOCAL AREA NETWORK
 Limited geographical scope(few kilometers)
 Limited to building or an organization
 METROPOLITAN AREA NETWORK
 Large transmission area (150 km)
 High data rates
 TRANSMISSION IN LOCAL & METROPOLITAN AREA NETWORKS
 CATAGORIES OF MAC(medium access control)PROTOCOL
 Controlled Access Protocols.
 Contention based protocols.
 CONTROLLED ACCESS PROTOCOLS.
• Users take TURNS.
• Only one user is allowed to transmit info. at a time.
 CONTENTION BASED ACCESS PROTOCOLS
• Don't take turns.
• User makes own decision to transmit information.
• Example: carrier sense multiple access with collision detection (CSMA/CD)
WIRELESS AND MOBILE COMMUNICATION
NETWORKS
The devices used for wireless communication require certain features
 Low power consumption
 Light weight
 worldwide communication ability.
 Access to a communication network is wireless so that the end users remain free to move.
LIMITATIONS
 Range of wireless communication is always limited.
 Range of user mobility is also limited.
To overcome this limitations:
 A geographical region is divided into smaller regions called CELLS.
• Each cell has a fixed communication device that serves all mobile devices within that
cell.
• As a mobile Device moves out of one cell and into another cell, service of that
connection is transferred from one cell to another. This is called the handoff process.
• Low power consumptions.
RESOURCE ALLOCATION TECHNIQUES
Two approaches for allocation of resources among the users.
 Static Allocation of resources
 Dynamic allocation of resources
 STATIC ALLOCATION OF RESOURCES
• Quantity of resources is allocated to each user.
• If user doesn't use his allocated resources , no one else can
 DYNAMIC ALLOCATION OF RESOURCES
• Desired quantity of resources is allocated to users on the basis of their demands and for
the duration of their need.
• Once the need is satisfied, the allocation is retrieved.
• Someone else can use these resources if needed.
CHALLENGES AND ISSUES
 Propagation Delay (the time for a signal to propagate from one end to another)
 Integrations of different services in the same networks & Each type of service has its own
requirements to achieving a desired level of quality of service
 Maintaining security and integrity of information.
THANK YOU

More Related Content

What's hot

Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
Rajet Veshin
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
hoanv
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
Mannu Khani
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
Mziaulla
 
Types of Network Architecture
Types of Network ArchitectureTypes of Network Architecture
Types of Network Architecture
sabari Giri
 
Computer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPTComputer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPT
KalpanaC14
 
1. introduction data comm
1. introduction data comm1. introduction data comm
1. introduction data comm
Humayoun Kabir
 
Network protocol
Network protocolNetwork protocol
Network protocol
SWAMY NAYAK
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
Dr Rajiv Srivastava
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
Shubham Khedekar
 
Packet switching
Packet switchingPacket switching
Packet switching
asimnawaz54
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
Shafaan Khaliq Bhatti
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Rajendra Dangwal
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
Tushar Ranjan
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
Nitin16498
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission Media
Syed Ahmed Zaki
 
basic networking
basic networkingbasic networking
basic networking
Anmol Bagga
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
kieshore
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniques
Gupta6Bindu
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
ashiesh0007
 

What's hot (20)

Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Types of Network Architecture
Types of Network ArchitectureTypes of Network Architecture
Types of Network Architecture
 
Computer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPTComputer Networks - Unit 1 PPT
Computer Networks - Unit 1 PPT
 
1. introduction data comm
1. introduction data comm1. introduction data comm
1. introduction data comm
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission Media
 
basic networking
basic networkingbasic networking
basic networking
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniques
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 

Viewers also liked

Dmc roast
Dmc roastDmc roast
Dmc roast
cdnpal
 
Introduction to programming principles languages
Introduction to programming principles languagesIntroduction to programming principles languages
Introduction to programming principles languages
Frankie Jones
 
Ensayo blogger def 2
Ensayo blogger def 2Ensayo blogger def 2
Ensayo blogger def 2
AldoMaGe
 
Superfunds Magazine - Ready to take on the world
Superfunds Magazine - Ready to take on the worldSuperfunds Magazine - Ready to take on the world
Superfunds Magazine - Ready to take on the world
Chloe Tilley
 
الفيلم أداة للتدريس - التجربة الشخصية أثناء دراسة الماجستير
الفيلم أداة للتدريس - التجربة الشخصية أثناء دراسة الماجستيرالفيلم أداة للتدريس - التجربة الشخصية أثناء دراسة الماجستير
الفيلم أداة للتدريس - التجربة الشخصية أثناء دراسة الماجستير
Prof. Sherif Shaheen
 
Посібник "Конспекти уроків у 1 семестрі"
Посібник "Конспекти уроків у 1 семестрі"Посібник "Конспекти уроків у 1 семестрі"
Посібник "Конспекти уроків у 1 семестрі"
sveta7940
 
Cdnpal Media Sales Deck Sample
Cdnpal Media Sales Deck SampleCdnpal Media Sales Deck Sample
Cdnpal Media Sales Deck Sample
cdnpal
 

Viewers also liked (7)

Dmc roast
Dmc roastDmc roast
Dmc roast
 
Introduction to programming principles languages
Introduction to programming principles languagesIntroduction to programming principles languages
Introduction to programming principles languages
 
Ensayo blogger def 2
Ensayo blogger def 2Ensayo blogger def 2
Ensayo blogger def 2
 
Superfunds Magazine - Ready to take on the world
Superfunds Magazine - Ready to take on the worldSuperfunds Magazine - Ready to take on the world
Superfunds Magazine - Ready to take on the world
 
الفيلم أداة للتدريس - التجربة الشخصية أثناء دراسة الماجستير
الفيلم أداة للتدريس - التجربة الشخصية أثناء دراسة الماجستيرالفيلم أداة للتدريس - التجربة الشخصية أثناء دراسة الماجستير
الفيلم أداة للتدريس - التجربة الشخصية أثناء دراسة الماجستير
 
Посібник "Конспекти уроків у 1 семестрі"
Посібник "Конспекти уроків у 1 семестрі"Посібник "Конспекти уроків у 1 семестрі"
Посібник "Конспекти уроків у 1 семестрі"
 
Cdnpal Media Sales Deck Sample
Cdnpal Media Sales Deck SampleCdnpal Media Sales Deck Sample
Cdnpal Media Sales Deck Sample
 

Similar to Communication and computer networks

Computer networks
Computer networksComputer networks
Computer networks
Keerty Smile
 
Networking technology
Networking technologyNetworking technology
Networking technology
SmritiGurung4
 
MODULE 1_Telecommunications Networks.pdf
MODULE 1_Telecommunications Networks.pdfMODULE 1_Telecommunications Networks.pdf
MODULE 1_Telecommunications Networks.pdf
MustaphaAbdullahi35
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
devika g
 
BSNL TRAINNING
BSNL TRAINNING BSNL TRAINNING
BSNL TRAINNING
ridhuaditi
 
Chapter4
Chapter4Chapter4
Communication and Networking
Communication and NetworkingCommunication and Networking
Communication and Networking
Jay Nagar
 
Chapter 1.pptx
Chapter 1.pptxChapter 1.pptx
Chapter 1.pptx
sameernsn1
 
1.CN-PPT.ppt
1.CN-PPT.ppt1.CN-PPT.ppt
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
Sweta Kumari Barnwal
 
Bsnl Training Report
Bsnl Training ReportBsnl Training Report
Bsnl Training Report
Nikhil Kumar
 
Ioe module 4
Ioe module 4Ioe module 4
Ioe module 4
nikshaikh786
 
DATA COMMUNICATION BY BP. ...
DATA COMMUNICATION BY BP.                                                    ...DATA COMMUNICATION BY BP.                                                    ...
DATA COMMUNICATION BY BP. ...
BPRAVEENROLEX
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
Denis R
 
Lesson 4 communication and computer network (123 kb)
Lesson 4 communication and computer network (123 kb)Lesson 4 communication and computer network (123 kb)
Lesson 4 communication and computer network (123 kb)
IMRAN KHAN
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
HardeepKaurCSEAssist
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
FA20BCS061GHANAKAMAL
 
Computer networks
Computer networksComputer networks
Computer networks
Himadri khali
 
is chap5.pptx
is chap5.pptxis chap5.pptx
is chap5.pptx
Teshome48
 
Applications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksApplications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networks
paruvathavardhinipra
 

Similar to Communication and computer networks (20)

Computer networks
Computer networksComputer networks
Computer networks
 
Networking technology
Networking technologyNetworking technology
Networking technology
 
MODULE 1_Telecommunications Networks.pdf
MODULE 1_Telecommunications Networks.pdfMODULE 1_Telecommunications Networks.pdf
MODULE 1_Telecommunications Networks.pdf
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
 
BSNL TRAINNING
BSNL TRAINNING BSNL TRAINNING
BSNL TRAINNING
 
Chapter4
Chapter4Chapter4
Chapter4
 
Communication and Networking
Communication and NetworkingCommunication and Networking
Communication and Networking
 
Chapter 1.pptx
Chapter 1.pptxChapter 1.pptx
Chapter 1.pptx
 
1.CN-PPT.ppt
1.CN-PPT.ppt1.CN-PPT.ppt
1.CN-PPT.ppt
 
Computer network introduction
Computer network introductionComputer network introduction
Computer network introduction
 
Bsnl Training Report
Bsnl Training ReportBsnl Training Report
Bsnl Training Report
 
Ioe module 4
Ioe module 4Ioe module 4
Ioe module 4
 
DATA COMMUNICATION BY BP. ...
DATA COMMUNICATION BY BP.                                                    ...DATA COMMUNICATION BY BP.                                                    ...
DATA COMMUNICATION BY BP. ...
 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
 
Lesson 4 communication and computer network (123 kb)
Lesson 4 communication and computer network (123 kb)Lesson 4 communication and computer network (123 kb)
Lesson 4 communication and computer network (123 kb)
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
Computer networks
Computer networksComputer networks
Computer networks
 
is chap5.pptx
is chap5.pptxis chap5.pptx
is chap5.pptx
 
Applications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksApplications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networks
 

Recently uploaded

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 

Recently uploaded (20)

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 

Communication and computer networks

  • 2. Outlines  A brief history  Introduction  Computer networks  Wide area network  Local/Metropolitan area network  Allocation of resources  Challenges and issues
  • 5. INTRODUCTION  A typical communication system consist of following parts:
  • 7.  Transmission of the information can be analog or digital .therefore we have four possibilities: 1. Analog information transmitted as an analog signal. 2. Analog information transmitted as a digital signal. 3. Digital information transmitted as an analog signal. 4. Digital information transmitted as a digital signal  When a signal carrying information is transmitted, it looses its energy and strength and gathers some interference (noise) as it propagates away from the transmitter. BOOSTED / AMPLIFIED  Boost energy and strength of a signal, it must be amplified (in case of analog signals)  rebuilt (in case of digital signals) MAJOR ISSUE NOISE AMPLIFICATION in Analog Signal
  • 8. Why Digital Signal is preferred over Analog Signal in communication? • FILTERED OUT of noise in Digital Signal • processing of information for error detection and correction, applying encryption and decryption techniques to sensitive information.
  • 9. COMPUTER NETWORKS  Interconnection of computers.  The interconnection forms a facility that provides reliable and efficient means of communication among users and other devices.  Computer networks are also referred to as computer communication networks.  Interconnection among computers may be via wired or wireless transmission medium  Two broad categories 1. Wide area networks 2. Local/metropolitan area networks
  • 10. (a) A typical WAN. (b) A typical local/metropolitan area network. (c) A typical local/metropolitan area communication ring network
  • 11. • Users will be sharing the transmission link to exchanging their information. Users will also share • the processing power of the computers. • buffering capacity to store the information. • and any other resources that are connected to the computer network. • The information from one user to another may need to pass through several switching nodes and transmission links before reaching its destination. • If one path is not available, not feasible, or not functional, some other path may be used • Exchange of Large Quantity of Information via a Packets of information.
  • 12. TRANSPORTION OF NFORMATION : Major aspects are  Addressing mechanism to identify users.  Addressing mechanism for information packets to identify their source and destination  Establishing a connection between sender and receiver and maintaining it  Choosing a path or a route to carry the information from a sender to a receiver  Implementing a selected route or path.  Checking information packets.  Encryption and decryption of information  Controlling the flow of information.  Informing the sender.  Billing for the use of resources  Ensuring that different computers running different applications and operating systems can exchange information  Preparing information appropriately for transmission . .
  • 13. OSI (open system interconnection) Model The International Organization for Standardization (ISO) established the Open Systems Interconnection (OSI) Reference Model Each layer deals with a particular aspect of network communication.
  • 14. WIDE AREA COMPUTER NETWORKS:  A WAN consist of switching nodes and transmission links.  Layout of the switching nodes and transmission links is based on the traffic pattern and expected volume of traffic flow from one site to another site.  When a user is ready to transmit information 1. Connection oriented service 2. connectionless service
  • 15. TRAFFIC MANAGEMENT IN WAN REACTIVE TECHNIQUES (in late 1960 and early 1970) WINDOW SCHEME OPTICAL FIBER
  • 16. BISDNs (Broadband Integrated Services Digital Networks)  Transmit voice, video and data at the same time over fiber optic telephone lines. Broadband ISDN can support data rates of 1.5 million bits per second (bps)  Asynchronous transfer mode (ATM) is expected to be used as a transfer mechanism in BISDNs where information is transmitted into the form of the cell
  • 17. LOCAL & METROPOLITAN AREA NETWORK  LOCAL AREA NETWORK  Limited geographical scope(few kilometers)  Limited to building or an organization  METROPOLITAN AREA NETWORK  Large transmission area (150 km)  High data rates  TRANSMISSION IN LOCAL & METROPOLITAN AREA NETWORKS
  • 18.  CATAGORIES OF MAC(medium access control)PROTOCOL  Controlled Access Protocols.  Contention based protocols.  CONTROLLED ACCESS PROTOCOLS. • Users take TURNS. • Only one user is allowed to transmit info. at a time.  CONTENTION BASED ACCESS PROTOCOLS • Don't take turns. • User makes own decision to transmit information. • Example: carrier sense multiple access with collision detection (CSMA/CD)
  • 19. WIRELESS AND MOBILE COMMUNICATION NETWORKS The devices used for wireless communication require certain features  Low power consumption  Light weight  worldwide communication ability.  Access to a communication network is wireless so that the end users remain free to move. LIMITATIONS  Range of wireless communication is always limited.  Range of user mobility is also limited.
  • 20. To overcome this limitations:  A geographical region is divided into smaller regions called CELLS. • Each cell has a fixed communication device that serves all mobile devices within that cell. • As a mobile Device moves out of one cell and into another cell, service of that connection is transferred from one cell to another. This is called the handoff process. • Low power consumptions.
  • 21. RESOURCE ALLOCATION TECHNIQUES Two approaches for allocation of resources among the users.  Static Allocation of resources  Dynamic allocation of resources  STATIC ALLOCATION OF RESOURCES • Quantity of resources is allocated to each user. • If user doesn't use his allocated resources , no one else can  DYNAMIC ALLOCATION OF RESOURCES • Desired quantity of resources is allocated to users on the basis of their demands and for the duration of their need. • Once the need is satisfied, the allocation is retrieved. • Someone else can use these resources if needed.
  • 22. CHALLENGES AND ISSUES  Propagation Delay (the time for a signal to propagate from one end to another)  Integrations of different services in the same networks & Each type of service has its own requirements to achieving a desired level of quality of service  Maintaining security and integrity of information.