Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Communication and Network chapter computing Fundamentals
1. Communication &
Network
Submitted By:
Hanan Sadiq (2020-CHY-11)
Abdul Ghaffar (2020-CHY-14)
Muhammad Junaid Khan (2020-CHY-16)
Hamza Arshad (2020-CHY-17)
Abul Aala (2020-CHY-28)
3. Communication: is a Process of
Passing (Sending) information and
understanding (receiving) the
same from one person to another
through Different Modes will
discussed.
4. Historical and Present Modes of Communication
Smoke Signal Telegraph Television Cell Phones Internet E-mails
Social media Text messaging
10. Network Layers:
The network layers refer to the
hierarchical arrangement of
protocols and functions in a
networking architecture. The most
commonly used model for
understanding network layers is the
OSI (Open Systems
Interconnection) model, which
consists of seven layers.
11. Network Troubleshooting:
Network troubleshooting is the
process of identifying, diagnosing,
and resolving issues or problems
that can occur within a computer
network. It involves systematically
analyzing network-related problems
to restore normal network
operations.
15. LAN stands for
Local Area
Network.
✓ Ethernet & Wifi
✓ Up to 2Km
✓ Very high
✓ Within
office,building
✓ Private
✓ Easy
✓ Low
16. CAN Stand for
Campus Area Network
✓ Ethernet
✓ 1-5KM
✓ High
✓ Within University,
Corporate offices
✓ Private
✓ Moderate
✓ Moderate
17. WAN Stand for Wide
Area Network
✓ Leased line,Dial up
✓ Above 50KM
✓ Low
✓ Within countries
✓ Private or Public
✓ Very Difficult
✓ Very High
18. MAN Stand for
Metropolitan Area
Network
✓ FDDI,CDDI
✓ 5 -50KM
✓ Average
✓ Within a city like Lahore
✓ Private or public
✓ Difficult
✓ High
19. Network Security:
Network security involves
implementing measures to
protect a computer network
infrastructure from unauthorized
access, misuse, modification, or
disruption. The primary goal is
to ensure the confidentiality,
integrity, and availability of data
within the network.
21. Firewalls:
Firewalls are network security
devices or software applications
designed to monitor, filter, and
control incoming and outgoing
network traffic based on
predetermined security rules. They
act as a barrier between a secure
internal network and untrusted
external networks, such as the
internet.
22. Security Updates:
Network security updates refer to the
regular release and application of
patches, fixes, and improvements to
the software, hardware, and
configurations within a computer
network. These updates are essential
for maintaining the security and
functionality of the network by
addressing known vulnerabilities,
enhancing defense mechanisms, and
adapting to emerging threats
23. Data
Transmission:
Data Transmission:
Data transmission is the process of
sending or transferring data from one
location to another. In the context of
information technology and
telecommunications, data
transmission involves the movement
of digital data between devices or
systems over a communication
channel. This communication channel
can be wired or wireless and may
include various mediums such as
copper wires, fiber optics, radio
waves, or satellite links.
24. How does data transmission work?
Data transmission involves at least two or more
digital devices communicating over a network,
and requires a few key components:
Sender: The device that starts the transmission
of data.
Receiver: The device that receives the data sent
by the sender.
Message or data: This is the information
transmitted from one device to another,
including text, images, audio, video, or any other
form of content.
Medium: The physical path or channel through
which data is transmitted, such as an optical
cable or wireless transmission.
Protocol: A set of rules governing the format,
25. What are the types of
data transmission?
Here is a closer look at the
ways data can be
transmitted between parties:
•Simplex Transmission
•Half-duplex transmission
•Full-duplex transmission
26. Simplex transmission:
It’s a mode of communication where the data can only flow in one
direction, meaning it’s unidirectional. In this mode, the sender can
send data, but they can’t receive it. Similarly, the receiver can only
receive data and not send it back. So, it’s a bit like a one-way street,
where data flow can only go in one direction.
27. Half-duplex transmission:
Half-duplex allows data to flow in both directions, but only one
direction at a time.Each station can only send or receive data at a
given time, meaning that when one device sends data, the other can
only receive it, and vice versa. It’s similar to a two-lane highway
where only one direction of traffic can go at once.
28. Full-duplex transmission:
In full-duplex data transmission, information can flow in both directions
simultaneously, allowing for two-way communication. Unlike half-duplex,
which only allows one direction of data flow at a time, full-duplex enables
both stations to transmit and receive data concurrently, making it
bidirectional.
29. Parallel processing
Parallel processing is a computing technique when multiple
streams of calculations or data processing tasks co-occur
through numerous central processing units (CPUs) working
concurrently.
30. Distributed processing
Distributed processing means that a specific task can be broken up
into functions, and the functions are dispersed across two or more
interconnected processors. A distributed application is an application
for which the component application programs are distributed
between two or more interconnected processors.
31. Advantages of distributed processing
• Security
• Distributed databases
• Faster problem solving
• Collaborative processing
33. …Criteria
1: Performance
Depends on Network Elements.
2: Reliability
Failure rate of network components.
3: Security
Data protection against corruption/loss of data due to:
• Errors
• Malicious users
34. Goals of computer
Communication and Network:
• Data Transfer
• Resource Sharing
• Reliability
• Security
• Flexibility and Adaptability
• Efficiency
• Quality of Service (QoS)
• Support for Multimedia