The document provides information about data communication systems and computer networks. It defines communication as the exchange of information between a sender and receiver using electronic means. It then describes the basic components of a communication system including the source, transmitter, channel, receiver and sink. It also discusses different types of computer networks like LAN, MAN and WAN and their characteristics. Finally, it covers topics like network architectures, transmission media and network topologies.
This document discusses various topics related to data transmission including:
- Data transmission involves transferring electromagnetic signals over a physical communication channel like copper wires or wireless channels.
- Transmission modes can be parallel (multiple bits sent at once) or serial (one bit at a time). Serial transmission is further divided into asynchronous and synchronous types.
- Asynchronous transmission groups data into start-stop bit sequences while synchronous transmission uses device-generated clocks for synchronization.
This document discusses data communication and computer networks. It covers the basic elements of a communication system including sender, receiver, and medium. It describes different data transmission modes such as simplex, half-duplex, and full-duplex. It also discusses digital and analog transmission, transmission media such as twisted pair, coaxial cable, and fiber optics. The document defines protocols, computer networks, network topologies like star, ring and bus. It explains peer to peer and client/server networking and different types of networks including LAN, WAN and MAN. Finally, it provides details about local area networks, LAN protocols like Ethernet and Token Ring.
Transmission Modes in Computer Networks
There are three modes of transmission, namely: simplex, half duplex, and full duplex. The transmission mode defines the direction of signal flow between two connected devices.
Distributed operating systems allow applications to run across multiple connected computers. They extend traditional network operating systems to provide greater communication and integration between machines on the network. While appearing like a regular centralized OS to users, distributed OSs actually run across multiple independent CPUs. Early research in distributed systems began in the 1970s, with many prototypes introduced through the 1980s-90s, though few achieved commercial success. Design considerations for distributed OSs include transparency, inter-process communication, resource management, reliability, and flexibility.
This document discusses multiplexing techniques used in mobile computing. It describes four types of multiplexing: frequency division multiplexing (FDM), time division multiplexing (TDM), code division multiplexing (CDM), and space division multiplexing (SDM). For each type, it provides details on how the technique works and its advantages and disadvantages. FDM uses different frequencies to transmit multiple signals simultaneously. TDM divides a signal into time slots to share a frequency. CDM assigns unique codes to signals sharing the same frequency. SDM splits a channel across physical locations.
The document discusses transport layer protocols TCP and UDP. It provides an overview of process-to-process communication using transport layer protocols. It describes the roles, services, requirements, addressing, encapsulation, multiplexing, and error control functions of the transport layer. It specifically examines TCP and UDP, comparing their connection-oriented and connectionless services, typical applications, and segment/datagram formats.
This document discusses various topics related to data transmission including:
- Data transmission involves transferring electromagnetic signals over a physical communication channel like copper wires or wireless channels.
- Transmission modes can be parallel (multiple bits sent at once) or serial (one bit at a time). Serial transmission is further divided into asynchronous and synchronous types.
- Asynchronous transmission groups data into start-stop bit sequences while synchronous transmission uses device-generated clocks for synchronization.
This document discusses data communication and computer networks. It covers the basic elements of a communication system including sender, receiver, and medium. It describes different data transmission modes such as simplex, half-duplex, and full-duplex. It also discusses digital and analog transmission, transmission media such as twisted pair, coaxial cable, and fiber optics. The document defines protocols, computer networks, network topologies like star, ring and bus. It explains peer to peer and client/server networking and different types of networks including LAN, WAN and MAN. Finally, it provides details about local area networks, LAN protocols like Ethernet and Token Ring.
Transmission Modes in Computer Networks
There are three modes of transmission, namely: simplex, half duplex, and full duplex. The transmission mode defines the direction of signal flow between two connected devices.
Distributed operating systems allow applications to run across multiple connected computers. They extend traditional network operating systems to provide greater communication and integration between machines on the network. While appearing like a regular centralized OS to users, distributed OSs actually run across multiple independent CPUs. Early research in distributed systems began in the 1970s, with many prototypes introduced through the 1980s-90s, though few achieved commercial success. Design considerations for distributed OSs include transparency, inter-process communication, resource management, reliability, and flexibility.
This document discusses multiplexing techniques used in mobile computing. It describes four types of multiplexing: frequency division multiplexing (FDM), time division multiplexing (TDM), code division multiplexing (CDM), and space division multiplexing (SDM). For each type, it provides details on how the technique works and its advantages and disadvantages. FDM uses different frequencies to transmit multiple signals simultaneously. TDM divides a signal into time slots to share a frequency. CDM assigns unique codes to signals sharing the same frequency. SDM splits a channel across physical locations.
The document discusses transport layer protocols TCP and UDP. It provides an overview of process-to-process communication using transport layer protocols. It describes the roles, services, requirements, addressing, encapsulation, multiplexing, and error control functions of the transport layer. It specifically examines TCP and UDP, comparing their connection-oriented and connectionless services, typical applications, and segment/datagram formats.
Transmission media (data communication)Pritom Chaki
Transmission media is the material pathway that connects computers, different kinds of devices and people on a network. It can be compared to a superhighway carrying lots of information. Transmission media uses cables or electromagnetic signals to transmit data.
This document provides an overview of computer networks. It discusses what a computer network is, types of networks including LAN, MAN and WAN, network topologies such as bus, ring and star, and differences between topologies. Local area networks connect devices within a small physical area like a home or office building. Metropolitan area networks connect devices within a city. Wide area networks connect devices over large distances like countries. Topologies determine how devices are physically connected on a network. [END SUMMARY]
Data Representation in Data Communication (1).pptxmoviebro1
Data can be represented in different forms such as text, numbers, images, audio, and video. Text is represented using character encoding systems like Unicode and ASCII. Numbers are stored as binary patterns without encoding. Images are represented as a matrix of pixels, each assigned a binary pattern depending on the image type (black/white or color). Audio is continuous data while video combines pictures and audio. Data communication involves transmitting data between devices via transmission mediums. Effective communication depends on delivery, accuracy, timeliness, and jitter. Components include messages, senders, receivers, transmission mediums, and protocols. Modes of transmission are simplex, half-duplex, and full-duplex. Computer networks connect devices using transmission media
A distributed system is a collection of computational and storage devices connected through a communications network. In this type of system, data, software, and users are distributed.
T9. Trust and reputation in multi-agent systemsEASSS 2012
The credibility model in ReGreT evaluates the credibility of witnesses in two ways:
1. Direct trust in the witness - The trust that the agent has directly in the witness based on its past interactions. This is calculated using the direct trust model.
2. Reliability of the witness' reputation value - This measures how reliable or volatile the reputation values provided by the witness tend to be. It is calculated based on the number of outcomes the witness has observed and the deviation in its ratings.
The credibility model combines these two factors - direct trust and reliability - to get an overall credibility value for each witness. This credibility value is then used to weight the reputation values provided by each witness. Witnesses with higher credibility will have
This document discusses different types of errors that can occur during data transmission and various error detection and correction techniques. It describes single-bit errors where one bit is changed and burst errors where multiple consecutive bits are changed. It then explains techniques like two-dimensional parity, checksums, and cyclic redundancy checks which add redundant bits to detect errors by checking for discrepancies between transmitted and received data. The document provides examples of how internet checksums and cyclic redundancy checks work to detect errors.
The document discusses different methods of wireless transmission across the electromagnetic spectrum. It covers radio transmission, which can travel long distances but power falls off with distance; microwave transmission, which travels in straight lines and is used for long-distance communication; and infrared transmission, which is used for short-range communication like TV remotes but does not pass through objects well. It also mentions lightwave transmission using lasers offers high bandwidth but requires precise aiming over distance.
2. Distributed Systems Hardware & Software conceptsPrajakta Rane
This document discusses distributed system software and middleware. It describes three types of operating systems used in distributed systems - distributed operating systems, network operating systems, and middleware operating systems. Middleware operating systems provide a common set of services for local applications and independent services for remote applications. Common middleware models include remote procedure call, remote method invocation, CORBA, and message-oriented middleware. Middleware offers services like naming, persistence, messaging, querying, concurrency control, and security.
This document provides information about computer networks and networking concepts. It defines what a computer network is and some examples. It then discusses different types of networks including LAN, MAN, and WAN. It also covers topics like clients, servers, network devices, transmission media, protocols, and network topologies. The key points covered include the purpose of computer networks to share resources, examples of networks like the Internet, and definitions of fundamental networking components and concepts.
This document discusses software project management. It outlines software processes, common problems, and methods for improving processes. Software processes involve many elements and sub-processes. Common problems include cost overruns, schedule delays, low productivity, and poor quality. There are three methods for improving processes: meta processes focus on organizational strategies and profitability, macro processes produce software within constraints for a project, and micro processes focus on iterations and risk resolution for a project team. The objective of process improvement is to maximize resources for productive activities and minimize overhead impacts on resources like personnel and schedule to ultimately enhance product quality.
I.ITERATIVE DEEPENING DEPTH FIRST SEARCH(ID-DFS) II.INFORMED SEARCH IN ARTIFI...vikas dhakane
Artificial Intelligence: Introduction, Typical Applications. State Space Search: Depth Bounded
DFS, Depth First Iterative Deepening. Heuristic Search: Heuristic Functions, Best First Search,
Hill Climbing, Variable Neighborhood Descent, Beam Search, Tabu Search. Optimal Search: A
*
algorithm, Iterative Deepening A*
, Recursive Best First Search, Pruning the CLOSED and OPEN
Lists
This document provides an overview of computer networks including:
- Defining a computer network as interconnected hardware and computers that allow sharing of resources and information.
- Describing the main types of transmission in networks as simplex (one-way), half duplex (one direction at a time), and full duplex (two-way simultaneous communication).
- Discussing common network transmission media like twisted pair cable, coaxial cable, fiber optic cable, and wireless; outlining their advantages and disadvantages.
Mobile Network Layer protocols and mechanisms allow nodes to change their point of attachment to different networks while maintaining ongoing communication. Key concepts include:
- Mobile IP adds mobility support to IP, allowing nodes to use the same IP address even when changing networks. It relies on home agents and care-of addresses.
- Registration allows mobile nodes to inform their home agent of their current location when visiting foreign networks. Tunneling and encapsulation techniques are used to forward packets to mobile nodes' current locations.
- Various routing protocols like DSDV have been developed for mobile ad hoc networks which have no fixed infrastructure and dynamic topologies.
The document discusses the logical design of IoT. It describes the key logical design elements including IoT functional blocks, communication models, and communication APIs. The logical design provides an abstract representation of IoT entities and processes without implementation details. The functional blocks provide capabilities for identification, sensing, actuation, communication and management. Common communication models are request-response, publish-subscribe, push-pull and exclusive pair. REST and WebSocket are examples of IoT communication APIs.
This document describes the sliding window protocol. It discusses key concepts like both the sender and receiver maintaining buffers to hold packets, acknowledgements being sent for every received packet, and the sender being able to send a window of packets before receiving an acknowledgement. It then explains the sender side process of numbering packets and maintaining a sending window. The receiver side maintains a window size of 1 and acknowledges by sending the next expected sequence number. A one bit sliding window protocol acts like stop and wait. Merits include multiple packets being sent without waiting for acknowledgements while demerits include potential bandwidth waste in some situations.
This document discusses various web communication protocols used for connectivity of devices over constrained and unconstrained environments. It describes protocols like CoAP, DTLS, JSON and TLV formats that allow small devices with limited resources to communicate securely over the web. CoAP is a specialized web transfer protocol that uses request/response model and supports resource discovery. DTLS provides security services like integrity, authentication and confidentiality for UDP-based applications. JSON and TLV are compact data formats used for message transmission.
This document provides an introduction and overview of Load Runner and Win Runner software. Load Runner is an automated performance testing tool from HP that examines system behavior under load. Win Runner is an automated functional GUI testing tool that allows recording and playback of user interactions as test scripts. Both were originally developed by Mercury Interactive, which was acquired by HP. The document describes how each tool works, their typical processes, and provides some facts about Load Runner and Win Runner.
UDP is a connectionless transport layer protocol that runs over IP. It provides an unreliable best-effort service where packets may be lost, delivered out of order, or duplicated. UDP has a small 8-byte header and is lightweight, with no connection establishment or guarantee of delivery. This makes it fast and low overhead, suitable for real-time applications like streaming media where resending lost packets would cause delay.
The document provides an overview of computer networks. It defines a computer network as an interconnection between two or more computing devices using wired or wireless media for resource sharing or communication. The document discusses different types of networks including personal area networks (PANs), local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It also covers common network topologies like bus, star, ring, mesh, and tree. The document defines key networking concepts such as IP addresses, network classes, and differences between IPv4 and IPv6 addressing schemes.
The document discusses computer networks and communication. It begins with an introduction to how computer networks were developed in the 1960s to enable fast and real-time data transfer for scientific research. It then defines what a network is and discusses various types of networks including LANs, WANs, MANs, peer-to-peer networks, and examples like Ethernet. It also covers network topologies, the ISO-OSI reference model, and considerations for networking like cost, training, security and more.
Transmission media (data communication)Pritom Chaki
Transmission media is the material pathway that connects computers, different kinds of devices and people on a network. It can be compared to a superhighway carrying lots of information. Transmission media uses cables or electromagnetic signals to transmit data.
This document provides an overview of computer networks. It discusses what a computer network is, types of networks including LAN, MAN and WAN, network topologies such as bus, ring and star, and differences between topologies. Local area networks connect devices within a small physical area like a home or office building. Metropolitan area networks connect devices within a city. Wide area networks connect devices over large distances like countries. Topologies determine how devices are physically connected on a network. [END SUMMARY]
Data Representation in Data Communication (1).pptxmoviebro1
Data can be represented in different forms such as text, numbers, images, audio, and video. Text is represented using character encoding systems like Unicode and ASCII. Numbers are stored as binary patterns without encoding. Images are represented as a matrix of pixels, each assigned a binary pattern depending on the image type (black/white or color). Audio is continuous data while video combines pictures and audio. Data communication involves transmitting data between devices via transmission mediums. Effective communication depends on delivery, accuracy, timeliness, and jitter. Components include messages, senders, receivers, transmission mediums, and protocols. Modes of transmission are simplex, half-duplex, and full-duplex. Computer networks connect devices using transmission media
A distributed system is a collection of computational and storage devices connected through a communications network. In this type of system, data, software, and users are distributed.
T9. Trust and reputation in multi-agent systemsEASSS 2012
The credibility model in ReGreT evaluates the credibility of witnesses in two ways:
1. Direct trust in the witness - The trust that the agent has directly in the witness based on its past interactions. This is calculated using the direct trust model.
2. Reliability of the witness' reputation value - This measures how reliable or volatile the reputation values provided by the witness tend to be. It is calculated based on the number of outcomes the witness has observed and the deviation in its ratings.
The credibility model combines these two factors - direct trust and reliability - to get an overall credibility value for each witness. This credibility value is then used to weight the reputation values provided by each witness. Witnesses with higher credibility will have
This document discusses different types of errors that can occur during data transmission and various error detection and correction techniques. It describes single-bit errors where one bit is changed and burst errors where multiple consecutive bits are changed. It then explains techniques like two-dimensional parity, checksums, and cyclic redundancy checks which add redundant bits to detect errors by checking for discrepancies between transmitted and received data. The document provides examples of how internet checksums and cyclic redundancy checks work to detect errors.
The document discusses different methods of wireless transmission across the electromagnetic spectrum. It covers radio transmission, which can travel long distances but power falls off with distance; microwave transmission, which travels in straight lines and is used for long-distance communication; and infrared transmission, which is used for short-range communication like TV remotes but does not pass through objects well. It also mentions lightwave transmission using lasers offers high bandwidth but requires precise aiming over distance.
2. Distributed Systems Hardware & Software conceptsPrajakta Rane
This document discusses distributed system software and middleware. It describes three types of operating systems used in distributed systems - distributed operating systems, network operating systems, and middleware operating systems. Middleware operating systems provide a common set of services for local applications and independent services for remote applications. Common middleware models include remote procedure call, remote method invocation, CORBA, and message-oriented middleware. Middleware offers services like naming, persistence, messaging, querying, concurrency control, and security.
This document provides information about computer networks and networking concepts. It defines what a computer network is and some examples. It then discusses different types of networks including LAN, MAN, and WAN. It also covers topics like clients, servers, network devices, transmission media, protocols, and network topologies. The key points covered include the purpose of computer networks to share resources, examples of networks like the Internet, and definitions of fundamental networking components and concepts.
This document discusses software project management. It outlines software processes, common problems, and methods for improving processes. Software processes involve many elements and sub-processes. Common problems include cost overruns, schedule delays, low productivity, and poor quality. There are three methods for improving processes: meta processes focus on organizational strategies and profitability, macro processes produce software within constraints for a project, and micro processes focus on iterations and risk resolution for a project team. The objective of process improvement is to maximize resources for productive activities and minimize overhead impacts on resources like personnel and schedule to ultimately enhance product quality.
I.ITERATIVE DEEPENING DEPTH FIRST SEARCH(ID-DFS) II.INFORMED SEARCH IN ARTIFI...vikas dhakane
Artificial Intelligence: Introduction, Typical Applications. State Space Search: Depth Bounded
DFS, Depth First Iterative Deepening. Heuristic Search: Heuristic Functions, Best First Search,
Hill Climbing, Variable Neighborhood Descent, Beam Search, Tabu Search. Optimal Search: A
*
algorithm, Iterative Deepening A*
, Recursive Best First Search, Pruning the CLOSED and OPEN
Lists
This document provides an overview of computer networks including:
- Defining a computer network as interconnected hardware and computers that allow sharing of resources and information.
- Describing the main types of transmission in networks as simplex (one-way), half duplex (one direction at a time), and full duplex (two-way simultaneous communication).
- Discussing common network transmission media like twisted pair cable, coaxial cable, fiber optic cable, and wireless; outlining their advantages and disadvantages.
Mobile Network Layer protocols and mechanisms allow nodes to change their point of attachment to different networks while maintaining ongoing communication. Key concepts include:
- Mobile IP adds mobility support to IP, allowing nodes to use the same IP address even when changing networks. It relies on home agents and care-of addresses.
- Registration allows mobile nodes to inform their home agent of their current location when visiting foreign networks. Tunneling and encapsulation techniques are used to forward packets to mobile nodes' current locations.
- Various routing protocols like DSDV have been developed for mobile ad hoc networks which have no fixed infrastructure and dynamic topologies.
The document discusses the logical design of IoT. It describes the key logical design elements including IoT functional blocks, communication models, and communication APIs. The logical design provides an abstract representation of IoT entities and processes without implementation details. The functional blocks provide capabilities for identification, sensing, actuation, communication and management. Common communication models are request-response, publish-subscribe, push-pull and exclusive pair. REST and WebSocket are examples of IoT communication APIs.
This document describes the sliding window protocol. It discusses key concepts like both the sender and receiver maintaining buffers to hold packets, acknowledgements being sent for every received packet, and the sender being able to send a window of packets before receiving an acknowledgement. It then explains the sender side process of numbering packets and maintaining a sending window. The receiver side maintains a window size of 1 and acknowledges by sending the next expected sequence number. A one bit sliding window protocol acts like stop and wait. Merits include multiple packets being sent without waiting for acknowledgements while demerits include potential bandwidth waste in some situations.
This document discusses various web communication protocols used for connectivity of devices over constrained and unconstrained environments. It describes protocols like CoAP, DTLS, JSON and TLV formats that allow small devices with limited resources to communicate securely over the web. CoAP is a specialized web transfer protocol that uses request/response model and supports resource discovery. DTLS provides security services like integrity, authentication and confidentiality for UDP-based applications. JSON and TLV are compact data formats used for message transmission.
This document provides an introduction and overview of Load Runner and Win Runner software. Load Runner is an automated performance testing tool from HP that examines system behavior under load. Win Runner is an automated functional GUI testing tool that allows recording and playback of user interactions as test scripts. Both were originally developed by Mercury Interactive, which was acquired by HP. The document describes how each tool works, their typical processes, and provides some facts about Load Runner and Win Runner.
UDP is a connectionless transport layer protocol that runs over IP. It provides an unreliable best-effort service where packets may be lost, delivered out of order, or duplicated. UDP has a small 8-byte header and is lightweight, with no connection establishment or guarantee of delivery. This makes it fast and low overhead, suitable for real-time applications like streaming media where resending lost packets would cause delay.
The document provides an overview of computer networks. It defines a computer network as an interconnection between two or more computing devices using wired or wireless media for resource sharing or communication. The document discusses different types of networks including personal area networks (PANs), local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It also covers common network topologies like bus, star, ring, mesh, and tree. The document defines key networking concepts such as IP addresses, network classes, and differences between IPv4 and IPv6 addressing schemes.
The document discusses computer networks and communication. It begins with an introduction to how computer networks were developed in the 1960s to enable fast and real-time data transfer for scientific research. It then defines what a network is and discusses various types of networks including LANs, WANs, MANs, peer-to-peer networks, and examples like Ethernet. It also covers network topologies, the ISO-OSI reference model, and considerations for networking like cost, training, security and more.
This document provides an overview of data communications and computer networks. It discusses the following key points in 3 sentences:
1) Data communications involve the exchange of data between two devices via some transmission medium. A computer network connects multiple devices and allows them to share resources. There are two main types of computer networks - peer-to-peer networks with no central server and client-server networks with a dedicated central server.
2) Components of computer networks include network interface cards, hubs, switches, cables, routers, and modems. Computer network architectures can be peer-to-peer where all devices have equal access, or client-server where clients access resources from a central server. Transmission technologies include broadcast networks
This document provides an overview of computer networks. It begins by discussing how computer networks have changed daily life through services like watching cable TV, using ATMs, emailing, and more. A network is defined as two or more connected autonomous computers. The goals of networking are sharing resources, improved communication, and reduced communication costs. Networks have senders, receivers, messages, transmission mediums, and protocols. Early networks included ARPANET and NSFNET. The internet evolved from these and allows globally connected services. Network topologies like star, bus, and types of devices like hubs, switches, and routers are also summarized.
This document provides an introduction to computer networks. It defines key network concepts like local area networks (LANs), wide area networks (WANs), and the different physical network topologies including bus, star, ring, mesh, and hybrid networks. It discusses network performance metrics like throughput and delay. It also covers network criteria such as reliability, security, and standards organizations that help networks communicate. Examples of different network configurations are provided to illustrate LANs, WANs, and the various physical topologies.
Computer Networks: Evolution of Computer Networks.pptxVishwaTej10
The document summarizes the evolution of computer networking from early networks like ARPANET in 1969 to the modern Internet. It discusses key concepts like distributed processing, network criteria of performance, reliability and security. It also covers network transmission technologies including unicast, broadcast and multicast. Different types of networks are defined, from local area networks (LANs) to wide area networks (WANs). Common network devices like hubs, switches and routers are also explained.
Computer networks allow for information sharing between people or groups. A computer network facilitates information sharing between computers that are interconnected using various transmission technologies like copper wire or fiber optics. There are several types of computer networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs) which differ in size, transmission medium, and distance covered. LANs connect computers within a single building or campus while WANs connect computers across large distances like cities, states or countries.
Data communication involves the exchange of data between two or more parties through various means such as writing, talking, images, and electronic communication like emails and calls. An effective data communication model includes a source that generates data, a transmitter that converts it into signals, a transmission system that carries the data, a receiver that converts it back into data, and a destination that receives the incoming data. Computer networks allow for sharing of resources like files, printers, and applications between connected computers. Common network topologies include bus, star, ring and mesh configurations that determine how the connected computers are physically laid out and communicate with each other.
Networking and telecommunication involves the transmission of information over distances using telecommunication networks. There are different types of communication including simplex, half duplex, and full duplex. Key aspects of networking and telecommunication discussed in the document include bits, bandwidth, computer networks, networking devices like servers and workstations, transmission media, networking architecture models like client-server and peer-to-peer, types of computer networks including LAN, MAN and WAN, and communication protocols.
This document provides an overview of data communication systems and components. It discusses telecommunication systems, channels, media, hardware, software, and network topologies. The five main components of a telecommunications system are the sender, channel/media, hardware, software, and receiver. Common network topologies include bus, star, ring, and mesh configurations.
Computer networks allow interconnected devices to communicate. They have advantages like resource sharing and cost savings but also disadvantages such as reduced productivity if poorly managed or servers fail. Early networks included ARPANET in 1969 and NSFNET in the 1980s, leading to the modern Internet. Networks transmit data via circuits, packets, or messages using techniques like circuit switching, packet switching, and message switching. Components include nodes, servers, clients, hardware, software and communication channels. Networks can be LANs, MANs, WANs or PANs depending on their area of coverage. Wired networks use media like twisted pair, coaxial or fiber optic cables while wireless uses radio waves.
group of computers connected with each other to share information or resources. A network can be small or a large. it can be created in a building or spread all over the world. Networks are main source of communication all over the world. The most common resource shared today is connection to the Internet.
This document provides an overview of computer networks. It defines a network as consisting of two or more connected computers that can share resources and information. Networks allow sharing of hardware, software, files and administration. There are different types of networks classified by transmission medium (wired vs wireless), size (LAN, WAN, MAN), management (peer-to-peer, client/server), and topology. Common transmission media are twisted pair cables, coaxial cables, and fiber optic cables. Local area networks connect computers within a building while wide area networks connect locations further apart like across cities. Protocols like TCP/IP and domains names are used to transmit data packets across interconnected networks.
This presentation is about a range of computer network that are explained in detail. I recommend you have microsoft powerpoint 2010 or later for smooth running of the presentation. There are also animations in this presentation. Please enjoy, download and follow.
This document provides an introduction to data communication and computer networks. It discusses the basics of networking including:
1. The key components of a data communication system including the message, sender, receiver, transmission medium, and protocols.
2. Different types of networks including LANs, WANs, MANs, WLANs, and VPNs.
3. Network topologies such as mesh, star, bus, and ring.
4. Common network cabling including twisted pair, coaxial, and fiber optic cables.
Distributed Systems - Information TechnologySagar Mehta
Distributed systems rely on underlying computer networks for communication. The performance, reliability, scalability, mobility, and quality of service of these networks impact distributed system design. Networks are built using transmission media and hardware like routers and switches. They operate using principles such as protocol layering, packet switching, routing, and data streaming. Different network types include personal area networks, local area networks, wide area networks, and wireless variants of these.
This document discusses network topologies. It describes the bus, star, and ring network topologies. In a bus network, all computers and devices connect to a single central backbone cable. Data travels along the cable in both directions to all devices, but each device only accepts data addressed to it. Advantages are low cost and easy addition/removal of devices. A disadvantage is a cable break disables the whole network. Star and ring topologies are also introduced. The document focuses on network fundamentals including concepts, architectures, and layouts.
A network connects computer systems together to share computing power and storage facilities. Computers connect through cables or phone lines and may be in the same building or across different locations. Common examples include computer networks in offices and the global Internet. Networks allow for sharing of resources like printers and files as well as easy communication. While they provide advantages, networks also involve costs and security risks. The document describes different types of computer networks including LANs, WANs, and MANs as well as various network topologies, hardware, software, and security measures used in computer networking.
Program/Course : Computer System Servicing NC II
Unit of Competency : Set-up Computer Networks
Module : Install Network Cables
Learning Outcome 01: Installing Network Cables
for full compilation just visit my website.
http://computersystemsolution.com/
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
2. Data Communication System:
▪ Communication refers to the exchange of information
between sender and receiver with the help of
electronic means of communication.
▪ The electronic means of communication may be
wires, radio or satellite.
Data communication and networking 2
4. Block Diagram of Communication System/Model
• The communication system consists of information transmission from
one point to another. The original information signal is passes
through various stages and many changes in its orientation and shape
because of noise and attenuation (decreasing).
Data communication and networking 4
5. • The source generates the information which comes from any
source.
• Then source encoder translates source information into
electrical form.
• A transmitter (TX) transfers encoded form of information into
channel.
• Channel is the physical medium that connects the transmitter
to the receiver. The channels are transmission medias that
transform data into receiver.
• The receiver (RX) receives the incoming information and
transfers into a source decoder.
• Finally, source decoder converts the electrical signal back to a
form acceptable to the receiver and provide to the users.
• Sink: A sink is the user of the information generated by the
source. It is a final block in the communication system which
receives the message signal.
Data communication and networking 5
6. Computer Network
• Computer networking refers to interconnected computing
devices that can exchange data and share resources with each
other with the help of transmission media and set of rules.
• Example: human networks, telephone networks, radio
networks, computer networks, etc.
Data communication and networking 6
7. Advantages of computer network :
1. Ease of accessibility:
Modern computer networks are easy to explore. So, even if you are a kid or a
person new to technology, you'll find it easy to connect.
2. Flexibility:
Flexibility means that different people will be able to explore different things as per
their requirements. Eg: e-mail or messaging apps like WhatsApp.
3. Convenient resource sharing:
You can use resources such as printers, scanners and photocopy machines that can
be shared across multiple users.
4. Connectivity:
Computer Networks improve connectivity irrespective of a person's location. Eg -
as we use video call apps or Google documents to connect with our friends and
colleagues.
Data communication and networking 7
8. Disadvantages of computer network :
1. Cost of the network –
The expense of executing the system including cabling and equipment can
be expensive.
2. Security Problem: Network security is the most challenging job for
network administrator in order to protect network resources from
unauthorized users and physical destructions.
3. Needs Technical Person: It is very difficult to install and operate good
computer network. In order to manage computer network, the
organization needs network specialist. So it is very expensive for an
organization to hire network specialist.
4. Depends on centralized device: Computer networking depends on
centralized devices like server, hub, router, etc. So, if there is problem on
central devices, then whole network can be stopped.
Data communication and networking 8
9. Direction of communication flow
• Direction of communication refers to how data is transmitted
between sender and receiver.
• It is also know as mode of transmission.
• Classified into three types:
I. Simplex
II. Half duplex
III. Full duplex
Data communication and networking 9
10. Simplex
• The flow of data signal in simplex mode of communication is
unidirectional.
• Only one of two devices on a link can transmit data and the other can
receive.
• EX:
➢ Communication b/w keyboard and computer
➢ Radio and TV broadcasting etc
Data communication and networking 10
11. Half Duplex:
• Half-duplex data transmission means that data can be transmitted in
both directions (bidirectional). But, both devices cannot receive and
transmit data at the same time.
• Ex: communication between walkie-talkie
Full duplex
• Full-duplex data transmission means that data can be transmitted in
both directions. Both device can receive and transmit data at the same
time. .
• Ex :communication in telephone ,cell phone etc.
Data communication and networking 11
12. Types of Network
On the basis of geographical area
1. Local area network (LAN)
2. Metropolitan area network (MAN)
3. Wide area network (WAN)
On the basis of network architecture
1. Peer to peer network architecture
2. Client server network architecture
Data communication and networking 12
13. Local area network (LAN):
❖ LAN is small privately owned network that covers only few
kilometers such as within a room, office or buildings (up to
3KM).
❖It connects the network resources such as computers, faxes,
printers, and various networking devices.
❖Moreover, user also can share the resources such as data,
file, software, etc. in the network.
❖It has higher speed data transfer rate maximum up to
1000mbps.
❖It is highly secured and it has least error rate than others.
❖It is less expensive type of network because it requires least
expensive devices - NIC, Hub Bridges, Modem and switches
etc.
Data communication and networking 13
15. Advantages
1.Data transmission speed is faster than MAN and WAN.
2.It has higher security to resources of the network
3.It is easy to manage and operate.
Disadvantages
1.It is limited only to small area.
2.Initial setup cost is high .
3.It comparatively connects a small number of computers.
Data communication and networking 15
16. Metropolitan Area Network
• MAN is complex and heterogeneous type of network and it may be either
public or private.
• The size of MAN is bigger than LAN and it covers maximum up to 100km.
• This network uses bridges, repeater, router, gateway and microwave station
etc.
• It uses different types of media such as coaxial cable, optical fiber, microwave
etc.
• It can connect 100s of LAN and 1000s of individual computers.
Example - ATM, cable TV etc.
Data communication and networking 16
17. Advantages
1.Covers large geographical area.
2.It can connect dissimilar systems and networks.
3.Public libraries and government agencies typically use a
MAN.
Disadvantages:
1.Transmission speed is usually slower compared to the LAN.
2.It is complex to establish, manage and provide security.
3.It is expensive to run than LAN.
Data communication and networking 17
19. Wide area network
• WAN is a network that exists over a large-scale geographical
area.
• It has low speed data speed transfer 64Kbps to 10 Mbps or
more.
• It uses various types of transmission media such as telephone
line, optical fiber, radio wave, microwave, satellite, etc.
• It uses mesh and hybrid topologies.
• It can connect unlimited LANs and MANs.
Data communication and networking 19
20. Advantages :
➢ It is spread to a large area than LAN and MAN.
➢ It also connects dissimilar systems and networks.
➢ Allow you to share the data to all of your connected devices in
a network.
Disadvantages:
➢ It is the most expensive type of network because it requires
large amount of expensive devices such as router , gateway,
microwave station ,satellite etc.
➢ It is complex to establish, manage and provide security.
➢ Transmission speed is usually slower compare to LAN and
MAN.
➢ It is less secured network and it has highest error rate.
Data communication and networking 20
21. Computer Network Architecture
Computer Network Architecture is defined as the physical and logical
design of the software, hardware, protocols, and media of the
transmission of data.
Data communication and networking 21
22. Peer to peer network architecture
➢Peer-To-Peer network is a network in which all the computers
are linked together with equal privilege and responsibilities
for processing the data.
➢Peer-To-Peer network is useful for small environments,
usually up to 10 computers.
➢Peer-To-Peer network has no dedicated server.
➢Special permissions are assigned to each computer for sharing
the resources, but this can lead to a problem if the computer
with the resource is down.
Data communication and networking 22
24. • It P2P network is easier to set up.
• The p2p network is less expensive.
• In P2P all nodes are act as server as well as client therefore no need
of dedicated server.
• Each node has equal privileges to access the resources of its own and
others nodes connected to the network.
• It is suitable for small sized network which has maximum 10 nodes.
Advantage of peer to peer network
Data communication and networking 24
25. Disadvantages of peer to peer network
• Its performance becomes very poor for large size network.
• No centralized server is available to manage and control the access of
data.
• Network security problems due to equal privileges of the nodes.
• Data recovery or backup is very difficult.
• Each computer should have its own back-up system
Data communication and networking 25
26. Client server network architecture
• The client-server model describes how a server provides resources and
services to one or more clients.
• Examples of servers include web servers, mail servers, and file servers.
• Each of these servers provide resources to client devices, such
as desktop computers, laptops, tablets, and smart phones.
• Most servers have a one-to-many relationship with clients, meaning a
single server can provide resources to multiple clients at one time.
Data communication and networking 26
27. Client server network architecture
▪ Client/server architecture works when the client computer sends a
resource or process request to the server over the network
connection, which is then processed and delivered to the client.
▪ A server computer can manage several clients simultaneously,
whereas one client can be connected to several servers at a time,
each providing a different set of services.
▪ In its simplest form, the internet is also based on client/server
architecture where web servers serve many simultaneous users with
website data.
Data communication and networking 27
28. Advantages
• It is easier for centralized administration, controlling and monitoring
the entire network from server.
• It provides centralized backup and recovery.
• It is easier for managing the large size network.
• Security : Rules defining security and access rights can be defined at
the time of set-up of server.
• Servers can play different roles for different clients.
Data communication and networking 28
29. Disadvantages
• Congestion in Network :Too many requests from the clients may
lead to congestion.
• Overload can lead to breaking-down of servers.
• Cost : It is very expensive to install and manage this type of
computing.
• You need professional IT people to maintain the servers and other
technical details of network.
Data communication and networking 29
30. Network Topologies:
• Topology refers to the physical structure of a network that
deals with how computers are interconnected by using
cabling system.
• Common LAN topologies are
➢ Bus
➢ Star
➢ Ring
➢ Tree
➢ Mesh
➢ Hybrid
Data communication and networking 30
31. 1. BUS Topology
• Computers are connected to a single continuous cable that is called
‘bus’.
• The cable to which the nodes connect is called a "backbone".
• A bus must be terminated on both sides to prevent signal bounce.
• computers are connected to the bus with the help of drop line and T-
connector(tap).
• A bus runs throughout the office to which all the computers are
connected.
• It is based on client server network architecture.
Data communication and networking 31
32. • It works well when you have a small network.
• It‘s simple and easy to setup and extend the network.
• If any computer in the network downs, then it does not affect other
computers.
• It requires less cable length and network devices than a other topology
(Inexpensive).
• It is more flexible because we can easily connect and disconnect any
number of computers in the bus.
Advantages:
Data communication and networking 32
33. Disadvantages of bus topology
• Data traffic is very high in bus so there may be chance of data
collision.
• It can be difficult to identify the problems if the whole network goes
down.
• Bus topology is not great for large networks.
• Terminators are required for both ends of the main cable.
• Additional devices slow the network down.
• If a main cable is damaged, the network fails or splits into two.
Data communication and networking 33
34. • Star topology is a network topology where each individual piece of a
network is attached to a central node (often called a hub or switch).
• Star topology is also known as a star network.
• It is based on client server architecture.
• The communication is done with the help of hub or switch in the
entire network.
• The hub controls traffic on the network.
2. Star topologies
Data communication and networking 34
35. Advantages of star topologies:
• It is simple, reliable and easy to set up and re-configuration.
• It is flexible to connect new computer and remove existing
computer in the network.
• It is very easy to find out fault because of the use of hub or
switch.
• If any computer in the network goes down, then other computers
can continue their functions.
Data communication and networking 35
36. Disadvantages of star topologies:
• It requires very large amount of cables.
• It is expensive because of cables and networking devices hub or
switches.
• If there is any problem in central devices hub or switches then the
entire network will be down.
• The data traffic is high in central device hub.
Data communication and networking 36
37. 3. RING TOPOLOGY
Data communication and networking 37
➢ Computers are interconnected to each other by making a closed circular structure that
means each computer is connected to other two adjacent computers in either side.
➢ It is based on peer to peer network architecture.
➢ Communication is done in single direction only.
➢ When one computer receives the message, then it compares the destination address of
the message and its own address, if it matches then it accepts the message otherwise
the message is retransmitted to the next computer in the network.
38. Advantages:
• It is simple and inexpensive.
• There is less chance of data collision because of unidirectional data
transmission.
• There is no server so each computer has equal access facilities to the
resource.
Disadvantages:
• It is not flexible topology-hard to add or remove new nodes.
• It is not suitable for large size network.
• It is very difficult to find out the errors in the network.
• Failure of one computer disturbs whole network.
Data communication and networking 38
39. 4. Tree Topology :
➢A tree topology is sometimes known as a star bus topology
because it combines features of both star and bus topologies
to create a tree-like structure.
➢In this topology, every branch contains Star Network, and its
main structure is designed in the form of a bus backbone
cable.
➢It is a very flexible computer networking method that allows
you to add Network Devices to this network by simply
expanding the Star Network at each branch of a tree.
Data communication and networking 39
40. Advantages of Tree Topology:
• The other nodes in a network are not affected if one of their nodes
gets damaged or does not work.
• Tree topology provides easy maintenance and easy fault
identification can be done
• Tree Topology is highly secure and reliable.
• It is used in WAN.
Advantages of Tree Topology:
• Requires a large number of cables compared to star and ring
topology.
• The Backbone appears as the failure point of the entire segment of
the network.
• The establishment cost increases as well.
Data communication and networking 40
41. TRANSMISSION MEDIA
•It is a communication channel that carries the
information from the sender to the receiver.
• Data is transmitted through the electromagnetic
signals.
•The main functionality of the transmission media is
to carry the information in the form of bits
through LAN.
•It is a physical path between transmitter and receiver
in data communication.
•In a copper-based network, the bits in the form of
electrical signals.
Data communication and networking 41
43. BOUNDED MEDIA
• Bounded media are physical cables that signals travel through on a
narrow path.
• Bounded media are made up of an external conductor (usually
copper) wrapped in a jacket made of nonconductive material.
• Most common bounded media :
1. Twisted Pair Cable
2. Coaxial Cable
3. Fiber Optics Cable
Data communication and networking 43
44. Twisted pair cable
• It is made from a copper wire twisted to each other and surrounded by
outer insulating jacket.
• One wire is used for receiving data and the other for transmitting data.
• It is used for both analog and digital transmission and is available in
different categories.
• It is available in two forms :
1.Unshielded Twisted Pair - telephone.
2.Shielded Twisted Pair - LAN
Data communication and networking 44
47. Advantages of twisted pair cable
•It is inexpensive and suitable for data transmission.
•It is flexible and easier to operate.
•It has higher data transfer rate up to Gbps(Gigabits per
second).
Disadvantages of twisted pair cable
•It cannot transfer data for long distance.
•It emits electromagnetic interference.
•It is not suitable for analog data such as video transmission.
Data communication and networking 47
48. Coaxial cable
• It consists of two conductor – inner copper conductor is
surrounded by an insulator over which a sleeve of copper
mesh is woven.
• This copper mesh is gain surrounded by PVC jacket .
• It spans longer distance at higher speed than UTP.
• It is available in two forms :
1. Thinnet Coaxial Cable – It is known as 10Base2 which
refers to it carrying 10mpbs signal maximum up to 200m.
It is popular in bus topology.
2. Thicknet Coaxial Cable – It is known as 100Base5 which
refers to it carrying 100mbps signal maximum up to 500m.
It is used in cable tv.
Data communication and networking 48
49. Advantages of coaxial cable
•It has higher bandwidth compared to unshielded
twisted pair cable.
•It is less effective by electromagnetic interference.
•It can support multiple channels in a medium.
Disadvantages of coaxial cable
•It is expensive.
•It is inflexible and not suitable for digital data
transmissions.
•It is easily tapped.
Data communication and networking 49
50. Optical fiber cable
•It uses the concept of reflection of light through a
core made up of glass or plastic.
•The core is surrounded by a less dense glass or
plastic covering called the cladding. It is used for
transmission of large volumes of data.
•The plastic jacket is used to protect the cladding.
•Fibers are typically grouped in
bundle ,protect by outer sheath.
•Superior in data handling and
security.
Data communication and networking 50
51. Advantages of optical fiber cable
• It is suitable for long data transmission with unlimited
bandwidth.
• They are much thinner and lighter
compared to others.
• Since data is transmitted in the form of light, it is
difficult to tap from middle.
• They are not affected by other
interference like electromagnetic interference.
Disadvantages
• They are not flexible than other cables, so
it is difficult to bend.
• They are expensive.
• It is difficult to connect two fiber optic cables.
Data communication and networking 51
53. • A low frequency electromagnetic wave is called radio wave.
• Frequency below 1000MHz are radiofrequency .
• It is suitable for radio signal around earth surface.
• Ex: AM and FM.
Advantages :
➢It is inexpensive and easy to produce
➢It covers geographical area.
Disadvantages :
➢The data transfer rate is slower than that in wired media.
➢The quality of data transmission is very poor.
Data communication and networking 53
54. Microwave
• High frequencies electromagnetic wave (1GHz to 300GHz) are
called microwaves.
• Microwaves travel in straight lines, and so the transmitter and
receiver stations should be accurately aligned to each other.
• Microwave propagation is line – of – sight propagation. So,
towers hoisting the stations should be placed so that the
curvature of the earth or any other obstacle does not interfere
with the communication.
• Since it is unidirectional, it allows multiple receivers in a row to
receive the signals without interference.
• Microwave is used in WAN , MAN ,satellite and telephone
communication .
Data communication and networking 54
55. Advantages :
➢It has a high bandwidth than radio wave.
➢The quality of data transmission is better than radio wave.
Disadvantages
➢ It cannot bend and pass obstacles so requires line of sight for
data transmission.
➢It does not cover very large space because of earth’s curvature.
Data communication and networking 55
57. Advantages:
➢ It covers the geographical area of earth .
➢ It has higher bandwidth than radio or microwave data
transmission.
Disadvantages :
➢It is very expensive for installation and for maintenance.
➢It has signals experience propagation delay.
Data communication and networking 57
58. Transmission impairments terminology
• Transmission impairment occurs when the received signal is
different from the transmitted signal.
• As we know, a signal can be transmitted as Analog signal or
it can be transmitted as a digital signal.
• In Analog signals due to transmission impairment the
resulting received signal gets different amplitude or the
shape.
• In the case of digitally transmitted signals at the receiver
side we get changes in bits (0's or 1's).
Data communication and networking 58
60. Noise –
The random or unwanted signal that mixes up with the original signal is
called noise.
There are several types of noise such as-
Induced noise comes from sources such as motors and appliances. These
devices act as sending antenna and transmission medium act as receiving
antenna.
Thermal noise is movement of electrons in wire which creates an extra
signal.
noise is when one wire affects the other wire.
Impulse noise is a signal with high energy that comes from lightning or
power lines
Data communication and networking 60
61. Attenuation –
➢It means loss of energy.
➢The strength of signal decreases with increasing distance which causes loss
of energy in overcoming resistance of medium. This is also known as
attenuated signal.
➢ Amplifiers are used to amplify the attenuated signal which gives the
original signal back and compensate for this loss.
Data communication and networking 61
62. Distortion –
➢ It means changes in the form or shape of the signal.
➢This is generally seen in composite signals made up with different
frequencies.
➢Each frequency component has its own propagation speed travelling
through a medium.
➢ And that's why it delay in arriving at the final destination Every
component arrive at different time which leads to distortion.
➢Therefore, they have different phases at receiver end from what
they had at senders end.
Data communication and networking 62
63. Crosstalk
➢It is any phenomenon by which a signal transmitted on
one circuit or channel of a transmission system creates an undesired
effect in another circuit or channel.
➢Crosstalk is usually caused by undesired capacitive, inductive,
or conductive coupling from one circuit or channel to another.
➢Crosstalk is a significant issue in structured cabling, audio
electronics, integrated circuit design, wireless communication and
other communications systems.
Data communication and networking 63
64. Jitter-
It refers to small intermittent delays during data transfers.
It can be caused by a number of factors including network
congestion, collisions, and signal interference.
Data communication and networking 64
65. Echos and Singing-
➢Echoes and singing both occurs as a result of transmitted signals being
coupled into a return path and fed back to the respective sources.
➢Coupling will be zero only when perfect impedance matching occurs.
Impedance matching between trunks and subscriber loop (two wire
to four wire at hybrid) is difficult due to various subscriber loop
lengths.
➢A signal reflected to the speaker's end of the circuit is called talker
echo and at the listener's end is called listeners echo. The talker echo
is more troublesome.
➢When the returning signal is repeatedly coupled back into the forward
path to produce oscillations, singing occurs.
➢Basically singing results if the loop gain at some frequency is greater
than unity.
➢An echo coming 0.5 msec after the speech is not much effect.
➢The echoes with a round trip delay of more than 45 msec cannot be
tolerated.
Data communication and networking 65
66. Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that
allows users to create network topologies and imitate modern computer networks.
The software allows users to simulate the configuration of Cisco routers and switches
using a simulated command line interface.
Packet Tracer makes use of a drag and drop user interface, allowing users to add and
remove simulated network devices as they see fit.
The software is mainly focused towards Certified Cisco Network Associate Academy
students as an educational tool for helping them learn fundamental CCNA concepts.
Network tool
Data communication and networking 66
67. Remote Login is a process in which user can login into remote
site i.e. computer and use services that are available on the
remote computer.
With the help of remote login a user is able to understand
result of transferring result of processing from the remote
computer to the local computer.
A remote login facility permits a user to work on a program on
a distant computer based on valid login credentials.
Data communication and networking 67
68. Network Connecting Devices
• Network connecting devices enables to interconnect the
computer in a network.
• Two or more devices are connected with each other for the
purpose of sharing data and resources form a network.
• Example :
➢ Modem
➢ NIC
➢ repeaters
➢ Hubs
➢ Bridges
➢ Routers
➢ Gateway
➢ Switches
Data communication and networking 68
69. • Modem stands - "Modulator / Demodulator.“
• It is an electronic devices which translates data from digital
to analog and vice-versa.
• Modulation – convert digital to analog data.
• Demodulation – convert analog to digital data.
• It is used to connect internet via a telephone line which uses
analog signal where as computer uses digital signal.
• Internal modem /external modem.
MODEM
Data communication and networking 69
70. • A network interface card (NIC) is a hardware component
without which a computer cannot be connected over a
network.
• It is a circuit board installed in a computer that provides a
dedicated network connection to the computer.
• It is also called network interface controller / network
adapter or LAN adapter.
• Each network interface card is uniquely identified by a
special number called MAC Address.
NIC
Data communication and networking 70
71. • Hub is a multiport network connecting devices.
• A hub is the most basic networking device that connects multiple
computers or other network devices together in a LAN.
• It accepts data ,amplifies and retransmit them to their destination.
• It is used in star topology.
• Unlike a network switch or router, a network hub has no routing
tables or intelligence on where to send information
and broadcasts all network data across each connection.
Data communication and networking 71
72. ▪A network switch is a small hardware device that centralizes
communications among multiple connected devices in one local area
network (LAN).
▪ It is generally used in star topology.
▪ Hub works on half -duplex whereas switch works on full-
duplex mode.
▪It has the capacity of inspecting the address of data packets
and directly switch the sources port to destination port.
▪Therefore its functionality is same as bridge so switch is also
known as multiport bridge .
Data communication and networking 72
73. • Repeater is a signal amplifier device used to amplify weak signal into
its original signals.
• The main purpose of repeater is to extent the length of cable in a LAN
beyond the physical limit.
• It does not separate noise and data so , if noise is present ,it amplifies
noise with data.
• It links two similar ,type of LAN having same architecture.
Data communication and networking 73
74. ➢ A bridge is a type of computer network device that provides
interconnection with other bridge networks that use the same
protocol.
➢ Bridges are similar to repeaters and hubs in that they broadcast
data to every node.
➢A bridges can send the data only to the concerned segment thus
preventing network traffic.
➢It is possible to connect two different network together like star
and ring topology network.
BRIDGE
Data communication and networking 74
75. ➢ Router is hardware and software devices.
➢ A router is a device that forwards data packets along networks.
➢ It is highly intelligent and protocol sensitive linking devices used
to connect two different LANs or WANs.
➢ Routers are located at gateways, the places where two or more
networks connect.
➢ A router keeps tracks of the address of all segments of a
network and can even determine the best path for sending
data . Data communication and networking 75
76. GATEWAY
• A Gateway is an interconnecting device which connects two
different network protocols together which may be LANs and
WANs or two different LANs.
• It is much more complex and powerful than router .
• It combines the features of router and bridges.
• But slower than bridge and router because it connect entire
protocol of one network to other.
Data communication and networking 76
77. BLUETOOTH
•Bluetooth is a short-range wireless
communication technology that allows devices
such as mobile phones, computers, and
peripherals to transmit data or voice wirelessly
over a short distance.
•The purpose of Bluetooth is to replace the cables
that normally connect devices, while still keeping
the communications between them secure.
Data communication and networking 77
78. Infrared Ray
•Infrared is a type of electromagnetic wave of large
wavelength and small frequencies than visible light.
•It frequency is low ,so it has small penetrating power.
•It is limited to small area or with in a room.
•Less expensive and does not require antenna.
•Application :
➢ Mobile
➢ Television remote
➢ Home appliances etc..
Data communication and networking 78
79. Wi-Fi
•Wi-Fi (wireless- fidelity) refers to the wireless
network which is standardized by IEEE.
• Wi-Fi is simply a trademark of the Wi-Fi alliance.
•Wi-Fi is a type of wireless networking protocol that
allows devices to communicate without cables or
cords.
•It is also called as WLAN (wireless Local area
network).
Data communication and networking 79
80. OSI Reference Model of Networking
➢ International standard organization (ISO) is multinational
body committed for the worldwide standardization of
products ,services and business.
➢ There are n numbers of users who use computer network
and are located over the world.
➢ So to ensure, national and worldwide data
communication, systems must be developed which are
compatible to communicate with each other .
➢ ISO has developed a standard model for Open System
Interconnection (OSI) model in 1970’s.
➢ ISO model is a layered based system that allow
communication between different types of network.
Data communication and networking 80
81. lower layer
middle layer
Upper layer
OSI Reference Model of Networking
• An OSI REFERENCE model of network is certified model that entirely
describe how information is transmitted from an application of one
computer to another application of other computer.
Data communication and networking 81
83. Some related Terms
1. Server
➢ It is the main computer in client-server or broadcasting
network architecture which manages and control all other
computers in the network.
➢ It is called as server because it provide services to other by
allowing the components to share expensive resources such as
storage device , printer etc.
a. File server
b. Print server
c. Modem Server
Data communication and networking 83
84. 2. Client –
A device that make use of the services provided by a server.
3. Workstation –
In client – server network architecture , the clients are called as
workstation.
4. Internet and Intranet –
Intranet refers to an internal network that utilizes the tools and
techniques of the internet to provide services limited to local
network users.
It is a private network group and owned by particular person of
organization.
Internet is a network of network. So it is the biggest network in
the world . It is public networking which can be accessed by
anybody who has access right.
Data communication and networking 84
85. 5. IP address–
• It is a numerical label assigned to each device connected to
a computer network that uses the Internet Protocol for
communication.
• An IP address serves two main functions: host or network
interface identification and location addressing.
• Internet Protocol version 4 (IPv4) defines an IP address as
a 32-bit number.
• However, because of the growth of the Internet and
the depletion of available IPv4 addresses, a new version of IP
(IPv6), using 128 bits for the IP address, was developed.
• Ex - 192.168.1.15/24 (IPv6) , 172.16.254.1 (IPv4) etc.
Data communication and networking 85
86. 6. MAC address ( media access control address) –
➢ A MAC is a unique identifier assigned to a network
interface controller (NIC) for use as a network address in
communications within a network segment.
➢ MAC addresses are recognizable as six groups of
two hexadecimal digits, separated by hyphens, colons, or
without a separator.
➢ MAC addresses are primarily assigned by device
manufacturers, and are therefore often referred to as
the burned-in address, or as an Ethernet hardware
address, hardware address, and physical address.
➢ Each address can be stored in hardware, such as the
card's read-only memory, or by a firmware mechanism.
➢ Ex - 12-34-56-78-9A-BC
Data communication and networking 86