SlideShare a Scribd company logo
DATACOMMUNICATION AND
NETWORKING
UNIT 1 – PART 1
02/02/2021 & 03/02/2021
STAFF NAME : Ms. P. ABIRAMI
DEPARTMENT OF COMPUTER SCIENCE
ETHIRAJ COLLEGE FOR WOMEN - CHENNAI
2
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
3
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
4
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
5
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
COMPONENTS
•
•
•
•
•
6
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
Characters of data communication
7
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
Data representation
8
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
Dataflow
9
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
10
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
Network criteria
11
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
Identifiers of network
12
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
Important concepts
13
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
ACCESS NETWORK
•
•
•
•
•
14
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
15
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
16
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
Protocols:
In computer networks, communication occurs between entities in
different systems. An entity is anything capable of sending or receiving
information.
A protocol is a set of rules that govern data communications. A protocol
defines what is communicated, how it is communicated, and when it is
communicated. The key elements of a protocol are syntax, semantics,
and timing.
17
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
Standards:
Standards provide guidelines to manufacturers, vendors, government agencies, and other service providers to
ensure the kind of interconnectivity necessary in today's marketplace and in international communications.
Data communication standards fall into two categories: de facto (meaning "by fact" or "by convention") and
de jure (meaning "by law" or "by regulation").
De facto:
Standards that have not been approved by an organized body but have been adopted as standards through
widespread use are de facto standards. De facto standards are often established originally by manufacturers
who seek to define the functionality of a new product or technology.
De jure:
Those standards that have been legislated by an officially recognized body are de jure standards.
18
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
Network models
19
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
20
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
21
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
The Open Systems Interconnection (OSI) model describes
seven layers that computer systems use to communicate over
a network.
It was the first standard model for network communications,
adopted by all major computer and telecommunication
companies in the early 1980s.
22
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
23
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
24
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
25
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
26
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
27
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
28
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
Physical layers
29
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
30
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
Physical layer converts the binary sequences into signals vice versa and transfer it through a
transmission media such as cables etc.
The signals generated by physical layer is based on the transmission media.
For example
1. Electrical signal is generated if the media is copper cable
2. Light signal if media is optical fibre
3. Radio signal in case of transmission media is air.
This generated signal is received by the physical layer at the receiver side and converts it
into bits.
31
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
Main functions of Physical Layer:
Digital Transmission:
One of the main functions of physical layer is to transfer data in form of signals. In this guide, we will
learn about digital transmission. A data can be either analog or digital. To transfer the data over a
transmission media such as wire, cable etc. physical layer must need to convert the data to its digital
signal.
Digital data to Digital signal conversion:
Physical layer converts digital data to digital signal. It uses two techniques to do this conversion: Line
coding and block coding.
Line coding:
A digital data is in form of binary sequence such as 1000111 (combination of 0s and 1s). Line coding uses
three schemes to represent these binary sequences in form of signals that can be transferred.
32
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
Data link layer
33
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
Network layer
34
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
Transport layer
35
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
Session layer
36
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021
References - images
• www.google.com
• https://www.lifewire.com/osi-model-reference-guide-816289
• https://sites.google.com/site/yutbms/osi-model
• https://www.imperva.com/learn/application-security/osi-model/
• https://www.geeksforgeeks.org/layers-of-osi-model/
• https://infosys.beckhoff.com/english.php?content=../content/1033/tf6310_tc3_tcpip/9007199338987915.html&id=
• https://www.lifewire.com/layers-of-the-osi-model-illustrated-818017
• https://beginnersbook.com/2019/04/osi-model-in-computer-network/
37
P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE)
Feb 2 & 3 , 2021

More Related Content

Similar to Data Communication and Networking Part 1 (Introduction)

IRJET - Hand Gesture Recognition and Voice Conversion System using IoT
IRJET -  	  Hand Gesture Recognition and Voice Conversion System using IoTIRJET -  	  Hand Gesture Recognition and Voice Conversion System using IoT
IRJET - Hand Gesture Recognition and Voice Conversion System using IoT
IRJET Journal
 
Akraino Ike Alisson 6G Architecture Themes Sensing Netw Core RAN Conv CF Cell...
Akraino Ike Alisson 6G Architecture Themes Sensing Netw Core RAN Conv CF Cell...Akraino Ike Alisson 6G Architecture Themes Sensing Netw Core RAN Conv CF Cell...
Akraino Ike Alisson 6G Architecture Themes Sensing Netw Core RAN Conv CF Cell...
Ike Alisson
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
darulquthni
 
An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...
Alexander Decker
 
Unit 1 part-1
Unit 1 part-1Unit 1 part-1
Unit 1 part-1
Vikram Nandini
 
Mode of Data Flow in the OSI Model
Mode of Data Flow in the OSI ModelMode of Data Flow in the OSI Model
Mode of Data Flow in the OSI Model
ijiert bestjournal
 
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
MohammadSwerki2
 
Hy3313681373
Hy3313681373Hy3313681373
Hy3313681373
IJERA Editor
 
Experimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer NetworksExperimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer Networks
ijtsrd
 
6th International Conference on Networks, Communications, Wireless and Mobile...
6th International Conference on Networks, Communications, Wireless and Mobile...6th International Conference on Networks, Communications, Wireless and Mobile...
6th International Conference on Networks, Communications, Wireless and Mobile...
ijassn
 
Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...
Maurice Dawson
 
CCNA PPT score increases as you pick a category, fill out a long description ...
CCNA PPT score increases as you pick a category, fill out a long description ...CCNA PPT score increases as you pick a category, fill out a long description ...
CCNA PPT score increases as you pick a category, fill out a long description ...
edieali1
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN) International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)
jackson130
 
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMLORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEM
IRJET Journal
 
The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...
IJAEMSJORNAL
 
Open System Interconnection Model Essay
Open System Interconnection Model EssayOpen System Interconnection Model Essay
Open System Interconnection Model Essay
Jessica Deakin
 
CS-324 Computer Networks.pdf
CS-324 Computer Networks.pdfCS-324 Computer Networks.pdf
CS-324 Computer Networks.pdf
priyadharshinic22
 

Similar to Data Communication and Networking Part 1 (Introduction) (20)

IRJET - Hand Gesture Recognition and Voice Conversion System using IoT
IRJET -  	  Hand Gesture Recognition and Voice Conversion System using IoTIRJET -  	  Hand Gesture Recognition and Voice Conversion System using IoT
IRJET - Hand Gesture Recognition and Voice Conversion System using IoT
 
Akraino Ike Alisson 6G Architecture Themes Sensing Netw Core RAN Conv CF Cell...
Akraino Ike Alisson 6G Architecture Themes Sensing Netw Core RAN Conv CF Cell...Akraino Ike Alisson 6G Architecture Themes Sensing Netw Core RAN Conv CF Cell...
Akraino Ike Alisson 6G Architecture Themes Sensing Netw Core RAN Conv CF Cell...
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...
 
Unit 1 part-1
Unit 1 part-1Unit 1 part-1
Unit 1 part-1
 
Mode of Data Flow in the OSI Model
Mode of Data Flow in the OSI ModelMode of Data Flow in the OSI Model
Mode of Data Flow in the OSI Model
 
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
liaison-2019-09-30-itu-t-tsag-ietf-iab-ls-on-new-ip-shaping-future-network-at...
 
Hy3313681373
Hy3313681373Hy3313681373
Hy3313681373
 
Experimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer NetworksExperimental Based Learning and Modeling of Computer Networks
Experimental Based Learning and Modeling of Computer Networks
 
6th International Conference on Networks, Communications, Wireless and Mobile...
6th International Conference on Networks, Communications, Wireless and Mobile...6th International Conference on Networks, Communications, Wireless and Mobile...
6th International Conference on Networks, Communications, Wireless and Mobile...
 
Osi model
Osi modelOsi model
Osi model
 
Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...Common protocol to support disparate communication types within industrial Et...
Common protocol to support disparate communication types within industrial Et...
 
CCNA PPT score increases as you pick a category, fill out a long description ...
CCNA PPT score increases as you pick a category, fill out a long description ...CCNA PPT score increases as you pick a category, fill out a long description ...
CCNA PPT score increases as you pick a category, fill out a long description ...
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN) International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)
 
LORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEMLORA BASED DATA ACQUISITION SYSTEM
LORA BASED DATA ACQUISITION SYSTEM
 
The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...The Impact on Security due to the Vulnerabilities Existing in the network a S...
The Impact on Security due to the Vulnerabilities Existing in the network a S...
 
Open System Interconnection Model Essay
Open System Interconnection Model EssayOpen System Interconnection Model Essay
Open System Interconnection Model Essay
 
CS-324 Computer Networks.pdf
CS-324 Computer Networks.pdfCS-324 Computer Networks.pdf
CS-324 Computer Networks.pdf
 

Recently uploaded

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Data Communication and Networking Part 1 (Introduction)

  • 1. DATACOMMUNICATION AND NETWORKING UNIT 1 – PART 1 02/02/2021 & 03/02/2021 STAFF NAME : Ms. P. ABIRAMI DEPARTMENT OF COMPUTER SCIENCE ETHIRAJ COLLEGE FOR WOMEN - CHENNAI
  • 2. 2 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 3. 3 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 4. 4 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 5. 5 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 6. COMPONENTS • • • • • 6 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 7. Characters of data communication 7 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 8. Data representation 8 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 9. Dataflow 9 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 10. 10 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 11. Network criteria 11 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 12. Identifiers of network 12 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 13. Important concepts 13 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 14. ACCESS NETWORK • • • • • 14 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 15. 15 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 16. 16 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 17. Protocols: In computer networks, communication occurs between entities in different systems. An entity is anything capable of sending or receiving information. A protocol is a set of rules that govern data communications. A protocol defines what is communicated, how it is communicated, and when it is communicated. The key elements of a protocol are syntax, semantics, and timing. 17 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 18. Standards: Standards provide guidelines to manufacturers, vendors, government agencies, and other service providers to ensure the kind of interconnectivity necessary in today's marketplace and in international communications. Data communication standards fall into two categories: de facto (meaning "by fact" or "by convention") and de jure (meaning "by law" or "by regulation"). De facto: Standards that have not been approved by an organized body but have been adopted as standards through widespread use are de facto standards. De facto standards are often established originally by manufacturers who seek to define the functionality of a new product or technology. De jure: Those standards that have been legislated by an officially recognized body are de jure standards. 18 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 19. Network models 19 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 20. 20 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 21. 21 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 22. The Open Systems Interconnection (OSI) model describes seven layers that computer systems use to communicate over a network. It was the first standard model for network communications, adopted by all major computer and telecommunication companies in the early 1980s. 22 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 23. 23 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 24. 24 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 25. 25 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 26. 26 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 27. 27 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 28. 28 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 29. Physical layers 29 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 30. 30 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 31. Physical layer converts the binary sequences into signals vice versa and transfer it through a transmission media such as cables etc. The signals generated by physical layer is based on the transmission media. For example 1. Electrical signal is generated if the media is copper cable 2. Light signal if media is optical fibre 3. Radio signal in case of transmission media is air. This generated signal is received by the physical layer at the receiver side and converts it into bits. 31 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 32. Main functions of Physical Layer: Digital Transmission: One of the main functions of physical layer is to transfer data in form of signals. In this guide, we will learn about digital transmission. A data can be either analog or digital. To transfer the data over a transmission media such as wire, cable etc. physical layer must need to convert the data to its digital signal. Digital data to Digital signal conversion: Physical layer converts digital data to digital signal. It uses two techniques to do this conversion: Line coding and block coding. Line coding: A digital data is in form of binary sequence such as 1000111 (combination of 0s and 1s). Line coding uses three schemes to represent these binary sequences in form of signals that can be transferred. 32 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 33. Data link layer 33 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 34. Network layer 34 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 35. Transport layer 35 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 36. Session layer 36 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021
  • 37. References - images • www.google.com • https://www.lifewire.com/osi-model-reference-guide-816289 • https://sites.google.com/site/yutbms/osi-model • https://www.imperva.com/learn/application-security/osi-model/ • https://www.geeksforgeeks.org/layers-of-osi-model/ • https://infosys.beckhoff.com/english.php?content=../content/1033/tf6310_tc3_tcpip/9007199338987915.html&id= • https://www.lifewire.com/layers-of-the-osi-model-illustrated-818017 • https://beginnersbook.com/2019/04/osi-model-in-computer-network/ 37 P ABIRAMI (ASST PROF - DEPT OF COMPUTER SCIENCE) Feb 2 & 3 , 2021