SlideShare a Scribd company logo
Information and CommunicationInformation and Communication
TechnologyTechnology
Chapter 7
Data Communication and Computer
Networks
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 1
Data CommunicationData Communication
 collection of hardware & software
 facilitates intersystem exchange of information between different
devices via wired or wireless transmission medium
 transfer of data, the method of transfer and the preservation of
the data during the transfer process
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 2
Data Communication ComponentsData Communication Components
Five basic components
Message:
◦ information to be communicated
Sender:
◦ device sends the message
Receiver:
◦ device receives the message.
Medium:
◦ physical path communicates the message from sender to receiver.
Protocols:
◦ set of rules coordinates the exchange of information.
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 3
Data Transmission ModeData Transmission Mode
◦ refers to the direction of signal flow between two linked devices
 Simplex:
◦ Unidirectional
◦ Only one of the communicating devices transmits information, the other can
only receive it.
 Half Duplex:
◦ each communicating device can receive and transmit information, but not at the
same time.
 Full- Duplex:
◦ both communicating devices to transmit and receive data simultaneously
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 4
Data Transmission Mode con…Data Transmission Mode con…
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 5
Data Communication MeasurementData Communication Measurement
 measurement of quantity of data passed down a communicating
link in a given time in terms of bandwidth
Bandwidth
 refers to the maximum volume of information transferred over any
communication medium
 communication data transfer rate is measured in a unit called baud
(bits per second)
 level of bandwidth falls into three categories:
◦ Narrowband: (bandwidth capacity lies between 64Kbps and 1.544 Mbps.)
◦ Wideband: (etween1.544Mbps (T1 Lines) and 45 Mbps ( T3 Lines))
◦ Broadband: (equal to 45Mbps or a T3 line)
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 6
Common Network DevicesCommon Network Devices
The Network Interface Card (NIC)
 expansion card
 installed in to connect (interface) computer to the network.
 provides the physical, electrical, and electronic connections to the network media
 built in to the motherboard of the computer
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 7
Common Network Devices Con…Common Network Devices Con…
The Repeater
 amplifies (or repeats) network signals to extend the maximum reach of a network
 receive network signals on one port, amplify and repeat them out on the other
port.
 interconnect different media types
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 8
Common Network Devices Con…Common Network Devices Con…
The Hub
 central device in a star topology.
 receive a signal on one port and repeat it to all other ports (multiport repeaters)
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 9
Common Network Devices Con…Common Network Devices Con…
The Bridge
 logically separates a single network into two segments
 keep traffic meant for stations on one segment on that side of the bridge and not let
that traffic pass to the other side.
 improve network performance because traffic is not propagated unnecessarily on all
network segments
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 10
Common Network DevicesCommon Network Devices
Con…Con…
The Ethernet Switch
 high-performance multi-interface bridges
 subdivide larger networks
 prevent the unnecessary flow of network traffic from one segment to another or in
the case of cross-segment traffic
 direct the frames only across the segments containing the source and destination
hosts
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 11
Common Network Devices Con…Common Network Devices Con…
The Router
 connects multiple, dissimilar, network segments into an internetwork.
 special-purpose computer than a simple electronic device
 reads source and destination address of a packet and forwards it based on the
information it gathers about the network.
 make intelligent decisions about the best way to forward packets.
 
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 12
Computer NetworkComputer Network
 collection of two or more computers connected together to share
information and resources
 interconnected by telephone lines, coaxial cables, satellite links,
radio and/or some other communication technique.
 small network or larger internet, a worldwide network
three primary categories
◦ based on the size of the network, the distance it covers, and the type of link
used in interconnection
1. Local Area Network (LAN).
2. Metropolitan Area Network (MAN)
3. Wide Area Network (WAN)
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 13
Local Area Network (LAN)Local Area Network (LAN)
 spans only a small geographical area, such as an office, building or campus.
 uses a variety of telecommunication media, ordinary telephone wiring, coaxial
cable etc.
 To communicate, each PC has a circuit board called a network interface card
(NIC)
 uses file server or network server having a larger hard disk capacity
 contains network Operating System Program that controls communication,
sharing of network resources
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 14
Metropolitan Area NetworkMetropolitan Area Network
(MAN)(MAN)
 large computer networks usually spanning a campus or a city.
 use wireless infrastructure or optical fiber connections to link their sites.
 support both data & voice, and related to the local cable television network.
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 15
Wide Area Network (WAN):Wide Area Network (WAN):
 spans a relatively large geographical area, consists of two or more LANs
 are often connected through public networks, such as the telephone system,
Internet.
 connected through leased lines or satellites
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 16
WANS differ from LANSWANS differ from LANS
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 17
LAN WAN
smaller distance greater distance
Faster speed slower speed
permanently connected permanently connected
private network transports public or private network transports
half-duplex communications full- or half-duplex communications
Peer-to-Peer NetworksPeer-to-Peer Networks
 all computers are equal (peers) .
 a client that requests resources and a server that provides resources upon request
They are characterized by the following:
 Security is not centralized; each computer is responsible to check access rights for its
resources
 Network is not scalable; good only for a few number of computers (≤10)
 Each user is responsible for local backup
 No specialized operating system is required; Windows NT 4.0 Workstation,
Windows 95/98, Windows 2000 Pro, etc. are sufficient
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 18
Client/Server NetworksClient/Server Networks
 there exist dedicated servers provide resources/services when requested.
They are characterized by the following:
 Security is centralized and tighter. All user accounts are stored in the same
database on the server.
 The network is highly scalable; tens of thousands of workstations in the network.
 Backup is centralized, done by backup operator
 Specialized networking operating systems are required, such as Windows NT 4.0
server, Windows 2000 server, Novell NetWare, etc.
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 19
Network TopologiesNetwork Topologies
 the physical configuration of a network
 determines how the network's computers are connected
 bus, star mesh and ring topologies
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 20
Network Topologies con…Network Topologies con…
The Bus Topology
 all computers are connected to a single cable
 The cable is terminated at its ends to avoid signal bouncing
 When a computer wants to send data to another computer, it places the data and
address of the recipient computer on the cable
 Only the computer whose address is included with the data accepts the data
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 21
Network Topologies con…Network Topologies con…
Advantages of a Bus Topology
 Easy to connect a computer or peripheral to a linear bus
 Requires less cable length than a star topology
Disadvantages of a Bus Topology
 Entire network shuts down if there is a break in the main cable
 Terminators are required at both ends of the backbone cable
 Difficult to identify the problem if the entire network shuts down
 Network can slow down in heavy traffic
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 22
Network Topologies con…Network Topologies con…
The Star Topology
 Each computer is connected to a central device (hub) by a separate cable.
 When a computer wants to send data to another computer, it sends the data and
address of the recipient computer to the hub
 The hub sends it every computer connected to it
 Only the computer whose address is included with the data accepts the data.
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 23
Network Topologies con…Network Topologies con…
Advantages of a Star Topology
 Easy to install and wire
 No disruptions to the network then connecting or removing devices
 Easy to detect faults and to remove parts
 Failure of one computer does not affect the rest of the network
Disadvantages of a Star Topology
 Requires more cable length than a linear topology
 If the hub or concentrator fails, nodes attached are disabled
 More expensive than linear bus topologies because of the cost of the concentrators
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 24
Network Topologies con…Network Topologies con…
The Ring Topology
 Each computer is connected directly to two other computers in the network.
 Data moves down a one-way path from one computer and if the next computer is
the recipient it accepts the data; otherwise it amplifies it and sends it to the next
computer down in the path.
 Any break disrupts the entire network
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 25
Network Topologies con…Network Topologies con…
Advantages of a Ring Topology
 System provides equal access for all computers.
 Performance is even despite many users
Disadvantages of a Ring Topology
 Failure of one computer can impact the rest of the network
 Problems are hard to isolate.
 Network reconfiguration disrupts operation
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 26
Network Topologies con…Network Topologies con…
The Mesh Topology
 Each computer is directly connected to every other computer.
 complex as wiring and connections increase rapidly with the increase of computers
to connect.
 For n computers, n(n-1)/2 cables are required
 Today rarely used only in a WAN environment because the mesh topology is fault
tolerant
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 27
Network Topologies con…Network Topologies con…
Advantages of a Mesh Topology
 System provides increased redundancy and reliability as well as ease of
troubleshooting
Disadvantages of a Mesh Topology
 System is complex
 expensive to install because it uses a lot of cabling
Considerations When Choosing a Topology:
 Money
 Length of cable needed
 Future growth
 Cable type
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 28
Media AccessMedia Access
Carrier Sense/Multiple Access with Collision Detection (CSMA/CD)
 used in Ethernet networks
 When a protocol that uses CSMA/CD has data to transmit,
1. it first senses if a signal is already on the wire (a carrier), indicating that
someone is transmitting currently
2. If no one else is transmitting, it attempts a transmission and then listens to hear
if someone else tried to transmit at the same time
3. If someone else transmits at the exact same time, a condition known as a
collision occurs
4. Both senders "back off" and don't transmit until some random period of time
has passed
5. They then both retry
 
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 29
Media Access con…Media Access con…
Carrier Sense/Multiple Access with Collision Detection
(CSMA/CD)
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 30
Media Access con…Media Access con…
Token Passing : uses a special packet called a token.
1. The first computer turned on creates the token
2. It then passes the token on to the next computer
3. The token passes around the network until a computer that has data to send takes the
token off the network, modifies it, and puts it back on the network along with the data
it has to send
4. Each station between the sender and the receiver along the network reads the
destination address in the token
5. If the destination address doesn't match its own, the station simply sends the package
on its way
6. When the destination station recognizes its address in the destination address of the
token, the NIC copies the data into the station's memory and modifies the token,
indicating it has received the data.
7. The token continues around the network until the original sender receives the token
back again.
8. If the original sender has more data to send, the process repeats itself. If not, the
sender modifies the token to indicate that the token is "free" for anyone else to use
 With this method, there are no collisions (as in CSMA/CD networks) because
everyone has to have "permission" to transmit (via the token).
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 31
Media Access con…Media Access con…
Token Passing
9/12/2015
Dr. J. VijiPriya, Assistant Professor,
Hawassa University, Ethiopia 32

More Related Content

What's hot

CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slidesMahesh Rajawat
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
hoanv
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
ijujournal
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
Manish8976
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentationAditya Pandey
 
4 Weeks Summer Training In BSNL, Agartala
4 Weeks Summer Training In BSNL, Agartala4 Weeks Summer Training In BSNL, Agartala
4 Weeks Summer Training In BSNL, Agartala
Arijit Roy
 
IPv4
IPv4IPv4
Types of networking
Types of networkingTypes of networking
Types of networking
Natasha Maqbool
 
Transmission media (data communication)
Transmission media (data communication)Transmission media (data communication)
Transmission media (data communication)
Pritom Chaki
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
Bibhu Prasad
 
Topic Packet switching
Topic Packet switchingTopic Packet switching
Topic Packet switching
Dr Rajiv Srivastava
 
Network protocol
Network protocolNetwork protocol
Network protocol
SWAMY NAYAK
 
Data communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesData communication and computer networks | Network Topologies
Data communication and computer networks | Network Topologies
MSA Technosoft
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniquestameemyousaf
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
Vishal kakade
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
Aman Jaiswal
 

What's hot (20)

Transmission modes
Transmission modesTransmission modes
Transmission modes
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentation
 
4 Weeks Summer Training In BSNL, Agartala
4 Weeks Summer Training In BSNL, Agartala4 Weeks Summer Training In BSNL, Agartala
4 Weeks Summer Training In BSNL, Agartala
 
Modem
ModemModem
Modem
 
IPv4
IPv4IPv4
IPv4
 
Types of networking
Types of networkingTypes of networking
Types of networking
 
Transmission media (data communication)
Transmission media (data communication)Transmission media (data communication)
Transmission media (data communication)
 
Multiple access techniques
Multiple access techniquesMultiple access techniques
Multiple access techniques
 
Topic Packet switching
Topic Packet switchingTopic Packet switching
Topic Packet switching
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Data communication and computer networks | Network Topologies
Data communication and computer networks | Network TopologiesData communication and computer networks | Network Topologies
Data communication and computer networks | Network Topologies
 
Packet Switching
Packet SwitchingPacket Switching
Packet Switching
 
Switching Techniques
Switching TechniquesSwitching Techniques
Switching Techniques
 
Unit 2 data link control
Unit 2 data link controlUnit 2 data link control
Unit 2 data link control
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 

Viewers also liked

Information and Communication Technology Chapter 1,2 ,3 - Dr.J.VijiPriya
Information and Communication Technology Chapter 1,2 ,3 - Dr.J.VijiPriyaInformation and Communication Technology Chapter 1,2 ,3 - Dr.J.VijiPriya
Information and Communication Technology Chapter 1,2 ,3 - Dr.J.VijiPriya
VijiPriya Jeyamani
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2
Zafar Ayub
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communicationHarpreet Dhaliwal
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1
Zafar Ayub
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
Shafaan Khaliq Bhatti
 
Publish versin host monitoring and outbound load balancing(0915113656)
Publish versin host monitoring and outbound load balancing(0915113656)Publish versin host monitoring and outbound load balancing(0915113656)
Publish versin host monitoring and outbound load balancing(0915113656)gmolina200
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technologyhome
 
data communication
data communicationdata communication
data communication
Abirami Thangavel
 
Computer networks protocols
Computer networks protocolsComputer networks protocols
Computer networks protocols
Mustafa Qamar-ud-Din
 
SC161-Lecture4-1
SC161-Lecture4-1SC161-Lecture4-1
SC161-Lecture4-1
Thiti Theerathean
 
Do you know about cat 8 cable
Do you know about cat 8 cableDo you know about cat 8 cable
Do you know about cat 8 cable
Angelina Li
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
Bushra M
 
10 Tips For Networking Like a Sir
10 Tips For Networking Like a Sir10 Tips For Networking Like a Sir
10 Tips For Networking Like a Sir
Slido
 
Ch 1
Ch 1Ch 1
Comparison between aodv and olsr protocol
Comparison between aodv and olsr protocolComparison between aodv and olsr protocol
Comparison between aodv and olsr protocolMehedi
 
Management Information System 6
Management Information System 6Management Information System 6
Management Information System 6
Warawut
 

Viewers also liked (20)

Information and Communication Technology Chapter 1,2 ,3 - Dr.J.VijiPriya
Information and Communication Technology Chapter 1,2 ,3 - Dr.J.VijiPriyaInformation and Communication Technology Chapter 1,2 ,3 - Dr.J.VijiPriya
Information and Communication Technology Chapter 1,2 ,3 - Dr.J.VijiPriya
 
Data communication and network Chapter - 2
Data communication and network Chapter - 2Data communication and network Chapter - 2
Data communication and network Chapter - 2
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communication
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1
 
Chapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and NetworksChapter 1: Introduction to Data Communication and Networks
Chapter 1: Introduction to Data Communication and Networks
 
Publish versin host monitoring and outbound load balancing(0915113656)
Publish versin host monitoring and outbound load balancing(0915113656)Publish versin host monitoring and outbound load balancing(0915113656)
Publish versin host monitoring and outbound load balancing(0915113656)
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
 
data communication
data communicationdata communication
data communication
 
Computer networks protocols
Computer networks protocolsComputer networks protocols
Computer networks protocols
 
SC161-Lecture4-1
SC161-Lecture4-1SC161-Lecture4-1
SC161-Lecture4-1
 
Do you know about cat 8 cable
Do you know about cat 8 cableDo you know about cat 8 cable
Do you know about cat 8 cable
 
Security
SecuritySecurity
Security
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
10 Tips For Networking Like a Sir
10 Tips For Networking Like a Sir10 Tips For Networking Like a Sir
10 Tips For Networking Like a Sir
 
Ch 1
Ch 1Ch 1
Ch 1
 
Comparison between aodv and olsr protocol
Comparison between aodv and olsr protocolComparison between aodv and olsr protocol
Comparison between aodv and olsr protocol
 
Management Information System 6
Management Information System 6Management Information System 6
Management Information System 6
 
Traffic analysis
Traffic analysisTraffic analysis
Traffic analysis
 
Psdn and ccitt x series
Psdn and ccitt x seriesPsdn and ccitt x series
Psdn and ccitt x series
 
Ch10
Ch10Ch10
Ch10
 

Similar to Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Communication and Computer Networks

Introduction to Networking And its Types
Introduction to Networking And its TypesIntroduction to Networking And its Types
Introduction to Networking And its Types
HamzaHaji8
 
Csc341 – Lecture 1 network management
Csc341 – Lecture 1 network managementCsc341 – Lecture 1 network management
Csc341 – Lecture 1 network management
Kabul Education University
 
Computer Networks Module I
Computer Networks Module IComputer Networks Module I
Computer Networks Module I
Ajit Nayak
 
Network and Types of Networks
Network and Types of NetworksNetwork and Types of Networks
Network and Types of Networks
Uttar Tamang ✔
 
Dr. J. VijiPriya - Information and Communication Technology Chapter 8 The Int...
Dr. J. VijiPriya - Information and Communication Technology Chapter 8 The Int...Dr. J. VijiPriya - Information and Communication Technology Chapter 8 The Int...
Dr. J. VijiPriya - Information and Communication Technology Chapter 8 The Int...
VijiPriya Jeyamani
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
Fizaril Amzari Omar
 
Assignment1
Assignment1Assignment1
Assignment1
NishatTasnimAli
 
Communication information technology
Communication information technologyCommunication information technology
Communication information technology
Chittagong University
 
Computer Networks -Unit-I
Computer Networks -Unit-IComputer Networks -Unit-I
Computer Networks -Unit-I
vmdharxfr
 
Chapter 1 Introduction Data Communication and Networking
Chapter 1 Introduction Data Communication and NetworkingChapter 1 Introduction Data Communication and Networking
Chapter 1 Introduction Data Communication and Networking
TakiTajwaruzzamanKha
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
Dr. Mazin Mohamed alkathiri
 
Computer Network Theory Part1
 Computer Network Theory Part1 Computer Network Theory Part1
Computer Network Theory Part1
NishatTasnimAli
 
Dcn concepts
Dcn conceptsDcn concepts
Dcn concepts
Prof. Dr. K. Adisesha
 
V2X, V2I, and the Cellular Infrastructure
V2X, V2I, and the Cellular InfrastructureV2X, V2I, and the Cellular Infrastructure
V2X, V2I, and the Cellular Infrastructure
Center for Transportation Research - UT Austin
 
Module 1 Introduction to Network
Module 1 Introduction to NetworkModule 1 Introduction to Network
Module 1 Introduction to Network
Ira Raji
 
Module 1 introduction 20 to 20 network
Module  1   introduction 20 to 20 networkModule  1   introduction 20 to 20 network
Module 1 introduction 20 to 20 network
Nick Racers
 
1 04 jan-2017-rm001_introduction to computer communication_vts_10888
1 04 jan-2017-rm001_introduction to computer communication_vts_108881 04 jan-2017-rm001_introduction to computer communication_vts_10888
1 04 jan-2017-rm001_introduction to computer communication_vts_10888
Venkat Motamarri
 
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
PST SC015 Chapter 3 Internet Technology (I)  2017/2018PST SC015 Chapter 3 Internet Technology (I)  2017/2018
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
Fizaril Amzari Omar
 
Networking online assignment
Networking online assignmentNetworking online assignment
Networking online assignment
Kavitha Dhanesh
 
Unit 1.pdf
Unit 1.pdfUnit 1.pdf
Unit 1.pdf
lakshmisangeetha1
 

Similar to Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Communication and Computer Networks (20)

Introduction to Networking And its Types
Introduction to Networking And its TypesIntroduction to Networking And its Types
Introduction to Networking And its Types
 
Csc341 – Lecture 1 network management
Csc341 – Lecture 1 network managementCsc341 – Lecture 1 network management
Csc341 – Lecture 1 network management
 
Computer Networks Module I
Computer Networks Module IComputer Networks Module I
Computer Networks Module I
 
Network and Types of Networks
Network and Types of NetworksNetwork and Types of Networks
Network and Types of Networks
 
Dr. J. VijiPriya - Information and Communication Technology Chapter 8 The Int...
Dr. J. VijiPriya - Information and Communication Technology Chapter 8 The Int...Dr. J. VijiPriya - Information and Communication Technology Chapter 8 The Int...
Dr. J. VijiPriya - Information and Communication Technology Chapter 8 The Int...
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
 
Assignment1
Assignment1Assignment1
Assignment1
 
Communication information technology
Communication information technologyCommunication information technology
Communication information technology
 
Computer Networks -Unit-I
Computer Networks -Unit-IComputer Networks -Unit-I
Computer Networks -Unit-I
 
Chapter 1 Introduction Data Communication and Networking
Chapter 1 Introduction Data Communication and NetworkingChapter 1 Introduction Data Communication and Networking
Chapter 1 Introduction Data Communication and Networking
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Computer Network Theory Part1
 Computer Network Theory Part1 Computer Network Theory Part1
Computer Network Theory Part1
 
Dcn concepts
Dcn conceptsDcn concepts
Dcn concepts
 
V2X, V2I, and the Cellular Infrastructure
V2X, V2I, and the Cellular InfrastructureV2X, V2I, and the Cellular Infrastructure
V2X, V2I, and the Cellular Infrastructure
 
Module 1 Introduction to Network
Module 1 Introduction to NetworkModule 1 Introduction to Network
Module 1 Introduction to Network
 
Module 1 introduction 20 to 20 network
Module  1   introduction 20 to 20 networkModule  1   introduction 20 to 20 network
Module 1 introduction 20 to 20 network
 
1 04 jan-2017-rm001_introduction to computer communication_vts_10888
1 04 jan-2017-rm001_introduction to computer communication_vts_108881 04 jan-2017-rm001_introduction to computer communication_vts_10888
1 04 jan-2017-rm001_introduction to computer communication_vts_10888
 
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
PST SC015 Chapter 3 Internet Technology (I)  2017/2018PST SC015 Chapter 3 Internet Technology (I)  2017/2018
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
 
Networking online assignment
Networking online assignmentNetworking online assignment
Networking online assignment
 
Unit 1.pdf
Unit 1.pdfUnit 1.pdf
Unit 1.pdf
 

More from VijiPriya Jeyamani

Dr. J. VijiPriya Information and Communication Technology Chapter 5,6
Dr. J. VijiPriya  Information and Communication Technology Chapter 5,6Dr. J. VijiPriya  Information and Communication Technology Chapter 5,6
Dr. J. VijiPriya Information and Communication Technology Chapter 5,6
VijiPriya Jeyamani
 
Human Computer Interaction Chapter 2 Interaction and Interaction Design Basi...
Human Computer Interaction Chapter 2  Interaction and Interaction Design Basi...Human Computer Interaction Chapter 2  Interaction and Interaction Design Basi...
Human Computer Interaction Chapter 2 Interaction and Interaction Design Basi...
VijiPriya Jeyamani
 
Human Computer Interaction Chapter 3 HCI in the Software Process and Design ...
Human Computer Interaction Chapter 3 HCI in the Software Process and  Design ...Human Computer Interaction Chapter 3 HCI in the Software Process and  Design ...
Human Computer Interaction Chapter 3 HCI in the Software Process and Design ...
VijiPriya Jeyamani
 
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
VijiPriya Jeyamani
 
Human Computer Interaction Chapter 5 Universal Design and User Support - Dr....
Human Computer Interaction Chapter 5 Universal Design and User Support -  Dr....Human Computer Interaction Chapter 5 Universal Design and User Support -  Dr....
Human Computer Interaction Chapter 5 Universal Design and User Support - Dr....
VijiPriya Jeyamani
 
IPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriya
IPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriyaIPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriya
IPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriya
VijiPriya Jeyamani
 
IPT Chapter 3 Data Mapping and Exchange - Dr. J. VijiPriya
IPT Chapter 3 Data Mapping and Exchange - Dr. J. VijiPriyaIPT Chapter 3 Data Mapping and Exchange - Dr. J. VijiPriya
IPT Chapter 3 Data Mapping and Exchange - Dr. J. VijiPriya
VijiPriya Jeyamani
 
Expert System Lecture Notes Chapter 1,2,3,4,5 - Dr.J.VijiPriya
 Expert System Lecture Notes Chapter 1,2,3,4,5 - Dr.J.VijiPriya Expert System Lecture Notes Chapter 1,2,3,4,5 - Dr.J.VijiPriya
Expert System Lecture Notes Chapter 1,2,3,4,5 - Dr.J.VijiPriya
VijiPriya Jeyamani
 
CLISP Lab Manual - Dr.J.VijiPriya
CLISP Lab Manual - Dr.J.VijiPriyaCLISP Lab Manual - Dr.J.VijiPriya
CLISP Lab Manual - Dr.J.VijiPriya
VijiPriya Jeyamani
 
Integrative Programming and Technology Chapter 4- Dr. J. VijiPriya
Integrative Programming and Technology Chapter 4- Dr. J. VijiPriyaIntegrative Programming and Technology Chapter 4- Dr. J. VijiPriya
Integrative Programming and Technology Chapter 4- Dr. J. VijiPriya
VijiPriya Jeyamani
 
Integrative Programming Technology Chapter 5 - Dr. J. VijiPriya
Integrative Programming Technology Chapter 5 - Dr. J. VijiPriyaIntegrative Programming Technology Chapter 5 - Dr. J. VijiPriya
Integrative Programming Technology Chapter 5 - Dr. J. VijiPriya
VijiPriya Jeyamani
 

More from VijiPriya Jeyamani (11)

Dr. J. VijiPriya Information and Communication Technology Chapter 5,6
Dr. J. VijiPriya  Information and Communication Technology Chapter 5,6Dr. J. VijiPriya  Information and Communication Technology Chapter 5,6
Dr. J. VijiPriya Information and Communication Technology Chapter 5,6
 
Human Computer Interaction Chapter 2 Interaction and Interaction Design Basi...
Human Computer Interaction Chapter 2  Interaction and Interaction Design Basi...Human Computer Interaction Chapter 2  Interaction and Interaction Design Basi...
Human Computer Interaction Chapter 2 Interaction and Interaction Design Basi...
 
Human Computer Interaction Chapter 3 HCI in the Software Process and Design ...
Human Computer Interaction Chapter 3 HCI in the Software Process and  Design ...Human Computer Interaction Chapter 3 HCI in the Software Process and  Design ...
Human Computer Interaction Chapter 3 HCI in the Software Process and Design ...
 
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
Human Computer Interaction Chapter 4 Implementation Support and Evaluation Te...
 
Human Computer Interaction Chapter 5 Universal Design and User Support - Dr....
Human Computer Interaction Chapter 5 Universal Design and User Support -  Dr....Human Computer Interaction Chapter 5 Universal Design and User Support -  Dr....
Human Computer Interaction Chapter 5 Universal Design and User Support - Dr....
 
IPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriya
IPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriyaIPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriya
IPT Chapter 2 Web Services and Middleware - Dr. J. VijiPriya
 
IPT Chapter 3 Data Mapping and Exchange - Dr. J. VijiPriya
IPT Chapter 3 Data Mapping and Exchange - Dr. J. VijiPriyaIPT Chapter 3 Data Mapping and Exchange - Dr. J. VijiPriya
IPT Chapter 3 Data Mapping and Exchange - Dr. J. VijiPriya
 
Expert System Lecture Notes Chapter 1,2,3,4,5 - Dr.J.VijiPriya
 Expert System Lecture Notes Chapter 1,2,3,4,5 - Dr.J.VijiPriya Expert System Lecture Notes Chapter 1,2,3,4,5 - Dr.J.VijiPriya
Expert System Lecture Notes Chapter 1,2,3,4,5 - Dr.J.VijiPriya
 
CLISP Lab Manual - Dr.J.VijiPriya
CLISP Lab Manual - Dr.J.VijiPriyaCLISP Lab Manual - Dr.J.VijiPriya
CLISP Lab Manual - Dr.J.VijiPriya
 
Integrative Programming and Technology Chapter 4- Dr. J. VijiPriya
Integrative Programming and Technology Chapter 4- Dr. J. VijiPriyaIntegrative Programming and Technology Chapter 4- Dr. J. VijiPriya
Integrative Programming and Technology Chapter 4- Dr. J. VijiPriya
 
Integrative Programming Technology Chapter 5 - Dr. J. VijiPriya
Integrative Programming Technology Chapter 5 - Dr. J. VijiPriyaIntegrative Programming Technology Chapter 5 - Dr. J. VijiPriya
Integrative Programming Technology Chapter 5 - Dr. J. VijiPriya
 

Recently uploaded

Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 

Recently uploaded (20)

Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 

Dr. J. VijiPriya - Information Communication and Technology Chapter 7 Data Communication and Computer Networks

  • 1. Information and CommunicationInformation and Communication TechnologyTechnology Chapter 7 Data Communication and Computer Networks 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 1
  • 2. Data CommunicationData Communication  collection of hardware & software  facilitates intersystem exchange of information between different devices via wired or wireless transmission medium  transfer of data, the method of transfer and the preservation of the data during the transfer process 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 2
  • 3. Data Communication ComponentsData Communication Components Five basic components Message: ◦ information to be communicated Sender: ◦ device sends the message Receiver: ◦ device receives the message. Medium: ◦ physical path communicates the message from sender to receiver. Protocols: ◦ set of rules coordinates the exchange of information. 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 3
  • 4. Data Transmission ModeData Transmission Mode ◦ refers to the direction of signal flow between two linked devices  Simplex: ◦ Unidirectional ◦ Only one of the communicating devices transmits information, the other can only receive it.  Half Duplex: ◦ each communicating device can receive and transmit information, but not at the same time.  Full- Duplex: ◦ both communicating devices to transmit and receive data simultaneously 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 4
  • 5. Data Transmission Mode con…Data Transmission Mode con… 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 5
  • 6. Data Communication MeasurementData Communication Measurement  measurement of quantity of data passed down a communicating link in a given time in terms of bandwidth Bandwidth  refers to the maximum volume of information transferred over any communication medium  communication data transfer rate is measured in a unit called baud (bits per second)  level of bandwidth falls into three categories: ◦ Narrowband: (bandwidth capacity lies between 64Kbps and 1.544 Mbps.) ◦ Wideband: (etween1.544Mbps (T1 Lines) and 45 Mbps ( T3 Lines)) ◦ Broadband: (equal to 45Mbps or a T3 line) 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 6
  • 7. Common Network DevicesCommon Network Devices The Network Interface Card (NIC)  expansion card  installed in to connect (interface) computer to the network.  provides the physical, electrical, and electronic connections to the network media  built in to the motherboard of the computer 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 7
  • 8. Common Network Devices Con…Common Network Devices Con… The Repeater  amplifies (or repeats) network signals to extend the maximum reach of a network  receive network signals on one port, amplify and repeat them out on the other port.  interconnect different media types 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 8
  • 9. Common Network Devices Con…Common Network Devices Con… The Hub  central device in a star topology.  receive a signal on one port and repeat it to all other ports (multiport repeaters) 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 9
  • 10. Common Network Devices Con…Common Network Devices Con… The Bridge  logically separates a single network into two segments  keep traffic meant for stations on one segment on that side of the bridge and not let that traffic pass to the other side.  improve network performance because traffic is not propagated unnecessarily on all network segments 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 10
  • 11. Common Network DevicesCommon Network Devices Con…Con… The Ethernet Switch  high-performance multi-interface bridges  subdivide larger networks  prevent the unnecessary flow of network traffic from one segment to another or in the case of cross-segment traffic  direct the frames only across the segments containing the source and destination hosts 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 11
  • 12. Common Network Devices Con…Common Network Devices Con… The Router  connects multiple, dissimilar, network segments into an internetwork.  special-purpose computer than a simple electronic device  reads source and destination address of a packet and forwards it based on the information it gathers about the network.  make intelligent decisions about the best way to forward packets.   9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 12
  • 13. Computer NetworkComputer Network  collection of two or more computers connected together to share information and resources  interconnected by telephone lines, coaxial cables, satellite links, radio and/or some other communication technique.  small network or larger internet, a worldwide network three primary categories ◦ based on the size of the network, the distance it covers, and the type of link used in interconnection 1. Local Area Network (LAN). 2. Metropolitan Area Network (MAN) 3. Wide Area Network (WAN) 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 13
  • 14. Local Area Network (LAN)Local Area Network (LAN)  spans only a small geographical area, such as an office, building or campus.  uses a variety of telecommunication media, ordinary telephone wiring, coaxial cable etc.  To communicate, each PC has a circuit board called a network interface card (NIC)  uses file server or network server having a larger hard disk capacity  contains network Operating System Program that controls communication, sharing of network resources 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 14
  • 15. Metropolitan Area NetworkMetropolitan Area Network (MAN)(MAN)  large computer networks usually spanning a campus or a city.  use wireless infrastructure or optical fiber connections to link their sites.  support both data & voice, and related to the local cable television network. 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 15
  • 16. Wide Area Network (WAN):Wide Area Network (WAN):  spans a relatively large geographical area, consists of two or more LANs  are often connected through public networks, such as the telephone system, Internet.  connected through leased lines or satellites 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 16
  • 17. WANS differ from LANSWANS differ from LANS 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 17 LAN WAN smaller distance greater distance Faster speed slower speed permanently connected permanently connected private network transports public or private network transports half-duplex communications full- or half-duplex communications
  • 18. Peer-to-Peer NetworksPeer-to-Peer Networks  all computers are equal (peers) .  a client that requests resources and a server that provides resources upon request They are characterized by the following:  Security is not centralized; each computer is responsible to check access rights for its resources  Network is not scalable; good only for a few number of computers (≤10)  Each user is responsible for local backup  No specialized operating system is required; Windows NT 4.0 Workstation, Windows 95/98, Windows 2000 Pro, etc. are sufficient 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 18
  • 19. Client/Server NetworksClient/Server Networks  there exist dedicated servers provide resources/services when requested. They are characterized by the following:  Security is centralized and tighter. All user accounts are stored in the same database on the server.  The network is highly scalable; tens of thousands of workstations in the network.  Backup is centralized, done by backup operator  Specialized networking operating systems are required, such as Windows NT 4.0 server, Windows 2000 server, Novell NetWare, etc. 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 19
  • 20. Network TopologiesNetwork Topologies  the physical configuration of a network  determines how the network's computers are connected  bus, star mesh and ring topologies 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 20
  • 21. Network Topologies con…Network Topologies con… The Bus Topology  all computers are connected to a single cable  The cable is terminated at its ends to avoid signal bouncing  When a computer wants to send data to another computer, it places the data and address of the recipient computer on the cable  Only the computer whose address is included with the data accepts the data 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 21
  • 22. Network Topologies con…Network Topologies con… Advantages of a Bus Topology  Easy to connect a computer or peripheral to a linear bus  Requires less cable length than a star topology Disadvantages of a Bus Topology  Entire network shuts down if there is a break in the main cable  Terminators are required at both ends of the backbone cable  Difficult to identify the problem if the entire network shuts down  Network can slow down in heavy traffic 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 22
  • 23. Network Topologies con…Network Topologies con… The Star Topology  Each computer is connected to a central device (hub) by a separate cable.  When a computer wants to send data to another computer, it sends the data and address of the recipient computer to the hub  The hub sends it every computer connected to it  Only the computer whose address is included with the data accepts the data. 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 23
  • 24. Network Topologies con…Network Topologies con… Advantages of a Star Topology  Easy to install and wire  No disruptions to the network then connecting or removing devices  Easy to detect faults and to remove parts  Failure of one computer does not affect the rest of the network Disadvantages of a Star Topology  Requires more cable length than a linear topology  If the hub or concentrator fails, nodes attached are disabled  More expensive than linear bus topologies because of the cost of the concentrators 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 24
  • 25. Network Topologies con…Network Topologies con… The Ring Topology  Each computer is connected directly to two other computers in the network.  Data moves down a one-way path from one computer and if the next computer is the recipient it accepts the data; otherwise it amplifies it and sends it to the next computer down in the path.  Any break disrupts the entire network 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 25
  • 26. Network Topologies con…Network Topologies con… Advantages of a Ring Topology  System provides equal access for all computers.  Performance is even despite many users Disadvantages of a Ring Topology  Failure of one computer can impact the rest of the network  Problems are hard to isolate.  Network reconfiguration disrupts operation 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 26
  • 27. Network Topologies con…Network Topologies con… The Mesh Topology  Each computer is directly connected to every other computer.  complex as wiring and connections increase rapidly with the increase of computers to connect.  For n computers, n(n-1)/2 cables are required  Today rarely used only in a WAN environment because the mesh topology is fault tolerant 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 27
  • 28. Network Topologies con…Network Topologies con… Advantages of a Mesh Topology  System provides increased redundancy and reliability as well as ease of troubleshooting Disadvantages of a Mesh Topology  System is complex  expensive to install because it uses a lot of cabling Considerations When Choosing a Topology:  Money  Length of cable needed  Future growth  Cable type 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 28
  • 29. Media AccessMedia Access Carrier Sense/Multiple Access with Collision Detection (CSMA/CD)  used in Ethernet networks  When a protocol that uses CSMA/CD has data to transmit, 1. it first senses if a signal is already on the wire (a carrier), indicating that someone is transmitting currently 2. If no one else is transmitting, it attempts a transmission and then listens to hear if someone else tried to transmit at the same time 3. If someone else transmits at the exact same time, a condition known as a collision occurs 4. Both senders "back off" and don't transmit until some random period of time has passed 5. They then both retry   9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 29
  • 30. Media Access con…Media Access con… Carrier Sense/Multiple Access with Collision Detection (CSMA/CD) 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 30
  • 31. Media Access con…Media Access con… Token Passing : uses a special packet called a token. 1. The first computer turned on creates the token 2. It then passes the token on to the next computer 3. The token passes around the network until a computer that has data to send takes the token off the network, modifies it, and puts it back on the network along with the data it has to send 4. Each station between the sender and the receiver along the network reads the destination address in the token 5. If the destination address doesn't match its own, the station simply sends the package on its way 6. When the destination station recognizes its address in the destination address of the token, the NIC copies the data into the station's memory and modifies the token, indicating it has received the data. 7. The token continues around the network until the original sender receives the token back again. 8. If the original sender has more data to send, the process repeats itself. If not, the sender modifies the token to indicate that the token is "free" for anyone else to use  With this method, there are no collisions (as in CSMA/CD networks) because everyone has to have "permission" to transmit (via the token). 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 31
  • 32. Media Access con…Media Access con… Token Passing 9/12/2015 Dr. J. VijiPriya, Assistant Professor, Hawassa University, Ethiopia 32