SlideShare a Scribd company logo
Data Communications Making computers talk to each other
Types of usage's ,[object Object],[object Object],[object Object],[object Object]
Two methods of communication ,[object Object],[object Object]
How computers communicate Let’s do lunch
Telecommunications 0  1  0  0  0  0  0  1 LA NY Analog Phone System in U.S.
Telecommunications 0  1  0  0  0  0  0  1 LA NY Bandwidth  =  300 - 3000 hz
Telecommunications 0  1  0  0  0  0  0  1 LA NY Analog Phone System in U.S. Bandwidth  =  300 - 3000 hz What are two terms that describe this form of information?
Telecommunications 0  1  0  0  0  0  0  1 LA NY Analog Phone System in U.S. Bandwidth  =  300 - 3000 hz 1)  Binary 2)  Digital
Telecommunications Ok, so what we want to do is send  digital information over a network designed to support  analog  signals. This presents some compatibility  problems ...
Telecommunications Lets take a look at what  ANALOG  information looks like... Time --> + - 0
Telecommunications Lets take a look at what  DIGITAL  information looks like... + - 0 Time -->
Telecommunications 0  1  0  0  0  0  0  1 LA NY Analog Phone System in U.S. OK, so what we need is a  DIGITAL  to  ANALOG  converter. First thing we need to design is a . . .
Telecommunications 0  1  0  0  0  0  0  1 LA NY Analog Phone System in U.S.
Telecommunications 0  1  0  0  0  0  0  1 LA NY Analog Phone System in U.S. Black Box
Telecommunications 0  1  0  0  0  0  0  1 LA NY The black box is a hardware device, next we need some type of software to control how and when the bits are sent from the computer to the black box...
Telecommunications 0  1  0  0  0  0  0  1 LA NY The black box is a hardware device, next we need some type of software to control how and when the bits are sent from the computer to the black box... Bit control  software Bit control  software
Telecommunications 0  1  0  0  0  0  0  1 LA NY The black box is a hardware device, next we need some type of software to control how and when the bits are sent from the computer to the black box... How to handle a zero or a one?  Bit control  software
Telecommunications 0  1  0  0  0  0  0  1 0  LA NY Need to convert the zero to a tone... Lets use 1000 hz Working with  bit # 1  Send  1000 hz --> Receive --> 1000 hz  Working with  bit # 1  Convert tone into a zero ... Convert zero into a tone ...
Telecommunications 0  1  0  0  0  0  0  1 0  1  LA NY Need to convert the ONE to a tone... Lets use 2000 hz Working with  bit # 2  Send  2000 hz --> Receive --> 2000 hz  Working with  bit # 2  Convert tone into a  ONE  ... Convert  ONE into a tone ...
Telecommunications 0  1  0  0  0  0  0  1 LA NY Need to convert the ONE to a tone... Working with  bit # 8  Send  2000 hz --> Receive --> 2000 hz  Working with  bit # 8  Convert tone into a  ONE  ... Convert  ONE into a tone ... 0  1  0  0  0  0  0  1
Telecommunications 0  1  0  0  0  0  0  1 LA NY Need to convert the ONE to a tone... Working with  bit # 8  Send  2000 hz --> Receive --> 2000 hz  Working with  bit # 8  Convert tone into a  ONE  ... Convert  ONE into a tone ... 0  1  0  0  0  0  0  1 What term describes the black box ?
Telecommunications Modem (Modulator-Demodulator) Digital to Analog  =  Modulator Analog to Digital  =  Demodulator
Telecommunications 0  1  0  0  0  0  0  1 LA NY Have some logistical problems... How does NY know that LA is getting ready to send the FIRST bit ? Working with  bit # 1
Telecommunications 0  1  0  0  0  0  0  1 LA NY Before every byte, a  start tone  is sent to the receiving computer Ready to transmit first bit  Get ready to receive bit # 1  Send a  START tone 500 hz --> Receive START tone --> 500 hz
Telecommunications 0  1  0  0  0  0  0  1 LA NY After every byte, a  stop tone  is sent to the receiving computer Done with  last bit  Sequenced  completed  Send a  STOP tone 800 hz --> Receive STOP tone --> 800 hz 0  1  0  0  0  0  0  1
Telecommunications 0  1  0  0  0  0  0  1 LA NY Last major logistical problem ... How fast are we sending the bits down the phone line? 0  1  0  0  0  0  0  1
Telecommunications BAUD RATES 300  baud 600  baud 1200 baud 2400 baud 4800 baud 9600 baud 12,000 baud 14,400 baud 19,200 baud 28,800 baud 38,400 baud 57,600 baud Low speed Medium speed High speed An approximate definition of BAUD is “bits per second”
Computer Networks Making computers work together
What is a Computer Network Two or more computers connected together
Why Network ,[object Object],[object Object],[object Object],[object Object]
Types of Networks ,[object Object],[object Object],[object Object]
Local Area Network (LAN) ,[object Object],[object Object]
Wide Area Network (WAN) Computers interconnected in a large area (campus, multiple building, office complex)
Municipal Area Network (MAN) Computers interconnected throughout the municipality (city-wide/county-wide)
Network Configurations ,[object Object],[object Object],[object Object],[object Object]
Sneaker Net Hand carry a floppy disk from one computer to another in order to share files.
Peer to Peer Sharing Data
Client/Server Clients Server Clients use files and programs that are stored on the server
Distributed Data is distributed between servers on various networks. When data is requested, the computer checks all connected systems for data. The user probably does not know which computer the data came from. Connected Servers
Necessary Devices ,[object Object],[object Object],[object Object]
Network Topologies ,[object Object],[object Object]
Ethernet (Twisted Pair) HUB
Ethernet (Coaxial) Echo Terminator
Token Ring
How Data Flows A B Computer A wants to send information to computer B.
How Data Flows A B Network software in computer A builds a  PACKET  or  PACKETS  and puts the information onto the network media.
How Data Flows A B Packet(s) Start Length | Destination Address | Source Address | Length Count | Data | Frame Check Sequence What the packet contains:
How Data Flows A B Computer B receives the PACKET(S) from the network media. The network software separates the information from the PACKET(S).
Next, What’s the internet?

More Related Content

Similar to I Networks

Wan technology
Wan technologyWan technology
Wan technology
Wan technologyWan technology
Wan technology
Ronald Estrada
 
Networking Basics
Networking Basics Networking Basics
Networking Basics
lokeshw24
 
adapters2.PPT
adapters2.PPTadapters2.PPT
adapters2.PPT
ssuser8298f2
 
Humming code error detector 7_communications.ppt
Humming code error detector 7_communications.pptHumming code error detector 7_communications.ppt
Humming code error detector 7_communications.ppt
nesarahmad37
 
Aspects Strategiques Des Réseaux 2008 2009
Aspects Strategiques Des Réseaux 2008 2009Aspects Strategiques Des Réseaux 2008 2009
Aspects Strategiques Des Réseaux 2008 2009
Eric Vyncke
 
Understanding computer networks
Understanding computer networksUnderstanding computer networks
Understanding computer networks
UC San Diego
 
Welcome to IP Surveillance 101
Welcome to IP Surveillance 101Welcome to IP Surveillance 101
Welcome to IP Surveillance 101
grantsupplies
 
How new technologies affect the art of contesting
How new technologies affect the art of contestingHow new technologies affect the art of contesting
How new technologies affect the art of contesting
Tobias Wellnitz
 
SIGFOX Makers Tour - Porto
SIGFOX Makers Tour - PortoSIGFOX Makers Tour - Porto
SIGFOX Makers Tour - Porto
Nicolas Lesconnec
 
Ip addressing
Ip addressingIp addressing
Ip addressing
Tapan Khilar
 
Chapter 1.pptx
Chapter 1.pptxChapter 1.pptx
Chapter 1.pptx
abdirahman gure
 
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
John Mathias
 
Information system
Information systemInformation system
Information system
Aakash software cell Gujrat.
 
Important terms in understanding internet programming
Important terms in understanding internet programmingImportant terms in understanding internet programming
Important terms in understanding internet programming
shahajahankhan123
 
Aspects Stratégiques des Réseaux
Aspects Stratégiques des RéseauxAspects Stratégiques des Réseaux
Aspects Stratégiques des Réseaux
Eric Vyncke
 
Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0
Emertxe Information Technologies Pvt Ltd
 
CCNA 1 : introduction_to_networking
CCNA 1 : introduction_to_networkingCCNA 1 : introduction_to_networking
CCNA 1 : introduction_to_networking
eysipi
 
Uart
UartUart
Gbell Ra
Gbell RaGbell Ra
Gbell Ra
asiramage
 

Similar to I Networks (20)

Wan technology
Wan technologyWan technology
Wan technology
 
Wan technology
Wan technologyWan technology
Wan technology
 
Networking Basics
Networking Basics Networking Basics
Networking Basics
 
adapters2.PPT
adapters2.PPTadapters2.PPT
adapters2.PPT
 
Humming code error detector 7_communications.ppt
Humming code error detector 7_communications.pptHumming code error detector 7_communications.ppt
Humming code error detector 7_communications.ppt
 
Aspects Strategiques Des Réseaux 2008 2009
Aspects Strategiques Des Réseaux 2008 2009Aspects Strategiques Des Réseaux 2008 2009
Aspects Strategiques Des Réseaux 2008 2009
 
Understanding computer networks
Understanding computer networksUnderstanding computer networks
Understanding computer networks
 
Welcome to IP Surveillance 101
Welcome to IP Surveillance 101Welcome to IP Surveillance 101
Welcome to IP Surveillance 101
 
How new technologies affect the art of contesting
How new technologies affect the art of contestingHow new technologies affect the art of contesting
How new technologies affect the art of contesting
 
SIGFOX Makers Tour - Porto
SIGFOX Makers Tour - PortoSIGFOX Makers Tour - Porto
SIGFOX Makers Tour - Porto
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Chapter 1.pptx
Chapter 1.pptxChapter 1.pptx
Chapter 1.pptx
 
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
 
Information system
Information systemInformation system
Information system
 
Important terms in understanding internet programming
Important terms in understanding internet programmingImportant terms in understanding internet programming
Important terms in understanding internet programming
 
Aspects Stratégiques des Réseaux
Aspects Stratégiques des RéseauxAspects Stratégiques des Réseaux
Aspects Stratégiques des Réseaux
 
Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0
 
CCNA 1 : introduction_to_networking
CCNA 1 : introduction_to_networkingCCNA 1 : introduction_to_networking
CCNA 1 : introduction_to_networking
 
Uart
UartUart
Uart
 
Gbell Ra
Gbell RaGbell Ra
Gbell Ra
 

More from CTIN

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
CTIN
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
CTIN
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
CTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
CTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
CTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
CTIN
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
CTIN
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
CTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
CTIN
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
CTIN
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
CTIN
 
Nra
NraNra
Nra
CTIN
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
CTIN
 
Edrm
EdrmEdrm
Edrm
CTIN
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
CTIN
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
CTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
CTIN
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
CTIN
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
CTIN
 
Raidprep
RaidprepRaidprep
Raidprep
CTIN
 

More from CTIN (20)

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Nra
NraNra
Nra
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Edrm
EdrmEdrm
Edrm
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 
Raidprep
RaidprepRaidprep
Raidprep
 

Recently uploaded

Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 

Recently uploaded (20)

Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 

I Networks

  • 1. Data Communications Making computers talk to each other
  • 2.
  • 3.
  • 4. How computers communicate Let’s do lunch
  • 5. Telecommunications 0 1 0 0 0 0 0 1 LA NY Analog Phone System in U.S.
  • 6. Telecommunications 0 1 0 0 0 0 0 1 LA NY Bandwidth = 300 - 3000 hz
  • 7. Telecommunications 0 1 0 0 0 0 0 1 LA NY Analog Phone System in U.S. Bandwidth = 300 - 3000 hz What are two terms that describe this form of information?
  • 8. Telecommunications 0 1 0 0 0 0 0 1 LA NY Analog Phone System in U.S. Bandwidth = 300 - 3000 hz 1) Binary 2) Digital
  • 9. Telecommunications Ok, so what we want to do is send digital information over a network designed to support analog signals. This presents some compatibility problems ...
  • 10. Telecommunications Lets take a look at what ANALOG information looks like... Time --> + - 0
  • 11. Telecommunications Lets take a look at what DIGITAL information looks like... + - 0 Time -->
  • 12. Telecommunications 0 1 0 0 0 0 0 1 LA NY Analog Phone System in U.S. OK, so what we need is a DIGITAL to ANALOG converter. First thing we need to design is a . . .
  • 13. Telecommunications 0 1 0 0 0 0 0 1 LA NY Analog Phone System in U.S.
  • 14. Telecommunications 0 1 0 0 0 0 0 1 LA NY Analog Phone System in U.S. Black Box
  • 15. Telecommunications 0 1 0 0 0 0 0 1 LA NY The black box is a hardware device, next we need some type of software to control how and when the bits are sent from the computer to the black box...
  • 16. Telecommunications 0 1 0 0 0 0 0 1 LA NY The black box is a hardware device, next we need some type of software to control how and when the bits are sent from the computer to the black box... Bit control software Bit control software
  • 17. Telecommunications 0 1 0 0 0 0 0 1 LA NY The black box is a hardware device, next we need some type of software to control how and when the bits are sent from the computer to the black box... How to handle a zero or a one? Bit control software
  • 18. Telecommunications 0 1 0 0 0 0 0 1 0 LA NY Need to convert the zero to a tone... Lets use 1000 hz Working with bit # 1 Send 1000 hz --> Receive --> 1000 hz Working with bit # 1 Convert tone into a zero ... Convert zero into a tone ...
  • 19. Telecommunications 0 1 0 0 0 0 0 1 0 1 LA NY Need to convert the ONE to a tone... Lets use 2000 hz Working with bit # 2 Send 2000 hz --> Receive --> 2000 hz Working with bit # 2 Convert tone into a ONE ... Convert ONE into a tone ...
  • 20. Telecommunications 0 1 0 0 0 0 0 1 LA NY Need to convert the ONE to a tone... Working with bit # 8 Send 2000 hz --> Receive --> 2000 hz Working with bit # 8 Convert tone into a ONE ... Convert ONE into a tone ... 0 1 0 0 0 0 0 1
  • 21. Telecommunications 0 1 0 0 0 0 0 1 LA NY Need to convert the ONE to a tone... Working with bit # 8 Send 2000 hz --> Receive --> 2000 hz Working with bit # 8 Convert tone into a ONE ... Convert ONE into a tone ... 0 1 0 0 0 0 0 1 What term describes the black box ?
  • 22. Telecommunications Modem (Modulator-Demodulator) Digital to Analog = Modulator Analog to Digital = Demodulator
  • 23. Telecommunications 0 1 0 0 0 0 0 1 LA NY Have some logistical problems... How does NY know that LA is getting ready to send the FIRST bit ? Working with bit # 1
  • 24. Telecommunications 0 1 0 0 0 0 0 1 LA NY Before every byte, a start tone is sent to the receiving computer Ready to transmit first bit Get ready to receive bit # 1 Send a START tone 500 hz --> Receive START tone --> 500 hz
  • 25. Telecommunications 0 1 0 0 0 0 0 1 LA NY After every byte, a stop tone is sent to the receiving computer Done with last bit Sequenced completed Send a STOP tone 800 hz --> Receive STOP tone --> 800 hz 0 1 0 0 0 0 0 1
  • 26. Telecommunications 0 1 0 0 0 0 0 1 LA NY Last major logistical problem ... How fast are we sending the bits down the phone line? 0 1 0 0 0 0 0 1
  • 27. Telecommunications BAUD RATES 300 baud 600 baud 1200 baud 2400 baud 4800 baud 9600 baud 12,000 baud 14,400 baud 19,200 baud 28,800 baud 38,400 baud 57,600 baud Low speed Medium speed High speed An approximate definition of BAUD is “bits per second”
  • 28. Computer Networks Making computers work together
  • 29. What is a Computer Network Two or more computers connected together
  • 30.
  • 31.
  • 32.
  • 33. Wide Area Network (WAN) Computers interconnected in a large area (campus, multiple building, office complex)
  • 34. Municipal Area Network (MAN) Computers interconnected throughout the municipality (city-wide/county-wide)
  • 35.
  • 36. Sneaker Net Hand carry a floppy disk from one computer to another in order to share files.
  • 37. Peer to Peer Sharing Data
  • 38. Client/Server Clients Server Clients use files and programs that are stored on the server
  • 39. Distributed Data is distributed between servers on various networks. When data is requested, the computer checks all connected systems for data. The user probably does not know which computer the data came from. Connected Servers
  • 40.
  • 41.
  • 45. How Data Flows A B Computer A wants to send information to computer B.
  • 46. How Data Flows A B Network software in computer A builds a PACKET or PACKETS and puts the information onto the network media.
  • 47. How Data Flows A B Packet(s) Start Length | Destination Address | Source Address | Length Count | Data | Frame Check Sequence What the packet contains:
  • 48. How Data Flows A B Computer B receives the PACKET(S) from the network media. The network software separates the information from the PACKET(S).
  • 49. Next, What’s the internet?

Editor's Notes

  1. Filename: Networks.ppt This presentation introduces data communications, modems, networks, and data packets.