SlideShare a Scribd company logo
Introduction to Computer
Lecture # 13
Course Instructor : Sehrish Rafiq
Govt. Girls Degree College Maneri Swabi
Higher Education Department KP
Lecture Overview
 Data Communication
 Components of a data communication system
 Characteristics of a data communication system
 Transmission Mode
 Network
 Network Criteria
 Applications of Networks
 Types of Networks
Data Communication
 “Data Communication is the exchange of information from one entity to
another using a transmission medium”.
 The word data refers to facts, concepts and instructions presented in
whatever form is agreed upon by the parties creating and using the data.
 In the context of Computer information Systems
 Data is represented by binary information units(or bits) produced and
consumed in the form of 0’s and 1’s.
 “Data Communication is the exchange of data (in the form of 0’s and
1’s) between devices(computers) via some form of transmission
medium(such as a wire cable)”.
 For data communication to occur the communicating devices must be part
of a communication system.
Components of a Data communication system
Components of a
Data Communication System
 Message
 Message is the information /data to be communicated.
 Popular forms of information is text, audio, image and video.
 Sender
 Sender can be any device that has the ability to send information.
 It can be a computer, telephone handset, video camera etc.
 Receiver
 A receiver can be any device that has the ability to receive information.
 It can be a computer, telephone handset, television, radio set etc.
Continued…
 Transmission medium
 Transmission medium is the physical pathway by which a message travels
from sender to receiver.
 Transmission medium can be wired(e.g. coaxial cable , twisted pair cable,
fiber optic) or wireless (e.g. radio waves, micro waves etc. )
 Protocol
 Protocol is the set of rules which governs data communication.
 It represents an agreement between the communicating devices.
 Without a protocol two devices may be connected but not communicating just
as a person speaking French cannot be understood by a person who speaks
only Japanese.
Characteristics of a Data Communication
System
• The effectiveness of a data communication system depends on three
fundamental characteristics:
 Delivery
 Accuracy
 Timeliness
Transmission Mode
 The term Transmission Mode is used to define the direction of signal flow
between two linked devices.
 Simplex
 Half-duplex
 Full-duplex
Simplex Mode
 In simplex mode the communication is uni-directional as on a one-way
street.
 Only one of the two stations on a link can transmit, the other can only
receive.
 Examples: Keyboard, Monitor, Mouse
Half Duplex
 In half-duplex mode, each station can both transmit and receive but not at
the same time.
 When one device is sending, the other can only receive.
 The half-duplex mode is like a one-lane road with two-directional traffic.
 The entire capacity of the communication channel is taken over by
whichever of the two devices is transmitting at the time.
 e.g. walkie-talkie
Full duplex
 In full-duplex mode both stations can transmit and receive
simultaneously.
 The full duplex mode is like a two-way street with traffic flowing in both
directions at the same time.
 In full duplex mode signals going in either direction share the capacity of
the link.
 This sharing can occur in two ways either the link must contain two
physically separate transmission paths, one for sending and the other for
receiving or the capacity of the channel is divided between signals
traveling in opposite directions.
Network
 A network is a set of devices(often referred to as nodes) connected by
media links.
 A node can be a computer, printer or any other device capable of sending
and/or receiving data generated by other nodes on the network.
 Media links can be wired or wireless communication channels.
Network Criteria
 For a network to be considered effective & efficient, It must meet the
following criteria.
 Performance
 Reliability
 Security
Performance
 Performance can be measured in many ways including transit time and
response time.
 Transit time: The amount of time required for a message to travel from one
device to another.
 Response time: The elapsed time between an inquiry and a response.
 Performance of a network depends on a number of factors including:
 Number of users
 Type of transmission medium
 The capabilities of the connected hardware
 The efficiency of software
Reliability
 In addition to accuracy of delivery, network reliability is also
important for an effective network.
 Reliability measures
 Frequency of failure
 Recovery time after a failure
 Catastrophe
Security
 Network security issues include protecting data from unauthorized
access and viruses.
 Unauthorized access
 Lowest level
 Highest level
 Virus protection
Applications of Networks
 Data communication networks have been indispensable part of business,
industry & entertainment.
 Marketing & Sales:
 Marketing Professionals use them to collect, exchange and analyze data
relating to customer needs and product development cycles.
 E-Commerce:
 Because of computer networks many companies and business firms sell
their products online which save customer time and money.
 Financial Services:
 Financial services include credit card, foreign exchange and investment
services, EFT and ATM.
Continued…
 Manufacturing:
 Computer networks are used today in many aspects of manufacturing
including the manufacturing process itself.
 Two applications that use network services CAD and CAM allow multiple
users to work on a project simultaneously.
 Electronic Messaging:
 The most widely used network application.
 Electronic messaging allow users to type messages at their local nodes and
then send to someone on the network. Examples include email programs
and instant chat applications.
 Information Services:
 Network information services include Information publishing services,
products information etc.
Continued…
 Teleconferencing:
 Teleconferencing allow conferences to occur without participants being in
the same place.
 Cellular Telephone:
 Cellular telephones provide the facility of wireless based voice and text
communication between its customers over large distances.
 Cable Television:
 Cable television is also a common application of networks which provide
transmission of different channels to its customers. It also include services
like video on request and marketing.
Types of Network
 In to which category a network falls is determined by its size, its ownership,
the distance it covers and its physical architecture.
LAN(Local Area Network)
 A local Area network is usually privately owned.
 It usually links the devices in a single office, building or campus.
 LAN size is limited to a few kilometers.
 LAN’s are designed to allow resources to be shared between personal
computers or work stations.
 In addition to size, LANs are distinguished from other types of networks
by their transmission media and topology.
 Most common topologies: Bus, Ring & Star.
LAN(Local Area Network)
MAN(Metropolitan Area Network)
 A MAN is designed to extend over an entire city.
 It may be a single network such as cable television network or it may
be a means of connecting a number of LANs in to a larger network
so that resources may be shared LAN-to-LAN.
 A MAN may be wholly owned and operated by a private company
such as local telephone company.
MAN(Metropolitan Area Network)
WAN(Wide Area Network)
 A WAN provides long distance transmission of voice, data, image
and video information over large geographic areas.
 The area a WAN covers may comprise a country, a continent or
even the whole world.
 WANs may utilize public, leased or private communication devices
and media and can therefore span an unlimited number of miles.
 Usually a WAN lacks a single owner, in fact it has many stack
holders.
 A WAN that is wholly owned and used by a single company is often
referred to as enterprise network.
WAN(Wide Area Network)
Internetworks
 When two or more networks are connected, they became an internetwork
or internet.
 The Internet from “I” is a Wide area network while the internet from “i”
refers to the interconnection of networks.
 Internet can be thought as internet but the reverse is not necessarily true.
History of Internet
 1960, A project of ARPA of US department of Defense
 Stanford Research Institute
 University of California at Los Angeles
 University of California at Santa Barbara
 University of Utah
 Features
 Redundant lines
 Decentralized Computing
 1980, NSF and other Government agencies
 1991,Commercial traffic
 April 1995,US government action
 2017,4156 million users
World Wide Web
 WWW stands for "World Wide Web.“
 Web is a collection of hypertext documents which consists of pages that
can be accessed using a Web browser.
 Each page has its own unique address known as Universal Resource
Locator (URL).
 The Hyper-Text Transfer Protocol (HTTP) is the method used to transfer
Web pages to your computer.
 With hypertext, a word or phrase can contain a link to another Web site.
 These links are known as hyper links.
 All Web pages are written in the hyper-text markup language (HTML),
which works in conjunction with HTTP.
Introduction to Computers Lecture # 13

More Related Content

What's hot

Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
Siddique Ibrahim
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
Shovan Mandal
 
Computer networks and it's applications
Computer networks and it's applicationsComputer networks and it's applications
Computer networks and it's applications
varun arora
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
Raj vardhan
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
Jubayer Alam Shoikat
 
network essential ppt
network essential pptnetwork essential ppt
network essential pptVikas Tiwari
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communicationHarpreet Dhaliwal
 
Data com chapter 1 introduction
Data com chapter 1   introductionData com chapter 1   introduction
Data com chapter 1 introductionAbdul-Hamid Donde
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devicesKunal Bhansali
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
Ayush0734
 
Network Software
Network SoftwareNetwork Software
Network Software
Azamat Abdoullaev
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application ppt
Nitesh Dubey
 
B.sc i bio chem u 5 data communication and network
B.sc i bio chem u 5 data communication and networkB.sc i bio chem u 5 data communication and network
B.sc i bio chem u 5 data communication and network
Rai University
 
Presentation On Networking Harware
Presentation On Networking HarwarePresentation On Networking Harware
Presentation On Networking Harwareguest5e13c5
 
Network And Topology
Network And TopologyNetwork And Topology
Network And Topology
Pruthvi Bhalodia
 
Network topologies for management
Network topologies for managementNetwork topologies for management
Network topologies for managementSaugata Palit
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
'Rafid RezA'
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standardsMidhun Menon
 
SC161-Lecture4-1
SC161-Lecture4-1SC161-Lecture4-1
SC161-Lecture4-1
Thiti Theerathean
 

What's hot (20)

Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Computer networks and it's applications
Computer networks and it's applicationsComputer networks and it's applications
Computer networks and it's applications
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
 
network essential ppt
network essential pptnetwork essential ppt
network essential ppt
 
Presentation on data communication
Presentation on data communicationPresentation on data communication
Presentation on data communication
 
Data com chapter 1 introduction
Data com chapter 1   introductionData com chapter 1   introduction
Data com chapter 1 introduction
 
Network topology and devices
Network topology and devicesNetwork topology and devices
Network topology and devices
 
Computer network and its topologies
Computer network and its topologiesComputer network and its topologies
Computer network and its topologies
 
Network Software
Network SoftwareNetwork Software
Network Software
 
computer networking and its application ppt
computer networking and its application pptcomputer networking and its application ppt
computer networking and its application ppt
 
B.sc i bio chem u 5 data communication and network
B.sc i bio chem u 5 data communication and networkB.sc i bio chem u 5 data communication and network
B.sc i bio chem u 5 data communication and network
 
Presentation On Networking Harware
Presentation On Networking HarwarePresentation On Networking Harware
Presentation On Networking Harware
 
Network And Topology
Network And TopologyNetwork And Topology
Network And Topology
 
Network topologies for management
Network topologies for managementNetwork topologies for management
Network topologies for management
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standards
 
SC161-Lecture4-1
SC161-Lecture4-1SC161-Lecture4-1
SC161-Lecture4-1
 

Similar to Introduction to Computers Lecture # 13

Presentation1 Networking.pptx
Presentation1 Networking.pptxPresentation1 Networking.pptx
Presentation1 Networking.pptx
MohammedAnas871930
 
Computer networks
Computer networksComputer networks
Computer networks
Rohit Kori
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
PoojaWalia6
 
17 130920091458-phpapp01
17 130920091458-phpapp0117 130920091458-phpapp01
17 130920091458-phpapp01Dilan Atapattu
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptx
sairakesh41
 
Internet tybcom
Internet tybcomInternet tybcom
Internet tybcomAditya
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
mv9499596
 
network.pdf
network.pdfnetwork.pdf
network.pdf
LakshayTyagi28
 
Data Communication, Networking & Internet
Data Communication, Networking & InternetData Communication, Networking & Internet
Data Communication, Networking & InternetKusai007
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
AkshayIngole17
 
Telecommunication The Fastest Way To Communicate
Telecommunication The Fastest Way To CommunicateTelecommunication The Fastest Way To Communicate
Telecommunication The Fastest Way To Communicate
Eric Ronald
 
Data communications ch 1
Data communications   ch 1Data communications   ch 1
Data communications ch 1
Mukesh Tekwani
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
MDKhalik1
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
Deven Sahu
 
COMPUTER NETWORKS.pptx
COMPUTER NETWORKS.pptxCOMPUTER NETWORKS.pptx
COMPUTER NETWORKS.pptx
varunvigneshprabhaka
 
E content network
E content networkE content network
E content network
Kaliyamurthi Punitha Devi
 
1 computer networks basic
1 computer networks basic1 computer networks basic
1 computer networks basic
Md. Asifur Rahman Siddiki
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
Jennifer Polack
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
shahinaz Altabbakh
 

Similar to Introduction to Computers Lecture # 13 (20)

Presentation1 Networking.pptx
Presentation1 Networking.pptxPresentation1 Networking.pptx
Presentation1 Networking.pptx
 
Computer networks
Computer networksComputer networks
Computer networks
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
17 130920091458-phpapp01
17 130920091458-phpapp0117 130920091458-phpapp01
17 130920091458-phpapp01
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptx
 
Internet tybcom
Internet tybcomInternet tybcom
Internet tybcom
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
 
Lecture 02
Lecture 02Lecture 02
Lecture 02
 
network.pdf
network.pdfnetwork.pdf
network.pdf
 
Data Communication, Networking & Internet
Data Communication, Networking & InternetData Communication, Networking & Internet
Data Communication, Networking & Internet
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 
Telecommunication The Fastest Way To Communicate
Telecommunication The Fastest Way To CommunicateTelecommunication The Fastest Way To Communicate
Telecommunication The Fastest Way To Communicate
 
Data communications ch 1
Data communications   ch 1Data communications   ch 1
Data communications ch 1
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
COMPUTER NETWORKS.pptx
COMPUTER NETWORKS.pptxCOMPUTER NETWORKS.pptx
COMPUTER NETWORKS.pptx
 
E content network
E content networkE content network
E content network
 
1 computer networks basic
1 computer networks basic1 computer networks basic
1 computer networks basic
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 

More from Sehrish Rafiq

Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
Sehrish Rafiq
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
Sehrish Rafiq
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
Sehrish Rafiq
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9
Sehrish Rafiq
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
Sehrish Rafiq
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
Sehrish Rafiq
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
Sehrish Rafiq
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
Sehrish Rafiq
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
Sehrish Rafiq
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
Sehrish Rafiq
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
Sehrish Rafiq
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Sehrish Rafiq
 

More from Sehrish Rafiq (20)

Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12Introduction to Computers Lecture # 12
Introduction to Computers Lecture # 12
 
Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11Introduction to Computers Lecture # 11
Introduction to Computers Lecture # 11
 
Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10Introduction to Computers Lecture # 10
Introduction to Computers Lecture # 10
 
Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9Introduction to Computers Lecture # 9
Introduction to Computers Lecture # 9
 
Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8Introduction to Computers Lecture # 8
Introduction to Computers Lecture # 8
 
Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7Introduction to Computers Lecture # 7
Introduction to Computers Lecture # 7
 
Introduction to computers Lecture # 4
Introduction to computers Lecture # 4Introduction to computers Lecture # 4
Introduction to computers Lecture # 4
 
Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5Introduction to Computers Lecture # 5
Introduction to Computers Lecture # 5
 
Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3Introduction to Computers Lecture # 3
Introduction to Computers Lecture # 3
 
Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2Introduction to Computers Lecture # 2
Introduction to Computers Lecture # 2
 
Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1Introduction to Computers Lecture # 1
Introduction to Computers Lecture # 1
 
Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16Data Communications and Networking Lecture 16
Data Communications and Networking Lecture 16
 
Lecture 24
Lecture 24Lecture 24
Lecture 24
 
Lecture 18
Lecture 18Lecture 18
Lecture 18
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Lecture 12
Lecture 12Lecture 12
Lecture 12
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Lecture 07
Lecture 07Lecture 07
Lecture 07
 
Lecture 06
Lecture 06Lecture 06
Lecture 06
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Introduction to Computers Lecture # 13

  • 1. Introduction to Computer Lecture # 13 Course Instructor : Sehrish Rafiq Govt. Girls Degree College Maneri Swabi Higher Education Department KP
  • 2. Lecture Overview  Data Communication  Components of a data communication system  Characteristics of a data communication system  Transmission Mode  Network  Network Criteria  Applications of Networks  Types of Networks
  • 3. Data Communication  “Data Communication is the exchange of information from one entity to another using a transmission medium”.  The word data refers to facts, concepts and instructions presented in whatever form is agreed upon by the parties creating and using the data.  In the context of Computer information Systems  Data is represented by binary information units(or bits) produced and consumed in the form of 0’s and 1’s.  “Data Communication is the exchange of data (in the form of 0’s and 1’s) between devices(computers) via some form of transmission medium(such as a wire cable)”.  For data communication to occur the communicating devices must be part of a communication system.
  • 4. Components of a Data communication system
  • 5. Components of a Data Communication System  Message  Message is the information /data to be communicated.  Popular forms of information is text, audio, image and video.  Sender  Sender can be any device that has the ability to send information.  It can be a computer, telephone handset, video camera etc.  Receiver  A receiver can be any device that has the ability to receive information.  It can be a computer, telephone handset, television, radio set etc.
  • 6. Continued…  Transmission medium  Transmission medium is the physical pathway by which a message travels from sender to receiver.  Transmission medium can be wired(e.g. coaxial cable , twisted pair cable, fiber optic) or wireless (e.g. radio waves, micro waves etc. )  Protocol  Protocol is the set of rules which governs data communication.  It represents an agreement between the communicating devices.  Without a protocol two devices may be connected but not communicating just as a person speaking French cannot be understood by a person who speaks only Japanese.
  • 7. Characteristics of a Data Communication System • The effectiveness of a data communication system depends on three fundamental characteristics:  Delivery  Accuracy  Timeliness
  • 8. Transmission Mode  The term Transmission Mode is used to define the direction of signal flow between two linked devices.  Simplex  Half-duplex  Full-duplex
  • 9. Simplex Mode  In simplex mode the communication is uni-directional as on a one-way street.  Only one of the two stations on a link can transmit, the other can only receive.  Examples: Keyboard, Monitor, Mouse
  • 10. Half Duplex  In half-duplex mode, each station can both transmit and receive but not at the same time.  When one device is sending, the other can only receive.  The half-duplex mode is like a one-lane road with two-directional traffic.  The entire capacity of the communication channel is taken over by whichever of the two devices is transmitting at the time.  e.g. walkie-talkie
  • 11. Full duplex  In full-duplex mode both stations can transmit and receive simultaneously.  The full duplex mode is like a two-way street with traffic flowing in both directions at the same time.  In full duplex mode signals going in either direction share the capacity of the link.  This sharing can occur in two ways either the link must contain two physically separate transmission paths, one for sending and the other for receiving or the capacity of the channel is divided between signals traveling in opposite directions.
  • 12. Network  A network is a set of devices(often referred to as nodes) connected by media links.  A node can be a computer, printer or any other device capable of sending and/or receiving data generated by other nodes on the network.  Media links can be wired or wireless communication channels.
  • 13. Network Criteria  For a network to be considered effective & efficient, It must meet the following criteria.  Performance  Reliability  Security
  • 14. Performance  Performance can be measured in many ways including transit time and response time.  Transit time: The amount of time required for a message to travel from one device to another.  Response time: The elapsed time between an inquiry and a response.  Performance of a network depends on a number of factors including:  Number of users  Type of transmission medium  The capabilities of the connected hardware  The efficiency of software
  • 15. Reliability  In addition to accuracy of delivery, network reliability is also important for an effective network.  Reliability measures  Frequency of failure  Recovery time after a failure  Catastrophe
  • 16. Security  Network security issues include protecting data from unauthorized access and viruses.  Unauthorized access  Lowest level  Highest level  Virus protection
  • 17. Applications of Networks  Data communication networks have been indispensable part of business, industry & entertainment.  Marketing & Sales:  Marketing Professionals use them to collect, exchange and analyze data relating to customer needs and product development cycles.  E-Commerce:  Because of computer networks many companies and business firms sell their products online which save customer time and money.  Financial Services:  Financial services include credit card, foreign exchange and investment services, EFT and ATM.
  • 18. Continued…  Manufacturing:  Computer networks are used today in many aspects of manufacturing including the manufacturing process itself.  Two applications that use network services CAD and CAM allow multiple users to work on a project simultaneously.  Electronic Messaging:  The most widely used network application.  Electronic messaging allow users to type messages at their local nodes and then send to someone on the network. Examples include email programs and instant chat applications.  Information Services:  Network information services include Information publishing services, products information etc.
  • 19. Continued…  Teleconferencing:  Teleconferencing allow conferences to occur without participants being in the same place.  Cellular Telephone:  Cellular telephones provide the facility of wireless based voice and text communication between its customers over large distances.  Cable Television:  Cable television is also a common application of networks which provide transmission of different channels to its customers. It also include services like video on request and marketing.
  • 20. Types of Network  In to which category a network falls is determined by its size, its ownership, the distance it covers and its physical architecture.
  • 21. LAN(Local Area Network)  A local Area network is usually privately owned.  It usually links the devices in a single office, building or campus.  LAN size is limited to a few kilometers.  LAN’s are designed to allow resources to be shared between personal computers or work stations.  In addition to size, LANs are distinguished from other types of networks by their transmission media and topology.  Most common topologies: Bus, Ring & Star.
  • 23. MAN(Metropolitan Area Network)  A MAN is designed to extend over an entire city.  It may be a single network such as cable television network or it may be a means of connecting a number of LANs in to a larger network so that resources may be shared LAN-to-LAN.  A MAN may be wholly owned and operated by a private company such as local telephone company.
  • 25. WAN(Wide Area Network)  A WAN provides long distance transmission of voice, data, image and video information over large geographic areas.  The area a WAN covers may comprise a country, a continent or even the whole world.  WANs may utilize public, leased or private communication devices and media and can therefore span an unlimited number of miles.  Usually a WAN lacks a single owner, in fact it has many stack holders.  A WAN that is wholly owned and used by a single company is often referred to as enterprise network.
  • 27. Internetworks  When two or more networks are connected, they became an internetwork or internet.  The Internet from “I” is a Wide area network while the internet from “i” refers to the interconnection of networks.  Internet can be thought as internet but the reverse is not necessarily true.
  • 28. History of Internet  1960, A project of ARPA of US department of Defense  Stanford Research Institute  University of California at Los Angeles  University of California at Santa Barbara  University of Utah  Features  Redundant lines  Decentralized Computing  1980, NSF and other Government agencies  1991,Commercial traffic  April 1995,US government action  2017,4156 million users
  • 29. World Wide Web  WWW stands for "World Wide Web.“  Web is a collection of hypertext documents which consists of pages that can be accessed using a Web browser.  Each page has its own unique address known as Universal Resource Locator (URL).  The Hyper-Text Transfer Protocol (HTTP) is the method used to transfer Web pages to your computer.  With hypertext, a word or phrase can contain a link to another Web site.  These links are known as hyper links.  All Web pages are written in the hyper-text markup language (HTML), which works in conjunction with HTTP.