SlideShare a Scribd company logo
Data Communication and
Computer Network
Chapter 1: Introduction
Presented by: Abdalle M. Geele
abdallegeele@gmail.com
Objectives
At the end of this chapter, the learner
should know the concepts of:
 Data communication
 Computer network
 The components of data
communication
 The data flow
 The fundamental characteristics of DC
 Network criteria and network
connections
What is Computer Networking
 A computer Network is a system that
connects numerous independent
computers in order to share
resources.
 The integration of computers and
other different devices allows users to
communicate more easily
 A computer network consists of
various kinds of nodes, servers and
networking devices.
Data Communications
 When we communicate, we are sharing
information. This sharing can be local or remote.
Between individuals, local communication usually
occurs face to face, while remote communication
takes place over distance
 The term telecommunication means
communication at a distance.
 The word data refers to information presented in
whatever form is agreed upon by the parties
creating and using the data.
 Data communications are the exchange of data
between two devices via some form of
transmission medium such as a wire cable.
5/15
Five components of data communication
Five components of data
communication
 Message :- is information to (Data) be
communicated
E.g. text, numbers, Audio, Video.
 Sender :- Device that sends the Data message
E.g. Computer , Work-station ,telephone
handset television and so on.
 Receiver:- Device that receive the message
E.g. Computer , Work-station ,telephone
handset television and so on.
 Transmission Medium :- Physical Path in which
the message travels from sender to Receiver.
E.g Twisted Pair, Coaxial Cable, Fiber Optics
6/15
Five components of data
communication
Conti…
 Protocols:- Set of Rules that Govern the data
communication.
 Represent the agreement between
Communication.
 Without Protocol two Device can be connected but
not communicate each other
E.g. Just person speaks amharic can’t
understand a person speak Somali.
7/15
Four Fundamental Characteristics
 Delivery :- the system must deliver data to the
correct destination.
 Accuracy:-the system must deliver the data
accurately.
 Timeliness:- The data must deliver data in a
timely manner, data delivery late are useless.
In case of video, and Audio, timely delivery
means delivering date as they produced – this
kind of delivering is known as Real-time transition.
 Jitter, refers the variation of the packets arrival
time
8/15
The effectiveness of data communications
system depends four fundamental
characteristics:
9/15
Data flow (simplex, half-duplex, and full-duplex)
Data Flow
 Communication between two devices can be
simplex, half duplex or full duplex
In Simplex mode, the communication is
unidirectional, as on a one-way. Only one of
the two devices on a link can transmit the
other can only receive
In half-duplex mode, each station can both
transmit and receive but not at the same
time.
When one device is sending, the other can
only receive and vice versa.
In full-duplex mode, both stations can
transmit and receive simultaneously.
 What are the network criteria that the
network must be able to meet?
Network Criteria
 A network must be able to meet a
certain number of criteria. The most
important of these are:
 performance
Reliability
Security
Performance
 Performance can be measured in many
ways including transit time and response
time.
 Transit time is the amount of time
required for a message to travel from
one device to another.
 Response time is the elapsed time
between an inquiry and a response.
 The performance of a network depends
on a number of factors including the
number of users, the type of
transmission medium, the capabilities of
the connection hardware and the
efficiency of the software.
Reliability
 In addition to accuracy of delivery,
network reliability is measured by the
frequency of failure, the time it takes a
link to recover from a failure.
Security
 Network security issues include
protecting data from unauthorized
access, protecting data from damage
and development, and implementing
policies and procedures for recovery
from data loss.
NETWORKS
• A network is a set of devices (often referred to as
nodes) connected by communication links. A
node can be a computer, printer, or any other
device capable of sending and/or receiving data
generated by other nodes on the network.
• For communication to occur, two devices must
be connected in some way to the same link at the
same time.
• There are two possible types of connections:
 Point-to-Point
 Multipoint
 What is the difference between Point-
to-Point and multipoint connections?
Types of connections: point-to-point and multipoint
Point-to-Point and Multipoint
 A Point-to-Point connection provides a
dedicated link between two devices.
 A multipoint connection is one in which
more than two specific devices share
a single link.
Any Question??
Thanks

More Related Content

Similar to Introduction.pptx

#1 Physical Layer.pdf
#1 Physical Layer.pdf#1 Physical Layer.pdf
#1 Physical Layer.pdf
TamiratDejene1
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
Dr. SELVAGANESAN S
 
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptx
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptxUnit1-INTRODUCTION AND PHYSICAL LAYER.pptx
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptx
LAVANYAsrietacin
 
munsif.comma
munsif.commamunsif.comma
munsif.comma
Munsif Ullah
 
new data.pdf
new data.pdfnew data.pdf
new data.pdf
ssuserfe7de5
 
new data.pdf
new data.pdfnew data.pdf
new data.pdf
ssuserfe7de5
 
waleed khaliqi DataCommunication Lec !
waleed khaliqi DataCommunication Lec !waleed khaliqi DataCommunication Lec !
waleed khaliqi DataCommunication Lec !
Ahmad Waleed Khaliqi
 
Unit-1.docx
Unit-1.docxUnit-1.docx
Unit-1.docx
KrishnaNeupane37
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
musfirafatima3
 
Data Communications and Networks
Data Communications and NetworksData Communications and Networks
Data Communications and Networks
Kisorjan Jakathiswaran
 
Chapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptxChapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptx
PoojaBahirat1
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptx
sairakesh41
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
Sehrish Rafiq
 
Computer Networks Notes by -Dr. K. Adisesha
Computer Networks Notes by -Dr. K. AdiseshaComputer Networks Notes by -Dr. K. Adisesha
Computer Networks Notes by -Dr. K. Adisesha
Prof. Dr. K. Adisesha
 
Networking notes
Networking notesNetworking notes
Networking notes
0718928964
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
Pankaj Gautam
 
Computer network
Computer networkComputer network
Computer network
antimpanghal
 
Computer network
Computer networkComputer network
Computer network
antimpanghal
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
MDKhalik1
 
Fundamentals of data network
Fundamentals of data networkFundamentals of data network
Fundamentals of data network
Dr Reeja S R
 

Similar to Introduction.pptx (20)

#1 Physical Layer.pdf
#1 Physical Layer.pdf#1 Physical Layer.pdf
#1 Physical Layer.pdf
 
Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer Computer Networks Unit 1 Introduction and Physical Layer
Computer Networks Unit 1 Introduction and Physical Layer
 
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptx
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptxUnit1-INTRODUCTION AND PHYSICAL LAYER.pptx
Unit1-INTRODUCTION AND PHYSICAL LAYER.pptx
 
munsif.comma
munsif.commamunsif.comma
munsif.comma
 
new data.pdf
new data.pdfnew data.pdf
new data.pdf
 
new data.pdf
new data.pdfnew data.pdf
new data.pdf
 
waleed khaliqi DataCommunication Lec !
waleed khaliqi DataCommunication Lec !waleed khaliqi DataCommunication Lec !
waleed khaliqi DataCommunication Lec !
 
Unit-1.docx
Unit-1.docxUnit-1.docx
Unit-1.docx
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
 
Data Communications and Networks
Data Communications and NetworksData Communications and Networks
Data Communications and Networks
 
Chapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptxChapter No 1 Introduction to Network and Network Models.pptx
Chapter No 1 Introduction to Network and Network Models.pptx
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptx
 
Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13Introduction to Computers Lecture # 13
Introduction to Computers Lecture # 13
 
Computer Networks Notes by -Dr. K. Adisesha
Computer Networks Notes by -Dr. K. AdiseshaComputer Networks Notes by -Dr. K. Adisesha
Computer Networks Notes by -Dr. K. Adisesha
 
Networking notes
Networking notesNetworking notes
Networking notes
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
 
Computer network
Computer networkComputer network
Computer network
 
Computer network
Computer networkComputer network
Computer network
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
 
Fundamentals of data network
Fundamentals of data networkFundamentals of data network
Fundamentals of data network
 

Recently uploaded

Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 

Recently uploaded (20)

Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 

Introduction.pptx

  • 1. Data Communication and Computer Network Chapter 1: Introduction Presented by: Abdalle M. Geele abdallegeele@gmail.com
  • 2. Objectives At the end of this chapter, the learner should know the concepts of:  Data communication  Computer network  The components of data communication  The data flow  The fundamental characteristics of DC  Network criteria and network connections
  • 3. What is Computer Networking  A computer Network is a system that connects numerous independent computers in order to share resources.  The integration of computers and other different devices allows users to communicate more easily  A computer network consists of various kinds of nodes, servers and networking devices.
  • 4. Data Communications  When we communicate, we are sharing information. This sharing can be local or remote. Between individuals, local communication usually occurs face to face, while remote communication takes place over distance  The term telecommunication means communication at a distance.  The word data refers to information presented in whatever form is agreed upon by the parties creating and using the data.  Data communications are the exchange of data between two devices via some form of transmission medium such as a wire cable.
  • 5. 5/15 Five components of data communication
  • 6. Five components of data communication  Message :- is information to (Data) be communicated E.g. text, numbers, Audio, Video.  Sender :- Device that sends the Data message E.g. Computer , Work-station ,telephone handset television and so on.  Receiver:- Device that receive the message E.g. Computer , Work-station ,telephone handset television and so on.  Transmission Medium :- Physical Path in which the message travels from sender to Receiver. E.g Twisted Pair, Coaxial Cable, Fiber Optics 6/15
  • 7. Five components of data communication Conti…  Protocols:- Set of Rules that Govern the data communication.  Represent the agreement between Communication.  Without Protocol two Device can be connected but not communicate each other E.g. Just person speaks amharic can’t understand a person speak Somali. 7/15
  • 8. Four Fundamental Characteristics  Delivery :- the system must deliver data to the correct destination.  Accuracy:-the system must deliver the data accurately.  Timeliness:- The data must deliver data in a timely manner, data delivery late are useless. In case of video, and Audio, timely delivery means delivering date as they produced – this kind of delivering is known as Real-time transition.  Jitter, refers the variation of the packets arrival time 8/15 The effectiveness of data communications system depends four fundamental characteristics:
  • 9. 9/15 Data flow (simplex, half-duplex, and full-duplex)
  • 10. Data Flow  Communication between two devices can be simplex, half duplex or full duplex In Simplex mode, the communication is unidirectional, as on a one-way. Only one of the two devices on a link can transmit the other can only receive In half-duplex mode, each station can both transmit and receive but not at the same time. When one device is sending, the other can only receive and vice versa. In full-duplex mode, both stations can transmit and receive simultaneously.
  • 11.  What are the network criteria that the network must be able to meet?
  • 12. Network Criteria  A network must be able to meet a certain number of criteria. The most important of these are:  performance Reliability Security
  • 13. Performance  Performance can be measured in many ways including transit time and response time.  Transit time is the amount of time required for a message to travel from one device to another.  Response time is the elapsed time between an inquiry and a response.  The performance of a network depends on a number of factors including the number of users, the type of transmission medium, the capabilities of the connection hardware and the efficiency of the software.
  • 14. Reliability  In addition to accuracy of delivery, network reliability is measured by the frequency of failure, the time it takes a link to recover from a failure.
  • 15. Security  Network security issues include protecting data from unauthorized access, protecting data from damage and development, and implementing policies and procedures for recovery from data loss.
  • 16. NETWORKS • A network is a set of devices (often referred to as nodes) connected by communication links. A node can be a computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the network. • For communication to occur, two devices must be connected in some way to the same link at the same time. • There are two possible types of connections:  Point-to-Point  Multipoint
  • 17.  What is the difference between Point- to-Point and multipoint connections?
  • 18. Types of connections: point-to-point and multipoint
  • 19. Point-to-Point and Multipoint  A Point-to-Point connection provides a dedicated link between two devices.  A multipoint connection is one in which more than two specific devices share a single link.