SlideShare a Scribd company logo
CHAPTER 5
DATA COMMUNICATIONS
SYSTEM
INTRODUCTION
• Data communication is the movement of data
and information from one point to another
point by means of electrical or electromagnetic
devices, fibre-optic cables or microwave
signals.
TELECOMMUNICATIONS SYSTEM
Telecommunications system has five
components. These are
1. Sender: - input devices.
2. Channel & Media:-channel characteristics.
• Transmission Speed.
• Transmission Mode.
• Transmission direction
Conn..
.Media
• Bounded.
• Unbounded.
3. Hardware: -
• Host Computer,
• Front end Processor,
• Modem,
• Multiplexer,
• Switch.
• Bridge
• Gateway
• Bus.
Conn…
4. Software:-
• Access Control.
• Transmission control.
• Network control & Management.
• Error detection & Correction.
• Network Security.
5. Receiver:-Output Devices.
Telecommunications Channels
• A data communications channels is a path through a medium that
data can take from sending stations to receiving stations.
Characteristic of channels are:
 Transmission Speed: -
• It is the capacity of a telecommunication channel depending on the
bandwidth. The greater bandwidth the greater amount of
information transmitted over the channel. There are three types of
bandwidth:-
 Voice-band (300 bps to9600 bps),
 Medium band (9600bps to 256000bps).
 Broadband (256000bps to a very large number.)
Conn..
 Transmission Mode:-There are two types of transmission mode
• Synchronous:-In this transmission a group of characters transmit
at a time.
• Asynchronous: - In this transmission one character transmit at a
time.
 Transmission direction:- It is the direction in which data is
transmitted . There are three types of directions:
• Simplex: - In this direction data communication devices that can
either send or receive data, but can not do both.
• Half duplex: - In this case two devices are send or received data,
but not at a time.
• Full duplex: - In this case two devices are send or received data at
a time.
Telecommunications Media
• There are two types of media over with data is
transmitted.
• Bounded media-The signals are confined to
the medium. Ex-Twisted pair cable, fibre-optic
cables, coaxial cable.
• Unbounded media-The signal are not
restricted to the medium. Ex-Microwaves.
DATA COMMUNICATIONS HARDWARE
• Host Computer:-The host performs the data
processing for the network.
• Front-end processor:-The front-end processor is
a minicomputer that acts as a buffer between the
client device and the host computer.
• Modem:-It stands for modulator-demodulator. It
is used for Digital signals are converted into
analog signals and vice-versa.
Conn..
• Multiplexer:-It is a device that permits the
simultaneous sending and receiving of
multiple messages over a signal channel.
• Switch:-It is a device which is determines the
data transmission path.
• Switches can control the transmission path
across national or local networks.
Conn..
• Bridge and gateway:-
• • A bridge is a device that separates two or more network
segments with in one logical network (e.g. a single IP-
subnet). A bridge is usually placed between two separate
groups
• of computers that talk with each other, but not that much
with the computers in the other group.
• • A gateway is a node (a router) on a TCP/IP network that
serves as an access point to another network. A default
gateway is the node on the computer network that the
network software uses when an IP address does not match
any other routes in the routing table.
• Bus: - A collection of wires through which data is
transmitted from one part of a computer to another.
DATA COMMUNICATIONS SOFTWARE
• Software enables all of the data communication hardware
units to work as one system.
• Various types of computer software are:
• Access control software: This software establishes access
between different devices, terminals and computers in the
network and checks the transmission mode, transmission
speed and transmission direction.
• It has two types:-
• 1.centralised
• 2.decentralised.
• Terminal Control Software: This software controls the
transmission of data over the network.
Conn..
• Terminal emulation software: This software enables a
microcomputer to behave like specific terminal when in
interact with a mainframe.
• Network control software: The software coordinates
controls and manages the complete operation of the
network. It establish priority for data waiting to be
transmitted, check for any transmission error, route
message, and maintain statistics system used.
• Error correction and detection software: It ensures that
errors, caused by any other problem, are detected and
connected.
• Security software: The software prevents unauthorized
access to data and monitors the use of the network.
COMMUNICATION NETWORKS
• There are five types of communication
networks:
1. Private Branch Exchanges (PBXs)
2. Integrated Services Digital Networks (ISDNs)
3. Local Area Networks (LANs)
4. Wide Area Networks (WANs)
5. Value Added Networks (VANs)
Conn..
• PBX (private branch exchange) is a telephone
system within an enterprise that switches calls
between enterprise users on local lines while
allowing all users to share a certain number of
external phone lines.
• Integrated Services Digital Networks (ISDNs):
• The ISDN is a digital communication network that
uses the public telephone network and allows
users to transmit data, voice, text, and video
communication in digital form over telephone
lines.
Conn..
Local Area Networks (LANS)
• It is connected devices share the resources of a single
processor or server within a small geographic area (for
example, within an office building).
• Major local area network technologies are: Ethernet,
Token Ring, and FDDI(fiber distributed data interface).
Wide Area Networks (WANS)
• It is a collection of computers and network resources
connected via a network over a large geographic area.
Conn..
• There are different types of set up a WAN are:-direct
distance dialing (DDD), Wide area telephone service
lines (WATS), leased lines and satellites.
• Example:-banking networks, airline reservation systems
and railway reservation systems.
• The public data networks that add value to the basic
communication services provided by common carriers
by offering specialized services are termed as value
added networks.
• The specialized services include access to commercial
databases and software, correction of transmission
errors, providing compatibility between incompatible
computers and terminals, Email, and video
conferencing.
Conn..
Value Added Networks (VANS)
• The public data networks that add value to
the basic communication services provided by
common carriers by offering specialized
services are termed as value added networks.
• The specialized services include access to
commercial databases and software,
correction of transmission errors, providing
compatibility between incompatible
computers and terminals, Email, and video
conferencing.
TOPOLOGY OF COMPUTER NETWORK
• The term topology, or more specifically, network
topology, refers to the arrangement or physical
layout of computers, cables, and other components
on the network.
• In addition to the term "topology," you will find
several other terms that are used to define a
network's design:
Physical layout
Design
Diagram
Map
Logical vs. Physical topology
• A network's physical topology is the wire itself. A
network's logical topology is the way it carries
signals on the wire.
Standard Topologies
• All network designs stem from four basic
topologies:
Bus
Star
Ring
Mesh
Bus topology
• The bus topology is often referred to as a "linear
bus" because the computers are connected in a
straight line. This is the simplest and most
common method of networking computers. It
consists of a single cable called a trunk (also
called a backbone or segment) that connects all
of the computers in the network in a single line.
Star Topology
• In the star topology, cable segments from each
computer are connected to a centralized component
called a hub. The star network offers the advantage
of centralized resources and management. However,
because each computer is connected to a central
point, this topology requires a great deal of cable in
a large network installation. Also, if the central
point fails, the entire network goes down.
• If one computer—or the cable that connects it to
the hub—fails on a star network, only the failed
computer will not be able to send or receive
network data. The rest of the network continues to
function normally.
Conn..
Ring Topology
• The ring topology connects computers on a
single circle of cable. Unlike the bus topology,
there are no terminated ends. The signals
travel around the loop in one direction and
pass through each computer. Each computer
can act as a repeater to boost (regenerate) the
signal and send it on to the next computer.
Conn..
One method of transmitting data around a ring
is called token passing. (A token is a special
series of bits that travels around a token-ring
network.
Mesh Topology
• This configuration provides redundant paths
throughout the network so that if one cable
fails, another will take over the traffic. These
networks are expensive to install because they
use a lot of cabling.
Topology Advantages and
Disadvantages
is chap5.pptx

More Related Content

Similar to is chap5.pptx

Computer networks
Computer networksComputer networks
Computer networks
Tej Kiran
 
Networking technology
Networking technologyNetworking technology
Networking technology
SmritiGurung4
 
data communication and networking
data communication and networkingdata communication and networking
data communication and networking
prashanna13
 
Itm 4
Itm 4Itm 4
ch01.ppt
ch01.pptch01.ppt
MODULE 1_Telecommunications Networks.pdf
MODULE 1_Telecommunications Networks.pdfMODULE 1_Telecommunications Networks.pdf
MODULE 1_Telecommunications Networks.pdf
MustaphaAbdullahi35
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information Technology
Sagar Mehta
 
Introduction to Computer Network
Introduction to Computer NetworkIntroduction to Computer Network
Introduction to Computer Network
Adetula Bunmi
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
Online
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standards
Midhun Menon
 
Types of cn, protocols and standards
Types of cn, protocols and standardsTypes of cn, protocols and standards
Types of cn, protocols and standards
bhavanatmithun
 
Dc lec-02 (networks)
Dc lec-02 (networks)Dc lec-02 (networks)
Dc lec-02 (networks)
diaryinc
 
Computer networks
Computer networksComputer networks
Computer networks
samina khan
 
Chapter 5 - Data Communication and Internet Technology Pt.1.pptx
Chapter 5 - Data Communication and Internet Technology Pt.1.pptxChapter 5 - Data Communication and Internet Technology Pt.1.pptx
Chapter 5 - Data Communication and Internet Technology Pt.1.pptx
BiancaBen3
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
Samit Singh
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
pavan kumar Thatikonda
 
Computer network
Computer networkComputer network
Computer network
Simran Kaur
 
networking.ppt
networking.pptnetworking.ppt
networking.ppt
suchita74
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
Manjit Chavda
 
computer network 2
computer network 2computer network 2
computer network 2
FLYMAN TECHNOLOGY LIMITED
 

Similar to is chap5.pptx (20)

Computer networks
Computer networksComputer networks
Computer networks
 
Networking technology
Networking technologyNetworking technology
Networking technology
 
data communication and networking
data communication and networkingdata communication and networking
data communication and networking
 
Itm 4
Itm 4Itm 4
Itm 4
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
MODULE 1_Telecommunications Networks.pdf
MODULE 1_Telecommunications Networks.pdfMODULE 1_Telecommunications Networks.pdf
MODULE 1_Telecommunications Networks.pdf
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information Technology
 
Introduction to Computer Network
Introduction to Computer NetworkIntroduction to Computer Network
Introduction to Computer Network
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standards
 
Types of cn, protocols and standards
Types of cn, protocols and standardsTypes of cn, protocols and standards
Types of cn, protocols and standards
 
Dc lec-02 (networks)
Dc lec-02 (networks)Dc lec-02 (networks)
Dc lec-02 (networks)
 
Computer networks
Computer networksComputer networks
Computer networks
 
Chapter 5 - Data Communication and Internet Technology Pt.1.pptx
Chapter 5 - Data Communication and Internet Technology Pt.1.pptxChapter 5 - Data Communication and Internet Technology Pt.1.pptx
Chapter 5 - Data Communication and Internet Technology Pt.1.pptx
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
Computer network
Computer networkComputer network
Computer network
 
networking.ppt
networking.pptnetworking.ppt
networking.ppt
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
computer network 2
computer network 2computer network 2
computer network 2
 

More from Teshome48

installandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptxinstallandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptx
Teshome48
 
Chapter 4 EThics, CSR, Sustainability, & Governance.pptx
Chapter 4 EThics, CSR, Sustainability, & Governance.pptxChapter 4 EThics, CSR, Sustainability, & Governance.pptx
Chapter 4 EThics, CSR, Sustainability, & Governance.pptx
Teshome48
 
Chapter 1 Overview of OB.ppt
Chapter 1 Overview of OB.pptChapter 1 Overview of OB.ppt
Chapter 1 Overview of OB.ppt
Teshome48
 
Chapter 5 The External, Industry, and Competitive Analysis.ppt
Chapter 5 The External, Industry, and Competitive Analysis.pptChapter 5 The External, Industry, and Competitive Analysis.ppt
Chapter 5 The External, Industry, and Competitive Analysis.ppt
Teshome48
 
Chapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptx
Chapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptxChapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptx
Chapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptx
Teshome48
 
Chapter 1_ Overview of International Business.pptx
Chapter 1_ Overview of International Business.pptxChapter 1_ Overview of International Business.pptx
Chapter 1_ Overview of International Business.pptx
Teshome48
 
Chapter 2 Globalization.pptx
Chapter 2 Globalization.pptxChapter 2 Globalization.pptx
Chapter 2 Globalization.pptx
Teshome48
 
Research Methodology(1).pptx
Research Methodology(1).pptxResearch Methodology(1).pptx
Research Methodology(1).pptx
Teshome48
 
Entrepreneurship PPT - Yohannes.pptx
Entrepreneurship PPT - Yohannes.pptxEntrepreneurship PPT - Yohannes.pptx
Entrepreneurship PPT - Yohannes.pptx
Teshome48
 
QA CHAPTER I.pptx
QA CHAPTER I.pptxQA CHAPTER I.pptx
QA CHAPTER I.pptx
Teshome48
 
Operations Management PPT RVU 2022.ppt
Operations Management  PPT RVU   2022.pptOperations Management  PPT RVU   2022.ppt
Operations Management PPT RVU 2022.ppt
Teshome48
 
Zelalem final power point..pptx
Zelalem final power point..pptxZelalem final power point..pptx
Zelalem final power point..pptx
Teshome48
 
QA CHAPTER III and IV(1)(1).pdf
QA CHAPTER III and IV(1)(1).pdfQA CHAPTER III and IV(1)(1).pdf
QA CHAPTER III and IV(1)(1).pdf
Teshome48
 
is chap 6.pptx
is chap 6.pptxis chap 6.pptx
is chap 6.pptx
Teshome48
 
Data Link Control.ppt
Data Link Control.pptData Link Control.ppt
Data Link Control.ppt
Teshome48
 
Chapter 2Management Theories.ppt
Chapter 2Management Theories.pptChapter 2Management Theories.ppt
Chapter 2Management Theories.ppt
Teshome48
 
journal.docx
journal.docxjournal.docx
journal.docx
Teshome48
 
amtreuf.docx
amtreuf.docxamtreuf.docx
amtreuf.docx
Teshome48
 
fra'ool ass.pptx
fra'ool ass.pptxfra'ool ass.pptx
fra'ool ass.pptx
Teshome48
 
ababa pre.pptx
ababa pre.pptxababa pre.pptx
ababa pre.pptx
Teshome48
 

More from Teshome48 (20)

installandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptxinstallandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptx
 
Chapter 4 EThics, CSR, Sustainability, & Governance.pptx
Chapter 4 EThics, CSR, Sustainability, & Governance.pptxChapter 4 EThics, CSR, Sustainability, & Governance.pptx
Chapter 4 EThics, CSR, Sustainability, & Governance.pptx
 
Chapter 1 Overview of OB.ppt
Chapter 1 Overview of OB.pptChapter 1 Overview of OB.ppt
Chapter 1 Overview of OB.ppt
 
Chapter 5 The External, Industry, and Competitive Analysis.ppt
Chapter 5 The External, Industry, and Competitive Analysis.pptChapter 5 The External, Industry, and Competitive Analysis.ppt
Chapter 5 The External, Industry, and Competitive Analysis.ppt
 
Chapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptx
Chapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptxChapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptx
Chapter_5_New_Market_Segmentation,_Targeting_and_Positioning.pptx
 
Chapter 1_ Overview of International Business.pptx
Chapter 1_ Overview of International Business.pptxChapter 1_ Overview of International Business.pptx
Chapter 1_ Overview of International Business.pptx
 
Chapter 2 Globalization.pptx
Chapter 2 Globalization.pptxChapter 2 Globalization.pptx
Chapter 2 Globalization.pptx
 
Research Methodology(1).pptx
Research Methodology(1).pptxResearch Methodology(1).pptx
Research Methodology(1).pptx
 
Entrepreneurship PPT - Yohannes.pptx
Entrepreneurship PPT - Yohannes.pptxEntrepreneurship PPT - Yohannes.pptx
Entrepreneurship PPT - Yohannes.pptx
 
QA CHAPTER I.pptx
QA CHAPTER I.pptxQA CHAPTER I.pptx
QA CHAPTER I.pptx
 
Operations Management PPT RVU 2022.ppt
Operations Management  PPT RVU   2022.pptOperations Management  PPT RVU   2022.ppt
Operations Management PPT RVU 2022.ppt
 
Zelalem final power point..pptx
Zelalem final power point..pptxZelalem final power point..pptx
Zelalem final power point..pptx
 
QA CHAPTER III and IV(1)(1).pdf
QA CHAPTER III and IV(1)(1).pdfQA CHAPTER III and IV(1)(1).pdf
QA CHAPTER III and IV(1)(1).pdf
 
is chap 6.pptx
is chap 6.pptxis chap 6.pptx
is chap 6.pptx
 
Data Link Control.ppt
Data Link Control.pptData Link Control.ppt
Data Link Control.ppt
 
Chapter 2Management Theories.ppt
Chapter 2Management Theories.pptChapter 2Management Theories.ppt
Chapter 2Management Theories.ppt
 
journal.docx
journal.docxjournal.docx
journal.docx
 
amtreuf.docx
amtreuf.docxamtreuf.docx
amtreuf.docx
 
fra'ool ass.pptx
fra'ool ass.pptxfra'ool ass.pptx
fra'ool ass.pptx
 
ababa pre.pptx
ababa pre.pptxababa pre.pptx
ababa pre.pptx
 

Recently uploaded

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 

Recently uploaded (20)

Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 

is chap5.pptx

  • 2. INTRODUCTION • Data communication is the movement of data and information from one point to another point by means of electrical or electromagnetic devices, fibre-optic cables or microwave signals.
  • 3. TELECOMMUNICATIONS SYSTEM Telecommunications system has five components. These are 1. Sender: - input devices. 2. Channel & Media:-channel characteristics. • Transmission Speed. • Transmission Mode. • Transmission direction
  • 4. Conn.. .Media • Bounded. • Unbounded. 3. Hardware: - • Host Computer, • Front end Processor, • Modem, • Multiplexer, • Switch. • Bridge • Gateway • Bus.
  • 5. Conn… 4. Software:- • Access Control. • Transmission control. • Network control & Management. • Error detection & Correction. • Network Security. 5. Receiver:-Output Devices.
  • 6. Telecommunications Channels • A data communications channels is a path through a medium that data can take from sending stations to receiving stations. Characteristic of channels are:  Transmission Speed: - • It is the capacity of a telecommunication channel depending on the bandwidth. The greater bandwidth the greater amount of information transmitted over the channel. There are three types of bandwidth:-  Voice-band (300 bps to9600 bps),  Medium band (9600bps to 256000bps).  Broadband (256000bps to a very large number.)
  • 7. Conn..  Transmission Mode:-There are two types of transmission mode • Synchronous:-In this transmission a group of characters transmit at a time. • Asynchronous: - In this transmission one character transmit at a time.  Transmission direction:- It is the direction in which data is transmitted . There are three types of directions: • Simplex: - In this direction data communication devices that can either send or receive data, but can not do both. • Half duplex: - In this case two devices are send or received data, but not at a time. • Full duplex: - In this case two devices are send or received data at a time.
  • 8. Telecommunications Media • There are two types of media over with data is transmitted. • Bounded media-The signals are confined to the medium. Ex-Twisted pair cable, fibre-optic cables, coaxial cable. • Unbounded media-The signal are not restricted to the medium. Ex-Microwaves.
  • 9. DATA COMMUNICATIONS HARDWARE • Host Computer:-The host performs the data processing for the network. • Front-end processor:-The front-end processor is a minicomputer that acts as a buffer between the client device and the host computer. • Modem:-It stands for modulator-demodulator. It is used for Digital signals are converted into analog signals and vice-versa.
  • 10. Conn.. • Multiplexer:-It is a device that permits the simultaneous sending and receiving of multiple messages over a signal channel. • Switch:-It is a device which is determines the data transmission path. • Switches can control the transmission path across national or local networks.
  • 11. Conn.. • Bridge and gateway:- • • A bridge is a device that separates two or more network segments with in one logical network (e.g. a single IP- subnet). A bridge is usually placed between two separate groups • of computers that talk with each other, but not that much with the computers in the other group. • • A gateway is a node (a router) on a TCP/IP network that serves as an access point to another network. A default gateway is the node on the computer network that the network software uses when an IP address does not match any other routes in the routing table. • Bus: - A collection of wires through which data is transmitted from one part of a computer to another.
  • 12. DATA COMMUNICATIONS SOFTWARE • Software enables all of the data communication hardware units to work as one system. • Various types of computer software are: • Access control software: This software establishes access between different devices, terminals and computers in the network and checks the transmission mode, transmission speed and transmission direction. • It has two types:- • 1.centralised • 2.decentralised. • Terminal Control Software: This software controls the transmission of data over the network.
  • 13. Conn.. • Terminal emulation software: This software enables a microcomputer to behave like specific terminal when in interact with a mainframe. • Network control software: The software coordinates controls and manages the complete operation of the network. It establish priority for data waiting to be transmitted, check for any transmission error, route message, and maintain statistics system used. • Error correction and detection software: It ensures that errors, caused by any other problem, are detected and connected. • Security software: The software prevents unauthorized access to data and monitors the use of the network.
  • 14. COMMUNICATION NETWORKS • There are five types of communication networks: 1. Private Branch Exchanges (PBXs) 2. Integrated Services Digital Networks (ISDNs) 3. Local Area Networks (LANs) 4. Wide Area Networks (WANs) 5. Value Added Networks (VANs)
  • 15. Conn.. • PBX (private branch exchange) is a telephone system within an enterprise that switches calls between enterprise users on local lines while allowing all users to share a certain number of external phone lines. • Integrated Services Digital Networks (ISDNs): • The ISDN is a digital communication network that uses the public telephone network and allows users to transmit data, voice, text, and video communication in digital form over telephone lines.
  • 16. Conn.. Local Area Networks (LANS) • It is connected devices share the resources of a single processor or server within a small geographic area (for example, within an office building). • Major local area network technologies are: Ethernet, Token Ring, and FDDI(fiber distributed data interface). Wide Area Networks (WANS) • It is a collection of computers and network resources connected via a network over a large geographic area.
  • 17. Conn.. • There are different types of set up a WAN are:-direct distance dialing (DDD), Wide area telephone service lines (WATS), leased lines and satellites. • Example:-banking networks, airline reservation systems and railway reservation systems. • The public data networks that add value to the basic communication services provided by common carriers by offering specialized services are termed as value added networks. • The specialized services include access to commercial databases and software, correction of transmission errors, providing compatibility between incompatible computers and terminals, Email, and video conferencing.
  • 18. Conn.. Value Added Networks (VANS) • The public data networks that add value to the basic communication services provided by common carriers by offering specialized services are termed as value added networks. • The specialized services include access to commercial databases and software, correction of transmission errors, providing compatibility between incompatible computers and terminals, Email, and video conferencing.
  • 19. TOPOLOGY OF COMPUTER NETWORK • The term topology, or more specifically, network topology, refers to the arrangement or physical layout of computers, cables, and other components on the network. • In addition to the term "topology," you will find several other terms that are used to define a network's design: Physical layout Design Diagram Map
  • 20. Logical vs. Physical topology • A network's physical topology is the wire itself. A network's logical topology is the way it carries signals on the wire. Standard Topologies • All network designs stem from four basic topologies: Bus Star Ring Mesh
  • 21. Bus topology • The bus topology is often referred to as a "linear bus" because the computers are connected in a straight line. This is the simplest and most common method of networking computers. It consists of a single cable called a trunk (also called a backbone or segment) that connects all of the computers in the network in a single line.
  • 22. Star Topology • In the star topology, cable segments from each computer are connected to a centralized component called a hub. The star network offers the advantage of centralized resources and management. However, because each computer is connected to a central point, this topology requires a great deal of cable in a large network installation. Also, if the central point fails, the entire network goes down. • If one computer—or the cable that connects it to the hub—fails on a star network, only the failed computer will not be able to send or receive network data. The rest of the network continues to function normally.
  • 24. Ring Topology • The ring topology connects computers on a single circle of cable. Unlike the bus topology, there are no terminated ends. The signals travel around the loop in one direction and pass through each computer. Each computer can act as a repeater to boost (regenerate) the signal and send it on to the next computer.
  • 25. Conn.. One method of transmitting data around a ring is called token passing. (A token is a special series of bits that travels around a token-ring network.
  • 26. Mesh Topology • This configuration provides redundant paths throughout the network so that if one cable fails, another will take over the traffic. These networks are expensive to install because they use a lot of cabling.