Fcet2b
Fcet2b
1. Message
2. Sender
3. Receiver
4. Transmission Medium
5. Set of rules (Protocol)
1. Message :
This is most useful asset of a data communication system. The message
simply refers to data or piece of information which is to be communicated. A
message could be in any form, it may be in form of a text file, an audio file, a
video file, etc.
2. Sender :
To transfer message from source to destination, someone must be there who
will play role of a source. Sender plays part of a source in data communication
system. It is simple a device that sends data message. The device could be in
form of a computer, mobile, telephone, laptop, video camera, or a workstation,
etc.
3. Receiver :
It is destination where finally message sent by source has arrived. It is a
device that receives message. Same as sender, receiver can also be in form
of a computer, telephone mobile, workstation, etc.
4. Transmission Medium :
In entire process of data communication, there must be something which
could act as a bridge between sender and receiver, Transmission medium
plays that part. It is physical path by which data or message travels from
sender to receiver. Transmission medium could be guided (with wires) or
unguided (without wires), for example, twisted pair cable, fiber optic cable,
radio waves, microwaves, etc.
6.
A protocol performs the following functions:
1. Data sequencing. It refers to breaking a long message into smaller packets of fixed size.
Data sequencing rules define the method of numbering packets to detect loss or
duplication of packets, and to correctly identify packets, which belong to same message.
2. Data routing. Data routing defines the most efficient path between the source and
destination.
3. Data formatting. Data formatting rules define which group of bits or characters within
packet constitute data, control, addressing, or other information.
4. Flow control. A communication protocol also prevents a fast sender from overwhelming
a slow receiver. It ensures resource sharing and protection against traffic congestion by
regulating the flow of data on communication lines.
5. Error control. These rules are designed to detect errors in messages and to ensure
transmission of correct messages. The most common method is to retransmit erroneous
message block. In such a case, a block having error is discarded by the receiver and is
retransmitted by the sender.
6. Precedence and order of transmission. These rules ensure that all the nodes get a
chance to use the communication lines and other resources of the network based on the
priorities assigned to them.
7. Connection establishment and termination. These rules define how connections are
established, maintained and terminated when two nodes of a network want to
communicate with each other.
8. Data security. Providing data security and privacy is also built into most communication
software packages. It prevents access of data by unauthorized users.
9. Log information. Several communication software are designed to develop log
information, which consists of all jobs and data communications tasks that have taken
place. Such information may be used for charging the users of the network based on their
usage of the network resources.
The effectiveness depends on four fundamental characteristics of data communications
Characteristics of Data Communications
1. Delivery:
The system must deliver data to the correct destination. Data must be received by the intended
device or user and only by that device or user.
2. Accuracy:
The system must deliver the data accurately. Data that have been altered in transmission and
left uncorrected are unusable.
3. Timeliness:
The system must deliver data in a timely manner. Data delivered late are useless. In the case of
video and audio, timely delivery means delivering data as they are produced, in the same order
that they are produced, and without significant delay. This kind of delivery is called real-time
transmission.
4. Jitter:
Jitter refers to the variation in the packet arrival time. It is the uneven delay in the delivery of
audio or video packets. For example, let us assume that video packets are sent every 3D ms. If
some of the packets arrive with 3D-ms delay and others with 4D-ms delay, an uneven quality in
the video is the result.
Data flow
o Two devices communicate with each other by sending and receiving data.
o The way in which data flow/transmitted from one device to another device is also known
as transmission mode/communication mode..
o Each communication channel has a direction associated with it, and transmission media
provide the direction. Therefore, the transmission mode is also known as a directional
mode.
o The data can flow between the two devices in the following ways: .
o Simplex mode
o Half-duplex mode
o Full-duplex mode
Simplex mode
o In Simplex mode, the communication is unidirectional, i.e., the data flow in one direction.
o A device can only send the data but cannot receive it or it can receive the data but
cannot send the data.
o This transmission mode is not very popular as mainly communications require the two-
way exchange of data. The simplex mode is used in the business field as in sales that do
not require any corresponding reply.
o The radio station is a simplex channel as it transmits the signal to the listeners but never
allows them to transmit back.
o Keyboard and Monitor are the examples of the simplex mode as a keyboard can only
accept the data from the user and monitor can only be used to display the data on the
screen.
o The main advantage of the simplex mode is that the full capacity of the communication
channel can be utilized during transmission.
o In simplex mode, the station can utilize the entire bandwidth of the communication
channel, so that more data can be transmitted at a time.
Half-Duplex mode
o In a Half-duplex channel, direction can be reversed, i.e., the station can transmit and
receive the data as well.
o Messages flow in both the directions, but not at the same time.
o The entire bandwidth of the communication channel is utilized in one direction at a time.
o In half-duplex mode, it is possible to perform the error detection, and if any error occurs,
then the receiver requests the sender to retransmit the data.
o A Walkie-talkie is an example of the Half-duplex mode. In Walkie-talkie, one party speaks,
and another party listens. After a pause, the other speaks and first party listens.
Speaking simultaneously will create the distorted sound which cannot be understood.
o In half-duplex mode, both the devices can send and receive the data and also can utilize
the entire bandwidth of the communication channel during the transmission of data.
o In half-duplex mode, when one device is sending the data, then another has to wait, this
causes the delay in sending the data at the right time.
Full-duplex mode
o In Full duplex mode, the communication is bi-directional, i.e., the data flow in both the
directions.
o Both the stations can send and receive the message simultaneously.
o Full-duplex mode has two simplex channels. One channel has traffic moving in one
direction, and another channel has traffic flowing in the opposite direction.
o The Full-duplex mode is the fastest mode of communication between devices.
o The most common example of the full-duplex mode is a telephone network. When two
people are communicating with each other by a telephone line, both can talk and listen
at the same time.
Advantage of Full-duplex mode:
o Both the stations can send and receive the data at the same time.
o If there is no dedicated path exists between the devices, then the capacity of the
communication channel is divided into two parts.
Send/Receive A device can only Both the devices Both the devices can send
send the data but can send and and receive the data
cannot receive it or it receive the data, simultaneously.
can only receive the but one at a time.
data but cannot send
it.
COMPUTER NETWORK
Definition of NETWORK :
A network is defined as a group of two or more computer systems linked
together Or
Need of networking
o File sharing: Networking of computers helps the network users to share data files.
o Hardware sharing: Users can share devices such as printers, scanners, CD-ROM drives,
hard drives etc. Without computer networks, device sharing is not possible.
o Application sharing: Applications can be shared over the network, and this allows to
implement client/server applications
o User communication: Networks allow users to communicate using e-mail, newsgroups,
and video conferencing etc.
o Network gaming: A lot of network games are available, which allow multi-users to play
from different locations.
o Voice over IP (VoIP): Voice over Internet Protocol (IP) is a revolutionary change in
telecommunication which allows to send telephone calls (voice data) using standard
Internet Protocol (IP)
o In the case of Peer-To-Peer network, it does not contain the centralized system .
Therefore, it cannot back up the data as the data is different in different locations.
o It has a security issue as the device is managed itself.
Client/Server Network
o Client/Server network is a network model designed for the end users called clients, to
access the resources such as songs, video, etc. from a central computer known as
Server.
o The central controller is known as a server while all other computers in the network are
called clients.
o A server performs all the major operations such as security and network management.
o A server is responsible for managing all the resources such as files, directories, printer,
etc.
o All the clients communicate with each other through a server. For example, if client1
wants to send some data to client 2, then it first sends the request to the server for the
permission. The server sends the response to the client 1 to initiate its communication
with the client 2.
Advantages Of Client/Server network:
o A Client/Server network contains the centralized system. Therefore we can back up the
data easily.
o A Client/Server network has a dedicated server that improves the overall performance of
the whole system.
o Security is better in Client/Server network as a single server administers the shared
resources.
o It also increases the speed of the sharing resources.
Increased storage capacity: You will be able to access files and multimedia, such
as music and images, which are stored remotely on another computer or network
-attached storage.
Higher information security: As a result of granting authorization to computers,
computer networks can provide a sense of security. Most of the time,
authorization is done using a user ID and password. Thus, it ensures that
someone can only log in if their information matches details in the database.
Easy sharing of files: The data you store on other devices can be shared with
other users and accessed remotely if they are connected.
Faster resources sharing: You can also save money by using networked
resources like printers, scanners, copiers, etc. or by sharing software among
multiple users.
Enhanced data reliability: There is no question that the information contained in
the central server is more reliable. It is also possible to access similar kinds of
data by using another computer if the information on one PC happens to be lost
for any reason. Thus, there are no disruptions in the office environment, leading
to a smooth operation.
Improved communication: Customers, suppliers and the staff can easily share
information and contact one another via email, chat or calls made over the
network.
Better collaboration: Collaboration in the business world is made easier with the
use of computers and a computer network. All these tasks can be performed
comfortably, whether it’s connecting teams, arranging social gatherings, or
acquiring personal responses.
Higher connectivity: It allows individuals to stay connected no matter where they
are. With the advent of video calling apps and Google documents, we can see live
examples of how we can connect with our friends and colleagues in these
testing times.
Enhanced flexibility: Computer networks are flexible for several reasons. They
provide users with the opportunity to explore anything they need to know.
Reliability: Computer networking ensures information backup for uninterrupted
functioning. So, you need not worry about device and equipment crash anymore.
Network Setup Costs: Setting up the network requires hardware like routers, hubs
and switches and cabling that can cost significantly. The cost further varies
based on the number of systems to be added to the network.
Issues with Independent Usage: Because everything is centralized, the network
lacks independence. As a result, individual users cannot use the computer as
they wish.
Malware Infection: Viruses or Malware can propagate easily between the
connected computers in a network. It is quite likely that malware will spread to
the remaining computers if one of the systems gets infected. However, this can
be prevented by running regular malware scans.
Expert Assistance is Required: Networks must be monitored continuously to
ensure their performance and functionality. Therefore, if you want to maintain
your computer network, you need a team of experts.
Security of Computer Networks is a Concern: From viruses to hackers, there are
many ways in which computer networks can be disrupted. DDoS attacks, viruses,
data corruption, and internet outages are just a few examples of disruptions you
might see on a day to day basis. Regardless of whether a network is running
online or offline, it will not be 100% secure.
Health Issues: Since computer networks provide access to a variety of content
such as entertainment, games, and movies, this leads to an addictive
dependence on the services and overuse. The excessive amount of screen time
can cause fatigue, eye strain, and body pain as well as make you feel lethargic.
Poor Internet Accessibility: Despite the fact that most computers nowadays offer
free access, some countries still have connectivity issues. Connectivity
challenges are particularly severe in countries that are developing. It is
impossible to guarantee a truly global network until these challenges are
overcome.
TYPES OF NETWORK
Types Of Internetwork:
1. Extranet: An extranet is a communication network based on the internet protocol such
as Transmission Control protocol and internet protocol. It is used for information sharing. The
access to the extranet is restricted to only those users who have login credentials. An extranet
is the lowest level of internetworking. It can be categorized as MAN, WAN or other computer
networks. An extranet cannot have a single LAN, at least it must have one connection to the
external network.
2. Intranet: An intranet is a private network based on the internet protocol such
as Transmission Control protocol and internet protocol. An intranet belongs to an organization
which is only accessible by the organization's employee or members. The main aim of the
intranet is to share the information and resources among the organization employees. An
intranet provides the facility to work in groups and for teleconferences.
Intranet advantages:
o Communication: It provides a cheap and easy communication. An employee of the
organization can communicate with another employee through email, chat.
o Time-saving: Information on the intranet is shared in real time, so it is time-saving.
o Collaboration: Collaboration is one of the most important advantage of the intranet. The
information is distributed among the employees of the organization and can only be
accessed by the authorized user.
o Platform independency: It is a neutral architecture as the computer can be connected to
another device with different architecture.
o Cost effective: People can see the data and documents by using the browser and
distributes the duplicate copies over the intranet. This leads to a reduction in the
Network Topology
1 . BUS Topology :
It is cost effective.
It is easy to understand.
2. RING Topology :
3. STAR Topology :
In this type of topology all the computers are connected to a single hub
through a cable. This hub is the central node and all others nodes are
connected to the central node.
Every node has its own dedicated connection to the hub.
Hub acts as a repeater for data flow.
Can be used with twisted pair, Optical Fibre or coaxial cable.
Easy to troubleshoot.
Only that node is affected which has failed, rest of the nodes can work
smoothly.
Expensive to use.
If the hub fails then the whole network is stopped because all the nodes
depend on the hub.
4. MESH Topology :
It is robust.
5. TREE Topology :
It has a root node and all other nodes are connected to it forming a
hierarchy. It is also called hierarchical topology. It should at least have
three levels to the hierarchy.
Ideal if workstations are located in groups.
Used in Wide Area Network.
Heavily cabled.
Costly.
6. HYBRID Topology :
Effective.
Flexible.
Complex in design.
Costly.
Layered Architecture
o The main aim of the layered architecture is to divide the design into small pieces.
o Each lower layer adds its services to the higher layer to provide a full set of services to
manage communications and run the applications.
o It provides modularity and clear interfaces, i.e., provides interaction between
subsystems.
o It ensures the independence between layers by providing the services from lower to
higher layer without defining how the services are implemented. Therefore, any
modification in a layer will not affect the other layers.
o The number of layers, functions, contents of each layer will vary from network to
network. However, the purpose of each layer is to provide the service from lower to a
higher layer and hiding the details from the layers of how the services are implemented.
o The basic elements of layered architecture are services, protocols, and interfaces.
o Service: It is a set of actions that a layer provides to the higher layer.
o Protocol: It defines a set of rules that a layer uses to exchange the information
with peer entity. These rules mainly concern about both the contents and order of
the messages used.
o Interface: It is a way through which the message is transferred from one layer to
another layer.
o In a layer n architecture, layer n on one machine will have a communication with the layer
n on another machine and the rules used in a conversation are known as a layer-n
protocol.
OSI Model
o OSI stands for Open System Interconnection is a reference model that describes how
information from a software application in one computer moves through a physical
medium to the software application in another computer.
o OSI consists of seven layers, and each layer performs a particular network function.
o OSI model was developed by the International Organization for Standardization (ISO) in
1984, and it is now considered as an architectural model for the inter-computer
communications.
o OSI model divides the whole task into seven smaller and manageable tasks. Each layer
is assigned a particular task.
o Each layer is self-contained, so that task assigned to each layer can be performed
independently.
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Feature of OSI Model :
It routes the signal through different channels from one node to other.
It acts as a network controller. It manages the Subnet traffic.
It decides by which route data should take.
It divides the outgoing messages into packets and assembles the
incoming packets into messages for higher levels.
Transport layer breaks the message (data) into small units so that they are
handled more efficiently by the network layer.
Presentation layer takes care that the data is sent in such a way that the
receiver will understand the information (data) and will be able to use the
data.
While receiving the data, presentation layer transforms the data to be ready
for the application layer.
Languages(syntax) can be different of the two communicating systems.
Under this condition presentation layer plays a role of translator.
It perfroms Data compression, Data encryption, Data conversion etc.