Data Communication:
Communication is defined as a process in which more than one computer transfers
information, instructions to each other and for sharing resources. Or in other words,
communication is a process or act in which we can send or receive data. A network of
computers is defined as an interconnected collection of autonomous computers. Autonomous
means no computer can start, stop or control another computer.
Data communication is the process of transferring data from one place to another or
between two locations. It allows electronic and digital data to move between two networks,
no matter where the two are located geographically, what the data contains, or what format
they are in.
Components of Data Communication
A communication system is made up of the following components:
1. Message: A message is a piece of information that is to be transmitted from one
person to another. It could be a text file, an audio file, a video file, etc.
2. Sender: It is simply a device that sends data messages. It can be a computer, mobile,
telephone, laptop, video camera, or workstation, etc.
3. Receiver: It is a device that receives messages. It can be a computer, telephone
mobile, workstation, etc.
4. Transmission Medium / Communication Channels: Communication channels are
the medium that connect two or more workstations. Workstations can be connected by
either wired media or wireless media.
5. Set of rules (Protocol): When someone sends the data (The sender), it should be
understandable to the receiver also otherwise it is meaningless. For example, Sonali
sends a message to Chetan. If Sonali writes in Hindi and Chetan cannot understand
Hindi, it is a meaningless conversation.
Therefore, there are some set of rules (protocols) that is followed by every computer
connected to the internet and they are:
TCP(Transmission Control Protocol): It is responsible for dividing messages into
packets on the source computer and reassembling the received packet at the
destination or recipient computer. It also makes sure that the packets have the
information about the source of the message data, the destination of the message data,
the sequence in which the message data should be re-assembled, and checks if the
message has been sent correctly to the specific destination.
IP(Internet Protocol): Do You ever wonder how computer determines which packet
belongs to which device. What happens if the message you sent to your friend is
received by your father? Scary Right. Well! IP is responsible for handling the address
of the destination computer so that each packet is sent to its proper destination.
Type of data communication
As we know that data communication is communication in which we can send or receive data
from one device to another. The data communication is divided into three types:
1. Simplex Communication: It is one-way communication or we can say that
unidirectional communication in which one device only receives and another device
only sends data and devices uses their entire capacity in transmission. For example,
IoT, entering data using a keyboard, listing music using a speaker, etc.
2. Half Duplex communication: It is a two-way communication, or we can say that it is
a bidirectional communication in which both the devices can send and receive data
but not at the same time. When one device is sending data then another device is only
receiving and vice-versa. For example, walkie-talkie.
3. Full-duplex communication: It is a two-way communication or we can say that it is
a bidirectional communication in which both the devices can send and receive data at
the same time. For example, mobile phones, landlines, etc.
Communication Channels
Communication channels are the medium that connects two or more workstations.
Workstations can be connected by either wired media or wireless media. It is also known as a
transmission medium. The transmission medium or channel is a link that carries messages
between two or more devices. We can group the communication media into two categories:
Guided media transmission
Unguided media transmission
1. Guided Media: In this transmission medium, the physical link is created using wires or
cables between two or more computers or devices, and then the data is transmitted using
these cables in terms of signals. Guided media transmission of the following types:
1. Twisted pair cable: It is the most common form of wire used in communication. In a
twisted-pair cable, two identical wires are wrapped together in a double helix. The twisting of
the wire reduces the crosstalk. It is known as the leaking of a signal from one wire to another
due to which signal can corrupt and can cause network errors. The twisting protects the wire
from internal crosstalk as well as external forms of signal interference. Types of Twisted Pair
Cable :
Unshielded Twisted Pair (UTP): It is used in computers and telephones widely. As
the name suggests, there is no external shielding so it does not protects from external
interference. It is cheaper than STP.
Shielded Twisted Pair (STP): It offers greater protection from crosstalk due to
shield. Due to shielding, it protects from external interference. It is heavier and
costlier as compare to UTP.
2. Coaxial Cable: It consists of a solid wire core that is surrounded by one or more foil or
wire shields. The inner core of the coaxial cable carries the signal and the outer shield
provides the ground. It is widely used for television signals and also used by large
corporations in building security systems. Data transmission of this cable is better but
expensive as compared to twisted pair.
3. Optical fibers: Optical fiber is an important technology. It transmits large amounts of data
at very high speeds due to which it is widely used in internet cables. It carries data as a light
that travels inside a thin glass fiber. The fiber optic cable is made up of three pieces:
1. Core: Core is the piece through which light travels. It is generally created using glass
or plastic.
2. Cladding: It is the covering of the core and reflects the light back to the core.
3. Sheath: It is the protective covering that protects fiber cable from the environment.
2. Unguided Media: The unguided transmission media is a transmission mode in which the
signals are propagated from one device to another device wirelessly. Signals can wave
through the air, water, or vacuum. It is generally used to transmit signals in all directions.
Unguided Media is further divided into various parts :
1. Microwave: Microwave offers communication without the use of cables. Microwave
signals are just like radio and television signals. It is used in long-distance communication.
Microwave transmission consists of a transmitter, receiver, and atmosphere. In microwave
communication, there are parabolic antennas that are mounted on the towers to send a beam
to another antenna. The higher the tower, the greater the range.
2. Radio wave: When communication is carried out by radio frequencies, then it is termed
radio waves transmission. It offers mobility. It is consists of the transmitter and the receiver.
Both use antennas to radiate and capture the radio signal.
3. Infrared: It is short-distance communication and can pass through any object. It is
generally used in TV remotes, wireless mouse, etc.
Data Communication & Computer Network
Data communications refers to the transmission of this digital data between two or more
computers and a computer network or data network is a telecommunications network that
allows computers to exchange data. The physical connection between networked computing
devices is established using either cable media or wireless media. The best-known computer
network is the Internet.
This tutorial should teach you basics of Data Communication and Computer Network (DCN)
and will also take you through various advance concepts related to Data Communication and
Computer Network.
Network Basic Understanding
A system of interconnected computers and computerized peripherals such as printers is called
computer network. This interconnection among computers facilitates information sharing
among them. Computers may connect to each other by either wired or wireless media.
Network Engineering
Networking engineering is a complicated task, which involves software, firmware, chip level
engineering, hardware, and electric pulses. To ease network engineering, the whole
networking concept is divided into multiple layers. Each layer is involved in some particular
task and is independent of all other layers. But as a whole, almost all networking tasks
depend on all of these layers. Layers share data between them and they depend on each other
only to take input and send output.
Internet
A network of networks is called an internetwork, or simply the internet. It is the
largest network in existence on this planet.The internet hugely connects all WANs and it can
have connection to LANs and Home networks. Internet uses TCP/IP protocol suite and uses
IP as its addressing protocol. Present day, Internet is widely implemented using IPv4.
Because of shortage of address spaces, it is gradually migrating from IPv4 to IPv6.
Internet enables its users to share and access enormous amount of information worldwide. It
uses WWW, FTP, email services, audio and video streaming etc. At huge level, internet
works on Client-Server model.
Internet uses very high speed backbone of fiber optics. To inter-connect various continents,
fibers are laid under sea known to us as submarine communication cable.
Applications of Communication & Computer Network
Computer systems and peripherals are connected to form a network. They provide numerous
advantages:
Resource sharing such as printers and storage devices
Exchange of information by means of e-Mails and FTP
Information sharing by using Web or Internet
Interaction with other users using dynamic web pages
IP phones
Video conferences
Parallel computing
Instant messaging
Computer Network
A computer network is a collection of computing devices that are connected with each other
for the purpose of information and resource sharing among a wide variety of users.
A system of interconnected computers and computerized peripherals such as printers is called
computer network. This interconnection among computers facilitates information sharing
among them. Computers may connect to each other by either wired or wireless media.
Features of Computer Network
The features of a computer network are −
Sharing − Computer networks enable sharing of files, software, hardware resources and
computing capabilities.
Speed: The communication speed among the components is fast enough to be comparable
with a centralized system.
Scalability − Sizes of computer networks dynamically increase with time. The networks have
to be scalable so that they can evolve adequately for future deployments.
Integration − All the components of the network work in a coordinated manner for a
seamless user experience.
Security − Networks allow security and access rights to the users for restricted sharing of
resources and information.
Cost Effectiveness − Networking reduces the deployment cost of hardware and software of a
centralized system.
Classification of Computer Networks
Computer networks are classified based on various factors. They includes:
Geographical span
Inter-connectivity
Administration
Architecture
Geographical Span
Geographically a network can be seen in one of the following categories:
It may be spanned across your table, among Bluetooth enabled devices,. Ranging not more
than few meters.
It may be spanned across a whole building, including intermediate devices to connect all
floors.
It may be spanned across a whole city.
It may be spanned across multiple cities or provinces.
It may be one network covering whole world.
Inter-Connectivity
Components of a network can be connected to each other differently in some fashion. By
connectedness we mean either logically , physically , or both ways.
Every single device can be connected to every other device on network, making the network
mesh.
All devices can be connected to a single medium but geographically disconnected, created
bus like structure.
Each device is connected to its left and right peers only, creating linear structure.
All devices connected together with a single device, creating star like structure.
All devices connected arbitrarily using all previous ways to connect each other, resulting in a
hybrid structure.
Network Architecture
Computer networks can be discriminated into various types such as Client-Server,
peer-to-peer or hybrid, depending upon its architecture.
There can be one or more systems acting as Server. Other being Client, requests the
Server to serve requests. Server takes and processes request on behalf of Clients.
Two systems can be connected Point-to-Point, or in back-to-back fashion. They both
reside at the same level and called peers.
There can be hybrid network which involves network architecture of both the above
types.
Network Applications
Computer systems and peripherals are connected to form a network.They provide numerous
advantages:
Resource sharing such as printers and storage devices
Exchange of information by means of e-Mails and FTP
Information sharing by using Web or Internet
Interaction with other users using dynamic web pages
IP phones
Video conferences
Parallel computing
Instant messaging
Generally, networks are distinguished based on their geographical span. A network
can be as small as distance between your mobile phone and its Bluetooth headphone
and as large as the internet itself, covering the whole geographical world.
Personal Area Network
A Personal Area Network (PAN) is smallest network which is very personal to a user. This
may include Bluetooth enabled devices or infra-red enabled devices. PAN has connectivity
range up to 10 meters. PAN may include wireless computer keyboard and mouse, Bluetooth
enabled headphones, wireless printers and TV remotes.
For example, Piconet is Bluetooth-enabled Personal Area Network which may contain up to 8
devices connected together in a master-slave fashion.
Local Area Network
A computer network spanned inside a building and operated under single administrative
system is generally termed as Local Area Network (LAN). Usually, LAN covers an
organization’ offices, schools, colleges or universities. Number of systems connected in LAN
may vary from as least as two to as much as 16 million.
LAN provides a useful way of sharing the resources between end users. The resources such
as printers, file servers, scanners, and internet are easily sharable among computers.
LANs are composed of inexpensive networking and routing equipment. It may contains local
servers serving file storage and other locally shared applications. It mostly operates on private
IP addresses and does not involve heavy routing. LAN works under its own local domain and
controlled centrally.
LAN uses either Ethernet or Token-ring technology. Ethernet is most widely employed LAN
technology and uses Star topology, while Token-ring is rarely seen.
LAN can be wired, wireless, or in both forms at once.
Metropolitan Area Network
The Metropolitan Area Network (MAN) generally expands throughout a city such as cable
TV network. It can be in the form of Ethernet, Token-ring, ATM, or Fiber Distributed Data
Interface (FDDI).
Metro Ethernet is a service which is provided by ISPs. This service enables its users to
expand their Local Area Networks. For example, MAN can help an organization to connect
all of its offices in a city.
Backbone of MAN is high-capacity and high-speed fiber optics. MAN works in between
Local Area Network and Wide Area Network. MAN provides uplink for LANs to WANs or
internet.
Wide Area Network
As the name suggests, the Wide Area Network (WAN) covers a wide area which may span
across provinces and even a whole country. Generally, telecommunication networks are Wide
Area Network. These networks provide connectivity to MANs and LANs. Since they are
equipped with very high speed backbone, WANs use very expensive network equipment.
WAN may use advanced technologies such as Asynchronous Transfer Mode (ATM), Frame
Relay, and Synchronous Optical Network (SONET). WAN may be managed by multiple
administration.
Internetwork
A network of networks is called an internetwork, or simply the internet. It is the largest
network in existence on this planet. The internet hugely connects all WANs and it can have
connection to LANs and Home networks. Internet uses TCP/IP protocol suite and uses IP as
its addressing protocol. Present day, Internet is widely implemented using IPv4. Because of
shortage of address spaces, it is gradually migrating from IPv4 to IPv6.
Internet enables its users to share and access enormous amount of information worldwide. It
uses WWW, FTP, email services, audio and video streaming etc. At huge level, internet
works on Client-Server model.
Internet uses very high speed backbone of fiber optics. To inter-connect various continents,
fibers are laid under sea known to us as submarine communication cable.
Internet is widely deployed on World Wide Web services using HTML linked pages and is
accessible by client software known as Web Browsers. When a user requests a page using
some web browser located on some Web Server anywhere in the world, the Web Server
responds with the proper HTML page. The communication delay is very low.
Internet is serving many proposes and is involved in many aspects of life. Some of them are:
Web sites
E-mail
Instant Messaging
Blogging
Social Media
Marketing
Networking
Resource Sharing
Audio and Video Streaming
Ethernet
Ethernet is a widely deployed LAN technology. This technology was invented by Bob
Metcalfe and D.R. Boggs in the year 1970. It was standardized in IEEE 802.3 in 1980.
Ethernet shares media. Network which uses shared media has high probability of data
collision. Ethernet uses Carrier Sense Multi Access/Collision Detection (CSMA/CD)
technology to detect collisions. On the occurrence of collision in Ethernet, all its hosts roll
back, wait for some random amount of time, and then re-transmit the data.
Ethernet connector is, network interface card equipped with 48-bits MAC address. This helps
other Ethernet devices to identify and communicate with remote devices in Ethernet.
Traditional Ethernet uses 10BASE-T specifications. The number 10 depicts 10MBPS speed,
BASE stands for baseband, and T stands for Thick Ethernet. 10BASE-T Ethernet provides
transmission speed up to 10MBPS and uses coaxial cable or Cat-5 twisted pair cable with RJ-
45 connector. Ethernet follows star topology with segment length up to 100 meters. All
devices are connected to a hub/switch in a star fashion.
Fast-Ethernet
To encompass need of fast emerging software and hardware technologies, Ethernet extends
itself as Fast-Ethernet. It can run on UTP, Optical Fiber, and wirelessly too. It can provide
speed up to 100 MBPS. This standard is named as 100BASE-T in IEEE 803.2 using Cat-5
twisted pair cable. It uses CSMA/CD technique for wired media sharing among the Ethernet
hosts and CSMA/CA (CA stands for Collision Avoidance) technique for wireless Ethernet
LAN.
Fast Ethernet on fiber is defined under 100BASE-FX standard which provides speed up to
100 MBPS on fiber. Ethernet over fiber can be extended up to 100 meters in half-duplex
mode and can reach maximum of 2000 meters in full-duplex over multimode fibers.
Giga-Ethernet
After being introduced in 1995, Fast-Ethernet could enjoy its high speed status only for 3
years till Giga-Ethernet introduced. Giga-Ethernet provides speed up to 1000 mbits/seconds.
IEEE802.3ab standardize Giga-Ethernet over UTP using Cat-5, Cat-5e and Cat-6 cables.
IEEE802.3ah defines Giga-Ethernet over Fiber.
Virtual LAN
LAN uses Ethernet which in turn works on shared media. Shared media in Ethernet create
one single Broadcast domain and one single Collision domain. Introduction of switches to
Ethernet has removed single collision domain issue and each device connected to switch
works in its separate collision domain. But even Switches cannot divide a network into
separate Broadcast domains.
Virtual LAN is a solution to divide a single Broadcast domain into multiple Broadcast
domains. Host in one VLAN cannot speak to a host in another. By default, all hosts are
placed into the same VLAN.
In this diagram, different VLANs are depicted in different color codes. Hosts in one VLAN,
even if connected on the same Switch cannot see or speak to other hosts in different VLANs.
VLAN is Layer-2 technology which works closely on Ethernet. To route packets between
two different VLANs a Layer-3 device such as Router is required.
A Network Topology is the arrangement with which computer systems or network devices
are connected to each other. Topologies may define both physical and logical aspect of the
network. Both logical and physical topologies could be same or different in a same network.
Point-to-Point
Point-to-point networks contains exactly two hosts such as computer, switches or routers,
servers connected back to back using a single piece of cable. Often, the receiving end of one
host is connected to sending end of the other and vice-versa.
If the hosts are connected point-to-point logically, then may have multiple intermediate
devices. But the end hosts are unaware of underlying network and see each other as if they
are connected directly.
Bus Topology
In case of Bus topology, all devices share single communication line or cable.Bus topology
may have problem while multiple hosts sending data at the same time. Therefore, Bus
topology either uses CSMA/CD technology or recognizes one host as Bus Master to solve the
issue. It is one of the simple forms of networking where a failure of a device does not affect
the other devices. But failure of the shared communication line can make all other devices
stop functioning.
Both ends of the shared channel have line terminator. The data is sent in only one direction
and as soon as it reaches the extreme end, the terminator removes the data from the line.
Star Topology
All hosts in Star topology are connected to a central device, known as hub device, using a
point-to-point connection. That is, there exists a point to point connection between hosts and
hub. The hub device can be any of the following:
Layer-1 device such as hub or repeater
Layer-2 device such as switch or bridge
Layer-3 device such as router or gateway
As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts to
all other hosts fails. Every communication between hosts, takes place through only the hub.
Star topology is not expensive as to connect one more host, only one cable is required and
configuration is simple.
Ring Topology
In ring topology, each host machine connects to exactly two other machines, creating a
circular network structure. When one host tries to communicate or send message to a host
which is not adjacent to it, the data travels through all intermediate hosts. To connect one
more host in the existing structure, the administrator may need only one more extra cable.
Failure of any host results in failure of the whole ring. Thus, every connection in the ring is a
point of failure. There are methods which employ one more backup ring.
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts. This topology has hosts
in point-to-point connection with every other host or may also have hosts which are in point-
to-point connection to few hosts only.
Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-
point links. Mesh technology comes into two types:
Full Mesh: All hosts have a point-to-point connection to every other host in the
network. Thus for every new host n(n-1)/2 connections are required. It provides the
most reliable network structure among all network topologies.
Partially Mesh: Not all hosts have point-to-point connection to every other host.
Hosts connect to each other in some arbitrarily fashion. This topology exists where we
need to provide reliability to some hosts out of all.
Tree Topology
Also known as Hierarchical Topology, this is the most common form of network topology in
use presently. This topology imitates as extended Star topology and inherits properties of bus
topology.
This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a
network is bifurcated into three types of network devices. The lowermost is access-layer
where computers are attached. The middle layer is known as distribution layer, which works
as mediator between upper layer and lower layer. The highest layer is known as core layer,
and is central point of the network, i.e. root of the tree from which all nodes fork.
All neighbouring hosts have point-to-point connection between them. Similar to the
Bus topology, if the root goes down, then the entire network suffers even. though it is
not the single point of failure. Every connection serves as point of failure, failing of
which divides the network into unreachable segment.
Daisy Chain
This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts are
connected to two hosts only, except the end hosts. Means, if the end hosts in daisy chain are
connected then it represents Ring topology.
Each link in daisy chain topology represents single point of failure. Every link failure splits
the network into two segments. Every intermediate host works as relay for its immediate
hosts.
Hybrid Topology
A network structure whose design contains more than one topology is said to be hybrid
topology. Hybrid topology inherits merits and demerits of all the incorporating topologies.
The above picture represents an arbitrarily hybrid topology. The combining topologies may
contain attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are connected
by means of Dual-Ring topology and networks connected to them are mostly Star topology
networks. Internet is the best example of largest Hybrid topology.
Networking engineering is a complicated task, which involves software, firmware, chip level
engineering, hardware, and electric pulses. To ease network engineering, the whole
networking concept is divided into multiple layers. Each layer is involved in some particular
task and is independent of all other layers. But as a whole, almost all networking tasks
depend on all of these layers. Layers share data between them and they depend on each other
only to take input and send output.
Layered Tasks
In layered architecture of Network Model, one whole network process is divided into small
tasks. Each small task is then assigned to a particular layer which works dedicatedly to
process the task only. Every layer does only specific work.
In layered communication system, one layer of a host deals with the task done by or to be
done by its peer layer at the same level on the remote host. The task is either initiated by layer
at the lowest level or at the top most level. If the task is initiated by the-top most layer, it is
passed on to the layer below it for further processing. The lower layer does the same thing, it
processes the task and passes on to lower layer. If the task is initiated by lower most layer,
then the reverse path is taken.
Every layer clubs together all procedures, protocols, and methods which it requires to execute
its piece of task. All layers identify their counterparts by means of encapsulation header and
tail.
OSI Model
Open System Interconnect is an open standard for all communication systems. OSI model is
established by International Standard Organization (ISO). This model has seven layers:
Application Layer: This layer is responsible for providing interface to the application
user. This layer encompasses protocols which directly interact with the user.
Presentation Layer: This layer defines how data in the native format of remote host
should be presented in the native format of host.
Session Layer: This layer maintains sessions between remote hosts. For example,
once user/password authentication is done, the remote host maintains this session for
a while and does not ask for authentication again in that time span.
Transport Layer: This layer is responsible for end-to-end delivery between hosts.
Network Layer: This layer is responsible for address assignment and uniquely
addressing hosts in a network.
Data Link Layer: This layer is responsible for reading and writing data from and
onto the line. Link errors are detected at this layer.
Physical Layer: This layer defines the hardware, cabling wiring, power output, pulse
rate etc.
Internet Model
Internet uses TCP/IP protocol suite, also known as Internet suite. This defines Internet Model
which contains four layered architecture. OSI Model is general communication model but
Internet Model is what the internet uses for all its communication. The internet is independent
of its underlying network architecture so is its Model. This model has the following layers:
Application Layer: This layer defines the protocol which enables user to interact
with the network. For example, FTP, HTTP etc.
Transport Layer: This layer defines how data should flow between hosts. Major
protocol at this layer is Transmission Control Protocol (TCP). This layer ensures data
delivered between hosts is in-order and is responsible for end-to-end delivery.
Internet Layer: Internet Protocol (IP) works on this layer. This layer facilitates host
addressing and recognition. This layer defines routing.
Link Layer: This layer provides mechanism of sending and receiving actual data.
Unlike its OSI Model counterpart, this layer is independent of underlying network
architecture and hardware
During initial days of internet, its use was limited to military and universities for research
and development purpose. Later when all networks merged together and formed internet,
the data used to travel through public transit network. Common people may send the data
that can be highly sensitive such as their bank credentials, username and passwords,
personal documents, online shopping details, or confidential documents.
All security threats are intentional i.e. they occur only if intentionally triggered. Security
threats can be divided into the following categories:
Interruption
Interruption is a security threat in which availability of resources is attacked. For
example, a user is unable to access its web-server or the web-server is hijacked.
Privacy-Breach
In this threat, the privacy of a user is compromised. Someone, who is not the
authorized person is accessing or intercepting data sent or received by the original
authenticated user.
Integrity
This type of threat includes any alteration or modification in the original context of
communication. The attacker intercepts and receives the data sent by the sender and
the attacker then either modifies or generates false data and sends to the receiver. The
receiver receives the data assuming that it is being sent by the original Sender.
Authenticity
This threat occurs when an attacker or a security violator, poses as a genuine person
and accesses the resources or communicates with other genuine users.
No technique in the present world can provide 100% security. But steps can be taken to
secure data while it travels in unsecured network or internet. The most widely used technique
is Cryptography.
Cryptography is a technique to encrypt the plain-text data which makes it difficult to
understand and interpret. There are several cryptographic algorithms available present day as
described below:
Secret Key
Public Key
Message Digest
Secret Key Encryption
Both sender and receiver have one secret key. This secret key is used to encrypt the data at
sender’s end. After the data is encrypted, it is sent on the public domain to the receiver.
Because the receiver knows and has the Secret Key, the encrypted data packets can easily be
decrypted.
Example of secret key encryption is Data Encryption Standard (DES). In Secret Key
encryption, it is required to have a separate key for each host on the network making it
difficult to manage.
Public Key Encryption
In this encryption system, every user has its own Secret Key and it is not in the shared
domain. The secret key is never revealed on public domain. Along with secret key, every user
has its own but public key. Public key is always made public and is used by Senders to
encrypt the data. When the user receives the encrypted data, he can easily decrypt it by using
its own Secret Key.
Example of public key encryption is Rivest-Shamir-Adleman (RSA).
Message Digest
In this method, actual data is not sent, instead a hash value is calculated and sent. The other
end user, computes its own hash value and compares with the one just received.If both hash
values are matched, then it is accepted otherwise rejected.
Example of Message Digest is MD5 hashing. It is mostly used in authentication where user
password is cross checked with the one saved on the server.