Types of Communication Systems
Types of Communication Systems
Twisted wire communication. Twisted-pair cable is a type of cabling that is used for
telephone communications and most modern Ethernet networks. A pair of wires forms a circuit
that can transmit data. The pairs are twisted to provide protection against crosstalk, the noise
generated by adjacent pairs
Coaxial cable communication. Coaxial cable is commonly used by cable operators, telephone
companies, and internet providers around the world to convey data, video, and
voice communications to customers. It has also been used extensively within homes. ... They are
also called RF cables, which stands for "radio frequency".
Optical fibre communication.
1 byte = 8 bits
Please enter the gigabit per second (Gbps) value to convert to Mbps. Welcome to our
online gigabits per second to megabits per second conversion calculator.
...
Gbps to Mbps Conversion Table.
IP stands for "Internet Protocol," which is the set of rules governing the format of data
sent via the internet or local network. In essence, IP addresses are the identifier that
allows information to be sent between devices on a network: they contain location
information and make devices accessible for communication
The IP address 192.168. 0.1 it's used as the default router IP address for certain
routers, including some models from Cisco, D-Link, LevelOne, Linksys, and many
others.
192.168.255.255
What is my ip address
https://whatismyipaddress.com/
IP Cow - What is my IP Address?
TCP
TCP stands for Transmission Control Protocol. It is a transport layer
protocol that facilitates the transmission of packets from source to
destination. It is a connection-oriented protocol that means it establishes
the connection prior to the communication that occurs between the
computing devices in a network. This protocol is used with an IP protocol, so
together, they are referred to as a TCP/IP.
Need of Transport Control Protocol
Bandwidth is the amount of data that can be transferred from one point to another
within a network in a specific amount of time. It is measured in bits per second.
Packet loss occurs when one or more packets of data travelling across a computer network
fail to reach their destination. Packet loss is either caused by errors in data transmission,
typically across wireless networks, or network congestion.
Jitter is when there is a time delay in the sending of these data packets over your network connection.
This is often caused by network congestion, and sometimes route changes. Essentially, the longer data
packets take to arrive, the more jitter can negatively impact the video and audio quality.
Geometric representation of how the computers are connected to each other is known as topology. There are five types
of topology – Mesh, Star, Bus, Ring and Hybrid.
Types of Topology
There are five types of topology in computer networks:
1. Mesh Topology
2. Star Topology
3. Bus Topology
4. Ring Topology
Mesh Topology
In mesh topology each device is connected to every other device on the network through a
dedicated point-to-point link. When we say dedicated it means that the link only carries
data for the two connected devices only. Lets say we have n devices in the network then each
device must be connected with (n-1) devices of the network. Number of links in a mesh topology of
n devices would be n(n-1)/2.
In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology,
star topology doesn’t allow direct communication between devices, a device must have to communicate through
hub. If one device wants to send data to other device, it has to first send the data to hub and then the hub
transmit that data to the designated device.
Advantages of Star topology
1. Less expensive because each device only need one I/O port and needs to be connected with hub with one
link.
2. Easier to install
3. Less amount of cables required because each device needs to be connected with the hub only.
4. Robust, if one link fails, other links will work just fine.
5. Easy fault detection because the link can be easily identified.
1. If hub goes down everything goes down, none of the devices can work without hub.
2. Hub requires more resources and regular maintenance because it is the central system of star topology.
Bus Topology
In bus topology there is a main cable and all the devices are connected to this main cable through drop lines.
There is a device called tap that connects the drop line to the main cable. Since all the data is transmitted over
the main cable, there is a limit of drop lines and the distance a main cable can have.
Ring Topology
In ring topology each device is connected with the two devices on either side of it. There are two dedicated point
to point links a device has with the devices on the either side of it. This structure forms a ring thus it is known as
ring topology. If a device wants to send data to another device then it sends the data in one direction, each
device in ring topology has a repeater, if the received data is intended for other device then repeater forwards
this data until the intended device receives it.
1. Easy to install.
2. Managing is easier as to add or remove a device from the topology only two links are required to be changed.
1. A link failure can fail the entire network as the signal will not travel forward due to failure.
2. Data traffic issues, since all the data is circulating in a ring.
HTTP vs HTTPS
What is HTTP?
An HTTP stands for Hypertext Transfer Protocol. The HTTP protocol provides communication
between different communication systems. When the user makes an HTTP request on the
browser, then the webserver sends the requested data to the user in the form of web pages. In
short, we can say that the HTTP protocol allows us to transfer the data from the server to the
client.
An HTTP is an application layer protocol that comes above the TCP layer. It has provided some
standard rules to the web browsers and servers, which they can use to communicate with each
other.
An HTTP is a stateless protocol as each transaction is executed separately without having any
knowledge of the previous transactions, which means that once the transaction is completed
between the web browser and the server, the connection gets lost.
What is HTTPS?
The full form of HTTPS is Hypertext Transfer Protocol Secure. The HTTP protocol does not provide
the security of the data, while HTTPs ensures the security of the data. Therefore, we can say that
HTTPS is a secure version of the HTTP protocol. This protocol allows transferring the data in an
encrypted form. The use of HTTPS protocol is mainly required where we need to enter the bank
account details. The HTTPS protocol is mainly used where we require to enter the login
credentials. In modern browsers such as chrome, both the protocols, i.e., HTTP and HTTPS, are
marked differently.
To provide encryption, HTTPS uses an encryption protocol known as Transport Layer Security, and
officially, it is referred to as a Secure Sockets Layer (SSL). This protocol uses a mechanism known
as asymmetric public key infrastructure, and it uses two different keys which are given below:
o Private key: This key is available on the web server, which is managed by the owner of a
website.
This additional feature of security is very important for those websites which transmit sensitive
data such as credit card information.
The HTTPS protocol is secured due to the SSL protocol. The SSL protocol encrypts the data which
the client transmits to the server. If someone tries to steal the information which is being
communicated between the client and the server, then he/she would not be able to understand
due to the encryption. This is the main difference between the HTTP and HTTPS that the HTTP
does not contain SSL, whereas the HTTPS contains SSL that provides secure communication
between the client and the server.