0% found this document useful (0 votes)
112 views

Unit - 3 Data Communication

Communication Process, Data Transmission speed, Communication Types (modes), Data Transmission Medias, Modem and its working, characteristics, Types of Networks, LAN Topologies, Computer Protocols, Concepts relating to networking.

Uploaded by

Dr. Rupali Taru
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
0% found this document useful (0 votes)
112 views

Unit - 3 Data Communication

Communication Process, Data Transmission speed, Communication Types (modes), Data Transmission Medias, Modem and its working, characteristics, Types of Networks, LAN Topologies, Computer Protocols, Concepts relating to networking.

Uploaded by

Dr. Rupali Taru
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
You are on page 1/ 54

Overview points on:

Data communication

Unit 3
BY
Dr. Rupali Taru (Assistant Professor)
Bharati Vidyapeeth (Deemed to be University) Department of Management Studies
(Off Campus)
Navi Mumbai, MH-IN
Unit 3- Data communication

 Communication Process, Data Transmission speed, Communication Types


(modes), Data Transmission Medias, Modem and its working, characteristics,
Types of Networks, LAN Topologies, Computer Protocols, Concepts relating to
networking.
Communication Process,

 The communication process is defined as a way of communicating a


message, idea, or information from the sender by overcoming several
barriers via channels through which the message is sent to the
receiver. The communication process is a dynamic method where the sender
first conceptualizes a message and sends it to a receiver over a media
Data Transmission speed
 Transmission speed is the rate at which data packets cross a computer network
from one server to another. Transmission speed is typically measured in megabits
per second (Mbps), which equals one million bits per second, although gigabit and
even terabit speeds are becoming common. The speed of light is considered the
ideal rate of data transmission; transmission speed across cables or wires is a
fraction or percent of that

1 KHz =1000 Hz 1 MHz =1000 KHz = 1000000 Hz

1 Kbps= 1024 bps


1 Mbps=1024 Kbps
1 Gbps=1024 Mbps
1 Tbps=1024 Gbps
Data Transmission Medias
Communication Types (modes),
Modem and its working, characteristics

 A modulator-demodulator or modem is a computer hardware device that


converts data from a digital format into a format suitable for an analog
transmission medium such as telephone or radio. A modem transmits data by
modulating one or more carrier wave signals to encode digital information,
while the receiver demodulates the signal to recreate the original digital
information. The goal is to produce a signal that can be transmitted easily
and decoded reliably. Modems can be used with almost any means of
transmitting analog signals, from light-emitting diodes to radio.
Types of Networks, LAN Topologies, Computer
Protocols, Concepts relating to networking.
Networking
 Definition of Network,
 Types of Networks, Advantages of Networks,
 Network Topology,
 Internet Definition, Origin of Internet
 Working of internet and Networking devices
 Advantages of internet
 Internet threats
 Internet applications
Definition of Network,
 Computer networks allow the user to access remote programs and remote
databases either of the same organization or from other enterprises or public
sources. Computer networks provide communication possibilities faster than
other facilities.
Types of Networks
 Computer Networks may be classified on the basis of geographical area in two
broad categories. There are various types of Computer Networking options
available. The classification of network in computers can be done according to
their size as well as their purpose. The size of a network should be expressed by
the geographic area and number of computers, which are a part of their networks.
It includes devices housed in a single room to millions of devices spread across the
world. Following are the popular types of Computer Network:
PAN
 PAN (Personal Area Network) is a computer network formed around a person.
It generally consists of a computer, mobile, or personal digital assistant. PAN
can be used for establishing communication among these personal devices for
connecting to a digital network and the internet.
Characteristics of PAN
 Below are the main characteristics of PAN:
• It is mostly personal devices network equipped within a limited area.
• Allows you to handle the interconnection of IT devices at the surrounding of a single
user.
• PAN includes mobile devices, tablet, and laptop.
• It can be wirelessly connected to the internet called WPAN.
• Appliances use for PAN: cordless mice, keyboards, and Bluetooth systems.
Local Area Network (LAN)
 A Local Area Network (LAN) is a group of computer and peripheral devices which
are connected in a limited area such as school, laboratory, home, and office
building. It is a widely useful network for sharing resources like files, printers,
games, and other application. The simplest type of LAN network is to connect
computers and a printer in someone’s home or office. In general, LAN will be used
as one type of transmission medium. It is a network which consists of less than
5000 interconnected devices across several buildings.
Characteristics of LAN

 Here are the important characteristics of a LAN network:


• It is a private network, so an outside regulatory body never controls it.
• LAN operates at a relatively higher speed compared to other WAN systems.
• There are various kinds of media access control methods like token ring and
ethernet.
Wide Area Network (WAN)
 WAN (Wide Area Network) is
another important computer
which is spread across a large
area. WAN network system could
connection of a LAN which
other LAN’s using telephone lines
waves. It is mostly limited to an
an organization
Characteristics of WAN

 Below are the characteristics of WAN:


• The software files will be shared among all the users; therefore, all can access to
the latest files.
• Any organization can form its global integrated network using WAN.
Metropolitan Area Networks (MAN)
 A Metropolitan Area Network or MAN is consisting of a computer network
across an entire city, college campus, or a small region. This type of network is
large than a LAN, which is mostly limited to a single building or site. Depending
upon the type of configuration, this type of network allows you to cover an area
from several miles to tens of miles.
Characteristics of MAN

 Here are important characteristics of the MAN network:


• It mostly covers towns and cities in a maximum 50 km range
• Mostly used medium is optical fibers, cables
• Data rates adequate for distributed computing applications.
Different Types of Network

 Personal Area Network (PAN)


 Local Area Network (LAN)
 Metropolitan Area Network (MAN)
 Wide Area Network (WAN)
 Storage Area Network (SAN)
 System Area Network (SysAN)
 Enterprise Private Network (EPN)
 Virtual Private Network (VPN)
 WLAN (Wireless Local Area Network)
 POLAN- Passive Optical LAN
 Campus Area Network
Advantages of Networks,

there are other reasons why any organization should have a computer network
 cost reduction by sharing hardware and software resources
 high reliability by having multiple sources of supply
 cost reduction by downsizing to microcomputer-based networks instead of
using mainframes
 greater flexibility because of possibility to connect devices from various
vendors
Physical Topology Vs Logical Topology
 Physical topology is basically the physical layout of the network media. In contrast,
logical topology refers to the way, how data is transmitted throughout the network.
Bus topology
 Bus topology is a network type in which every computer and network device is
connected to a single cable. It transmits the data from one end to another in a single
direction. No bi-directional feature is in bus topology. It is a multi-point connection and
a non-robust topology because if the backbone fails the topology crashes. In Bus
Topology, various MAC (Media Access Control) protocols are followed by LAN ethernet
connections like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.
Advantages of this topology:

• If N devices are connected to each other in a bus topology, then the number of
cables required to connect them is 1, which is known as backbone cable, and N
drop lines are required.
• Coaxial or twisted pair cables are mainly used in bus based networks that
support up to 10 Mbps.
• The cost of the cable is less compared to other topologies, but it is used to build
small networks.
• Bus topology is familiar technology as installation and troubleshooting
techniques are well known.
Problems with this topology:
• A bus topology is quite simpler , but still it requires a lot of cabling.
• If the common cable fails, then the whole system will crash down.
• If the network traffic is heavy, it increases collisions in the network. To avoid
this, various protocols are used in the MAC layer known as Pure Aloha, Slotted
Aloha, CSMA/CD, etc.
• Adding new devices to network would slow down networks.
• Security is very low.
Ring Topology
 In this topology, it forms a ring connecting devices with exactly two neighboring
devices. A number of repeaters are used for Ring topology with a large number of
nodes, because if someone wants to send some data to the last node in the ring
topology with 100 nodes, then the data will have to pass through 99 nodes to reach
the 100th node. Hence to prevent data loss repeaters are used in the network.
 The data flows in one direction, i.e.., it is unidirectional, but it can be made
bidirectional by having 2 connections between each Network Node, it is
called Dual Ring Topology. In-Ring Topology, the Token Ring Passing protocol is
used by the workstations to transmit the data.
Star Topology
 In star topology, all the devices are connected to a single hub through a cable. This hub is the
central node and all other nodes are connected to the central node. The hub can be passive in
nature i.e., not an intelligent hub such as broadcasting devices, at the same time the hub can
be intelligent known as an active hub. Active hubs have repeaters in them. Coaxial cable or RJ-
45 cables are used to connect the computers. In Star Topology, many popular Ethernet LAN
protocols are used as CD(Collision Detection), CSMA (Carrier Sense Multiple Access), etc.
 In short a star topology having four systems connected to a single point of connection i.e. hub.
Mesh topology
 In a mesh topology, every device is connected to another device via a particular
channel. In Mesh Topology, the protocols used are AHCP (Ad Hoc
Configuration Protocols), DHCP (Dynamic Host Configuration Protocol), etc.
Tree Topology
 Tree topology is the variation of the Star topology. This topology has a hierarchical flow
of data. In Tree Topology, SAC (Standard Automatic Configuration ) protocols like DHCP
and SAC are used. In this, the various secondary hubs are connected to the central hub
which contains the repeater. This data flow from top to bottom i.e. from the central hub
to the secondary and then to the devices or from bottom to top i.e. devices to the
secondary hub and then to the central hub. It is a multi-point connection and a non-
robust topology because if the backbone fails the topology crashes.
Hybrid Topology
 This topology technology is the combination of all the various types of topologies we
have studied above. It is used when the nodes are free to take any form. It means these
can be individuals such as Ring or Star topology or can be a combination of various
types of topologies seen above. Each individual topology uses the protocol that has
been discussed earlier.
 The above figure shows the structure of the Hybrid topology. As seen it contains
a combination of all different types of networks.
Wireless networking
A wireless local-area network (LAN) uses radio waves to connect devices such as laptops
and mobile phones to the Internet and to your business network and its applications
The Components of a Wireless Network
 Several components make up a wireless network’s topology:
1. Clients: What we tend to think of as the end user devices are typically called
‘clients’. As the reach of Wi-Fi has expanded, a variety of devices may be using Wi-
Fi to connect the network, including phones, tablets, laptops, desktops, and more.
This gives users the ability to move about the area without sacrificing their bridge
to the network. In some instances, mobility within an office, warehouse, or other
work area is necessary. For example, if employees have to use scanners to register
packages due to be shipped, a wireless network provides the flexibility they need
to freely move about the warehouse.
2. Access Point (AP): An access point (AP) consists of a Wi-Fi that is advertising a
network name (known as a Service Set Identifier, or SSID). Users who connect to
this network will typically find their traffic bridged to a local-area network (LAN)
wired network (like Ethernet) for communication to the larger network or even
the internet.
Internet
 Origins of the Internet
Working of Internet
Working of Internet
functioning of internet is a 4-step process: –
World Wide Web
 The World Wide Web (WWW, W3) is an information system of interlinked
hypertext documents that are accessed via the Internet. The concept of the
Web was perfected at CERN (Centre Européen de Recherche Nucléaire) in
1991 by a group of researchers which included Tim-Berners Lee, the creator
of the hyperlink, who is today considered the father of the Web. The principle
of the Web is based on using hyperlinks to navigate between documents
(called "web pages")
Advantages of internet
Activities based on internet in almost need of all the fields now a days :
• Information, knowledge, and learning
• Research and Innovation
• Established business and startups
• Connectivity, communication, and sharing.
• Address, mapping, and contact information.
• Banking, bills, and shopping
• Selling and making money
• Collaboration, work from home, and access to a global workforce
• Donations and funding
• Entertainment and media
• Internet of Things and advancement
• Cloud computing and cloud storage
• Insurance and Investment area
Internet threats
 following categories:

 Private network threats - impact sub-networks connected to the wider global


internet. Typical examples can include home Wi-Fi or ethernet networks,
corporate intranets, and national intranets.

 Host threats - impact specific network host devices. The term host often refers to
corporate endpoints and personal devices, such as mobile phones, tablets, and
traditional computers.

 Web server threats - impact dedicated hardware and software that serve web
infrastructure and services. Internet-based threats expose people and computer
systems to harm online. A broad scope of dangers fits into this category, including
well-known threats like phishing and computer viruses.
How do internet web threats spread?
 The most concerning internet threats travel the web to attack more systems. These
threat agents often use a mix of human manipulation and technical commands to
reach their targets.

 Web threats of this nature use the internet's many communications channels to
spread. Larger threats use the global internet to respond to threats, while more
targeted threats may directly infiltrate private networks.

 Users are affected when they engage with malicious URLs, downloads, or provide
sensitive info to websites and message senders. This engagement may also trigger
infection and spread of web threats to other users and networks.
Major Threats on Internet
Internet-based threats are Malware programs which can be targeted when we use
the Internet. These Web-based threats include a range of malicious software
programs which are designed to infect victims' computers.
 Spam
 Trojan
 Phishing
 Virus
 Worms
 Pharming
• Internet Threats like pharming causing financial harm which includes
institutional losses, Compensation fees etc.
Internet applications
 Internet Applications can be described as the type of applications that use the internet for
operating successfully, that is, by using the internet for fetching, sharing and displaying the
information from the respective server systems. It can be accessed only with the help of the
internet facility, and it cannot be functional without the internet. These applications can be
classified as electronic devices based, automated digital technology, industrial internet,
smartphones based, smart home-based, smart grids, smart city, and other major applications.
Example of Healthcare industry and use
of internet application

You might also like