Unit - 3 Data Communication
Unit - 3 Data Communication
Data communication
Unit 3
BY
Dr. Rupali Taru (Assistant Professor)
Bharati Vidyapeeth (Deemed to be University) Department of Management Studies
(Off Campus)
Navi Mumbai, MH-IN
Unit 3- Data communication
there are other reasons why any organization should have a computer network
cost reduction by sharing hardware and software resources
high reliability by having multiple sources of supply
cost reduction by downsizing to microcomputer-based networks instead of
using mainframes
greater flexibility because of possibility to connect devices from various
vendors
Physical Topology Vs Logical Topology
Physical topology is basically the physical layout of the network media. In contrast,
logical topology refers to the way, how data is transmitted throughout the network.
Bus topology
Bus topology is a network type in which every computer and network device is
connected to a single cable. It transmits the data from one end to another in a single
direction. No bi-directional feature is in bus topology. It is a multi-point connection and
a non-robust topology because if the backbone fails the topology crashes. In Bus
Topology, various MAC (Media Access Control) protocols are followed by LAN ethernet
connections like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.
Advantages of this topology:
• If N devices are connected to each other in a bus topology, then the number of
cables required to connect them is 1, which is known as backbone cable, and N
drop lines are required.
• Coaxial or twisted pair cables are mainly used in bus based networks that
support up to 10 Mbps.
• The cost of the cable is less compared to other topologies, but it is used to build
small networks.
• Bus topology is familiar technology as installation and troubleshooting
techniques are well known.
Problems with this topology:
• A bus topology is quite simpler , but still it requires a lot of cabling.
• If the common cable fails, then the whole system will crash down.
• If the network traffic is heavy, it increases collisions in the network. To avoid
this, various protocols are used in the MAC layer known as Pure Aloha, Slotted
Aloha, CSMA/CD, etc.
• Adding new devices to network would slow down networks.
• Security is very low.
Ring Topology
In this topology, it forms a ring connecting devices with exactly two neighboring
devices. A number of repeaters are used for Ring topology with a large number of
nodes, because if someone wants to send some data to the last node in the ring
topology with 100 nodes, then the data will have to pass through 99 nodes to reach
the 100th node. Hence to prevent data loss repeaters are used in the network.
The data flows in one direction, i.e.., it is unidirectional, but it can be made
bidirectional by having 2 connections between each Network Node, it is
called Dual Ring Topology. In-Ring Topology, the Token Ring Passing protocol is
used by the workstations to transmit the data.
Star Topology
In star topology, all the devices are connected to a single hub through a cable. This hub is the
central node and all other nodes are connected to the central node. The hub can be passive in
nature i.e., not an intelligent hub such as broadcasting devices, at the same time the hub can
be intelligent known as an active hub. Active hubs have repeaters in them. Coaxial cable or RJ-
45 cables are used to connect the computers. In Star Topology, many popular Ethernet LAN
protocols are used as CD(Collision Detection), CSMA (Carrier Sense Multiple Access), etc.
In short a star topology having four systems connected to a single point of connection i.e. hub.
Mesh topology
In a mesh topology, every device is connected to another device via a particular
channel. In Mesh Topology, the protocols used are AHCP (Ad Hoc
Configuration Protocols), DHCP (Dynamic Host Configuration Protocol), etc.
Tree Topology
Tree topology is the variation of the Star topology. This topology has a hierarchical flow
of data. In Tree Topology, SAC (Standard Automatic Configuration ) protocols like DHCP
and SAC are used. In this, the various secondary hubs are connected to the central hub
which contains the repeater. This data flow from top to bottom i.e. from the central hub
to the secondary and then to the devices or from bottom to top i.e. devices to the
secondary hub and then to the central hub. It is a multi-point connection and a non-
robust topology because if the backbone fails the topology crashes.
Hybrid Topology
This topology technology is the combination of all the various types of topologies we
have studied above. It is used when the nodes are free to take any form. It means these
can be individuals such as Ring or Star topology or can be a combination of various
types of topologies seen above. Each individual topology uses the protocol that has
been discussed earlier.
The above figure shows the structure of the Hybrid topology. As seen it contains
a combination of all different types of networks.
Wireless networking
A wireless local-area network (LAN) uses radio waves to connect devices such as laptops
and mobile phones to the Internet and to your business network and its applications
The Components of a Wireless Network
Several components make up a wireless network’s topology:
1. Clients: What we tend to think of as the end user devices are typically called
‘clients’. As the reach of Wi-Fi has expanded, a variety of devices may be using Wi-
Fi to connect the network, including phones, tablets, laptops, desktops, and more.
This gives users the ability to move about the area without sacrificing their bridge
to the network. In some instances, mobility within an office, warehouse, or other
work area is necessary. For example, if employees have to use scanners to register
packages due to be shipped, a wireless network provides the flexibility they need
to freely move about the warehouse.
2. Access Point (AP): An access point (AP) consists of a Wi-Fi that is advertising a
network name (known as a Service Set Identifier, or SSID). Users who connect to
this network will typically find their traffic bridged to a local-area network (LAN)
wired network (like Ethernet) for communication to the larger network or even
the internet.
Internet
Origins of the Internet
Working of Internet
Working of Internet
functioning of internet is a 4-step process: –
World Wide Web
The World Wide Web (WWW, W3) is an information system of interlinked
hypertext documents that are accessed via the Internet. The concept of the
Web was perfected at CERN (Centre Européen de Recherche Nucléaire) in
1991 by a group of researchers which included Tim-Berners Lee, the creator
of the hyperlink, who is today considered the father of the Web. The principle
of the Web is based on using hyperlinks to navigate between documents
(called "web pages")
Advantages of internet
Activities based on internet in almost need of all the fields now a days :
• Information, knowledge, and learning
• Research and Innovation
• Established business and startups
• Connectivity, communication, and sharing.
• Address, mapping, and contact information.
• Banking, bills, and shopping
• Selling and making money
• Collaboration, work from home, and access to a global workforce
• Donations and funding
• Entertainment and media
• Internet of Things and advancement
• Cloud computing and cloud storage
• Insurance and Investment area
Internet threats
following categories:
Host threats - impact specific network host devices. The term host often refers to
corporate endpoints and personal devices, such as mobile phones, tablets, and
traditional computers.
Web server threats - impact dedicated hardware and software that serve web
infrastructure and services. Internet-based threats expose people and computer
systems to harm online. A broad scope of dangers fits into this category, including
well-known threats like phishing and computer viruses.
How do internet web threats spread?
The most concerning internet threats travel the web to attack more systems. These
threat agents often use a mix of human manipulation and technical commands to
reach their targets.
Web threats of this nature use the internet's many communications channels to
spread. Larger threats use the global internet to respond to threats, while more
targeted threats may directly infiltrate private networks.
Users are affected when they engage with malicious URLs, downloads, or provide
sensitive info to websites and message senders. This engagement may also trigger
infection and spread of web threats to other users and networks.
Major Threats on Internet
Internet-based threats are Malware programs which can be targeted when we use
the Internet. These Web-based threats include a range of malicious software
programs which are designed to infect victims' computers.
Spam
Trojan
Phishing
Virus
Worms
Pharming
• Internet Threats like pharming causing financial harm which includes
institutional losses, Compensation fees etc.
Internet applications
Internet Applications can be described as the type of applications that use the internet for
operating successfully, that is, by using the internet for fetching, sharing and displaying the
information from the respective server systems. It can be accessed only with the help of the
internet facility, and it cannot be functional without the internet. These applications can be
classified as electronic devices based, automated digital technology, industrial internet,
smartphones based, smart home-based, smart grids, smart city, and other major applications.
Example of Healthcare industry and use
of internet application