5 GOAT Computer Awareness PDF - Data Communication and Networking
5 GOAT Computer Awareness PDF - Data Communication and Networking
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
When we communicate, we are sharing information. This sharing can be local or remote. Between
individuals, local communication usually occurs face to face, while remote communication takes place
over distance. The word data refers to information presented in whatever form is agreed upon by the
Data communication means the exchange of data between two devices via some form of transmission
medium such as a wire cable. For data communications to occur, the communicating devices must be
part of a communication system made up of a combination of hardware (physical equipment) and
software (programs). The effectiveness of a data communications system depends on four fundamental
Delivery: -The system must deliver data to the correct destination. Data must be received by the
Accuracy: -The system must deliver the data accurately. Data that have been altered in
transmission and left uncorrected are unusable.
Timeliness: -The system must deliver data in a timely manner. Data delivered late are useless. In
the case of video and audio, timely delivery means delivering data as they are produced, in the
same order that they are produced, and without significant delay. This kind of delivery is called
real-time transmission.
Jitter: -Jitter refers to the variation in the packet arrival time. It is the uneven delay in the delivery
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
Sender: - The sender is the device that sends the data message. It can be a computer,
agreement between the communicating devices. Without a protocol, two devices may be
connected but not communicating.
Networking Topologies
Mesh: -In a mesh topology, every device has a dedicated point-to-point link to every other device
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
Star: - In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub. The devices are not directly linked to one another. Unlike a mesh
topology, a star topology does not allow direct traffic between devices.
Bus: - A bus topology is a multipoint connection. One long cable acts as a backbone to link all the
devices in a network.
Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection running
between the device and the main cable. A tap is a connector that either splices into the main cable or
punctures the sheathing of a cable to create a contact with the metallic core.
Ring: - In a ring topology, each device has a dedicated point-to-point connection with only the two
devices on either side of it. A signal is passed along the ring in one direction, from device to
device, until it reaches its destination.
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
Hybrid Topology A Hybrid topology is a connection between different links and nodes to transfer
the data. It is the combination of various different topologies
wireless or optical links so that various devices can interact with each other through a network. The aim
Resource sharing: - Resource sharing is the sharing of resources such as programs, printers, and
data among the users on the network without the requirement of the physical location of the
resource and user.
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
E-commerce: -Computer network is also important in businesses. We can do the business over
the internet. For example, amazon.com is doing their business over the internet, i.e., they are
doing their business over the internet.
Communication medium: - Computer network behaves as a communication medium among the
users. For example, a company contains more than one computer has an email system which the
employees use for daily communication.
File sharing: - Files can be transferred on a network faster than any other medium.
Categories of network: -
LAN (Local Area Network): - A LAN connects network devices over a relatively short distance. A
networked office building, school, or home usually contains a single LAN, though sometimes one
building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span
a group of nearby buildings. A LAN is very useful for sharing resources, such as data storage and
printers. LANs can be built with relatively inexpensive hardware, such as hubs, network adapters
and Ethernet cables.
MAN (Metropolitan Area Network): - MAN consists of a computer network across an entire city,
college campus or small region. A MAN is larger than a LAN, which is typically limited to a single
building or site. Depending on the configuration, this type of network can cover an area from
several miles to tens of miles. A MAN is often used to connect several LANs together to form a
bigger network.
WAN (Wide Area Network): -A WAN provides long distance transmission of data, image, audio,
and video information over large geographic areas that may comprise a country, a continent, or
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
CAN (Campus Area Network): - A campus area networks (CANs) is a computer network
interconnecting a few local area networks (LANs) within a university campus or corporate campus
Network.
PAN (Personal Area Network): -A personal area network is a computer network organized around
an individual person. Personal area networks typically involve a mobile computer, Personal area
networks can be constructed with cables or wireless.
A protocol is a set of rules that govern data communication. A protocol defines what is communicated,
Syntax: - syntax refers to the structure or format of the data, meaning the order in which they are
presented.
sent
Modes Of Transmission
The way in which data is transmitted from one device to another device is known as transmission mode.
Each communication channel has a direction associated with it, and transmission media provide the
Simplex mode: -In Simplex mode, the communication is unidirectional, i.e., the data flow in one
direction. Example, a radio station is an example of Simplex mode communication.
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
Half-Duplex mode: - In a Half-duplex channel, direction can be reversed, i.e., the station can
transmit and receive the data as well. Messages flow in both the directions, but not at the same
time.
Full-duplex mode: - In Full duplex mode, the communication is bi-directional, i.e., the data flow in
both the directions. Both the stations can send and receive the message simultaneously.
TRANSMISSION MEDIUM
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
Guided media: -Guided media, which are those that provide a conduit from one device to another,
include Twisted-Pair Cable, Coaxial Cable, and Fibre-Optic Cable. A signal travelling along any of these
media is directed and contained by the physical limits of the medium.
Twisted Pair Cable: - This cable is the most commonly used and is cheaper than others. It is
lightweight, cheap, can be installed easily, and they support many different types of network. Its
frequency range is 0 to 3.5 kHz. A twisted pair consists of two conductors (normally copper), each
plastic. The core is surrounded by a cladding that reflects light back into the core. Each fibre is
Coaxial Cable: - These contain two conductors that are parallel to each other. Copper is used in
this as centre conductor which can be a solid wire or a standard one. It is surrounded by PVC
installation, a sheath which is encased in an outer conductor of metal foil, braid or both.
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
Unguided Transmission: - Unguided transmission is used when running a physical cable (either fibre or
Radio waves: - These are the electromagnetic waves having a frequency range of 3KHz-1GHz.
These are omnidirectional i.e. the senders and receivers do not have to be in line of sight with
each other. These can penetrate walls and are prone to interference.
Microwaves: - These are the electromagnetic waves having frequencies ranging from 1 to
300GHz. They are unidirectional and incorporates two antennas (sending & receiving) which
should be aligned or in line of sight with each other. They provide higher data rate but Very high
frequency microwaves are unable to penetrate the walls.
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
Modem: Modem stands for Modulator-Demodulator. It is used to connect computers for communication
Hub: It works at the Physical layer. It just acts like a connector of several computers i.e it simply
connects all the devices on its ports together .It broadcasts all the data packets arriving at it with no
filtering capacity.
Switch: Switch is data link layer device. A network switch connects computers to each other, like a hub.
Where the switch differs from a hub is in the way it handles packets of data. When a switch receives a
packet of data, it determines what computer or device the packet is intended for and sends it to that
computer only. It does not broadcast the packet to all computers as a hub does which means bandwidth
is not shared and makes the network much more efficient.
Repeater: It operates at the physical layer. It is used to amplify a signal that has lost its original strength
so as to enable them to travel long distances. It can only join the networks that transmit similar data
packets. It does not have filtering capacity i.e. all data including noise is amplified and passed on in the
Router: It works at the network layer and is used to connect different networks that have different
architectures and protocols. It sends the data packets to desired destination by choosing the best path
available thus reducing network traffic. It routes the data packets using the routing table that contains all
the Information regarding all known network addresses, possible paths and cost of transmission over
them.
Gateway: It operates in all the layers of the network architecture. It can be used to connect two different
networks having different architectures, environment and even models. It converts the data packets in
form that is suitable to the destination application. The two different networks may differ in types of
Bridge: They are used two connect two LANs with the same standard but using different types of cables.
It provides an intelligent connection by allowing only desired messages to cross the bridge thus
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
improving performance. It uses physical addresses of the packets for this decision. It works on data link
Brouter: A brouter is a device that functions as both a bridge and a router. It can forward data between
networks (serving as a bridge), but can also route data to individual systems within a network (serving
as a router). The brouters functions at the network and data link layer of the OSI model.
Bridge Router
A bridge transfers the data in the form of A router transfers the data in the form of
frames. packets
The bridge does not use any table to The router uses a routing table to send
forward the data the data.
NIC (network interface card): - NIC is a hardware component used to connect a computer with another
computer onto a network. The MAC address or physical address is encoded on the network card chip
which is assigned by the IEEE to identify a network card uniquely. The MAC address is stored in the
PROM (Programmable read-only memory). It is also called network interface controller, network adapter
or LAN adapter. There are two types of NIC: Wired NIC &Wireless NIC.
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
Computer Network Architecture is defined as the physical and logical design of the software, hardware,
protocols, and media of the transmission of data. Simply we can say that how computers are organized
and how tasks are allocated to the computer.
Peer-To-Peer network: - It is a network in which all the computers are linked together with equal
privilege and responsibilities for processing the data. Peer-To-Peer network is useful for small
Special permissions are assigned to each computer for sharing the resources, but this can lead to
a problem if the computer with the resource is down
Client/Server network: - It is a network model designed for the end users called clients, to access
the resources such as songs, video, etc. from a central computer known as Server. The central
controller is known as a server while all other computers in the network are called clients. A
server performs all the major operations such as security and network management. A server is
responsible for managing all the resources such as files, directories, printer, etc.
Network Models
OSI Model
OSI (Open System Interconnection) Model was developed by International Standards Organisation
(ISO) to standardize the network architecture internationally. The purpose of the OSI Model is to show
how facilitate communication between different system without requiring changes to the logic of the
underlying hardware and software. It is a layered framework having seven layers.
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
Layer 1-The Physical layer: - Physical layer coordinates the function required to carry a bit stream over a
physical medium. It defines the mechanical, electrical & physical specifications of the interface & the
transmission medium used for communication. It determines how a cable is attached with LAN card & is
responsible for transmitting bit stream from one computer to another.
1. It defines the characteristics of the interface between the device and the transmission medium.
2. Data in this layer consists of stream of bits. The bits must be encoded into signals for
transmission. It defines the type of encoding i.e. how 0's and 1's are changed to signal.
3. This layer defines the rate of transmission which is the number of bits per second.
4. It deals with the synchronization of the transmitter and receiver. The sender and receiver are
synchronized at bit level.
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
5. The Physical layer is concerned with the connection of devices to the media. It connects the
Layer 2- The Data Link Layer: - The data link layer is most reliable node to node delivery of data. It
forms frames from the packets that are received from network layer and gives it to physical layer. It also
synchronizes the information which is to be transmitted over the data. Error controlling is easily done.
The encoded data are then passed to physical.
Logical Link Control: It deals with protocols, flow-control, and error control.
Media Access Control: It deals with actual control of media
Framing: - The datalink layer divides the stream of bits received from the network layer into
manageable data units called frames.
Physical addressing: - The Data Link layer adds a header to the frame in order to define physical
address of the sender or receiver of the frame, if the frames are to be distributed to different
systems on the network.
Flow control: - If the rate at which the data are absorbed by the receiver is less than the rate at
which data are produced in the sender, the data link layer imposes a flow control mechanism to
avoid overwhelming the receiver.
Error control: -The data link layer adds reliability to the physical layer by adding mechanisms to
detect and retransmit damaged or lost frames. It also uses a mechanism to recognize duplicate
frames.
Access control: -When two or more devices are connected to the same link, data link layer
protocols are necessary to determine which device has control over the link at any given time.
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
Layer 3-The Network Layer: -The network layer is responsible for the source-to-destination delivery of a
packet, possibly across multiple networks(links). The function of network layer called routing.
Logical addressing: - It translates logical network address into physical address. It is concerned
of networks) or a large networks, the connecting device (called routers or switches) routes or
switch the packets to their final destinations.
Layer 4-The Transport Layer: -The transport layer is responsible for process-to-process delivery of the
entire message. A process is an application program running on a host, whereas the network layer
oversees source-to-destination delivery of individual packets, it does not recognize any relationship
The transport layer on the other hand, ensures that the whole message arrives intact and in order,
overseeing both error control and flow control at the source-to-destination level.
Service-point addressing: -Transport Layer header includes service point address which is port
address. This layer gets the message to the correct process on the computer unlike Network
Segmentation and reassembly: -A message is divided into segments; each segment contains
sequence number, which enables this layer in reassembling the message. Message is
reassembled correctly upon arrival at the destination and replaces packets which were lost in
transmission.
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
the transport layer at the destination machine. A connection-oriented transport layer makes a
connection with the transport layer at the destination machine first before delivering the packets.
After all the data are transfer, the connection is terminated.
Flow control: -In this layer, flow control is performed end to end.
Error control: -Error Control is performed end to end in this layer to ensure that the complete
message arrives at the receiving transport layer without any error. Error Correction is done
through retransmission.
Layer 5-The Session Layer: -The session layer is the network dialog controller. It establishes, maintains
and synchronizes the interaction among communicating system.
Dialog Control: -The session layer allows two systems to enter into dialog. It allows the
communication between two processes to take place in either half-dulex or full duplex mode.
Synchronization: -The session layer allows a process to add checkpoints, or synchronization
Layer 6-The Presentation Layer: -The presentation layer is concerned with the syntax and semantics of
the information exchange between two systems.
Translation: -Before being transmitted, information in the form of characters and numbers should
be changed to bit streams. The presentation layer is responsible for interoperability between
encoding methods as different computers use different encoding methods. It translates data
between the formats the network requires and the format the computer.
Encryption: -To carry sensitive information, a system must be able to ensure privacy. Encryption
means that the sender transforms the original information to another form and sends the resulting
message out over the network. Decryption reverse the original process to transform the message
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
Compression: -Data compression reduces the number of bits contained in the information. Data
compression becomes particularly important in the transmission of multimedia such as text, audio
and video
Layer 7-Application Layer: The application layer enables the user, whether human or software, to
access the network. It provides user interface and support for services such as electronic mail, remote
file access and transfer, a shared database management, and other type of distributed information
services.
Network Virtual terminal: -It allows a user to log on to a remote host. The application creates
software emulation of a terminal at the remote host. User's computer talks to the software
terminal which in turn talks to the host and vice versa. Then the remote host believes it is
communicating with one of its own terminals and allows user to log on.
File transfer, access, and management: -It is a standard mechanism to access files and manages
it. Users can access files in a remote computer and manage it. They can also retrieve files from a
remote computer.
Mail Services: -This layer provides the basis for E-mail forwarding and storage.
Directory Services: -This layer provides access for global information about various services.
TCP/IP Model
TCP/IP means Transmission Control Protocol and Internet Protocol. The TCP/IP protocol suite was
developed prior to the OSI model. The layers of the TCP/IP protocol suite contain relatively independent
protocol that can be mixed and matched depending on the needs of the system.
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
Layer 1- Network Interface Layer: -It is responsible for breaking down the data packets from Internet
layer into frames which are then converted into bits for transmission across the physical media. Here,
Ethernet, FDDI, Token ring etc. The Network Interface layer encompasses the Data Link and Physical
Ethernet: -Ethernet is the most popular physical layer LAN technology in use today. Other LAN types
include Token Ring, Fast Ethernet, Fibre Distributed Data Interface (FDDI), Asynchronous Transfer
Mode (ATM) and LocalTalk. Ethernet is popular because it strikes a good balance between speed, cost
Fast Ethernet: -For ethernet networks that need higher transmission speeds, the Fast Ethernet standard
(IEEE 802.3u) has been established. This standard raises the Ethernet speed limit from 10 Megabits per
second (Mbps) to 100 Mbps with only minimal changes to the existing cable structure.
Token Ring: -Token Ring is another form of network configuration which differs from Ethernet in that all
messages are transferred in a unidirectional manner along the ring at all times. Data is transmitted in
tokens, which are passed along the ring and viewed by each device.
FDDI: -FDDI (Fibre-Distributed Data Interface) is a standard for data transmission on fibre optic lines in
a local area network that can extend in range up to 200 km (124 miles). The FDDI protocol is based on
the token ring protocol. In addition to being large geographically, an FDDI local area network can
support thousands of users.
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
Layer 2-The Internet Layer: -The Internet layer is responsible for addressing, packaging, and routing
functions. The core protocols of the Internet layer are IP, ARP, ICMP, and IGMP. The Internet Protocol
(IP) is a routable protocol responsible for IP addressing, routing, and the fragmentation and reassembly
of packets.
The Internet Protocol (IP) is a routable protocol responsible for IP addressing, routing, and the
The Address Resolution Protocol (ARP) is responsible for the resolution of the Internet layer
address to the Network Interface layer address such as a hardware address.
The Internet Control Message Protocol (ICMP) is responsible for providing diagnostic functions
The Internet Group Management Protocol (IGMP) is responsible for the management of IP
multicast groups.
IP Addressing: -Every host and router on the internet is provided with a unique standard form of network
address, which encodes its network number and host number. The combination is unique; no two nodes
have the same IP addresses. Basically, every device connected to the network has an IP Address.
Public address: -The public address is also known as an external address as they are grouped
under the WAN. We can also define the public address as a way to communicate outside the
network. This address is used to access the internet. The public address available on our
computer provides the remote access to our computer. This address is generally assigned by the
ISP (Internet Service Provider).
Private address: - A private address is also known as an internal address, as it is grouped under
the LAN. It is used to communicate within the network. These addresses are not routed on the
internet so that no traffic can come from the internet to this private address.
IPv4 Addressing:
The IPv4 addresses are 32-bit long. The main address formats are assigned with network addresses
(net id) and host address (host id) fields of different sizes. The Class A format allows up to 126 networks
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
with 16 million hosts each. Class B allows up to 16,382 networks with up to 64 K hosts each. Class C
allows 2 million networks with up to 254 hosts each. The Class D is used for multicasting and Class E is
reserved for future use, or R&D.
Class Range
future use, or
Research
and Development
process.)
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
Subnetting: -Subnetting is the strategy used to partition a single physical network into more than one
smaller logical sub-network (subnets). An IP address includes a network segment and a host segment.
Subnets are designed by accepting bits from the IP address's host part and using these bits to assign a
number of smaller sub-networks inside the original network.
Subnet mask: -A Subnet mask is a 32-bit number that masks an IP address, and divides the IP address
Supernetting: -It is the process of combining several IP networks with a common network prefix.
Supernetting was introduced as a solution to the problem of increasing size in routing tables.
Subnetting Supernetting
Classless Inter-Domain Routing: - It is a method of IP address allocation and IP routing that allows for
more efficient use of IP addresses. CIDR is based on the idea that IP addresses can be allocated and
routed based on their network prefix rather than their class, which was the traditional way of IP address
allocation. CIDR addresses are represented using a slash notation, which specifies the number of bits in
the network prefix. For example, an IP address of 192.168.1.0 with a prefix length of 24 would be
represented as 192.168.1.0/24. This notation indicates that the first 24 bits of the IP address are the
network prefix and the remaining 8 bits are the host identifier.
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
IPv6 Addressing: -IPv6 is of 128 bits represented in 8 combinations of 4 hexadecimal numbers each,
separated by a colon. An example of an IPv6 address is: 2001:0db8:85a3:0000:0000:8a2e:0370:7334.
Unicast: It represents a single interface. A packet sent to a unicast address is delivered to the
Routing: -It is the act of moving information across a network from a source to a destination. Routing is
performed on the data which describes the path that data follows to reach from source to destination in
the network. The primary difference between the two is that bridging
occurs at Layer 2 (the data link layer) of the OSI reference model, whereas routing occurs at Layer 3
(the network layer).
IPsec: -IPsec short for IP security, a set of protocol developed by the Internet Engineering Task Force
(IETF) to support secure exchange of packets at the IP layer. IPsec has been deployed widely to
Layer 3 – Transport Layer: -It encapsulates raw data received from application layer into data segments
and performs error control and flow control. It is represented by the two protocols i.e. TCP & UDP.
TCP (Transmission Control Protocol): -It is a connection oriented protocol. First a connection is
established between the sender and the receiver and then data is sent across the network. It gives the
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
data segments proper sequence numbers for reordering at the destination side and also the
acknowledgment numbers are given for the data packets received. So it is a reliable protocol.
UDP(User Datagram Protocol): -It is an unreliable, connectionless protocol i.e. no reliable connection is
established between sender & receiver before data transmission. It is used for client- server type
requests where prompt delivery of requests-replies is more important than accurate delivery.
Layer 4- Application Layer: -It enables network access to the user. Following are some of the protocols
defined here:-
File Transfer Protocol (FTP) is a TCP/IP client-server application for transfer files between two
remote machines through internet. A TCP connection is set up before file transfer and it persists
throughout the session. It is possible to send more than one file before disconnecting the link. A
control connection is established first with a remote host before any file can be transferred
HTTP (Hyper Text Transfer Protocol) provides a standard between a web browser and a web
server to establish communication. It is a set of rules for transferring data from one computer to
another. Data such as text, images, and other multimedia files are shared on the World Wide
Web.
Telnet is a simple remote terminal protocol that provides a remote log-on capability, which
enables a user to log on to a remote computer and behaves as if it is directly connected to it.
Simple Network Management Protocol (SNMP) is an application layer protocol that uses UDP
port number 161/162.SNMP is used to monitor the network, detect network faults, and sometimes
even used to configure remote devices. There are 3 components of SNMP;
Simple Network Management Protocol (SMTP) provides a systematic way for managing network
resources. It uses transport layer protocol for communication. It allows them to monitor switches,
routers and hosts.
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)
HTTP HTTPS
In HTTP, URL begins with “http://”. In HTTPs, URL starts with “https://”.
HTTP uses port number 80 for HTTPs uses 443 port number for
communication communication.
Click Here for GOAT (The Complete Mentorship Program for Bank Exams)