Unit-1 CN
Unit-1 CN
COMPUTER NETWORK
DEFINITON: A computer network is a system that connects two or more computing devices for
transmitting and sharing information. Computing devices include everything from a mobile
phone to a server. These devices are connected using physical wires such as fiber optics, but they
can also be wireless.
Computer Networking
COMPUTER NETWORKS UNIT-1
1. Resource Sharing
Resource sharing is an application of a computer network. Resource sharing means you can
share one Hardware and Software among multiple users. Hardware includes printers, Disks, Fax
Machines, etc. Computing devices. And Software includes Atom, Oracle VM Virtual Box,
Postman, Android Studio, etc.
COMPUTER NETWORKS UNIT-1
2. Information Sharing
Using a Computer network, we can share Information over the network, and it provides Search
capabilities such as WWW. Over the network, a single information can be shared among the
many users over the internet.
3. Communication
Communication includes email, calls, message broadcast, electronic funds transfer system etc.
4. Entertainment Industry
In Entertainment industry also uses computer networks widely. Some of the Entertainment
industries are Video on demand, Multiperson real-time simulation games, movie/TV programs,
etc.
5. Access to Remote Databases
Computer networks allow us to access the Remote Database of the various applications by the
end-users. Some applications are Reservation for Hotels, Airplane Booking, Home
Banking, Automated Newspaper, Automated Library etc.
6. Home applications
There are many common uses of the computer network are as home applications. For example,
you can consider user-to-user communication, access to remote instruction, electronic
commerce, and entertainment. Another way is managing bank accounts, transferring money to
some other banks, paying bills electronically. A computer network arranges a robust connection
mechanism between users.
7. Business applications
The result of business application here is resource sharing. And the purpose of resource sharing
is that without moving to the physical location of the resource, all the data, plans, and tools can
be shared to any network user. Most of the companies are doing business electronically with
other companies and with other clients worldwide with the help of a computer network.
8. Mobile users
The rapidly growing sectors in computer applications are mobile devices like notebook
computers and PDAs (personal digital assistants). Here mobile users/device means portable
device. The computer network is widely used in new-age technology like smartwatches,
wearable devices, tablets, online transactions, purchasing or selling products online, etc.
9. Social media
Social media is also a great example of a computer network application. It helps people to share
and receive any information related to political, ethical, and social issues.
NETWORK TOPOLOGIES
COMPUTER NETWORKS UNIT-1
Geometric representation of how the computers are connected to each other is known as
topology. There are eight types of topology – Mesh, Star, Bus, Ring, Hybrid, Tree, P2P and
Daisy chain.
1. Mesh Topology
2. Star Topology
3. Bus Topology
4. Ring Topology
5. Hybrid Topology
6. Tree Topology
7. P2P Topology
8. Daisy Chain Topology
Mesh Topology
In mesh topology each device is connected to every other device on the network through a
dedicated point-to-point link. When we say dedicated it means that the link only carries data for
COMPUTER NETWORKS UNIT-1
the two connected devices only. Lets say we have n devices in the network then each device
must be connected with (n-1) devices of the network. Number of links in a mesh topology of n
devices would be n(n-1)/2.
1. Full Mesh Topology: In this topology each device is connected to all the devices available
on the network.
2. Partial Mesh Topology: In partial mesh topology, each device is connected to only those
devices, to which they communicate frequently. This reduces redundant links and saves
the setup cost.
1.No data loss: No data traffic issues as there is a dedicated link between two devices
which means the link is only available for those two devices.
2. Reliable: Mesh topology is reliable and robust as failure of one link doesn’t affect
other links and the communication between other devices on the network.
3. Secure: Mesh topology is secure because there is a point to point link thus
unauthorized access is not possible.
4. Easy to troubleshoot: Fault detection is easy as there is a separate connection between
each devices.
5. Fast communication: As there is a dedication connection between two devices on a
network, the communication is fast.
Star Topology
In star topology each device in the network is connected to a central device called hub. Unlike
Mesh topology, star topology doesn’t allow direct communication between devices, a device
must have to communicate through hub.
If one device wants to send data to other device, it has to first send the data to hub and then the
hub transmit that data to the designated device.
The central device is known as hub and other devices connected to hub are called clients.
Generally Coaxial cable or RJ-45 cables are used to connect the clients to the hub.
Less expensive: Less expensive because each device only need one I/O port and needs to
be connected with hub with one link.
Easier to install
Cost effective: Less amount of cables required because each device needs to be connected
with the hub only.
Robust: If one link fails, other links will work just fine.
Easy to troubleshoot: Easy fault detection because the link can be easily identified.
Reliable: Each device is separately connected to the hub, so a connection failure between
a device and hub doesn’t affect the connection of the other devices.
If hub goes down everything goes down, none of the devices can work without hub.
Hub requires more resources and regular maintenance because it is the central system of
star topology.
Not Scalable: There is a limit to add new devices as each device increase the load on the
central unit (hub or switch). This is why it is not suitable for the large networks.
COMPUTER NETWORKS UNIT-1
Bus Topology
In bus topology there is a main cable and all the devices are connected to this main cable through
drop lines. There is a device called tap that connects the drop line to the main cable. Since all the
data is transmitted over the main cable, there is a limit of drop lines and the distance a main cable
can have.
The main cable that is connected to the devices on the network using drop line is
called backbone cable.
The main cable broadcast the message to all the devices connected to it.
When a device wants to sends a message, it transmits the message to the backbone
cable. All the other devices connected to the backbone cable receives the message whether
they are intended to receive the message or not.
The most common access method of the bus topologies is CSMA (Carrier Sense Multiple
Access). This method is used to prevent the collision of data as two or more devices can
send the data to main cable at the same time.
CSMA: This method is developed to decrease the chance of collisions when two or more
devices starts sending the signal at the same time.
CSMA CD (Carrier Sense Multiple Access with Collision Detection): In this method, a
device monitors the transmission medium after it sends the data to see if the transmission was
successful. If successful, the device marks the communication successful else it sends the data
again.
CSMA CA (Carrier Sense Multiple Access with Collision Avoidance): This method tries to
prevent the collision from happening. In this method, before sending the data, the device checks
the transmission medium to see if it is busy or not. If busy, then the sender device waits until the
transmission medium becomes idle.
Ring Topology
In ring topology each device is connected with the two devices on either side of it. There are two
dedicated point to point links a device has with the devices on the either side of it. This structure
forms a ring thus it is known as ring topology.
If a device wants to send data to another device then it sends the data in one direction, each
device in ring topology has a repeater, if the received data is intended for other device then
repeater forwards this data until the intended device receives it.
Easy to install.
Managing is easier as to add or remove a device from the topology only two links are
required to be changed.
Less expensive: Generally Twisted pair cabling is used in ring topology which is
inexpensive and easily available.
Easy maintenance: The network in ring topology is easy to maintain as a system failure
doesn’t affect other systems on network, the failed system can be easily removed and
installed again after fixing the issue.
A link failure can fail the entire network as the signal will not travel forward due to failure.
Data traffic issues, since all the data is circulating in a ring.
Hybrid topology
A combination of two or more topology is known as hybrid topology. For example a combination of star
and bus topology is known as star bus hybrid topology, this topology is shown in the below diagram.
We can choose the topology based on the requirement for example, scalability is our
concern then we can use star topology instead of bus technology.
Scalable as we can further connect other computer networks with the existing networks
with different topologies.
Tree topology
In Peer to Peer topology, two devices are connected to each other directly. There is no client and
server in P2P topology as both the devices serve the purpose of client and server both. Torrent is
an example of P2P topology as one computer can download the data as well as upload the data
to another computer.
In P2P, these two devices can be two computers, routers, switches etc. The client is the computer
that requests the data and server is the computer that serves the request by sending data. In P2P,
both the devices can request as well as send the data.
Con: The biggest disadvantage of P2P network is the security. A computer connected to another
computer using P2P can read and write the data on the computer.
In Daisy Chain Topology, all devices are connected in a linear fashion. Consider it as a ring
topology where the last device is not connected to the first device. Every device in the daisy
chain network is connected to immediate left and right neighbour devices, except the first and
last device.
The intermediate device helps in propagating the signal by relaying it until it reaches the
destination. Consider ring topology as an advanced version of this topology, by joining first and
last devices in this topology a ring topology can be formed.
COMPUTER NETWORKS UNIT-1
If there is a failure in ring network, it can send the data through alternate path. For
example, if the signal is transmitting clockwise and there is a failure, the signal can still
reach destination by sending the signal in reverse direction.
Since signal flows in a loop, there is less need of transmitters and receivers so their count
can be reduced to lessen the cost.
A computer network is a group of computers connected with each other through a transmission
medium such as cable, wire etc. In this guide, we will discuss the types of computer networks in
detail.
There are mainly three types of computer networks based on their size:
1. Local Area Network (LAN)
2. Metropolitan Area Network (MAN)
3. Wide area network (WAN)
Local area network is a group of computers connected with each other in a small places such as
school, hospital, apartment etc.
LAN is secure because there is no outside connection with the local area network thus the data
which is shared is safe on the local area network and can’t be accessed outside.
LAN due to their small size are considerably faster, their speed can range anywhere from 100 to
100Mbps.
LANs are not limited to wire connection, there is a new evolution to the LANs that allows local
area network to work on a wireless connection.
COMPUTER NETWORKS UNIT-1
Advantages of LAN
There are various advantages of LAN, which are as follows −
Disadvantages of LAN
There are various disadvantages to LAN, which are as follows −
LAN software needed a memory area in each of the mainframe used on the
network. This decreases the memory space available for the user’s program.
Local area networking adds another phase of difficulty to the computer operation.
Users can have a problem in understanding the network commands. The
installation and authority of a LAN require far more technical and regulatory skills
than installing and handling multiple computers that are not networked.
Some security system should be executed if it is essential to protect private data.
COMPUTER NETWORKS UNIT-1
Some control on the part of the customer is lost. We have to share a printer with
different customers.
Some current application programs will not run in a network environment
MAN network covers larger area by connections LANs to a larger network of computers. In
Metropolitan area network various Local area networks are connected with each other through
telephone lines. The size of the Metropolitan area network is larger than LANs and smaller than
WANs(wide area networks), a MANs covers the larger area of a city or town.
ADVANTAGES OF MAN
Disadvantages of MAN
There is a security problem and configuration due to the maximum number of LANs is
connected, and their size is also significant, so it isn’t easy to manage.
MAN network cannot work in traditional phone copper wire if they install the network on
the copper wire then there will be low speed so if we want a high speed we want to set up
fiber optics which is of high cost when we set up at the first time.
In MAN, there is a high chance of stealing data by hackers as we compare to LAN
networks, so there is a chance of leaking our data. If we want to secure data, it requires
highly trained staff and security tools.
To set up a MAN network require technical people who can set it up correctly. The
people are network administrators and troubleshooters.
In MAN, there is a need for more cables two connect multiple LAN networks.
They are huge networks compared to LAN networks, which makes them difficult to
maintain.
Wide area network provides long distance transmission of data. The size of the WAN is
larger than LAN and MAN. A WAN can cover country, continent or even a whole world.
Internet connection is an example of WAN. Other examples of WAN are mobile
broadband connections such as 3G, 4G etc.
Advantages of WAN:
Centralized infrastructure: One of the main advantage of WAN is the that we do not need to
maintain the backup and store data on local system as everything is stored online on a data
centre, from where we can access the data through WAN.
COMPUTER NETWORKS UNIT-1
Privacy: We can setup the WAN in such a way that it encrypts the data that we share online that
way the data is secure and minimises the risk of unauthorized access.
Increased Bandwidth: With the WAN we get to choose the bandwidth based on the need, a large
organization can have larger bandwidth that can carry large amount of data faster and efficiently.
Area: A WAN can cover a large area or even a whole world though internet connection thus we
can connect with the person in another country through WAN which is not possible is other type
of computer networks.
Disadvantages of WAN:
Antivirus: Since our systems are connected with the large amount of systems, there is
possibility that we may unknowingly download the virus that can affect our system and
become threat to our privacy and may lead to data loss.
Expensive: Cost of installation is very high.
Issue resolution: Issue resolution takes time as the WAN covers large area, it is really
difficult to pin point the exact location where the issues raised and causing the problem.
Interconnection of Networks:
We have read LAN, MAN and WAN above, we also talked about internet. You can say that an
internet is a combination of LAN, MAN and WAN.
OSI MODEL
Application layer
Presentation Layer
Session layer
Transport layer
Network Layer
Data Link layer
Physical layer
Physical Layer
We now learned that a transport layer converts the data into segments, network layer converts the
segments into packets and data link layer converts the packets into frames. A frame is nothing
but a sequence of bits such as 1001011.
Physical layer converts these binary sequences into signals and transfer it through a transmission
media such as cables etc.
The signals generated by physical layer is based on the transmission media. For example an
electrical signal is generated if the media is copper cable, light signal if media is optical fibre and
radio signal in case of transmission media is air. This generated signal is received by the physical
layer at the receiver side and converts it into bits.
COMPUTER NETWORKS UNIT-1
Line coding:
A digital data is in form of binary sequence such as 1000111 (combination of 0s and 1s). Line
coding uses three schemes to represent these binary sequences in form of signals that can be
transferred.
There are two types of addressing done to the packets transfers from one computer to another
computer.
Logical addressing: Logical addressing is assigning sender and receiver IP addresses to data
packets. This is done at the network layer.
Physical addressing: Physical addressing is done at data link layer where MAC addresses of
sender and receiver are assigned to each data packets.
Data unit in the data link layer is called frame. A frame is transferred from one computer to
another computer and transmission is done through a transmission media such as wire, cable etc.
Both sender and receiver computer has NIC that helps in sending and receiving frame. These
NICs presents at sender and receiver provides a physical link between sender and receiver.
Media Access control: How data is placed and received from the media.
Error Detection: Tail of the each frame transferred contains certain bits to check whether the data
received on the side is corrupted or not.
Network layer
The main purpose of network layer is to receive the data segments from transport layer and
transfer them from one computer to another computer on different network.
Routing: It is a method of transferring data packets from source to destination. It uses the
combination of Mask and IP address to transfer the data to correct destination. Each data packets
contains three addition components mask, sender IP, receiver IP. The Mask determines the
computer network to which the data needs to be delivered and then the IP address determines
which computer on that particular network needs to receive the data packet.
Transport layer
The main role of transport layer is to check the reliability of data communication.
Segmentation: Data received from session layer is divided into small data units called segments.
Each segment contains the sender and receiver port number along with the sequence number.
Port number helps to direct the data segments to the correct application and the sequence number
helps to reassemble the data from data segments in correct order.
Flow control: It controls the flow of data. It checks the capability of the receiver device
receiving capability before transmitting data. For example a sender server can send the data at a
rate of 200Mbps but a receiving data can only receive data at a rate of 10 Mbps then it controls
the flow of data to 10Mbps so that the data doesn’t get lost during transmission.
Error control: Transport layer also performs error control using Automatic Repeat Request, if a
data is lost during transmission, it is send again using automatic repeat request. Transport layer
also adds a group of bits called checksum with each segment to check whether the data received
at receiver side is not corrupt.
Session Layer
The main role of session layer is to setup and maintain the connection between different systems.
Authentication: Before a computer can be connected to a server, the computer has to provide
user name and password for the authentication. The function of authentication and setting up a
connection after authentication is performed by session layer.
COMPUTER NETWORKS UNIT-1
Authorization: Once a connection is established, session layer checks whether the connected
computer is authorised to access the data, this function of authorisation checking is also
performed by session layer.
Session management: Session layer also checks that the data which is received from the server
in form of data packets belongs to which application for example when you access Facebook
profile through your browser, the data transferred from the Facebook server is transferred to your
web browser application, thus the session layer helps in session management.
Presentation Layer
Presentation layer receives the data from top most layer which is application layer.
Translation: The data received from application layer is in form of characters and numbers such
as 1234, ERFF etc. The presentation layer converts these characters and numbers into machine
understandable format which is known as binary format for example 100111101.
Encryption: To protect the sensitivity of data, presentation layer encrypts the data at the sender
side before the transmission and the receiver side this data is decrypted by the presentation layer
at the receiver side. Secure sockets layer protocol (SSL) is used by the presentation layer for
encryption and decryption.
Compression: Compress the data to small size so that it can be transferred faster over a network.
This compression can be lossy or lossless compression.
COMPUTER NETWORKS UNIT-1
Application layer
1. Application layer is used by computer applications such as google chrome, outlook, FireFox,
Skype etc.
2. Application layer defines the protocols that are used by computer applications for example:
HTTP and HTTPS protocols are used by web browsers such as google chrome, FireFox, Safari
etc.
FTP protocol is used for file transfer between two or more computers.
There are dozens of other protocol that forms the application layer, such as NFS, FMTP, DHCP,
SNMP, POP3, IRC, NNTP etc.
4. In short you can say that application layer provides the services to computer
applications with the help of protocols that are defined in it.
TCP/IP Model
1. Physical Layer
It is a group of applications requiring network communications. This
layer is responsible for generating the data and requesting
connections. It acts on behalf of the sender and the Network Access
layer on the behalf of the receiver. During this article, we will be
talking on the behalf of the receiver.
2. Data Link Layer
The packet’s network protocol type, in this case, TCP/IP, is identified by
the data-link layer. Error prevention and “framing” are also provided
by the data-link layer. Point-to-Point Protocol (PPP) framing and
Ethernet IEEE 802.2 framing are two examples of data-link layer
protocols.
3. Internet Layer
This layer parallels the functions of OSI’s Network layer. It defines the
protocols which are responsible for the logical transmission of data
over the entire network. The main protocols residing at this layer are
as follows:
IP: IP stands for Internet Protocol and it is responsible for
delivering packets from the source host to the destination host
by looking at the IP addresses in the packet headers. IP has 2
COMPUTER NETWORKS UNIT-1
versions: IPv4 and IPv6. IPv4 is the one that most websites are
using currently. But IPv6 is growing as the number of IPv4
addresses is limited in number when compared to the number
of users.
ICMP: ICMP stands for Internet Control Message Protocol. It is
encapsulated within IP datagrams and is responsible for
providing hosts with information about network problems.
ARP: ARP stands for Address Resolution Protocol. Its job is to
find the hardware address of a host from a known IP address.
ARP has several types: Reverse ARP, Proxy ARP, Gratuitous
ARP, and Inverse ARP.
The Internet Layer is a layer in the Internet Protocol (IP) suite, which is
the set of protocols that define the Internet. The Internet Layer is
responsible for routing packets of data from one device to another
across a network. It does this by assigning each device a unique IP
address, which is used to identify the device and determine the route
that packets should take to reach it.
Example: Imagine that you are using a computer to send an email to
a friend. When you click “send,” the email is broken down into smaller
packets of data, which are then sent to the Internet Layer for routing.
The Internet Layer assigns an IP address to each packet and uses
routing tables to determine the best route for the packet to take to
reach its destination. The packet is then forwarded to the next hop on
its route until it reaches its destination. When all of the packets have
been delivered, your friend’s computer can reassemble them into the
original email message.
In this example, the Internet Layer plays a crucial role in delivering the
email from your computer to your friend’s computer. It uses IP
addresses and routing tables to determine the best route for the
packets to take, and it ensures that the packets are delivered to the
correct destination. Without the Internet Layer, it would not be possible
to send data across the Internet.
4. Transport Layer
The TCP/IP transport layer protocols exchange data receipt
acknowledgments and retransmit missing packets to ensure that
packets arrive in order and without error. End-to-end communication is
referred to as such. Transmission Control Protocol (TCP) and User
Datagram Protocol are transport layer protocols at this level (UDP).
TCP: Applications can interact with one another using TCP as
though they were physically connected by a circuit. TCP
transmits data in a way that resembles character-by-character
transmission rather than separate packets. A starting point
COMPUTER NETWORKS UNIT-1
TCP/IP OSI
The Transport layer in TCP/IP does not In the OSI model, the transport layer
provide assurance delivery of packets. provides assurance delivery of packets.
Advantages:
⇢ Least expensive
⇢ Easy to install
⇢ High-speed capacity
Disadvantages:
⇢ Susceptible to external interference
⇢ Lower capacity and performance in comparison to STP
⇢ Short distance transmission due to attenuation
Applications:
Used in telephone connections and LAN networks
Shielded Twisted Pair (STP):
This type of cable consists of a special jacket (a copper braid
covering or a foil shield) to block external interference. It is
used in fast-data-rate Ethernet and in voice and data channels
of telephone lines.
Advantages:
⇢ Better performance at a higher data rate in comparison to UTP
⇢ Eliminates crosstalk
⇢ Comparatively faster
Disadvantages:
⇢ Comparatively difficult to install and manufacture
⇢ More expensive
COMPUTER NETWORKS UNIT-1
⇢ Bulky
Applications:
The shielded twisted pair type of cable is most frequently used in
extremely cold climates, where the additional layer of outer covering
makes it perfect for withstanding such temperatures or for shielding
the interior components.
(ii) Coaxial Cable –
It has an outer plastic covering containing an insulation layer made of
PVC or Teflon and 2 parallel conductors each having a separate
insulated protection cover. The coaxial cable transmits information in
two modes: Baseband mode(dedicated cable bandwidth) and
Broadband mode(cable bandwidth is split into separate ranges). Cable
TVs and analog television networks widely use Coaxial cables.
Advantages:
High Bandwidth
Better noise Immunity
Easy to install and expand
Inexpensive
Disadvantages:
Single cable failure can disrupt the entire network
Applications:
Radio frequency signals are sent over coaxial wire. It can be used for
cable television signal distribution, digital audio (S/PDIF), computer
network connections (like Ethernet), and feedlines that connect radio
transmitters and receivers to their antennas.
(iii) Optical Fiber Cable –
It uses the concept of refraction of light through a core made up of
glass or plastic. The core is surrounded by a less dense glass or plastic
covering called the cladding. It is used for the transmission of large
volumes of data.
The cable can be unidirectional or bidirectional. The WDM (Wavelength
Division Multiplexer) supports two modes, namely unidirectional and
bidirectional mode.
COMPUTER NETWORKS UNIT-1
Advantages:
Increased capacity and bandwidth
Lightweight
Less signal attenuation
Immunity to electromagnetic interference
Resistance to corrosive materials
Disadvantages:
Difficult to install and maintain
High cost
Fragile
Applications:
Medical Purpose: Used in several types of medical instruments.
Defence Purpose: Used in transmission of data in aerospace.
For Communication: This is largely used in formation of
internet cables.
Industrial Purpose: Used for lighting purposes and safety
measures in designing the interior and exterior of automobiles.
(iv) Stripline
Stripline is a transverse electromagnetic (TEM) transmission line
medium invented by Robert M. Barrett of the Air Force Cambridge
Research Centre in the 1950s. Stripline is the earliest form of the
planar transmission line. It uses a conducting material to transmit high-
frequency waves it is also called a waveguide. This conducting material
is sandwiched between two layers of the ground plane which are
usually shorted to provide EMI immunity.
(v) Microstripline
In this, the conducting material is separated from the ground plane by
a layer of dielectric.
2. Unguided Media:
It is also referred to as Wireless or Unbounded transmission media. No
COMPUTER NETWORKS UNIT-1
Microwave Transmission
(iii) Infrared –
Infrared waves are used for very short distance communication. They
cannot penetrate through obstacles. This prevents interference
COMPUTER NETWORKS UNIT-1
In Unicast transmission, the data is transferred from a single sender (or a single
source host) to a single receiver (or a single destination host).
The network switches hear the MAC addresses of the devices on the networks to
which they are connected. They can then forward packets only onto those
networks containing devices with the connected MAC addresses. Unicast
gradually becomes less efficient as more receivers need to see identical data.
Example
In the following figure, Host A sends the IP address 11.1.2.2 data to the Host B IP
address 20.12.4.3.
Directed Broadcast
Directed Broadcast transmits data from one source host to all the other hosts
that exist in some other network. It is used in two scenarios −
When the hosts are responsible for parsing data from broadcast packets.
When all the hosts require the same data.
COMPUTER NETWORKS UNIT-1
Limited Broadcast
In Limited Broadcast, the data is transmitted from a single source host to all the
other hosts residing in the same network.
COMPUTER NETWORKS UNIT-1
When the data is transmitted from a single source host to a specific group of
hosts having the interest to receive the data, it is known as multicast
transmission. Multicast can be more efficient than unicast when different groups
of receivers need to see the same data.
COMPUTER NETWORKS UNIT-1
Transmission modes
o The way in which data is transmitted from one device to another device is
known as transmission mode.
o The transmission mode is also known as the communication mode.
o Each communication channel has a direction associated with it, and
transmission media provide the direction. Therefore, the transmission mode
is also known as a directional mode.
o The transmission mode is defined in the physical layer.
o Simplex mode
o Half-duplex mode
o Full-duplex mode
Simplex mode
o In simplex mode, the station can utilize the entire bandwidth of the
communication channel, so that more data can be transmitted at a time.
Half-Duplex mode
o In half-duplex mode, both the devices can send and receive the data and also
can utilize the entire bandwidth of the communication channel during the
transmission of data.
o In half-duplex mode, when one device is sending the data, then another has
to wait, this causes the delay in sending the data at the right time.
Full-duplex mode
o In Full duplex mode, the communication is bi-directional, i.e., the data flow in
both the directions.
o Both the stations can send and receive the message simultaneously.
o Full-duplex mode has two simplex channels. One channel has traffic moving
in one direction, and another channel has traffic flowing in the opposite
direction.
o The Full-duplex mode is the fastest mode of communication between devices.
o The most common example of the full-duplex mode is a telephone network.
When two people are communicating with each other by a telephone line,
both can talk and listen at the same time.
o Both the stations can send and receive the data at the same time.
o If there is no dedicated path exists between the devices, then the capacity of
the communication channel is divided into two parts.
Send/Receive A device can only Both the devices Both the devices can send
send the data but can send and and receive the data
cannot receive it receive the data, simultaneously.
or it can only but one at a
receive the data time.
but cannot send
it.