0% found this document useful (0 votes)
16 views26 pages

Data Communication

Data communication is the process of transferring data between devices through various transmission mediums, playing a vital role in computer networks. Key elements include the sender, receiver, message, transmission medium, protocol, and encoder/decoder, which work together to ensure accurate and efficient data transfer. Different types of data communication exist, such as analog and digital, along with various transmission modes and network types like LAN, MAN, and WAN.

Uploaded by

iharmanrajput420
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views26 pages

Data Communication

Data communication is the process of transferring data between devices through various transmission mediums, playing a vital role in computer networks. Key elements include the sender, receiver, message, transmission medium, protocol, and encoder/decoder, which work together to ensure accurate and efficient data transfer. Different types of data communication exist, such as analog and digital, along with various transmission modes and network types like LAN, MAN, and WAN.

Uploaded by

iharmanrajput420
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 26

Data Communication

Data communication refers to the process of transferring data between two or


more devices through a transmission medium (such as cables or wireless
signals). It plays a crucial role in computer networks, enabling devices to
exchange information in real time. Data communication ensures that data sent
from a source reaches its intended destination accurately and efficiently.

Key Elements of Data Communication

1. Sender (Source):
- The device or entity that initiates the communication by sending data.
Examples include computers, smartphones, and sensors.

2. Receiver (Destination):
- The device or entity that receives the data from the sender. Examples
include servers, other computers, or IoT devices.

3. Transmission Medium:
- The physical or wireless path through which data is transmitted from
sender to receiver. Examples include:
- Wired: Ethernet cables, fiber optics, coaxial cables.
- Wireless: Radio waves (Wi-Fi, Bluetooth), microwaves, and infrared.

4. Message (Data):
- The actual data or information being communicated. This could be text,
images, audio, video, or a combination of these.

5. Protocol:
- The set of rules that governs how data is transmitted and received.
Protocols ensure that both the sender and receiver interpret the data
consistently. Examples include TCP/IP, HTTP, FTP, and UDP.

6. Encoder and Decoder:


- Encoder: Converts the data into a suitable format for transmission over the
chosen medium.
- Decoder: Converts the received signal back into its original format.

Types of Data Communication

1. Analog Communication:
- Transmits data in the form of continuous signals (analog waves).
- Examples: Traditional telephony, FM/AM radio broadcasting.

2. Digital Communication:
- Transmits data as discrete signals (bits of 0s and 1s).
- More reliable and widely used in modern communication systems.
- Examples: Ethernet, Wi-Fi, and mobile data.

Data Transmission Techniques

1. Serial Transmission:
- Data bits are transmitted one after the other over a single channel.
- Slower but more reliable for long-distance communication.
- Example: USB (Universal Serial Bus).
2. Parallel Transmission:
- Multiple data bits are transmitted simultaneously across several channels.
- Faster but suitable only for short distances due to signal degradation.
- Example: Data transfer within a computer from the processor to memory.

Transmission Modes Based on Synchronization

1. Synchronous Transmission:
- Data is sent as a continuous stream with synchronized clocks between
sender and receiver.
- Faster and more efficient for high-speed networks.
- Example: Data transfer over fiber optic networks.

2. Asynchronous Transmission:
- Data is sent one byte at a time, with start and stop bits used to identify each
piece of data.
- Slower but suitable for systems where data is sent intermittently.
- Example: Communication between computers and modems.

3. Isochronous Transmission:
- Data is transmitted at fixed intervals, ensuring that it arrives at regular,
predictable times.
- Typically used in real-time systems where timing is critical (e.g., video
streaming, VoIP).

Data Communication Protocols

1. Transmission Control Protocol (TCP):


- Ensures reliable and ordered delivery of data. It handles error checking,
flow control, and retransmission of lost packets.
- Commonly used in applications like email, web browsing, and file transfer.

2. User Datagram Protocol (UDP):


- Provides faster transmission but with no guarantee of data delivery, order,
or error correction.
- Suitable for applications where speed is critical, like online gaming or video
streaming.

3. Hypertext Transfer Protocol (HTTP):


- Used for transmitting web pages between web servers and browsers.

4. File Transfer Protocol (FTP):


- Enables file transfers between client and server.

5. Simple Mail Transfer Protocol (SMTP):


- Facilitates email transmission across networks.

Components of data communication


The components of data communication are the essential building blocks that
enable the transfer of data from one device to another. These components
ensure that information is transmitted accurately, efficiently, and securely
across a network or communication medium. The primary components of
data communication are:
1. Sender (Source)
- The sender is the device or entity that originates the message or data.
- It could be a computer, smartphone, IoT device, or any other digital device
capable of sending information.
- The sender prepares the message, encodes it into a suitable format, and
transmits it to the receiver.

Example: A computer sending an email or a sensor transmitting temperature


data.

2. Receiver (Destination)
- The receiver is the device or entity that receives the transmitted message
or data.
- Similar to the sender, the receiver could be a computer, server,
smartphone, or other digital devices.
- The receiver decodes the transmitted data and converts it back into a
format understandable by the user or system.

Example: A server receiving a request from a user or a computer receiving


an email.

3. Message (Data)
- The message is the actual information being communicated between the
sender and receiver.
- It can be any form of data, including text, numbers, images, audio, video, or
even control signals.
- The message is typically converted into a digital signal (or analog,
depending on the medium) before being transmitted.
Example: A text message, a video stream, or a file being transferred over a
network.

4. Transmission Medium
- The transmission medium is the physical pathway through which the
message travels from the sender to the receiver.
- The medium can be wired (such as copper cables, fiber optics) or wireless
(such as radio waves, microwaves, or infrared).

Types of Transmission Media:


- Wired: Includes cables like twisted-pair cables (Ethernet), coaxial cables,
and fiber optic cables.
- Wireless: Includes mediums like Wi-Fi, Bluetooth, cellular networks, and
satellite communication.

Example: The internet cable used for data transmission or Wi-Fi signals used
for wireless data communication.

5. Protocol
- A protocol is a set of rules or standards that govern how data is transmitted
and received across a network.
- Protocols ensure that devices on different networks or using different
systems can communicate with each other.
- They handle issues like data formatting, addressing, error detection, and
data flow control.

Common Protocols:
- Transmission Control Protocol (TCP): Ensures reliable data transmission
by handling error checking and data integrity.
- Internet Protocol (IP): Handles addressing and routing of data packets
across the network.
- HTTP/HTTPS: Used for web communication between browsers and web
servers.
- SMTP/POP3: Used for sending and receiving emails.

Example: TCP/IP protocol used for internet communication, HTTP for


browsing websites.

6. Encoder and Decoder


- Encoder: The sender often needs to convert the data into a form suitable
for transmission. The encoder converts data into signals that can be
transmitted over the chosen medium (digital or analog signals).
- Decoder: On the receiving side, the decoder converts the received signals
back into the original data format that the receiver can understand.

Example: In video streaming, data is encoded into a format suitable for


transmission and decoded on the receiver’s side for playback.

7. Modulation and Demodulation (Optional)


- Modulation: If the communication occurs over an analog medium (like
radio waves), the digital data needs to be modulated into an analog signal for
transmission. This is done by a modem (modulator).
- Demodulation: At the receiver's end, the analog signal is demodulated back
into digital form so that the data can be understood by the receiver.

Example: A modem modulates digital signals from a computer into analog


signals for transmission over telephone lines and demodulates them back into
digital signals at the receiver’s end.

---
Summary of Components

1. Sender: The source that sends the data.


2. Receiver: The destination that receives the data.
3. Message: The data or information being transmitted.
4. Transmission Medium: The physical or wireless channel through which
data travels.
5. Protocol: The rules governing data communication.
6. Encoder/Decoder: Converts data into signals and back into data.
7. Modulator/Demodulator (Optional): Converts digital data to analog signals
and back.

These components work together to facilitate the seamless and accurate


transfer of data across communication systems, ensuring that information
reaches its destination reliably and efficiently.

Data Transmission Modes


Data transmission modes refer to the ways in which data can be transmitted
between two devices in a network. The mode determines the direction and
timing of data flow between the sender and the receiver. Understanding these
modes is essential in designing and managing communication systems
effectively.

There are three primary data transmission modes:

1. Simplex Mode
2. Half-Duplex Mode
3. Full-Duplex Mode

1. Simplex Mode

In Simplex mode, data flows in only one direction — from the sender to the
receiver. The communication is unidirectional, meaning the sender can
transmit data, but the receiver cannot send any data back to the sender.

- Characteristics:
- One-way communication.
- The receiver can only receive data; it cannot send data back to the sender.
- Used in systems where response from the receiver is unnecessary or not
required.

- Examples:
- Television broadcasting: The television station sends signals to your TV, but
your TV does not send any data back.
- Radio broadcasting: The radio station sends audio signals to radios, and
radios only receive the signal.

2. Half-Duplex Mode

In Half-Duplex mode, data can be transmitted in both directions, but not


simultaneously. Devices take turns to send and receive data. When one device
is sending data, the other must wait until the transmission is complete before
it can start sending its own data.

- Characteristics:
- Two-way communication, but one direction at a time.
- Each device can either transmit or receive at a given moment, but not both
simultaneously.
- This mode is more efficient than Simplex because it allows two-way
communication.

- Examples:
- Walkie-talkies: When one person speaks, the other person must wait until
the transmission is over before responding.
- Two-way radios: Common in military and emergency communications,
where parties take turns speaking.

3. Full-Duplex Mode

In Full-Duplex mode, data can be transmitted in both directions


simultaneously. Both the sender and receiver can send and receive data at the
same time without waiting for the other to finish transmitting.

- Characteristics:
- Two-way communication happening simultaneously.
- Faster and more efficient since both devices can communicate without
interruption.
- Requires a more complex system to manage the simultaneous data flows,
but it is ideal for high-performance networks.

- Examples:
- Telephone communication: Both people can speak and listen at the same
time during a phone call.
- Modern Ethernet networks: Allow data to be sent and received at the same
time, improving the speed and performance of the network.
---

Summary of Data Transmission Modes

Transmission Direction of Data Simultaneous Examples


Mode Flow Communication
Simplex One direction only No Television,
Radio
Broadcasting
Half-Duplex Both directions No Walkie-talkies,
(one at a time) Two-way radios
Full-Duplex Both directions Yes Telephones,
(simultaneously) Ethernet
Networks

Overview of Network Types

1. Local Area Network (LAN)


A Local Area Network (LAN) is a network that connects computers and
devices within a limited geographical area, such as a single building, office,
home, or school. It is designed to enable fast communication and resource
sharing among connected devices. LANs are essential for facilitating
collaboration, data transfer, and access to shared resources like printers, files,
and internet connections. With their relatively low setup costs and high data
transfer rates, LANs are commonly used in both residential and commercial
environments.

Key Features:
- Limited geographical scope (typically a few hundred meters).
- Typically owned and managed by a single organization.
- High-speed data transmission (e.g., Ethernet, Wi-Fi).
- Inexpensive to install and maintain compared to larger networks.

Use Cases:
- Offices, schools, universities, homes.

Example:
- A network connecting all computers and printers in a small office building.

---

2. Metropolitan Area Network (MAN)


A Metropolitan Area Network (MAN) is a network that spans a larger
geographic area than a LAN, typically covering an entire city or a large
campus. It is specifically designed to connect multiple LANs within a city,
allowing for efficient communication and resource sharing among various
buildings. MANs are often used by municipalities or large organizations to
provide high-speed internet access, video conferencing, and other services
across a metropolitan area. By enabling different locations to communicate
seamlessly, MANs enhance collaboration and information flow within urban
environments.

Key Features:
- Covers a city, campus, or large urban area.
- Larger than a LAN but smaller than a WAN.
- Often owned by a service provider or a large organization.

Use Cases:
- Connecting multiple buildings of a university or businesses across a city.

Example:
- A network that connects the branches of a university across a city.

---

3. Wide Area Network (WAN)


A Wide Area Network (WAN) is a network that spans a vast geographical
area, such as a country or even globally. It connects multiple LANs or MANs,
enabling communication and data exchange over long distances. WANs are
crucial for businesses and organizations with multiple locations, allowing
them to operate as a cohesive unit regardless of physical distance. The
internet is the largest and most well-known example of a WAN, providing a
platform for global connectivity. WANs typically use a combination of leased
telecommunication lines, satellite links, and other communication
technologies to facilitate data transmission.

Key Features:
- Covers a large geographical area (across countries or continents).
- Often uses leased telecommunication lines or satellite links.
- Slower than LANs but capable of covering long distances.
- Owned and managed by multiple organizations or service providers.

Use Cases:
- Connecting regional offices of a multinational company.
- Internet backbone.

Example:
- The internet, which connects networks worldwide.

---

4. Wireless Local Area Network (WLAN)


A Wireless Local Area Network (WLAN), often referred to as Wireless LAN,
operates similarly to a LAN but uses wireless technologies, such as Wi-Fi, to
connect devices without physical cables. WLANs enable mobility and
convenience, allowing users to connect laptops, smartphones, and other
devices to the network from anywhere within the coverage area. This
technology is widely used in homes, offices, and public spaces, providing easy
access to the internet and other network resources without the constraints of
wired connections. WLANs are increasingly popular due to their flexibility and
the growing demand for mobile connectivity.

Key Features:
- Operates within a small geographical area like a LAN, but without physical
cables.
- Utilizes wireless technology (e.g., radio waves) for communication.
- Commonly used in homes, offices, and public places.

Use Cases:
- Home or office networks where users connect to the internet via Wi-Fi.
- Public Wi-Fi hotspots in cafes, airports, or libraries.

Example:
- A Wi-Fi network in a coffee shop allowing customers to connect their
laptops and smartphones.
Comparison of Network Types

Network Geographical Ownership Technology Example


Type Range
LAN Small Single Ethernet, Wi- Office or home
(building, organization Fi network
office)
MAN City or campus Single or Fiber optics, University
multiple Ethernet campus
entities network, city-
wide Wi-Fi
WAN Country, Multiple Satellites, The internet,
continent, or organizations leased lines multinational
globe business
networks
WLAN Small (home, Single Wi-Fi Wi-Fi in a home,
office) organization public hotspot
or public

Internet, Intranet, and Extranet

The Internet, Intranet, and Extranet are three types of networks that vary in
scope, accessibility, and purpose. They all use similar technologies like
TCP/IP, but differ in terms of who can access them and how they are used.

---
1. Internet

The Internet is the largest global network, connecting millions of private,


public, academic, business, and government networks. It enables people and
devices to communicate and share information from anywhere in the world.

- Key Features:
- Global access: Open and accessible to the public, connecting users
worldwide.
- Decentralized: No single organization controls the internet.
- Uses common protocols: TCP/IP, HTTP, HTTPS for communication.
- Publicly accessible: Anyone with an internet connection can access it.

- Use Cases:
- Web browsing, email, social media, video conferencing, e-commerce.
- Services like Google, Amazon, Wikipedia, and social media platforms
(Facebook, Instagram, Twitter).

- Examples:
- Accessing any public website like YouTube, performing searches on Google,
or sending an email through Gmail.

---

2. Intranet

An Intranet is a private network used within an organization, designed to be


accessible only by its employees or authorized users. It is typically used to
share company information, tools, and resources securely within the
organization.

- Key Features:
- Private network: Only authorized employees or members of an
organization can access it.
- Internal use: Designed to support internal communication and
collaboration.
- Uses internet technologies: Utilizes web technologies like browsers, HTML,
and TCP/IP, but access is restricted.
- Controlled access: Requires authentication, such as login credentials, to
ensure privacy and security.

- Use Cases:
- Corporate communication, document sharing, employee directories, HR
services.
- Collaboration tools, internal emails, project management software, and
training resources.

- Examples:
- A company portal where employees can access internal documents, reports,
or company announcements.
- HR systems for leave applications, pay slips, and employee records.

---

3. Extranet
An Extranet is an extension of an Intranet that provides limited access to
external users, such as business partners, suppliers, or customers. It allows
organizations to securely collaborate and share information with select
external parties while still maintaining control over the data and resources
being accessed.

- Key Features:
- Controlled external access: External users like suppliers, partners, or clients
can access specific parts of the organization’s internal network.
- Security-focused: Requires secure authentication and often uses VPNs
(Virtual Private Networks) or other encryption methods to ensure that only
authorized users can access the system.
- Collaboration: Used for sharing information, data, or services between an
organization and its external stakeholders.

- Use Cases:
- Supplier portals for checking inventory, placing orders, or tracking
shipments.
- Customer portals for accessing order history, invoices, or technical support.
- Collaboration between businesses and their partners in joint projects.

- Examples:
- A retail company providing its suppliers access to an Extranet for checking
stock levels and submitting orders.
- A customer service portal that allows clients to view their service history or
place new requests.

---
Comparison

Network Access Purpose Use Cases Examples


Type
Internet Public, open Global Email, web Google,
to everyone communication browsing, e- Facebook,
and information commerce Amazon
sharing
Intranet Private, Internal Employee Corporate
restricted to communication portals, intranet
internal and document portals for HR,
users collaboration sharing, finance, etc.
internal tools
Extranet Private, Secure Supplier Vendor
restricted to collaboration portals, management
internal and with external business portals,
selected partners partner customer
external collaboration service portals
users

Network Models
Network models define the architecture and design of how devices
(computers, servers, etc.) communicate with each other in a network. Two
common network architectures are the Client/Server network and the Peer-
to-Peer network. Additionally, two standard protocol models, OSI and TCP/IP,
define how data is transmitted between devices in a network.
1. Client/Server Network
In a Client/Server network, devices in the network are divided into two
categories: clients and servers. The server provides resources and services,
while the client requests them. This is a centralized model, where one or more
servers control the data flow and manage services.

- Key Characteristics:
- Centralized control: Servers manage resources and services such as files,
databases, printers, and internet access.
- Clients request services: Clients rely on servers for data processing, file
storage, and other services.
- Scalability: Easier to manage large networks due to centralized
administration.
- High security: Access to resources is controlled by the server, which helps
with security and resource management.

- Use Cases:
- Business networks where file sharing, databases, and centralized
management are essential.
- Websites and applications hosted on centralized servers.

- Examples:
- A web server providing pages to users' web browsers.
- An email server hosting multiple users' email accounts.

2. Peer-to-Peer (P2P) Network


In a Peer-to-Peer (P2P) network, there is no central server. All devices (or
"peers") in the network have equal roles and can act as both clients and
servers. Each device can share resources directly with other devices.
- Key Characteristics:
- Decentralized control: No single server controls the network; all devices are
equally privileged.
- Each peer is a client and server: Devices can both request and provide
resources such as files or services.
- Cost-effective: Easier and cheaper to set up since no dedicated server is
needed.
- Less security: More difficult to manage security and backups because of the
decentralized nature.

- Use Cases:
- Small networks, such as home or small office networks where users share
files directly.
- File-sharing applications like torrents.

- Examples:
- BitTorrent for file sharing.
- A home network where computers share files and printers without a
central server.

Comparison of Client/Server and Peer-to-Peer Networks


Feature Client/Server Network Peer-to-Peer Network
Control Centralized (server manages Decentralized (no central
resources) server)
Security More secure (centralized Less secure (security is harder
management) to manage)
Cost More expensive (servers and Cheaper (no need for a server)
maintenance)
Scalability Highly scalable Limited scalability
Best Use Large organizations, Home networks, small
businesses, websites networks, file sharing
OSI and TCP/IP models
OSI Model (Open Systems Interconnection)
The OSI model was developed by the International Organization for
Standardization (ISO) to provide a standardized framework for understanding
network communications. Each of the seven layers has specific roles and
responsibilities, allowing different systems to communicate regardless of their
underlying architecture.

The Seven Layers of the OSI Model:

1. Physical Layer:
- Function: Deals with the physical connection between devices, including
the transmission of raw bits over a communication medium (e.g., cables,
wireless).
- Examples: Ethernet cables, fiber optics, and radio frequencies.
- Purpose: Ensures that the data is physically transmitted over the network
medium without any errors.

2. Data Link Layer:


- Function: Provides node-to-node data transfer and error
detection/correction. It packages raw bits into frames and manages the
physical addressing (MAC addresses).
- Examples: Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11).
- Purpose: Ensures reliable communication between adjacent network
nodes.

3. Network Layer:
- Function: Manages routing of data packets across networks. It determines
the best path for data transmission.
- Examples: Internet Protocol (IP), Internet Control Message Protocol
(ICMP).
- Purpose: Facilitates logical addressing (IP addresses) and forwarding of
packets.

4. Transport Layer:
- Function: Provides reliable or unreliable data transport, flow control, and
error recovery. It segments data for transmission and reassembles it at the
destination.
- Examples: Transmission Control Protocol (TCP), User Datagram Protocol
(UDP).
- Purpose: Ensures complete data transfer and integrity.

5. Session Layer:
- Function: Manages sessions (connections) between applications,
establishing, maintaining, and terminating communication.
- Examples: Remote Procedure Call (RPC), NetBIOS.
- Purpose: Controls dialog between applications and manages token
management for data exchange.

6. Presentation Layer:
- Function: Translates data formats between the application and network. It
handles data encryption, compression, and translation.
- Examples: SSL/TLS for encryption, JPEG for image data.
- Purpose: Ensures that data is in a readable format for the application layer.

7. Application Layer:
- Function: Interfaces with end-user applications and provides network
services to those applications.
- Examples: Hypertext Transfer Protocol (HTTP), File Transfer Protocol
(FTP), Simple Mail Transfer Protocol (SMTP).
- Purpose: Facilitates user interactions with the network and provides
services like file transfers, email, and web browsing.

---

TCP/IP Model (Transmission Control Protocol/Internet Protocol)

The TCP/IP model was developed by the U.S. Department of Defense to


standardize communication between different types of networks. It focuses on
the protocols used in the internet and combines several functionalities from
the OSI model into fewer layers.

The Four Layers of the TCP/IP Model:

1. Network Access Layer:


- Function: Combines the functionalities of the OSI's Physical and Data Link
layers. It specifies how data is physically transmitted over the network.
- Examples: Ethernet, Wi-Fi, PPP (Point-to-Point Protocol).
- Purpose: Handles the physical network connection and data framing.

2. Internet Layer:
- Function: Corresponds to the OSI's Network layer. It is responsible for
addressing and routing packets across different networks.
- Examples: Internet Protocol (IP), Address Resolution Protocol (ARP),
Internet Control Message Protocol (ICMP).
- Purpose: Provides logical addressing and ensures that packets are routed
to their destinations.
3. Transport Layer:
- Function: Similar to the OSI's Transport layer. It ensures complete data
transfer, flow control, and error correction.
- Examples: Transmission Control Protocol (TCP) for reliable
communication, User Datagram Protocol (UDP) for faster, connectionless
communication.
- Purpose: Manages data segmentation, flow control, and ensures reliable or
unreliable delivery of packets.

4. Application Layer:
- Function: Combines the functionalities of the OSI's Application,
Presentation, and Session layers. It provides network services directly to
applications.
- Examples: Hypertext Transfer Protocol (HTTP), Simple Mail Transfer
Protocol (SMTP), File Transfer Protocol (FTP).
- Purpose: Facilitates communication between software applications and the
network.

---

Key Differences Between OSI and TCP/IP Models

1. Number of Layers:
- OSI has seven layers, while TCP/IP has four layers. TCP/IP combines
several functions from the OSI model into fewer layers.

2. Development Focus:
- The OSI model is theoretical and was designed to standardize network
communication. The TCP/IP model was developed for practical
implementation in the real world, primarily for the internet.
3. Layer Responsibilities:
- Each layer in the OSI model has clearly defined responsibilities. In the
TCP/IP model, some layers have combined functionalities, which can lead to
less clarity in certain aspects.

4. Protocol Dependency:
- The OSI model is protocol-independent and can support multiple protocols.
The TCP/IP model is primarily designed around TCP and IP, which are
foundational for internet communication.

5. Use Cases:
- The OSI model is more useful for understanding and designing network
systems, while the TCP/IP model is essential for actual network
implementations and internet protocols.

You might also like