Data Communication
Data Communication
1. Sender (Source):
- The device or entity that initiates the communication by sending data.
Examples include computers, smartphones, and sensors.
2. Receiver (Destination):
- The device or entity that receives the data from the sender. Examples
include servers, other computers, or IoT devices.
3. Transmission Medium:
- The physical or wireless path through which data is transmitted from
sender to receiver. Examples include:
- Wired: Ethernet cables, fiber optics, coaxial cables.
- Wireless: Radio waves (Wi-Fi, Bluetooth), microwaves, and infrared.
4. Message (Data):
- The actual data or information being communicated. This could be text,
images, audio, video, or a combination of these.
5. Protocol:
- The set of rules that governs how data is transmitted and received.
Protocols ensure that both the sender and receiver interpret the data
consistently. Examples include TCP/IP, HTTP, FTP, and UDP.
1. Analog Communication:
- Transmits data in the form of continuous signals (analog waves).
- Examples: Traditional telephony, FM/AM radio broadcasting.
2. Digital Communication:
- Transmits data as discrete signals (bits of 0s and 1s).
- More reliable and widely used in modern communication systems.
- Examples: Ethernet, Wi-Fi, and mobile data.
1. Serial Transmission:
- Data bits are transmitted one after the other over a single channel.
- Slower but more reliable for long-distance communication.
- Example: USB (Universal Serial Bus).
2. Parallel Transmission:
- Multiple data bits are transmitted simultaneously across several channels.
- Faster but suitable only for short distances due to signal degradation.
- Example: Data transfer within a computer from the processor to memory.
1. Synchronous Transmission:
- Data is sent as a continuous stream with synchronized clocks between
sender and receiver.
- Faster and more efficient for high-speed networks.
- Example: Data transfer over fiber optic networks.
2. Asynchronous Transmission:
- Data is sent one byte at a time, with start and stop bits used to identify each
piece of data.
- Slower but suitable for systems where data is sent intermittently.
- Example: Communication between computers and modems.
3. Isochronous Transmission:
- Data is transmitted at fixed intervals, ensuring that it arrives at regular,
predictable times.
- Typically used in real-time systems where timing is critical (e.g., video
streaming, VoIP).
2. Receiver (Destination)
- The receiver is the device or entity that receives the transmitted message
or data.
- Similar to the sender, the receiver could be a computer, server,
smartphone, or other digital devices.
- The receiver decodes the transmitted data and converts it back into a
format understandable by the user or system.
3. Message (Data)
- The message is the actual information being communicated between the
sender and receiver.
- It can be any form of data, including text, numbers, images, audio, video, or
even control signals.
- The message is typically converted into a digital signal (or analog,
depending on the medium) before being transmitted.
Example: A text message, a video stream, or a file being transferred over a
network.
4. Transmission Medium
- The transmission medium is the physical pathway through which the
message travels from the sender to the receiver.
- The medium can be wired (such as copper cables, fiber optics) or wireless
(such as radio waves, microwaves, or infrared).
Example: The internet cable used for data transmission or Wi-Fi signals used
for wireless data communication.
5. Protocol
- A protocol is a set of rules or standards that govern how data is transmitted
and received across a network.
- Protocols ensure that devices on different networks or using different
systems can communicate with each other.
- They handle issues like data formatting, addressing, error detection, and
data flow control.
Common Protocols:
- Transmission Control Protocol (TCP): Ensures reliable data transmission
by handling error checking and data integrity.
- Internet Protocol (IP): Handles addressing and routing of data packets
across the network.
- HTTP/HTTPS: Used for web communication between browsers and web
servers.
- SMTP/POP3: Used for sending and receiving emails.
---
Summary of Components
1. Simplex Mode
2. Half-Duplex Mode
3. Full-Duplex Mode
1. Simplex Mode
In Simplex mode, data flows in only one direction — from the sender to the
receiver. The communication is unidirectional, meaning the sender can
transmit data, but the receiver cannot send any data back to the sender.
- Characteristics:
- One-way communication.
- The receiver can only receive data; it cannot send data back to the sender.
- Used in systems where response from the receiver is unnecessary or not
required.
- Examples:
- Television broadcasting: The television station sends signals to your TV, but
your TV does not send any data back.
- Radio broadcasting: The radio station sends audio signals to radios, and
radios only receive the signal.
2. Half-Duplex Mode
- Characteristics:
- Two-way communication, but one direction at a time.
- Each device can either transmit or receive at a given moment, but not both
simultaneously.
- This mode is more efficient than Simplex because it allows two-way
communication.
- Examples:
- Walkie-talkies: When one person speaks, the other person must wait until
the transmission is over before responding.
- Two-way radios: Common in military and emergency communications,
where parties take turns speaking.
3. Full-Duplex Mode
- Characteristics:
- Two-way communication happening simultaneously.
- Faster and more efficient since both devices can communicate without
interruption.
- Requires a more complex system to manage the simultaneous data flows,
but it is ideal for high-performance networks.
- Examples:
- Telephone communication: Both people can speak and listen at the same
time during a phone call.
- Modern Ethernet networks: Allow data to be sent and received at the same
time, improving the speed and performance of the network.
---
Key Features:
- Limited geographical scope (typically a few hundred meters).
- Typically owned and managed by a single organization.
- High-speed data transmission (e.g., Ethernet, Wi-Fi).
- Inexpensive to install and maintain compared to larger networks.
Use Cases:
- Offices, schools, universities, homes.
Example:
- A network connecting all computers and printers in a small office building.
---
Key Features:
- Covers a city, campus, or large urban area.
- Larger than a LAN but smaller than a WAN.
- Often owned by a service provider or a large organization.
Use Cases:
- Connecting multiple buildings of a university or businesses across a city.
Example:
- A network that connects the branches of a university across a city.
---
Key Features:
- Covers a large geographical area (across countries or continents).
- Often uses leased telecommunication lines or satellite links.
- Slower than LANs but capable of covering long distances.
- Owned and managed by multiple organizations or service providers.
Use Cases:
- Connecting regional offices of a multinational company.
- Internet backbone.
Example:
- The internet, which connects networks worldwide.
---
Key Features:
- Operates within a small geographical area like a LAN, but without physical
cables.
- Utilizes wireless technology (e.g., radio waves) for communication.
- Commonly used in homes, offices, and public places.
Use Cases:
- Home or office networks where users connect to the internet via Wi-Fi.
- Public Wi-Fi hotspots in cafes, airports, or libraries.
Example:
- A Wi-Fi network in a coffee shop allowing customers to connect their
laptops and smartphones.
Comparison of Network Types
The Internet, Intranet, and Extranet are three types of networks that vary in
scope, accessibility, and purpose. They all use similar technologies like
TCP/IP, but differ in terms of who can access them and how they are used.
---
1. Internet
- Key Features:
- Global access: Open and accessible to the public, connecting users
worldwide.
- Decentralized: No single organization controls the internet.
- Uses common protocols: TCP/IP, HTTP, HTTPS for communication.
- Publicly accessible: Anyone with an internet connection can access it.
- Use Cases:
- Web browsing, email, social media, video conferencing, e-commerce.
- Services like Google, Amazon, Wikipedia, and social media platforms
(Facebook, Instagram, Twitter).
- Examples:
- Accessing any public website like YouTube, performing searches on Google,
or sending an email through Gmail.
---
2. Intranet
- Key Features:
- Private network: Only authorized employees or members of an
organization can access it.
- Internal use: Designed to support internal communication and
collaboration.
- Uses internet technologies: Utilizes web technologies like browsers, HTML,
and TCP/IP, but access is restricted.
- Controlled access: Requires authentication, such as login credentials, to
ensure privacy and security.
- Use Cases:
- Corporate communication, document sharing, employee directories, HR
services.
- Collaboration tools, internal emails, project management software, and
training resources.
- Examples:
- A company portal where employees can access internal documents, reports,
or company announcements.
- HR systems for leave applications, pay slips, and employee records.
---
3. Extranet
An Extranet is an extension of an Intranet that provides limited access to
external users, such as business partners, suppliers, or customers. It allows
organizations to securely collaborate and share information with select
external parties while still maintaining control over the data and resources
being accessed.
- Key Features:
- Controlled external access: External users like suppliers, partners, or clients
can access specific parts of the organization’s internal network.
- Security-focused: Requires secure authentication and often uses VPNs
(Virtual Private Networks) or other encryption methods to ensure that only
authorized users can access the system.
- Collaboration: Used for sharing information, data, or services between an
organization and its external stakeholders.
- Use Cases:
- Supplier portals for checking inventory, placing orders, or tracking
shipments.
- Customer portals for accessing order history, invoices, or technical support.
- Collaboration between businesses and their partners in joint projects.
- Examples:
- A retail company providing its suppliers access to an Extranet for checking
stock levels and submitting orders.
- A customer service portal that allows clients to view their service history or
place new requests.
---
Comparison
Network Models
Network models define the architecture and design of how devices
(computers, servers, etc.) communicate with each other in a network. Two
common network architectures are the Client/Server network and the Peer-
to-Peer network. Additionally, two standard protocol models, OSI and TCP/IP,
define how data is transmitted between devices in a network.
1. Client/Server Network
In a Client/Server network, devices in the network are divided into two
categories: clients and servers. The server provides resources and services,
while the client requests them. This is a centralized model, where one or more
servers control the data flow and manage services.
- Key Characteristics:
- Centralized control: Servers manage resources and services such as files,
databases, printers, and internet access.
- Clients request services: Clients rely on servers for data processing, file
storage, and other services.
- Scalability: Easier to manage large networks due to centralized
administration.
- High security: Access to resources is controlled by the server, which helps
with security and resource management.
- Use Cases:
- Business networks where file sharing, databases, and centralized
management are essential.
- Websites and applications hosted on centralized servers.
- Examples:
- A web server providing pages to users' web browsers.
- An email server hosting multiple users' email accounts.
- Use Cases:
- Small networks, such as home or small office networks where users share
files directly.
- File-sharing applications like torrents.
- Examples:
- BitTorrent for file sharing.
- A home network where computers share files and printers without a
central server.
1. Physical Layer:
- Function: Deals with the physical connection between devices, including
the transmission of raw bits over a communication medium (e.g., cables,
wireless).
- Examples: Ethernet cables, fiber optics, and radio frequencies.
- Purpose: Ensures that the data is physically transmitted over the network
medium without any errors.
3. Network Layer:
- Function: Manages routing of data packets across networks. It determines
the best path for data transmission.
- Examples: Internet Protocol (IP), Internet Control Message Protocol
(ICMP).
- Purpose: Facilitates logical addressing (IP addresses) and forwarding of
packets.
4. Transport Layer:
- Function: Provides reliable or unreliable data transport, flow control, and
error recovery. It segments data for transmission and reassembles it at the
destination.
- Examples: Transmission Control Protocol (TCP), User Datagram Protocol
(UDP).
- Purpose: Ensures complete data transfer and integrity.
5. Session Layer:
- Function: Manages sessions (connections) between applications,
establishing, maintaining, and terminating communication.
- Examples: Remote Procedure Call (RPC), NetBIOS.
- Purpose: Controls dialog between applications and manages token
management for data exchange.
6. Presentation Layer:
- Function: Translates data formats between the application and network. It
handles data encryption, compression, and translation.
- Examples: SSL/TLS for encryption, JPEG for image data.
- Purpose: Ensures that data is in a readable format for the application layer.
7. Application Layer:
- Function: Interfaces with end-user applications and provides network
services to those applications.
- Examples: Hypertext Transfer Protocol (HTTP), File Transfer Protocol
(FTP), Simple Mail Transfer Protocol (SMTP).
- Purpose: Facilitates user interactions with the network and provides
services like file transfers, email, and web browsing.
---
2. Internet Layer:
- Function: Corresponds to the OSI's Network layer. It is responsible for
addressing and routing packets across different networks.
- Examples: Internet Protocol (IP), Address Resolution Protocol (ARP),
Internet Control Message Protocol (ICMP).
- Purpose: Provides logical addressing and ensures that packets are routed
to their destinations.
3. Transport Layer:
- Function: Similar to the OSI's Transport layer. It ensures complete data
transfer, flow control, and error correction.
- Examples: Transmission Control Protocol (TCP) for reliable
communication, User Datagram Protocol (UDP) for faster, connectionless
communication.
- Purpose: Manages data segmentation, flow control, and ensures reliable or
unreliable delivery of packets.
4. Application Layer:
- Function: Combines the functionalities of the OSI's Application,
Presentation, and Session layers. It provides network services directly to
applications.
- Examples: Hypertext Transfer Protocol (HTTP), Simple Mail Transfer
Protocol (SMTP), File Transfer Protocol (FTP).
- Purpose: Facilitates communication between software applications and the
network.
---
1. Number of Layers:
- OSI has seven layers, while TCP/IP has four layers. TCP/IP combines
several functions from the OSI model into fewer layers.
2. Development Focus:
- The OSI model is theoretical and was designed to standardize network
communication. The TCP/IP model was developed for practical
implementation in the real world, primarily for the internet.
3. Layer Responsibilities:
- Each layer in the OSI model has clearly defined responsibilities. In the
TCP/IP model, some layers have combined functionalities, which can lead to
less clarity in certain aspects.
4. Protocol Dependency:
- The OSI model is protocol-independent and can support multiple protocols.
The TCP/IP model is primarily designed around TCP and IP, which are
foundational for internet communication.
5. Use Cases:
- The OSI model is more useful for understanding and designing network
systems, while the TCP/IP model is essential for actual network
implementations and internet protocols.