Unit1Data communication Components
Unit1Data communication Components
Data communication is nothing but the exchange of data between any two devices via transmission
media.
Components:-
There are five(5) main component of data communication.
Message
This is the most valuable asset of a system for data communication.
The message actually refers to data that is to be shared or a piece of
information. A message is in any form, like a text file, an audio file, a
video file, and so on.
Sender
Someone who can play the role of a source must be there to pass
messages from source to destination. The sender plays a part of the
data communication device root. A device that sends data messages
is easy. The node can be a computer, mobile device, telephone,
laptop, video camera, workstation, etc.
Receiver
It is the destination where messages sent by the source
have finally arrived. It is a message-receiving system. The
receiver is in the form of a computer, cell phone,
workstation, etc., identical to the sender.
Transmission Medium
There must be something in the entire data communication process that could act as a
bridge between sender and receiver. The transmission is the physical path from the
sender to the recipient where the information or message passes.
Eg: twisted pair cable, fibre optic cable, radio waves, microwaves, etc. The
transmission medium could be guided (with wires) or unguided (without wires).
Protocol
Different sets of rules have already been designed by the designers of communication
systems to control data communication, reflecting a sort of agreement between
communicating devices. These are characterized as protocols.
The protocol is also called as a set of rules regulating data communication. If two
separate devices are connected, but there is no protocol between them, there will be
no contact between the two devices of any sort. It determine :- what is
communicated,, how it communicated & what is communicated.
…………………………………………………………………………………………………………..
Representation of
Data/Information:-
Computers do not understand human language; they
understand data within the prescribed form. Data
representation is a method to represent data and encode it
in a computer system. Generally, a user inputs numbers,
text, images, audio, and video etc types of data to process
but the computer converts this data to machine language
first and then processes it.
Some common data representation methods include:-
Computers represent data in the
following forms
Number System
Bits and Bytes
Text Code – EBCDIC ,ASCII ,Extended ASCII ,Unicode
……………………………………………………………………………
……………………………
Types of Network Topology
Network topology refers to the arrangement of different
elements like nodes, links, or devices in a computer
network.
Network topology is the way devices are connected in a
network.
It defines how these components are connected and how
data transfer between the network.
Types of network Topology:
Point to Point Topology
Mesh Topology
Star Topology
Bus Topology
Ring Topology
Tree Topology
Hybrid Topology
Consequences of Non-
Compliance
Increased risk of cyber-attacks ? Non-compliance can leave
the network vulnerable to cybercriminals looking to exploit
vulnerabilities in the system.
Data breaches ? Breaches occur when sensitive
information is accessed, stolen, or shared without
authorization. Non-compliant networks are more
susceptible to data breaches, putting important business
and personal information at risk.
Network downtime ? Without protocols and standards in
place, network performance may suffer due to outages,
compatibility issues, or other technical problems.
Legal penalties ? Failure to comply with industry
regulations such as GDPR or HIPAA can result in legal
penalties, including fines and lawsuits.
Loss of reputation ? A security breach resulting from non-
compliance can cause significant damage to a company's
reputation and the trust of its customers.
Financial loss ? In addition to legal penalties, non-
compliance can lead to financial losses through lost
revenue, or the cost associated with repairing damage
caused by an attack or failure.
Reduced productivity ? non-compliant networks may have
reduced efficiencies that affect operations leading to
reduced productivity.
……………………………………………………………………………………………………….
OSI
Model:
The open systems interconnection (OSI) model is a
conceptual model created by the International Organization
for Standardization which enables diverse communication
systems to communicate using standard protocols. In plain
English, the OSI provides a standard for different computer
systems to be able to communicate with each other.
The OSI Model can be seen as a universal language for
computer networking. It is based on the concept of splitting
up a communication system into seven abstract layers,
each one stacked upon the last.
…………………………………………
………………………….
Local Area Network (LAN):--
A Local Area Network (LAN) is a private network that
connects computers and devices within a limited area like
a residence, an office, a building or a campus. On a small
scale, LANs are used to connect personal computers to
printers. However, LANs can also extend to a few
kilometers when used by companies, where a large
number of computers share a variety of resources like
hardware (e.g. printers, scanners, audiovisual devices etc),
software (e.g. application programs) and data.
…………………………………………
………………………………..
Bandwidth utilization:
Bandwidth utilization techniques like multiplexing and spreading enhance communication
efficiency and security.
Multiplexing combines multiple signals for simultaneous transmission, while spreading
spreads the signal over a wider bandwidth for enhanced protection against interference and
eavesdropping.
Multiplexing:
Frequency Division Multiplexing (FDM):
Divides the available bandwidth into distinct frequency bands, assigning each signal a unique
band.
Time Division Multiplexing (TDM):
Allocates different time slots to each signal, allowing multiple signals to share the same
bandwidth by transmitting them at different times.
Wavelength Division Multiplexing (WDM):
Uses different wavelengths of light to transmit multiple signals simultaneously over a single
optical fiber.
Spread Spectrum:
Frequency Hopping Spread Spectrum (FHSS):
The signal hops between different carrier frequencies at regular intervals, making it difficult
to intercept or jam.
Direct Sequence Spread Spectrum (DSSS):
Each bit of data is represented by a longer sequence of bits, which is then transmitted. This
spreading of the signal over a wider bandwidth makes it more resistant to interference.