0% found this document useful (0 votes)
6 views11 pages

Unit1Data communication Components

The document outlines the key components of data communication, including the message, sender, receiver, transmission medium, and protocols, which facilitate the exchange of data between devices. It also discusses various network topologies, types of protocols such as TCP/IP, HTTP, and FTP, and the importance of protocol compliance for network security and performance. Additionally, it covers Local Area Networks (LAN), Wireless LANs (WLAN), and bandwidth utilization techniques like multiplexing and spreading to enhance communication efficiency.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views11 pages

Unit1Data communication Components

The document outlines the key components of data communication, including the message, sender, receiver, transmission medium, and protocols, which facilitate the exchange of data between devices. It also discusses various network topologies, types of protocols such as TCP/IP, HTTP, and FTP, and the importance of protocol compliance for network security and performance. Additionally, it covers Local Area Networks (LAN), Wireless LANs (WLAN), and bandwidth utilization techniques like multiplexing and spreading to enhance communication efficiency.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Unit -1… - Data communication Components

Data communication is nothing but the exchange of data between any two devices via transmission
media.

Components:-
There are five(5) main component of data communication.

Message
This is the most valuable asset of a system for data communication.
The message actually refers to data that is to be shared or a piece of
information. A message is in any form, like a text file, an audio file, a
video file, and so on.

Sender
Someone who can play the role of a source must be there to pass
messages from source to destination. The sender plays a part of the
data communication device root. A device that sends data messages
is easy. The node can be a computer, mobile device, telephone,
laptop, video camera, workstation, etc.

Receiver
It is the destination where messages sent by the source
have finally arrived. It is a message-receiving system. The
receiver is in the form of a computer, cell phone,
workstation, etc., identical to the sender.
Transmission Medium
There must be something in the entire data communication process that could act as a
bridge between sender and receiver. The transmission is the physical path from the
sender to the recipient where the information or message passes.

Eg: twisted pair cable, fibre optic cable, radio waves, microwaves, etc. The
transmission medium could be guided (with wires) or unguided (without wires).

Protocol
Different sets of rules have already been designed by the designers of communication
systems to control data communication, reflecting a sort of agreement between
communicating devices. These are characterized as protocols.

The protocol is also called as a set of rules regulating data communication. If two
separate devices are connected, but there is no protocol between them, there will be
no contact between the two devices of any sort. It determine :- what is
communicated,, how it communicated & what is communicated.

…………………………………………………………………………………………………………..

Representation of
Data/Information:-
Computers do not understand human language; they
understand data within the prescribed form. Data
representation is a method to represent data and encode it
in a computer system. Generally, a user inputs numbers,
text, images, audio, and video etc types of data to process
but the computer converts this data to machine language
first and then processes it.
Some common data representation methods include:-
Computers represent data in the
following forms
Number System
Bits and Bytes
Text Code – EBCDIC ,ASCII ,Extended ASCII ,Unicode
……………………………………………………………………………
……………………………
Types of Network Topology
Network topology refers to the arrangement of different
elements like nodes, links, or devices in a computer
network.
Network topology is the way devices are connected in a
network.
It defines how these components are connected and how
data transfer between the network.
Types of network Topology:
Point to Point Topology
Mesh Topology
Star Topology
Bus Topology
Ring Topology
Tree Topology
Hybrid Topology

The Protocol and Standard Guide for


Computer Networks
In today's digital era, the seamless exchange of
information is essential for efficient and secure
communication between connected devices in computer
networks.
network protocol and standard compliance while breaking
down various types such as TCP/IP, HTTP, FTP, etc.
Types of Protocols and Standards:
There are several types of protocols and standards used in
computer networks, including Transmission Control Protocol
(TCP), Internet Protocol (IP), User Datagram Protocol (UDP)
and network standards such as TCP/IP, HTTP, FTP, among
others.
Transmission Control Protocol (TCP):
designed to ensure accurate and reliable data transmission
between devices.
TCP guarantees that all information packets arrive at their
intended destination in the correct order and without
errors.
Internet Protocol (IP):
enables data communication across the internet.
It is responsible for routing and forwarding data packets
from one device to another, based on their unique
addressing scheme.
IP addresses are used to identify devices that are
connected to a network, allowing them to communicate
with each other.
One of the key features of IP is its ability to work in
conjunction with other protocols such as TCP or UDP,
forming the backbone of the internet's infrastructure.
Without it, we wouldn't be able to send emails or browse
web pages online.
User Datagram Protocol (UDP):
User Datagram Protocol (UDP) is a connectionless protocol
that operates on top of the Internet Protocol (IP). It is faster
than Transmission Control Protocol (TCP) because it does
not guarantee the delivery of packets or in order delivery,
making it less reliable.
UDP is commonly used for time-sensitive applications such
as online gaming, video streaming, and voice-over-IP
(VoIP), where speed and efficiency are more important than
reliability.
UDP does not provide flow control or error correction like
TCP,
it requires fewer resources than TCP
Network Standards (TCP/IP, HTTP,
FTP, Etc.):--
Transmission Control Protocol/Internet Protocol
(TCP/IP) ? TCP/IP is the most commonly used protocol and
standard in computer networks. It is responsible for
ensuring reliable data transmission over the internet by
breaking down data into smaller packets that can be sent
across different network devices.
TCP is used to transfer the data over the internet, it divides
the fata into small packets and sends it to the destination
through the network .
While IP is used for addressing through which data reaches
the final destination
Hypertext Transfer Protocol (HTTP) ? HTTP is a standard protocol used for
transmitting web pages and other content on the World Wide Web. It
defines how web clients such as browsers communicate with servers to
retrieve information.

File Transfer Protocol (FTP) ? FTP is another protocol


used to transfer files between devices on a network. It
provides a simple way of sending and receiving files,
making it an essential tool for businesses that need to
transfer large amounts of data.
Simple Mail Transfer Protocol (SMTP) ? SMTP is a
standard protocol used for sending email messages
between different email clients and servers on the internet.
 Domain Name System (DNS) ? DNS is a set of protocols that
translates human-readable domain names into IP addresses used by
computers to locate websites and other resources on the internet.

Importance of Protocol and


Standard Compliance in Network
Security:
 Efficient Network Infrastructure ? Following protocol rules reduces the
likelihood of network downtime and ensures that data exchanges occur
without errors, ultimately leading to a more efficient network
infrastructure.
 Secure Data Transmission ? Compliance with security protocols provides
protection for sensitive data from being intercepted and accessed by
unauthorized parties, ensuring secure data transmission across the
network.
 Improved Network Performance ? Adhering to standard formatting
protocols helps to minimize data redundancy, optimize bandwidth usage
and reduce network congestion, ultimately leading to better network
performance.
 Interoperability between devices ? Standardized protocols ensure that
devices from different manufacturers can communicate effectively and
efficiently with one another, allowing them to interoperate seamlessly.
 Facilitates Network Management ? Protocols provide a standard set of
rules for handling data transfer and adjustment of settings, making it
easy for IT professionals to manage the connected devices on the
network.

Consequences of Non-
Compliance
Increased risk of cyber-attacks ? Non-compliance can leave
the network vulnerable to cybercriminals looking to exploit
vulnerabilities in the system.
Data breaches ? Breaches occur when sensitive
information is accessed, stolen, or shared without
authorization. Non-compliant networks are more
susceptible to data breaches, putting important business
and personal information at risk.
Network downtime ? Without protocols and standards in
place, network performance may suffer due to outages,
compatibility issues, or other technical problems.
Legal penalties ? Failure to comply with industry
regulations such as GDPR or HIPAA can result in legal
penalties, including fines and lawsuits.
Loss of reputation ? A security breach resulting from non-
compliance can cause significant damage to a company's
reputation and the trust of its customers.
Financial loss ? In addition to legal penalties, non-
compliance can lead to financial losses through lost
revenue, or the cost associated with repairing damage
caused by an attack or failure.
Reduced productivity ? non-compliant networks may have
reduced efficiencies that affect operations leading to
reduced productivity.
……………………………………………………………………………………………………….

OSI
Model:
The open systems interconnection (OSI) model is a
conceptual model created by the International Organization
for Standardization which enables diverse communication
systems to communicate using standard protocols. In plain
English, the OSI provides a standard for different computer
systems to be able to communicate with each other.
The OSI Model can be seen as a universal language for
computer networking. It is based on the concept of splitting
up a communication system into seven abstract layers,
each one stacked upon the last.
…………………………………………
………………………….
Local Area Network (LAN):--
A Local Area Network (LAN) is a private network that
connects computers and devices within a limited area like
a residence, an office, a building or a campus. On a small
scale, LANs are used to connect personal computers to
printers. However, LANs can also extend to a few
kilometers when used by companies, where a large
number of computers share a variety of resources like
hardware (e.g. printers, scanners, audiovisual devices etc),
software (e.g. application programs) and data.

features of LAN are


 Network size is limited to a small geographical area, presently to a few
kilometers.
 Data transfer rate is generally high. They range from 100 Mbps to 1000
Mbps.
 In general, a LAN uses only one type of transmission medium,
commonly category 5 coaxial cables.
 A LAN is distinguished from other networks by their topologies. The
common topologies are bus, ring, mesh, and star.
 The number of computers connected to a LAN is usually restricted. In
other words, LANs are limitedly scalable.
 IEEE 802.3 or Ethernet is the most common LAN. They use a wired
medium in conjuncture with a switch or a hub. Originally, coaxial cables
were used for communications. But now twisted pair cables and fiber
optic cables are also used. Ethernet’s speed has increased from 2.9
Mbps to 400 Gbps.
Wireless LANs (WLAN):
Wireless LANs use high-frequency radio waves instead of
cables for communications. They provide clutter free
homes, offices and other networked places. They have an
Access Point or a wireless router or a base station for
transferring packets to and from the wireless computers
and the internet. Most WLANs are based on the standard
IEEE 802.11 or WiFi.

Virtual LANs (VLAN):


Virtual LANs are a logical group of computers that appear
to be on the same LAN irrespective of the configuration of
the underlying physical network. Network administrators
partition the networks to match the functional
requirements of the VLANs so that each VLAN comprise a
subset of ports on a single or multiple switches. This allows
computers and devices on a VLAN to communicate in the
simulated environment as if it is a separate LAN.

…………………………………………
………………………………..
Bandwidth utilization:
Bandwidth utilization techniques like multiplexing and spreading enhance communication
efficiency and security.
Multiplexing combines multiple signals for simultaneous transmission, while spreading
spreads the signal over a wider bandwidth for enhanced protection against interference and
eavesdropping.
Multiplexing:
Frequency Division Multiplexing (FDM):
Divides the available bandwidth into distinct frequency bands, assigning each signal a unique
band.
Time Division Multiplexing (TDM):
Allocates different time slots to each signal, allowing multiple signals to share the same
bandwidth by transmitting them at different times.
Wavelength Division Multiplexing (WDM):
Uses different wavelengths of light to transmit multiple signals simultaneously over a single
optical fiber.
Spread Spectrum:
Frequency Hopping Spread Spectrum (FHSS):
The signal hops between different carrier frequencies at regular intervals, making it difficult
to intercept or jam.
Direct Sequence Spread Spectrum (DSSS):
Each bit of data is represented by a longer sequence of bits, which is then transmitted. This
spreading of the signal over a wider bandwidth makes it more resistant to interference.

You might also like