Chapter 1
Chapter 1
1
What is data communication?
2
Cont…
Communication: sharing information. Sharing can be local
(face to face) or remote (over distance)
telecommunication (tele: far) means communication at a
distance (telephone, television, telegraphy).
data refers to information presented in whatever form is agreed
upon by the parties creating and using the data.
Data communications are the exchange of data between two
devices via some form of transmission medium such as a wire
cable.
Communicating devices : made up of : H.W( physical
equipments )and S.W
3
Uses of computer network
Computer networks enhance how users communicate with each other by
using various electronic methods like email, instant messaging, online chat,
voice and video calls, and video conferencing
Networks also enable the sharing of computing resources
4
The type of data transmission demonstrates the direction in which the data
moves between the sender and receiver.
For example, IoT, entering data using a keyboard, listing music using a speaker, etc
2.Half-duplex data transmission: Data can transmit both ways, but not
simultaneously
• It is a two-way communication, or we can say that it is a bidirectional communication in
which both the devices can send and receive data but not at the same time. When one
device is sending data then another device is only receiving and vice-versa.
6
Computer Networks
A network is a set of devices connected by communication links. A
network is simply two or more computers that are linked together. A
node can be a computer, printer, or any other device capable of
sending and receiving data generated by other nodes on the network
A node can be a computer, printer, or any other device capable of
sending and/or receiving data generated by other nodes on the
network.
7
Network Applications
They provide numerous advantages:
9
Types of Computer networks
10
Types of Network- Geographical Span
• Internet Access: A Local Area Network provide internet access to all devices that is
connected to the same network.
• Gaming: A Local Area Network allows multiple users to play multiplayer games
over the network.
• File Sharing: A Local Area Network enables the sharing of files and documents
between multiple devices on the same network.
• Backup and Recovery: A Local Area network can provide backup and recovery
12
2.MAN(Metropolitan Area Network)
• A metropolitan area network (MAN) is a network with a size
between a LAN and a WAN.
• A company can use MAN to connect the LANs in all its offices
throughout a city.
17
Peer-to-Peer
In a peer-to-peer network:-
• All the computers are equal and therefore are known as peers.
18
Peer-to-Peer Networks
• The simplest form of a network is a peer-to-peer network.
20
Client/Server Networks
• A network that uses a server to enable clients to share data, data storage
space, and devices is known as a client/server network.
as switches or routers.
•
• Restrict when and from where users can access the network.
• Dictate which rules computers will use to communicate.
• Supply applications to clients.
24
Client/Server
• In an environment with more than 10 users, a peer-to-peer will
probably not be adequate.
Specialized Servers
• An application server differs from a file server in that with file server the
data or file is downloaded to the computer which making the request.
• With an application server, the database /file stays on the server and only the
results of a request are downloaded to the computer which making the request.26
Specialized Servers
5-Mail Servers
27
28
Advantage of network
• Information Sharing – Authorized users can use computers on the network to
access and share data. Use in group projects for share data among all the team
members.
• Hardware Sharing – Devices that are connected to the network can be shared
between multiple users. For example one printer that is connected to the network
are shared between multiple users.
• Software Sharing – If many users want to use a single paid software then Instead
of purchasing and installing that software on each computer , it can be installed on
the server. And all the users can able to use that software from that location.
• Privacy : With increased data sharing over networks, there are high chance to
protect data . Users personal information may be stolen by someone if any
protection algorithm is not applied.
31
Types of NIC
5. Switch 32
33
34
Software Components of Network
Network Software is mainly focused on reducing design issues like
managing, improving, or deploying a network.
It helps network administrators to manage a network and prevents
unauthorized access and various cyber-attacks, as by using network
software one can restrict access to the network.
• The two major software used in computer networks are the Operating
system and the Protocol suite.
• Here the function of the Operating system is to support the network. For example,
Windows, Mac, and Linux OS can easily connect to a network. One can use the OS to
make the system a server.
• Protocol suite consists of layers and each layer is working according to different
protocols. Here, protocol is a set of rules upon which communication devices agree
35 to
The software components of a network include:
Application layer: refers to the applications and services running
on the network.
Control layer: lies at the center of the architecture and defines
network topology and traffic routing.
Infrastructure layer: physically handles network traffic based on
the configuration at the control level.
Operating system: software required for installing computer
networks.
Protocols: software required for installing computer networks.
36
PROTOCOLS
• These protocols formally set out the rules and formats through
which data is transferred.
4.Internet Protocol(IP)
It is a protocol through which data is sent from one host to another over
the internet. It is used for addressing and routing data packets so that they
can reach their destination. 39
Network Management
These protocols assist in describing the procedures and policies that are
used in monitoring, maintaining, and managing the computer network.
Network management protocols can also be used for troubleshooting
connections between a host and a client.