CND Unit I
CND Unit I
Prof.Jagtap S.N
Characteristics of Data Communication
1. Delivery
• The data must be delivered to the correct destination (receiver).
• It involves ensuring that data is not lost during transmission and reaches the
intended device or user.
2. Accuracy
• Data should be transmitted without errors or corruption. Any errors in transmission
(due to noise or interference) must be detected and corrected.
• Error detection and correction techniques (e.g., parity bits, checksums) are often
employed to maintain accuracy.
3. Timeliness
• Data should be delivered in a timely manner, especially for time-sensitive
applications like video streaming or voice communication.
• Latency (delay in data delivery) must be minimized to ensure real-time
communication when required.
4. Jitter
• Jitter refers to the variation in time delay during the transmission of data packets.
• Consistent timing is crucial for real-time applications like video conferencing or Prof.Jagtap S.N
online gaming to avoid disruptions.
5. Bandwidth
• Bandwidth refers to the maximum amount of data that can be transmitted in a
specific period of time.
• Higher bandwidth allows faster and more efficient communication.
6. Transmission Modes
•The medium (e.g., wired, wireless, or optical fiber) plays a crucial role in the
quality and efficiency of data communication.
•Transmission Medium
The medium (e.g., wired, wireless, or optical fiber) plays a crucial role in the quality and
efficiency of data communication.
•Message-The data being communicated can take various forms, such as text,
images, audio, or video.
•Sender-The device or user initiating the data transmission.
•Protocol-A set of rules and conventions that govern data communication. Protocols
ensure that devices with different architectures and designs can
communicate effectively.
•Latency -The delay between the transmission and reception of data. Lower latency is
crucial for real-time communication. Prof.Jagtap S.N
Components of data communication
•Sender: Initiates the data transfer.
•Medium: The path through which the data travels (e.g., cable, wireless).
Prof.Jagtap S.N
Block Diagram of data
communication
Transmissio
Source Transmitter Receiver
n medium
Destination
Prof.Jagtap S.N
Data transmission
Transfer the data between two or more digital device in analog or digital format.
Serial Parallel
synchronous asynchronous
Prof.Jagtap S.N
Types of data Transmission
1.Serial Transmission-
• It sends data bit one after another over single channel.
• In serial transmission, data bits are sent sequentially, one bit at a time, over a single
communication channel or wire.
Characteristics:
• Requires only one communication line.
• Slower compared to parallel transmission but less prone to signal interference and
noise.
• Suitable for long-distance communication.
Examples: USB (Universal Serial Bus), RS232, Ethernet.
Advantages:
• Simple wiring.
• Cost-effective for long distances.
• Reliable over noisy channels.
Disadvantages:
• more time required & Slower than parallel transmission for large volumes of data.
Prof.Jagtap S.N
0 0
1 1
0 0
Sender Receiver
1 1
0 0
0
0 One by one 1 Receiver
Sender 1 0
0 1
1 0
0
Prof.Jagtap S.N fig. serial
Transmission
2. Parallel Transmission
• It sends multiple data bits of same time over multiple channel.
• In parallel transmission, multiple data bits are sent simultaneously,
with each bit traveling over a separate communication line.
Characteristics:
• Requires multiple communication lines (equal to the number of bits
transmitted simultaneously).
• Faster than serial transmission but prone to crosstalk and signal
degradation over long distances.
• Best suited for short distances.
Examples: Printer cables, internal data buses in computers (e.g., PCI,
RAM data transfer).
Advantages:
• High-speed data transfer.
• Suitable for high-volume, short-distance communication.
Disadvantages:
• Expensive due to the need for multiple lines.
Prof.Jagtap S.N
1.Synchronous Transmission
• A lot of Data sent in a block. Each block has many character.
• In synchronous transmission, data is sent in a continuous stream,
and the sender and receiver are synchronized using a shared clock
signal.
Characteristics:
• Data is transmitted as a steady stream of bits (blocks or frames) without
gaps between them.
• Requires precise timing coordination between sender and receiver.
• A clock signal or protocol establishes the timing for when bits are sent and
received.
0101010 101101 111100
Sender Receiver
1 10
Prof.Jagtap S.N
Multiple data
• Applications:
• Used in high-speed communication systems such as Ethernet, SDH
(Synchronous Digital Hierarchy), and fiber optic communication.
• Advantages:
• High data transfer rate because there is no overhead for start/stop bits.
• Efficient for transmitting large amounts of data.
• Disadvantages:
• Requires a complex setup with clock synchronization.
• Error detection and recovery can be more challenging.
• Example Protocols: SPI (Serial Peripheral Interface), I2C, Ethernet.
Prof.Jagtap S.N
2. Asynchronous Transmission
•Characteristics:
•No shared clock signal; the sender and receiver operate independently.
•Data is transmitted only when it's ready, with gaps or idle time between transmissions.
•Start bit (usually 0) indicates the beginning of a character, and a stop bit
(usually 1)
signals the end.
stop start
1 010101 0
Sender Receiver
Prof.Jagtap S.N
Applications:
•Common in low-speed communication systems like keyboards, modems, and
serial ports (RS-232).
Advantages:
•Simple and cost-effective since no clock synchronization is needed.
•Flexible and ideal for intermittent data transmission.
Disadvantages:
•Slower than synchronous transmission due to overhead (start and stop bits).
•Less efficient for large volumes of data.
Prof.Jagtap S.N
Transmission characteristic
1.Data Rate
• Definition: The amount of data transmitted per second, usually measured in bits per second
(bps).
• Importance:
• It determines how quickly data can be sent from the sender to the receiver.
• A higher data rate implies faster communication.
• Factors Affecting Data Rate:
• Bandwidth: Wider bandwidth allows higher data rates.
• Signal-to-Noise Ratio (SNR): A higher SNR improves data rate.
• Channel Quality: More noise or interference reduces the achievable data rate.
• Examples:
• Modern Ethernet (e.g., 1 Gbps, 10 Gbps) offers very high data rates for communication.
2. Bit Rate
• Definition: The number of bits transmitted per second (bps). It represents the actual payload of the
data being sent.
• Formula: Bit Rate= n×r
• Where:
• n = number of bits per signal element
• r= signaling rate (symbols per second)
• Examples:
Prof.Jagtap S.N
• In a system transmitting 1 million bits per second, the bit rate is 1 Mbps.
3. Baud Rate (Symbol Rate)
• Definition: The number of signal changes (symbols) transmitted per second. It is
measured in baud (symbols per second).
• Baud Rate=Number of Bits per Symbol Bit Rate
4. Signaling Rate
• Definition: The rate at which signal elements (symbols) are transmitted over the
communication medium. It is synonymous with the baud rate.
• Units: Measured in symbols per second (baud).
• Relationship with Bandwidth:
•
Prof.JagtapAS.N
higher signaling rate requires a wider bandwidth to avoid signal distortion.
• Formula: Signaling Rate=Number of Bits per Symbol Bit Rate(Same as Baud Rate)
Relationship Between Bit Rate and Baud Rate
The relationship depends on how many bits are encoded in each
signal element (symbol). This is determined by the modulation
technique used:
• For Binary Signaling: Each signal element represents 1 bit (n=1n =
1n=1). Bit Rate=Baud Rate
• For Multi-Level Signaling: Each signal element represents n bits.
Bit Rate=Baud Rate
• Bit Rate=Baud Rate×n
Where:
n = Number of bits encoded in each symbol.
Example:
• If 4 bits are encoded in each symbol and the baud rate is 1000 baud:
Bit Rate=1000×4=4000 bps.
Prof.Jagtap S.N
Network Topology
How the connection are connected.
The physical arrangement of computer system/ nodes which is
connected to each other.
Physical topology – connections such as cables & wire
Logical topology – conceptual framework of the network including the
rationale for its arrangement & data flow.
Represented as graph.
Prof.Jagtap S.N
1.Mesh Topology
In a mesh topology, every device is connected to each
other device via a particular channel. These channels
are known as links
• Suppose, the N number of devices are connected
with each other in a mesh topology, the total number
comp1 comp2
of ports that are required by each device is N-1.
• No. of port per device =n-1
No of ports/links=n(n-1)
Realibity=high
comp3 comp4
Cost = high
Security =high
• There is no traffic problem as there is a dedicated point to point links for every device.
• Mesh Topology provides high privacy and security due to device are direct
connected
• If particular machine fails then we won't send the message from failed machine.
• Mesh Topology is costly as compared to the other network topologies i.e. star, bus,
point to point topology.
• Power requirement is higher as all the nodes will need to remain active all the time and
share the load.
No. of cable = n
Hub/switch/router
No of ports=n
• It is Robust. If one link fails only that link will affect and not other than that.
• If the concentrator (hub) on which the whole topology relies fails, the whole system
will crash down.
Prof.Jagtap S.N
3.Bus Topology
Bus Topology
• Bus Topology is a network type in which every computer and network
device is connected to a single cable.
• It is bi-directional. It is a multi-point connection and a non-robust
topology because if the backbone fails the topology crashes.
• Example – Ethernet cable
• Easy to install
• Less expensive
• If the common cable fails, then the whole system will crash down because it depends
on bus /cable.
• If the network traffic is heavy, it increases data collisions in the network (To avoid this,
various protocols are used in the MAC layer known as Pure Aloha, Slotted Aloha,
CSMA/CD, etc.)
Cables
comp3 comp4 comp5
Prof.Jagtap S.N
4.Tree topology
Prof.Jagtap S.N
Advantages of Tree Topology
• It allows the network to get isolated and also prioritize from different
computers.
• Error detection and error correction are very easy in a tree topology.
comp2 comp4
• The failure of a single node in the network can cause the entire network to
fail.
Prof.Jagtap S.N
Advantages of Hybrid Topology
Prof.Jagtap S.N
Needs of Computer Networks
Computer networks are essential for modern communication and
information exchange. The key needs of computer networks include:
1. Resource Sharing: To allow multiple users to share hardware (e.g.,
printers, storage) and software (e.g., applications, databases).
2. Data Sharing: Enables users to exchange data across computers in
real-time, improving collaboration.
3. Communication: Facilitates instant communication through emails,
messaging, VoIP, and video conferencing.
4. Cost Efficiency: Reduces hardware and software costs by enabling
resource centralization and sharing.
5. Centralized Management: Networks allow centralized control,
monitoring, and management of resources and systems.
6. Scalability: Enables easy addition of new devices and users without
significant changes.
7. Remote Access: Allows users to access systems and data remotely,
promoting flexibility and remote work. Prof.Jagtap S.N
Network Criteria
For a computer network to be efficient and effective, it must meet the following
criteria:
1. Performance:
1. Throughput: High data transfer rates.
2. Latency: Minimal delays in data transmission.
2. Reliability:
1. Consistent and error-free data transmission.
2. Minimal downtime and quick recovery from failures.
3. Security:
1. Protects data from unauthorized access, breaches, and cyberattacks.
2. Ensures data confidentiality, integrity, and availability.
4. Scalability:
1. Ability to grow with increasing users and devices without degradation in performance.
5. Cost:
1. Network infrastructure, maintenance, and operational costs must be within budget
constraints.
Prof.Jagtap S.N
Advantages of Networking
Communicatio
Type Connection Example
n
Dedicated link
Telephone line,
Point-to-Point between 2 Direct, exclusive
direct cable
nodes
Ethernet,
Shared medium Simultaneous to
Broadcast wireless
with all nodes all devices
broadcasting
Prof.Jagtap S.N
Based on physical size(Scale)
1. PAN (Personal Area Network)
• Physical Size: Very small, typically within a range of 1 to 10 meters.
• Coverage: Personal devices like smartphones, laptops, and wearable
devices.
• Purpose: Connecting personal devices for short-range communication.
• Examples: Bluetooth connections, infrared, or USB tethering.
Prof.Jagtap S.N
5. VPN (Virtual Private Network)
• Physical Size: Not defined by physical size, as it operates virtually
over existing networks like the internet.
• Coverage: Can span across any geographical area, as it uses
encryption to securely connect remote users to a private network.
• Purpose: Secure remote access, privacy, and bypassing geographic
restrictions.
• Examples: Corporate VPNs for remote employees, personal VPNs for
anonymous browsing.
Size Hierarchy
• Smallest: BAN → PAN → LAN → MAN → VPN (dependent on scope).
• Largest (physical reach): VPN, as it can connect globally through the
internet.
Prof.Jagtap S.N
Based on Architecture :
1. peer-to-peer (P2P) model
A peer-to-peer (P2P) model is a decentralized network architecture
where participants (or peers) interact directly with each other without
the need for a centralized server or intermediary.
P2P models are commonly used in various applications, including file
sharing, cryptocurrency, decentralized applications (dApps), and
collaborative networks.
Key Features of the P2P Model:
1. Decentralization:
1. No central authority controls the system. Each peer has equal
rights and responsibilities.
2. Direct Communication:
1. Peers communicate and exchange data directly, without a
middleman.
3. Distributed Resources:
1. Each peer contributes its resources (e.g., bandwidth, storage, or
processing power) to the network. Prof.Jagtap S.N
4. Scalability:
1. As more peers join the network, its capacity and resilience often improve.
5. Fault Tolerance:
2. Because the network is decentralized, failure of one or more peers doesn't
necessarily disrupt the entire system.
Advantages of P2P:
• Cost-Efficiency: No need for expensive centralized infrastructure.
• Privacy & Control: Users retain greater control over their data.
• Resilience: More resistant to censorship and single points of failure.
Disadvantage of P2P:
• Security Risks: Vulnerable to malware and data breaches.
• Complexity: Harder to manage and maintain than centralized systems.
• Resource Dependency: Performance depends on peer contributions and
availability.
• Backup : Hard to backup
• Speed : Slow in speed Prof.Jagtap S.N
2. client-server network
A client-server network is a centralized network architecture where devices
(clients) interact with a central server to access resources, services, or data.
This model is widely used in modern computing environments, including web
applications, email systems, and enterprise networks.
Prof.Jagtap S.N
Advantages of Client-Server Networks:
1. Centralized Control:
1. Easier to manage and secure data and resources.
2. Scalability:
1. Servers can be upgraded to handle more users or increased demand.
3. Data Consistency:
1. Centralized storage ensures consistent data across all clients.
4. Efficient Resource Sharing:
1. Multiple clients can share server resources efficiently.
Disadvantages of Client-Server Networks:
5. Single Point of Failure : If the server fails, the entire network may become
inoperable.
6. Cost: Setting up and maintaining servers can be expensive.
7. Scalability Limits: High traffic or demand can overwhelm servers without
proper scaling.
8. Latency: Requests and responses depend on network speed and server
performance. Prof.Jagtap S.N
Comparison: Client-Server vs Peer-to-Peer (P2P)