Introduction To Data Communication: Names of Sub-Units
Introduction To Data Communication: Names of Sub-Units
Names of Sub-Units
Introduction, Components of Data Communication, Data Representation and Data Flow. Network
Devices, Types of Connection, Topology, Categories of Networks, Interconnection of Networks,
Applications of Networks, History of Network, Protocols and Standards.
Overview
This unit begins by learning about the concept of data communication. Then, the unit discusses
components of data communication. Next, the unit discusses the concept of data representation and
data flow. Further, the unit discusses the network devices, types of connection, and network topology.
This unit also discusses the categories of network and interconnection of networks. Then, the unit
discusses the applications of network and history of network. Towards the end, the unit discusses the
protocol and standards.
Learning Objectives
Learning Outcomes
At the end of this unit you would:
Assess the knowledge about data communication and computer networks
Analyse the concept of data representation, data flow, and network devices
Examine the significance of the network topology, categories of networks, and interconnection of
networks
Assess the applications of networks
Examine the idea about network protocols and standards
https://archive.mu.ac.in/myweb_test/syllFybscit/dcn.pdf
1.1 INTRODUCTION
A computer network is a collection of interconnected computers and electronic devices such as printers.
This connectivity allows computers to share information more easily. Computers can communicate
with one another via wired or wireless medium.
2
UNIT 01: Introduction to Data Communication JGI JAIN
DEEMED-TO-BE UNI VE RSI TY
3
JGI JAIN
DEEMED-TO-BE UNI VE RSI TY
Data Communication and Computer Networks
1.5.1 Simplex
In simplex mode, the course of the information stream is unidirectional. One of the gadgets can
communicate the information and another gadget can get consistently (Figure 1 Part 1). A model is the
CPU that sends the information to the screen constantly.
4
UNIT 01: Introduction to Data Communication JGI JAIN
DEEMED-TO-BE UNI VE RSI TY
Access Point
Hub
Switch Router
1.7.1 Point-to-Point
It establishes a direct and dedicated connection between two devices (usually the source and the
destination). Only these two devices have access to the link’s complete transmission capacity. For
instance, a connection between a display and a computer.
Figure 2 shows the point-to-point connection:
D1 D2 D3
Link
SERVER
D4 D5 D6
5
JGI JAIN
DEEMED-TO-BE UNI VE RSI TY
Data Communication and Computer Networks
Flexibility: Because office furniture, internal walls, and other elements change often, the network
architecture should allow for quick reconfiguration. This entails relocating existing nodes as well as
creating new ones.
Reliability: A network’s failure might take two forms. To begin with, a single node might fail. This
is not as bad as the second sort of failure, in which the network fails to function. The network
architecture selected can assist by allowing the location of the issue to be discovered and some
methods of isolating it.
6
UNIT 01: Introduction to Data Communication JGI JAIN
DEEMED-TO-BE UNI VE RSI TY
7
JGI JAIN
DEEMED-TO-BE UNI VE RSI TY
Data Communication and Computer Networks
8
UNIT 01: Introduction to Data Communication JGI JAIN
DEEMED-TO-BE UNI VE RSI TY
9
JGI JAIN
DEEMED-TO-BE UNI VE RSI TY
Data Communication and Computer Networks
10
UNIT 01: Introduction to Data Communication JGI JAIN
DEEMED-TO-BE UNI VE RSI TY
built by computer vendors prior to that time to connect terminals and distant job entry stations to a
mainframe.
In 1940, George Sitbit used a teletype machine for transporting instructions of a problem set from
his model to his complex number calculator, and received results. Early networks of communicating
computers were begun in the 1950s, including the military radar system Semi-Automatic Ground
Environment (SAGE). Later, in the 1960s, the ARPAnet design incorporated the concept of networking
between computers that saw each other as equal peers in order to accomplish “resource sharing.”
Another notable point of the Arpanet effort was its dependence on the then-novel technology of
packet switching, rather than the more typical message or circuit switching, to efficiently distribute
communication resources among “bursty” users.
Table 1 shows the progression of computer networks from network to internet throughout time:
Year Event
1961 Leonard Kleinrock introduced the notion of ARPANET, one of the first computer networks, in his article
“Information Flow in Large Communication Nets” in 1961.
1965 Donald Davies created the word “packet” to represent data transferred between computers via a
network in 1965.
1969 The Internet was formally launched on October 29, 1969, at 10:30 p.m., when the first data transfer was
transmitted between UCLA and SRI.
1970 NCP (NetWare Core Protocol) was created by Steve Crocker and a team at UCLA in 1970. NCP is a
NetWare-based file sharing mechanism.
1971 In Hawaii, ALOHAnet, a UHF wireless packet network, is utilised to connect the islands. Although, it is
not Wi-Fi, it aids in the establishment of Wi-Fi.
1973 In 1973, an experimental VoIP call was made, revealing VoIP technology and capabilities for the first
time.
However, it wasn’t until 1995 that the first software allowing users to conduct VoIP calls became
accessible.
1974 In 1974, Xerox introduced the first routers. These early routers, however, were not regarded genuine IP
routers.
1976 In 1976, Ginny Strazisar created the first real IP router, dubbed a gateway at the time.
1978 In 1978, Bob Kahn devised the TCP/IP protocol for networks, which he developed with Vint Cerf’s aid.
1981 The National Science Foundation of the United States created CSNET (Computer Science Network) in
1981.
1983 In 1983, Paul Mockapetris and Jon Postel created the first DNS.
1986 In 1986, BITNET II was established to overcome bandwidth difficulties with the first BITNET.
1988 The first publication on network firewall technology was in 1988. The first firewall, known as a packet
filter firewall, was built by Digital Equipment Corporation the same year, according to the report.
1990 In 1990, Kalpana, a network hardware firm based in the United States, designed, and released the first
network switch.
11
JGI JAIN DEEMED-TO-BE UNI VE RSI TY
Data Communication and Computer Networks
Year Event
1996 IPv6 was launched in 1996 as an upgrade to IPv4 that included a larger number of IP addresses, better
routing, and integrated encryption.
1997 In June 1997, the first version of the 802.11 Wi-Fi standard was released, with transmission rates of up
to 2 Mbps.
1999 In September 1999, the WEP Wi-Fi encryption standard was released for use with 802.11b.
2003 In 2004, the WPA2 encryption technology was launched as an upgrade to and replacement for WPA. By
the year 2006, all Wi-Fi devices must be WPA2 certified.
2009 In 2009, the Wi-Fi standard 802.11n became official. It can operate on the 2.4 GHz and 5 GHz bandwidths
and has faster transmission rates than 802.11a and 802.11g.
2018 In January 2018, the Wi-Fi Alliance launched WPA3 encryption for Wi-Fi, which offers security
improvements over WPA2.
1.13 PROTOCOLS
A procedure is essentially the same as a rule. Communication takes place between entities in various
systems in computer networks. Anything that can transmit or receive data is considered an entity. Any
two entities can’t just transmit each other bitstreams and expect to be understood. In order for the
communication to occur, the entities must agree on a protocol.
A protocol is a collection of rules that regulate the transmission of data. What is transmitted, how it
is communicated, and when it is communicated are all defined by the protocol. A protocol’s essential
elements are as given below:
Syntax: This word mostly relates to the data’s structure or format, which essentially refers to the
order in which information is displayed. A basic protocol, for example, may require the first 8 bits of
data to be the sender’s address, the second 8 bits to be the receiver’s address, and the remainder of
the stream to be the message itself.
Semantics: The meaning of each chunk of bits is referred to by this word. How is a certain pattern
should be understood, and what action should be performed based on that interpretation? Does an
address, for example, specify the path to be travelled or the message’s eventual destination?
Timing: Timing is based on two aspects: when data should be provided and how quickly it can be
sent. When a sender delivers data at 100 Mbps but the receiver can only take 1 Mbps, the receiver will
be overloaded and some data will be lost.
Some rules and processes should be agreed upon at the transmitting and receiving ends of the system
in order for communication between devices to be successful. Protocols are the names given to such
regulations and processes. For different forms of communication, multiple protocols are employed.
Network Protocols are a collection of rules that control how information is exchanged in a simple,
reliable, and secure manner. We need to understand how a network is logically structured or built before
we can examine the most common protocols used to transmit and receive data over a network. The Open
Systems Interface (OSI) proposed by ISO. paradigm is the most widely used methodology for establishing
open communication between two systems. There are some protocols for different-different usability:
OSI Model (Open Systems Interface Model)
TCP/IP (Transmission Control Protocol/Internet Protocol)
FTP (File Transfer Protocol)
PPP (Point to Point Protocol)
12
UNIT 01: Introduction to Data Communication JGI JAIN
DEEMED-TO-BE UNI VE RSI TY
Source Destination
Application Application
Presentation Presentation
Session Session
Transport Transport
Network Network
Physical Physical
1.13.2 TCP/IP
Transmission Control Protocol/Internet Protocol (TCP/IP) is the acronym for Transmission Control
Protocol/Internet Protocol. TCP/IP is a collection of layered protocols used for Internet communication.
This suite uses a client-server communication architecture. The client is the computer that submits the
request, and the server is the computer that receives the request.
TCP/IP has four layers:
Application Layer
Transport Layer
13
JGI JAIN
DEEMED-TO-BE UNI VE RSI TY
Data Communication and Computer Networks
Network Layer
Data Link Layer
Application Layer
Transport Layer
Network Layer
Data Link Layer
FTA Server
Host A 192.168.5.102
Figure 5: FTP
14
UNIT 01: Introduction to Data Communication JGI JAIN
DEEMED-TO-BE UNI VE RSI TY
PPP allows residential users to connect to the Internet through their telephone lines. Figure 7 shows the
PPP model:
Fail
Fail
Terminate Network
15
JGI JAINDEEMED-TO-BE UNI VE RSI TY
Data Communication and Computer Networks
1.16 GLOSSARY
16
UNIT 01: Introduction to Data Communication JGI JAIN
DEEMED-TO-BE UNI VE RSI TY
Standard: A standard is anything that has been set as a norm, for example, as a comparison point.
Committee: A committee is a group of persons who have been put together specifically for a task.
https://ecomputernotes.com/computernetworkingnotes/communication-networks/what-is-data-
communication
https://www.google.co.in/books/edition/Data_Communications_and_Networking/bwUNZ
vJbEeQC?hl=en&gbpv=1&dq=data+communication+forouzan+5th+edition+ppt&printsec
=frontcover
Discuss with your friends about the importance of a data communication, what to you understand
by th computer topologies and their application areas.
18