Search for notes by fellow students, in your own course and all over the country.
Browse our notes for titles which look like what you need, you can preview any of the notes via a sample of the contents. After you're happy these are the notes you're after simply pop them into your shopping cart.
Title: Send a Mystery Box to your friends
Description: here u get full knowlege of computrnetwork
Description: here u get full knowlege of computrnetwork
Document Preview
Extracts from the notes are below, to see the PDF you'll receive please use the links above
1: Characteristics of Data – Communication
...
This sharing can be local or remote
...
The term
telecommunication, which includes telephony, telegraphy, and television, means communication at a distance
(tele is Greek for "far")
...
Data communications are the exchange of data between two devices via some
form of transmission medium such as a wire cable
...
The effectiveness of a data communications system depends on four fundamental
characteristics: delivery, accuracy, timeliness, and jitter
...
II
...
IV
...
The system must deliver data to the correct destination
...
Accuracy
...
Data that have been altered in transmission and
left uncorrected are unusable
...
The system must deliver data in a timely manner
...
In the case
of video and audio, timely delivery means delivering data as they are produced, in the same order that
they are produced, and without significant delay
...
Jitter
...
It is the uneven delay in the delivery of
audio or video packets
...
If some of
the packets arrive with 3D-ms delay and others with 4D-ms delay, an uneven quality in the video is the
result
...
Five components of data communication
I
...
The message is the information (data) to be communicated
...
2
...
The sender is the device that sends the data message
...
3
...
The receiver is the device that receives the message
...
4
...
The transmission medium is the physical path by which a message travels from sender to
receiver
...
5
...
A protocol is a set of rules that govern data communications
...
Without a protocol, two devices may be connected but not communicating, just as a
person speaking French cannot be understood by a person who speaks only Japanese
CN –I UNIT I
JNEC
mandarlokhande@gmail
...
Data Flow
Communication between two devices can be simplex, half-duplex, or full-duplex
...
Only one of the two devices on a
link can transmit; the other can only receive
...
The keyboard can only introduce input; the monitor can only accept output
...
Half-Duplex
In half-duplex mode, each station can both transmit and receive, but not at the same time
...
When cars are traveling in one direction, cars going the other way must wait
...
Walkietalkies and CB (citizens band) radios are both half-duplex systems
...
Full-Duplex
In full-duplex, both stations can transmit and receive simultaneously the full-duplex mode is like a two-way street
with traffic flowing in both directions at the same time
...
This sharing can occur in two ways: Either the link
must contain two physically separate transmission paths, one for sending and the other for receiving; or the
capacity of the channel is divided between signals traveling in both directions
...
When two people are communicating by a telephone line, both can talk
and listen at the same time
...
The capacity of the channel, however, must be divided between the two
...
com
4
...
A node can be a
computer, printer, or any other device capable of sending and/or receiving data generated by other nodes on the
network
...
Instead of one
single large machine being responsible for all aspects of process, separate computers (usually a personal computer
or workstation) handle a subset
...
The most important of these are performance,
reliability, and security
...
Transit time is the amount
of time required for a message to travel from one device to another
...
The performance of a network depends on a number of factors, including the number
of users, the type of transmission medium, the capabilities of the connected hardware, and the efficiency of the
software
...
We often need more
through put and less delay
...
If we try to send more data to the
network, we may increase throughput but we increase the delay because of traffic congestion in the network
...
Security
Network security issues include protecting data from unauthorized access, protecting data from damage and
development, and implementing policies and procedures for recovery from breaches and data losses
...
Type of Connection
A network is two or more devices connected through links
...
For visualization purposes, it is simplest to imagine any link as a line drawn between
two points
...
There are two possible types of connections:
Point-to-point and multipoint
...
The entire capacity of
the link is reserved for transmission between those two devices
...
When you change television channels by infrared remote control, you are establishing a point-to-point
connection between the remote control and the television's control system
...
In a multipoint environment, the capacity of the channel is shared, either spatially or temporally
...
If users must take turns, it is a
timeshared connection
...
com
Physical Topology
The term physical topology refers to the way in which a network is laid out physically
...
The topology of a network is the geometric representation of
the relationship of all the links and linking devices (usually called nodes) to one another
...
INTERNET
The Internet is a communication system that has brought a wealth of information to our fingertips and organized it
for our use
...
An internet (note the
lowercase letter i) is two or more networks that can communicate with each other
...
Private individuals as well as various organizations such as government agencies, schools, research
facilities, corporations, and libraries in more than 100 countries
use the Internet
...
Yet this extraordinary communication system only came into being
in 1969
...
Computers from different manufacturers were unable to communicate with one another
...
In 1967, at an Association for Computing Machinery (ACM) meeting, ARPA presented its ideas
for ARPANET, a small network of connected computers
...
The IMPs, in tum, would be connected to one another
...
By 1969, ARPANET was a reality
...
com
California at Los Angeles (UCLA), the University of California at Santa Barbara (UCSB), Stanford Research Institute
(SRI), and the University of Utah, were connected via the IMPs to form a network
...
In 1972, Vint Cerf and Bob Kahn, both of
whom were part of the core ARPANET group, collaborated on what they called the Internetting Projec1
...
This paper on
Transmission Control Protocol (TCP) included concepts such as encapsulation, the datagram, and the functions of a
gateway
...
IP would handle datagram routing while TCP would be
responsible for higher-level functions such as segmentation, reassembly, and error detection
...
8
...
An entity is anything capable
of sending or receiving information
...
For communication to occur, the entities must agree on a protocol
...
A protocol defines what is communicated, how it is communicated, and
when it is communicated
...
Syntax
...
For example, a simple protocol might expect the first 8 bits of data to be the address of the sender, the
second 8 bits to be the address of the receiver, and the rest of the stream to be the message itself
...
The word semantics refers to the meaning of each section of bits
...
The term timing refers to two characteristics: when data should be sent and how fast they can be sent
...
Standards
Standards are essential in creating and maintaining an open and competitive market for equipment manufacturers
and in guaranteeing national and international interoperability of data and telecommunications technology and
processes
...
Data communication standards fall into two categories: de facto (meaning "by fact" or "by
convention") and de jure (meaning "by law" or "by regulation")
...
com
De facto
...
De facto standards are often established originally by
manufacturers who seek to define the functionality of a new product or technology
...
Those standards that have been legislated by an officially recognized body are de jure standards
...
Standards Creation Committees
While many organizations are dedicated to the establishment of standards, data telecommunications
in North America rely primarily on those published by the following:
International Organization for Standardization (ISO)
...
The ISO is active in
developing cooperation in the realms of scientific, technological, and economic activity
...
By the early 1970s, a
number of countries were defining national standards for telecommunications, but there was still little
international compatibility
...
This committee was devoted
to the research and establishment of standards for telecommunications in general and for phone and data systems
in particular
...
American National Standards Institute (ANSI)
...
S
...
However, all ANSI
activities are undertaken with the welfare of the United States and its citizens occupying primary importance
...
The Institute of Electrical and Electronics Engineers is the
largest professional engineering society in the world
...
As one of its goals, the IEEE oversees the development and adoption of international standards for
computing and communications
...
Aligned with ANSI, the Electronic Industries Association is a nonprofit
organization devoted to the promotion of electronics manufacturing concerns
...
In the field of information
technology, the EIA has made significant contributions by defining physical connection interfaces and electronic
signaling specifications for data communication
...
com
Types of Network Topology
Network Topology is the schematic description of a network arrangement, connecting various nodes (sender and
receiver) through lines of connection
...
Features of Bus Topology
1
...
2
...
It is cost effective
...
Cable required is least
compared to other
network topology
...
Used in small networks
...
It
is
easy
to
understand
...
Easy to expand joining
two cables together
...
Cables fails then whole
network fails
...
If network traffic is
heavy or nodes are
more the performance
of
the
network
decreases
...
Cable has a limited
length
...
It is slower than the ring
topology
...
Exactly two neighbours for each device
...
A number of
repeaters are used and the
transmission
is
unidirectional
...
Date
is
transferred in a sequential
manner that is bit by bit
...
Transmitting
network is not affected by
high traffic or by adding
more nodes, as only the
nodes having tokens can
transmit data
...
Cheap to install
and expand
Disadvantages
of
Ring
Topology
1
...
2
...
3
...
STAR Topology
In this type of topology all the computers are connected to a single hub through a cable
...
Features of Star Topology
1
...
2
...
3
...
CN –I UNIT I
Advantages of Star Topology
1
...
2
...
3
...
4
...
5
...
JNEC
Disadvantages
of
Star
Topology
1
...
2
...
3
...
4
...
com
MESH Topology
It is a point-to-point connection to other nodes or devices
...
Mesh has n (n-2)/2 physical channels to link hn devices
...
Partial
Mesh
Topology : In this topology
some of the systems are
connected in the same
fashion as mesh topology
but some devices are only
connected to two or three
devices
...
Full
Mesh
Topology : Each and every
nodes or devices are
connected to each other
...
Fully connected
...
Robust
...
Not flexible
...
Each connection
can carry its own data
load
...
It is robust
...
Fault is diagnosed
easily
...
Provides security
and privacy
...
Installation and
configuration is difficult
...
Cabling cost is
more
...
Bulk wiring is
required
...
It is also called hierarchical topology
...
Advantages
of
Tree Disadvantages of Tree
Features
of
Tree Topology
Topology
Topology
1
...
Heavily cabled
...
Ideal
if and star topologies
...
Costly
...
Expansion
of 3
...
nodes is possible and are added maintenance
2
...
is difficult
...
3
...
network fails
...
Error detection
is easily done
...
For example if in an office in
one department ring topology is used and in another star topology is used, connecting these topologies will result
in Hybrid Topology (ring topology and star topology)
...
It
is
a
combination of two or
topologies
2
...
Reliable as Error
detecting and trouble
shooting is easy
...
Effective
...
Scalable as size
can be increased easily
...
Flexible
...
Complex
in
design
...
Costly
...
com
CN –I UNIT I
JNEC
mandarlokhande@gmail
Title: Send a Mystery Box to your friends
Description: here u get full knowlege of computrnetwork
Description: here u get full knowlege of computrnetwork