Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unit III Data Communication and Networks (ITM) Ashima Wadhwa Assistant Professor (giBS)

Similar presentations


Presentation on theme: "Unit III Data Communication and Networks (ITM) Ashima Wadhwa Assistant Professor (giBS)"— Presentation transcript:

1 Unit III Data Communication and Networks (ITM) Ashima Wadhwa Assistant Professor (giBS)

2 Overview of Networks Network – two or more computers linked together so they can communicate, share resources and exchange information Networks allow users to: ◦ Access shared programs and data ◦ Transfer data from one computer to another ◦ Share peripheral devices such as printers ◦ Share storage devices to store data for backup ◦ Use e-mail to communicate with one another ◦ Access the Internet

3 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually, the connections between computers in a network are made using physical wires or cables However, some connections are wireless, using radio waves or infrared signals 15- 3

4 Networking The generic term node or host refers to any device on a network Data transfer rate The speed with which data is moved from one place on a network to another Data transfer rate is a key issue in computer networks 15- 4

5 Networking Computer networks have opened up an entire frontier in the world of computing called the client/server model 15- 5

6 Advantages: › Enable people to work together › Reduce costs from sharing networked hardware and software › Increase productivity by sharing data › Provide access to a wide range of services and specialized peripheral devices

7 Disadvantages › Unavailable resources when network malfunctions › More vulnerable to unauthorized access than stand alone computers › Susceptible to an increased number of worms, Trojan horses, and blended threats

8 Types of Networks LAN WAN

9 Local Area Network (LAN) Network of computers located in a single location, like a home, school, or office building Can share connection with other LANS and with the internet

10 Characteristics of a LAN? Local area network Relatively limited in size Computers connected in small areas Same office True peer-to-peer Can support limited number of nodes

11 Wide Area Network (WAN) Network over a large area like a city, a country, or multiple countries ◦ Connects multiple LANs together Generally utilizes different and much more expensive networking equipment than LANs The internet is the most popular WAN

12 Types of Computer Networks : Wired and Wireless Networks Client / Server And Peer to Peer Networks

13 Wired Network A wired network uses cables to connect network devices Wired networks are fast, secure, and simple to configure Devices tethered to cables have limited mobility

14 Wireless Networking  A network is considered wireless when data is transmitted from one device to another without cables or wires  Tend to be slower than wired networks  Have more security issues  Common wireless terms: › Wi-Fi - common standard technology for building home networks and other LANs › Hotspots – many businesses use Wi-Fi technology to allow the public an access point to a wireless network › Bluetooth – allows handhelds, cell phones, and other peripherals to communicate over short ranges

15 Client/Server Network work devices can function as clients or servers  Server - computer that performs administration or coordination functions within a network  Types: (1) application server, (2) file server, (3) print server  Client – regular workstation that performs applications

16 Client / Server Networks Clients ◦ Computers that request or order information from a server ◦ Usually desktop computers with their own local storage and processing power ◦ Thin client – network computer with no local storage

17 Servers ◦ Computers that work behind the scenes to provide (serve) the resources requested by the clients ◦ Two types  Non-dedicated – provides many different services to its client computers such as file retrieval, printing, and emailing  Dedicated – provides only one type of resource to its clients, such as printing

18 Client/Server Network

19 Peer-to-Peer Network  A network of personal computers, each of which acts as both client and sever, so that each can exchange files directly with every other computer on the network  Each computer can access any of the others, although access can be restricted to those files that a computer's user chooses to make available  Less expensive than client/server networks but less efficient when large amounts of data need to be exchanged

20 Peer-to-peer

21 Topology A Network Topology is the way computer systems or network equipment connected to each other. Topologies may define both physical and logical aspect of the network. Both logical and physical topologies could be same or different in a same network.

22 Topology Common types: ◦ Star ◦ Ring ◦ Bus ◦ Tree ◦ Mesh(Fully Connected) ◦ Hybrid

23 Star Topology  All the cables run from the computers to a central location, where they are all connected by a device called a hub. Each computer on a star network communicates with a central hub that resends the message either to all the computers or only to the destination computers.

24 Advantages of Star topology ▸ Due to its centralized nature, the topology offers simplicity of operation. ▸ It also achieves isolation of each device in the network. ▸ Adding or removing network nodes is easy, and can be done without affecting the entire network. ▸ Due to the centralized nature, it is easy to detect faults in the network devices. ▸ As the analysis of traffic is easy, the topology poses lesser security risk. ▸ Data packets do not have to pass through many nodes, like in the case of a ring network. Thus, with the use of a high-capacity central hub, traffic load can be handled at fairly decent speeds.

25 Disadvantages of Star Topology ▸ Network operation depends on the functioning of the central hub. Hence, central hub failure leads to failure of the entire network. ▸ Also, the number of nodes that can be added, depends on the capacity of the central hub. ▸ The setup cost is quite high.

26 Ring Topology  Every device has exactly two neighbors for communication purposes  All messages travel through a ring in the same direction (either "clockwise" or "counterclockwise“)

27 Advantages of Ring topology ▸ The data being transmitted between two nodes passes through all the intermediate nodes. A central server is not required for the management of this topology. ▸ The traffic is unidirectional and the data transmission is high-speed. ▸ In comparison to a bus, a ring is better at handling load. ▸ The adding or removing of network nodes is easy, as the process requires changing only two connections. ▸ The configuration makes it easy to identify faults in network nodes. ▸ In this topology, each node has the opportunity to transmit data. Thus, it is a very organized network topology. ▸ It is less costly than a star topology.

28 Disadvantages of Ring Topology ▸ The failure of a single node in the network can cause the entire network to fail. ▸ The movement or changes made to network nodes affect the entire network's performance. ▸ Data sent from one node to another has to pass through all the intermediate nodes. This makes the transmission slower in comparison to that in a star topology. The transmission speed drops with an increase in the number of nodes. ▸ There is heavy dependency on the wire connecting the network nodes in the ring.

29 Bus Topology  A common backbone (a single cable) to connects all devices and devices attach, or tap into, the cable with an interface connector  Devices wanting to communicate with other devices on the network send a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes the message

30 Advantages of Bus topology ▸ It is easy to set up, handle, and implement. ▸ It is best-suited for small networks. ▸ It costs very less.

31 Disadvantages of Bus Topology ▸ The cable length is limited. This limits the number of network nodes that can be connected. ▸ This network topology can perform well only for a limited number of nodes. When the number of devices connected to the bus increases, the efficiency decreases. ▸ It is suitable for networks with low traffic. High traffic increases load on the bus, and the network efficiency drops. ▸ It is heavily dependent on the central bus. A fault in the bus leads to network failure. ▸ It is not easy to isolate faults in the network nodes. ▸ Each device on the network "sees" all the data being transmitted, thus posing a security risk.

32 Tree Topology  Tree Topology integrates the characteristics of Star and Bus Topology.

33 Advantages of Tree topology ▸ The tree topology is useful in cases where a star or bus cannot be implemented individually. It is most-suited in networking multiple departments of a university or corporation, where each unit (star segment) functions separately, and is also connected with the main node (root node). ▸ The advantages of centralization that are achieved in a star topology are inherited by the individual star segments in a tree network. ▸ Each star segment gets a dedicated link from the central bus. Thus, failing of one segment does not affect the rest of the network. ▸ Fault identification is easy. ▸ The network can be expanded by the addition of secondary nodes. Thus, scalability is achieved.

34 Disadvantages of Tree Topology ▸ As multiple segments are connected to a central bus, the network depends heavily on the bus. Its failure affects the entire network. ▸ Owing to its size and complexity, maintenance is not easy and costs are high. Also, configuration is difficult in comparison to that in other topologies. ▸ Though it is scalable, the number of nodes that can be added depends on the capacity of the central bus and on the cable type.

35 Mesh Topology In a mesh network topology, each of the network node, computer and other devices, are interconnected with one another.

36 Advantages of Mesh topology 1) Data can be transmitted from different devices simultaneously. This topology can withstand high traffic. 2) Even if one of the components fails there is always an alternative present. So data transfer doesn’t get affected. 3) Expansion and modification in topology can be done without disrupting other nodes.

37 Disadvantages of Mesh topology 1) There are high chances of redundancy in many of the network connections. 2) Overall cost of this network is way too high as compared to other network topologies. 3) Set-up and maintenance of this topology is very difficult. Even administration of the network is tough.

38 Hybrid Topology  Combination of any two or more network topologies › A hybrid topology always accrues when two different basic network topologies are connected

39 Advantages of Hybrid topology One of the prominent advantages of this topology is its flexibility. The topology is designed, so that it can be implemented for a number of different network environment. As compared to most other topologies, this topology is reliable. It has better fault tolerance. Any type of topology can be combined with another without making any changes to the existing topology

40 Disadvantages of Hybrid Topology Since different topologies come together in a hybrid topology, managing the topology becomes difficult. It is also very expensive to maintain. Installation and configuration of the topology is difficult.

41 Communication Main purpose of communication is to transfer information from a source to a recipient via a channel or medium. Basic block diagram of a communication system: SourceTransmitterReceiver Recipient Channel

42 Brief Description Source: analog or digital Transmitter: transducer, amplifier, modulator, oscillator, power amp., antenna Channel: e.g. cable, optical fibre, free space Receiver: antenna, amplifier, demodulator, oscillator, power amplifier, transducer Recipient: e.g. person, (loud) speaker, computer

43 Data Communication Channels or Data Transmission Modes : Simplex Half Duplex Full Duplex

44 Data Communication Channels or Data Transmission Modes Simplex ◦ Data in a simplex channel is always one way. Simplex channels are not often used because it is not possible to send back error or control signals to the transmit end. An example of a simplex channel in a computer system is the interface between the keyboard and the computer, in that key codes need only be sent one way from the keyboard to the computer system. Half Duplex ◦ A half duplex channel can send and receive, but not at the same time. Its like a one-lane bridge where two way traffic must give way in order to cross. Only one end transmits at a time, the other end receives. Full Duplex ◦ Data can travel in both directions simultaneously. There is no need to switch from trans mit to receive mode like in half duplex. Its like a two lane bridge on a two-lane highway.

45 Analog and digital signals are used to transmit information, usually through electric signals. In both these technologies, the information, such as any audio or video, is transformed into electric signals. The difference between analog and digital technologies is that in analog technology, information is translated into electric pulses of varying amplitude. In digital technology, translation of information is into binary format (zero or one) where each bit is representative of two distinct amplitudes.

46 Comparison chart Analog Analog signal is a continuous signal which represents physical measurements. Denoted by sine waves Uses continuous range of values to represent information Digital Digital signals are discrete time signals generated by digital modulation. Denoted by square waves

47

48 Protocols

49 Network Protocol  Defines rules and conventions for communication between network devices  Protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets  Network protocols include mechanisms for: › Devices to identify and make connections with each other › Formatting rules that specify how data is packaged into messages sent and received › Message acknowledgement › Data compression designed for reliable and/or high- performance network communication  Hundreds of different computer network protocols have been developed each designed for specific purposes and environments

50 What is OSI? Developed by the International Organization for Standardization (ISO) in 1984 The primary architectural model for intercomputer communications. A conceptual model composed of seven layers, each specifying particular network functions. Describes how information from a software application in one computer moves through a network medium to a software application in another computer.

51

52 OSI Lower Layers/OSI Upper Layers 1. Physical 2. Data Link 3. Network 1. Transport 2. Session 3. Presentation 4. Application

53 OSI Physical Layer Responsible for transmission of bits Always implemented through hardware Encompasses mechanical, electrical, and functional interfaces Transmission technique: determines whether the encoded bits will be transmitted by baseband (digital) or broadband (analog) signaling.

54 OSI Data Link Layer Link establishment and termination: establishes and terminates the logical link between two nodes. Frame traffic control: tells the transmitting node to "back-off" when no frame buffers are available. Frame sequencing: transmits/receives frames sequentially. Frame acknowledgment: provides/expects frame acknowledgments. Detects and recovers from errors that occur in the physical layer by retransmitting non- acknowledged frames and handling duplicate frame receipt. Frame delimiting: creates and recognizes frame boundaries. Frame error checking: checks received frames for integrity. Media access management: determines when the node "has the right" to use the physical medium.

55 OSI Network Layer Routing: routes frames among networks. Subnet traffic control: routers (network layer intermediate systems) can instruct a sending station to "throttle back" its frame transmission when the router's buffer fills up. Frame fragmentation: if it determines that a downstream router's maximum transmission unit (MTU) size is less than the frame size, a router can fragment a frame for transmission and re-assembly at the destination station. Logical-physical address mapping: translates logical addresses, or names, into physical addresses. Subnet usage accounting: has accounting functions to keep track of frames forwarded by subnet intermediate systems, to produce billing information.

56 OSI Transport Layer Message segmentation: accepts a message from the (session) layer above it, splits the message into smaller units (if not already small enough), and passes the smaller units down to the network layer. The transport layer at the destination station reassembles the message. Message acknowledgment: provides reliable end-to- end message delivery with acknowledgments. Message traffic control: tells the transmitting station to "back-off" when no message buffers are available. Session multiplexing: multiplexes several message streams, or sessions onto one logical link and keeps track of which messages belong to which sessions (see session layer).

57 OSI Session Layer Session establishment, maintenance and termination: allows two application processes on different machines to establish, use and terminate a connection, called a session. Session support: performs the functions that allow these processes to communicate over the network, performing security, name recognition, logging, and so on.

58 OSI Presentation Layer Character code translation: for example, ASCII to EBCDIC. Data conversion: bit order, CR-CR/LF, integer-floating point, and so on. Data compression: reduces the number of bits that need to be transmitted on the network. Data encryption: encrypt data for security purposes. For example, password encryption.

59 OSI Application Layer Resource sharing and device redirection Remote file access Remote printer access Inter-process communication Network management Directory services Electronic messaging (such as mail) Network virtual terminals

60 TCP/IP Transmission control Protocol/Internet Protocol Developed by DARPA No official protocol standard Can identify five layers ◦ Application ◦ Host-to-Host (transport) ◦ Internet ◦ Network Access ◦ Physical

61 An OSI View of TCP/IP OSI Model Application (http, telnet, snmp, smtp, nfs, ftp) Transport (TCP, UDP) Network Access Physical layer TCP\IP Model Internet (IPv4/IPv6) (HDLC)

62 Application Layer Transport Layer Network Layer Data Link Layer Physical Layer HTTP Request HTTPTCP HTTPTCPIP HTTPTCPIPEthernet Sender Receiver Request Application Layer Transport Layer Network Layer Data Link Layer Physical Layer HTTP Request HTTPTCP HTTPTCPIP HTTPTCPIPEthernet Request

63 TCP/IP Network Access Layer Exchange of data between end system and network Address of host and destination Prioritization of transmission Software at this layer depends on network

64 TCP/IP Internet Layer An Internet is an interconnection of two or more networks Internet layer handles tasks similar to network access layer, but between networks rather than between nodes on a network Uses IP for addressing and routing across networks Implemented in workstations and routers

65 TCP/IP Transport Layer Also called host-to-host layer Reliable exchange of data between applications Uses TCP protocols for transmission

66 TCP/IP Application Layer Logic needed to support variety of applications Separate module supports each type of application (e.g. file transfer) ◦ FTP ◦ HTTP ◦ Telnet ◦ News ◦ SMTP

67 *TCP/IP Ethernet Token Bus Token Ring FDDI Internet Protocol ARP TELNET FTP SMTP DNS SNMP DHCP Data link Physical Network Transport ApplicationPresentationSession ICMP IGMP RTPRTCPTransmission Control Protocol User Datagram Protocol OSPF RIP

68 Overview of the Internet Internet – a vast network of LANs and WANs that electronically connects millions of people worldwide The Internet was formed in 1969 by ARPA, whose network, ARPANET, featured multiple servers and connections

69 The World Wide Web World Wide Web – a set of software programs that enables users to access resources on the Internet via hypertext documents, or Web pages Web page – a document created in HTML containing hypertext links that, when clicked, enable users to access a different location or document Web site – a collection of related Web pages Web browser – a software application that enables users to easily access, view and navigate Web pages on the Internet

70 How the Internet Works Network protocols and packets: ◦ Protocol – an agreed-upon format for transmitting data between two devices ◦ Packet – a fixed piece of information sent across a network Every computer connected to the Internet uses Transmission Control Protocol/Internet Protocol (TCP/IP) ◦ TCP/IP – software that makes Internet communication possible

71 How the Internet Works (cont’d) Computers access information from the Internet as follows: ◦ You request data from an Internet server ◦ The request is divided into packets ◦ The packets are routed from your LAN to the Internet backbone ◦ The packets are routed from the Internet backbone to the destination server ◦ The destination server sends the requested information using the same process

72 Connecting to the Internet Six elements are required to connect to the Internet: ◦ Computer ◦ Operating system ◦ TCP/IP ◦ Client software ◦ Internet connection (dial-up or direct through an ISP) ◦ Internet address

73 Internet Service Providers (ISPs) Internet Service Provider (ISP) – an organization that provides access to the Internet ◦ Most ISPs charge a flat monthly rate ◦ There are some basic-service ISPs that offer Internet connectivity for free ◦ ISPs offer dial-up or direct Internet connections

74 Internet Protocols Internet Protocol version 4 (IPv4) – supports 32-bit dotted quad IP address format ◦ Most widely used version of IP ◦ Approximately 4 billion possible IP addresses Internet Protocol version 6 (IPv6) – supports 128-bit hexadecimal address format ◦ Also known as Internet Protocol Next Generation (IPng) ◦ Will replace IPv4 in the future ◦ Approximately 4 trillion possible IP addresses

75 Internet Protocols (cont’d) Hypertext Transfer Protocol (HTTP) – used to transfer Web pages from a Web server to a Web client (Web browser) Hypertext Transfer Protocol Secure (HTTPS) – used to access a secure Web server File Transfer Protocol (FTP) – used to transfer files between computers on the Internet Electronic mail (e-mail) protocols: ◦ Simple Mail Transfer Protocol (SMTP) – used to transfer e-mail messages to others with an outgoing mail server

76 Domain Name System (DNS) Domain Name System (DNS) – resolves IP addresses into easily recognizable names For example: ◦ 64.128.206.9 = www.CIW-certified.com Domain name and IP address refer to the same Web server

77 Typical Domain Name www.CIW-certified.com Server (host) name Registered company domain name Domain category (top-level domain)

78 Top-Level Domains com — commercial or company sites edu — educational institutions, typically universities org — organizations; originally clubs, associations and nonprofit groups; currently, various types of organizations mil — U.S. military gov — U.S. civilian government net — network sites, including ISPs int — international organizations (rarely used)

79 Applications /Services Operations Of Internet Download programs and files E-Mail Voice and Video Conferencing E-Commerce File Sharing Information browsing Search the web addresses for access through search engine Chatting and many more…

80 Disadvantages of Internet Theft of personal information such as name, address, credit card number etc. Virus threats nothing but a program which disrupts the normal functioning of your system. Spamming refers to receiving unwanted e-mails in bulk, which provide no purpose and needlessly obstruct the entire system. Pornography This is perhaps the biggest threat related to children’s healthy mental life. A very serious issue concerning the Internet. Though, internet can also create havoc, destruction and its misuse can be very fatal, the advantages of it outweigh its disadvantages.

81 What is Intranet ? Internal company network that uses Internet standards (HTML, HTTP & TCP/IP protocols) & software. Accessed only by authorized persons, especially members or employees of the organization

82 Applications of Intranet Sharing of company policies/rules & regulations Access employee database Distribution of circulars/Office Orders Access product & customer data Sharing of information of common interest Launching of personal/departmental home pages Submission of reports Corporate telephone directories

83 Disadvantages Information overload lowers productivity True purpose of the Intranet is unknown to many employees/departments Hidden or unknown complexity and costs Productivity problem Unauthorized access Abuse of access Denial of service Security problem A company may not have person to update their Fear of sharing information and the loss of control Limited bandwidth for the business Management problem Intranet on a routine basis

84 What is Extranet ? Extranet is an Intranet for outside authorized users using same internet technology. Inter-organizational information system. enable outsiders to work together with company’s employees. open to selected suppliers, customers & other business partners

85 Benefits of Extranet Improved quality. lower travel costs. lower administrative & other overhead costs. reduction in paperwork. delivery of accurate information on time. improved customer service. better communication. overall improvement in business effectiveness.

86 Disadvantages The suppliers & customer who don’t have technical knowledge feel problem. Faceless contact. Information can be misused by other competitors. Fraud may be possible. Technical Employees are required.

87 Communication Media coaxial twisted-pair fiber optic Infrared Narrowband radio Microwave Cables Wireless Media

88 pp. 111-116 Cable is used to connect network devices. There are many types of networking cable in use today. Different types of cable have particular strengths and weaknesses, most notably in the speed at which they can transfer information. Cables

89 pp. 111-116 Cables The vast majority of networks are connected by some sort of cabling. The cables are the network transmission media that carry signals between computers. Three major groups of cabling connect the majority of networks: coaxial twisted-pair fiber optic

90 pp. 111-116 shielding Coaxial cable consists of a core of copper wire surrounded by insulation, a braided metal shielding, and an outer cover. shielding A layer of covering that grounds a cable and protects it from electric noise and crosstalk. Coaxial cable

91 pp. 111-116 twisted-paircable The twisting of the twisted-pair cable wire cancels out crosstalk from adjacent pairs of cable. The higher the number of twists per foot of cable, the more effectively it cancels out crosstalk. The total number of pairs in a cable varies, depending on the purpose of the cable. twisted-pair cable A type of cable that consists of two insulated strands of copper wire twisted around each other. Twisted-PairCable Twisted-Pair Cable

92 Twisted Pair Cable

93 pp. 111-116 fiber optic cable In a fiber optic cable, pulses of light travel down extremely thin tubes of glass or plastic to transmit data. The signal—a light pulse—can be transmitted over many miles very quickly. fiber optic cable A type of cable made up of extremely thin tubes of glass or plastic that allow pulses of light to travel through it to transmit data. Fiber Optic Cable

94 pp. 125-128 Infrared Narrowband radio Microwave Wireless Media

95 pp. 125-128 infrared There are four types of infrared networks: line-of-sight scatter infrared reflective broadband optical telepoint infrared A type of light beam used in wireless networks to transmit the data between devices. Infrared Light

96 pp. 125-128 Narrowband radio Narrowband radio is similar to broadcasting from a radio station. The broadcast range is 3,000 meters (9,842 feet), and does not require line-of- sight focusing. However, because the signal is high frequency, it is subject to attenuation from steel and load-bearing walls. narrowband radio A high-frequency transmission similar to broadcasting from a radio station. The user tunes both the transmitter and the receiver to a certain frequency. Narrowband Radio

97 pp. 125-128 Microwave Microwave systems can be used for the following: satellite-to-ground links between two buildings across large, flat, and open areas, such as bodies of water or deserts microwave Part of the electromagnetic spectrum, and a form of radiation that can be used for short- and long-distance communications systems. Microwave

98 pp. 125-128 Microwave Technology A microwave system can be used to transmit data from building to building.

99 Network hardware Cables Wireless Media Hubs Repeaters Bridges and Switches Routers Gateways Modems

100 pp. 104-109 Hubs The hub is a central hardware component for many LANs. Hubs operate at the Physical Layer in the OSI model. Hubs contain multiple ports, and can connect to other hubs to expand the network.

101 pp. 104-109 Repeaters segment Repeaters operate at the Physical Layer of the OSI model. Essentially, repeaters allow smaller LANs to grow into larger LANs by moving transmissions from one network segment to another. repeater A device that can be used to connect two cables and that boosts the signal before sending it along. segment A section of the network that includes the cable and nodes that are connected to a device, such as a repeater, hub, or bridge. Repeaters

102 pp. 104-109 Bridges Bridges can be used to connect dissimilar network segments that use different methods of transferring data. switches In today’s networks, it is uncommon to find bridges because switches provide “multibridge” capability. bridge A device used to connect two network segments together. switch A multiport bridge that allows several segments of a network to communicate with one another. Bridges and Switches

103 pp. 104-109 Bridges and Switches An important function of bridges and switches is to minimize collision of data packets by creating collision domains. Bridges and switches prevent the passing of collisions from one network segment to another.

104 pp. 104-109 routers Bridges are clever devices, but they are not as smart as routers. Brides forward data from one network segment to another, routers: forward packets from one network to another and, determine the best route to use to deliver the data router A network device used to connect networks of different types and that forwards packets from one network to another, even those separated by great distances. A router determines the best route to use to deliver the data. Routers

105 pp. 104-109 Gateways enable dissimilar networks to communicate. Gateways operate at higher levels in the OSI model such as the Application, Presentation, and Session layers. In some cases, they operate at all seven layers. gateway A dedicated network computer whose job is to convert data packets from one network protocol to another. Enables dissimilar networks to communicate. Gateways

106 Modems A modem is a computer- to-computer communication device that converts digital signals from the computer to analog signals for the telephone lines. The word “modem” comes from the two operations it handles: modulation modulation demodulation demodulation modulation The process on changing the digital signal to an analog signal on the sending computer. demodulation The process of converting the analog signal back to a digital signal on the receiving computer.

107 Queries??

108 Queries?


Download ppt "Unit III Data Communication and Networks (ITM) Ashima Wadhwa Assistant Professor (giBS)"

Similar presentations


Ads by Google