![Data Communication Notes In Hindi Pdf Data Communication Notes In Hindi Pdf](/uploads/1/2/5/7/125742999/763037864.jpg)
Modify or forge your data, either for amusement or for their own benefit. Cryptography can reformat and transform our data, making it safer on its trip between computers. The technology is based on the essentials of secret codes, augmented by modern mathematics that protects our data in powerful ways.
Data communications refers to the transmission of this digital data between two or more computers and a computer network or data network is a telecommunications network that allows computers to exchange data. The physical connection between networked computing devices is established using either cable media or wireless media. The best-known computer network is the Internet.
This tutorial should teach you basics of Data Communication and Computer Network (DCN) and will also take you through various advance concepts related to Data Communication and Computer Network.
This tutorial has been prepared for the computer science graduates to help them understand the basic to advanced concepts related to Data Communication and Computer Networking. After completing this tutorial you will find yourself at a moderate level of expertise in Data Communication and Computer Networking from where you can take yourself to next levels.
![Communication Communication](/uploads/1/2/5/7/125742999/607807486.jpg)
Before you start proceeding with this tutorial, I'm making an assumption that you are already aware about basic computer concepts like what is keyboard, mouse, monitor, input, output, primary memory and secondary memory etc. If you are not well aware of these concepts then I will suggest to go through our short tutorial on Computer Fundamentals.
nLECTURE #1</title>n<meta http-equiv='Content-Type' content='text/html; charset='UTF-8'>n</head>nn<div><div><p>LECTURE #3n</p>n<p><b>Communication Tasksn</b>There are some key tasks that must be performed in a data communication systemnElements can be added, deleted, or merged together n</p>n<p>Transmission System utilization Interfacingn</p>n<p>Signal Generation Synchronizationn</p>n<p>Exchange Management Error Detection and Correction n</p>n<p>Flow Control Addressingn</p>n<p>Routing Recoveryn</p>n<p>Security Network Managementn</p>n<p> <b>Transmission System Utilizationn</b></p>n<p>Need to make efficient use of Transmission facilities that are shared among a no. nof communicating devices n</p>n<p>For Example:n Techniques like <b>Multiplexing</b> to allow multiple users to share total n</p>n<p>capacity of a Transmission Mediumn <b>Congestion Control</b>: TX. System should not be overwhelmed by traffic n</p>n<p> <b>Interfacingn</b>A device must have an Interface with the Transmission System/TransmissionnMediumn</p>n<p> <b>Signal Generationn</b></p>n<p>Electromagnetic Signals travel over Transmission Medium. Once an interface isnestablished, Signal generation is required n</p>n<p> <b>Properties of Signalsn</b> Capable of being propagated over TX. Mediumn Interpretable as data at the Receiver n</p>n<p> <b>Synchronizationn</b>The transmission and the reception should be properly synchronized. nSynchronization means that the receiver must be able to determine, when to n</p>n<p>docsity.com</p>nn</div></div>n<div><div><p>expect a new transmission and when to send acknowledgements. In other words ntransmitter and receiver should have an agreement on the nature as well as timingnof the signals n</p>n<p> <b>Exchange Managementn</b>If the data needs to be exchanged in both directions over a period of time, both nparties must cooperate as follows n</p>n<p> Whether both devices must transmit simultaneously or take turns n Amount of Data to be sent at one timen Format f the Datan What to do when an Error Arises n</p>n<p> <b>Error Detection and Correctionn</b>In all comm. Systems, there is a potential risk for errors and impairments.n<b>Tx</b>. Signals are distorted to some extent before reaching their destination. ErrornDetection & Correction needs to be employed in Data Processing Systems where a nchange in say the contents of a file cannot be tolerated n</p>n<p> <b>Flow Controln</b>To make sure that source does not overwhelm destination by sending data faster nthan it can be handled and processed n</p>n<p> <b>Addressing & Routingn</b>If TX facility is shared by two or more devices, source must specify the identity ornthe address of the destination system and if Tx. System is itself a system, a proper nroute must be allocated that the data will take in order to reach the desiredndestinationn</p>n<p> <b>Recoveryn</b>If a data transmission is interrupted due to a fault somewhere in the system,nrecovery techniques are needed. The objective is either to resume activity at thenpoint of interruption and to restore the state of the system to what it was prior tonthe interruptionn</p>n<p> <b>Securityn</b></p>n<p>Security is very important issue in a Data Communication System. The sender nneeds to be assured that n</p>n<p> Only the Intended receiver receives the data n Data is delivered unalteredn</p>n<p><b>Introduction to Protocol n</b>In computer Networks, communication occurs between two entities in different systems.n</p>n<p>o Entity is anything sending and receiving informationno SYSTEM is a physical object containing more than one entities n</p>n<p>docsity.com</p>nn</div></div>n<div><div><p>Now, two entities in different systems cannot just send data and expect to be understood. nFor communication to occur, these entities must agree on a PROTOCOLn</p>n<p><b>PROTOCOLSn</b>As discussed earlier<b>, “Protocol is a set of rules governing communication”n</b></p>n<p>o Two computers cannot just send bit streams to each other and expect to benunderstoodn</p>n<p>o Entities must agree on a PROTOCOL n</p>n<p> Same Example French and Germann</p>n<p><b>Protocol defines</b>:n</p>n<p> What is Communicated? n How it is Communicated? n When it is Communicated?n</p>n<p><b>KEY elements of a PROTOCOL n</b> <b>Syntax:n</b></p>n<p> Represents the Structure or the format of the Datan Meaning the order in which data is presented n</p>n<p>For Examplen First eight bits to be Sender address n Next eight to be Receiver’s Addressn The Rest to be Data n</p>n<p> <b>Semantics:n</b></p>n<p> Refer to the Meaning of each section of bits n How is a particular pattern to be interpreted?n What action should be taken based on interpretation?n</p>n<p>For Examplen Does an address identify the route to be taken or the final destination of the n</p>n<p>message?n <b>Timingn</b></p>n<p>Refers to 2 characteristics:n When data should be sent?n How fast it should be sent?n</p>n<p>For Examplen If sender produces data at 100 Mbps n But Receiver can only process data at 1 Mbpsn The TX. will overload receiver and data will be lostn</p>n<p>docsity.com</p>nn</div></div>n<div><div><p><b>Protocol Architecturen</b>Instead of having a single Module for performing communication, there is a structured set nof modules that implement communications function” nThis structure is called Protocol Architecture nLet’s explain it by an example of File transfer system.n</p>n<p><b>Simplified File Transfer Architecturen</b></p>n<p>•nIn the above example File transfer could use three modulesn</p>n<p> File transfer applicationn Communication service module n Network access modulen</p>n<p> <b>File transfer applicationn</b></p>n<p>File Transfer contains all of the logic is unique to the file transfer application such as: n Transmitting passwordsn File Commandsn</p>n<p> Checking File System on other machine if it is ready n Check File System Compatibility n</p>n<p> File recordsn</p>n<p> <b>Communication service modulen</b>Instead of allowing File Transfer Module to deal with actual transfer of data and ncommands, we can have a separate module for this transfer. This module must makensure that the receiver system is ready to receive and look into the reliable exchange of ndatan</p>n<p> <b>Network access modulen</b></p>n<p>Nature of the exchange between systems is independent of the network that connects nthem. That allows us to have a 3rd module that handles the details of the Network ninterface and interacts with the network. If Network to be used changes, only Network naccess Module has to changen</p>n<p>docsity.com</p>nn</div></div>n<div><div><p><b>Characteristics of a Protocol n</b></p>n<p> Direct or indirectn Monolithic or structuredn Symmetric or asymmetricn Standard or nonstandard n</p>n<p> <b>Directn</b></p>n<p> Systems share a point to point link or n Data can pass without intervening active agent n Simple Protocol n</p>n<p> <b>Indirectn</b></p>n<p> Switched networks or n Interne works or internetsn Data transfer depend on other entities n Complex Protocol n</p>n<p> <b>Monolithic or Structured n</b></p>n<p> Communications is a complex task n To complex for single unit n Structured design breaks down problem into smaller units n Layered structure n</p>n<p> <b>Symmetric or Asymmetricn</b></p>n<p><b>Symmetricn</b> Communication between peer entities n</p>n<p><b>Asymmetricn</b> Client/servern</p>n<p><b>Standard or Nonstandard n</b> Nonstandard protocols built for specific computers and tasks n</p>n<p><b>Summaryn</b> Communication Tasks n Protocolsn Protocol Architecture n Characteristics of a Protocoln</p>n<p><b>Reading Sections n</b> Section 1.4 “Data Communications and Networking” 4th Edition by Behrouz A. n</p>n<p>Forouzann Sections 1.1,2.1 “Data and Computer Communication” 6th Edition by Williamn</p>n<p>Stallingsn</p>n<p>docsity.com</p>nn</div></div>n</body></html>','canEdit':false,'canDelete':false,'canReport':false,'userVote':null,'previewLimit':3,'advEnabled':true,'totalVotes':22,'title':'Communication Tasks-Data Communication-Lecture Notes, Study notes for Data Communication Systems and Computer Networks','isPremiumEnabled':false,'hasQuizcardSet':null}'><div><div><div><header><div><div><div><div></div><div><div><span>50</span><span>Number of download</span></div><div><span><span><span>100%</span><span>on 22 votes</span></span></span><span>Number of votes</span></div></div><div><div><span>Data Communication is exchange of data between two devices. In computers data exchange is in form of 0 and 1. This course discuss how computer communicate, what is medium and what are expenses. This handout includes: Com...</span></div></div><div><div><div></div></div><div><div><div><div><span><span>100</span> points</span><div><div><div><div>Download points needed to download</div></div></div></div></div></div></div></div></div></div></div></div></header><div><main><div><div><div><span><span>Preview</span><span>3 pages / 5</span></span></div><div><div><div><div><div><div></div><div></div></div></div></div></div></div></div></div><div><div><div></div><div></div><div></div></div></div><div><div><div><div><div><div>LECTURE #1<div><div><p>LECTURE #3</p><p><b>Communication Tasks</b>There are some key tasks that must be performed in a data communication systemElements can be added, deleted, or merged together </p><p>Transmission System utilization Interfacing</p><p>Signal Generation Synchronization</p><p>Exchange Management Error Detection and Correction </p><p>Flow Control Addressing</p><p>Routing Recovery</p><p>Security Network Management</p><p>0002 <b>Transmission System Utilization</b></p><p>Need to make efficient use of Transmission facilities that are shared among a no. of communicating devices </p><p>For Example:0003 Techniques like <b>Multiplexing</b> to allow multiple users to share total </p><p>capacity of a Transmission Medium0003 <b>Congestion Control</b>: TX. System should not be overwhelmed by traffic </p><p>0002 <b>Interfacing</b>A device must have an Interface with the Transmission System/TransmissionMedium</p><p>0002 <b>Signal Generation</b></p><p>Electromagnetic Signals travel over Transmission Medium. Once an interface isestablished, Signal generation is required </p><p>0004 <b>Properties of Signals</b>0003 Capable of being propagated over TX. Medium0003 Interpretable as data at the Receiver </p><p>0002 <b>Synchronization</b>The transmission and the reception should be properly synchronized. Synchronization means that the receiver must be able to determine, when to </p><p>docsity.com</p></div></div><div><div><p>expect a new transmission and when to send acknowledgements. In other words transmitter and receiver should have an agreement on the nature as well as timingof the signals </p><p>0002 <b>Exchange Management</b>If the data needs to be exchanged in both directions over a period of time, both parties must cooperate as follows </p><p>0004 Whether both devices must transmit simultaneously or take turns 0004 Amount of Data to be sent at one time0004 Format f the Data0004 What to do when an Error Arises </p><p>0002 <b>Error Detection and Correction</b>In all comm. Systems, there is a potential risk for errors and impairments.<b>Tx</b>. Signals are distorted to some extent before reaching their destination. ErrorDetection & Correction needs to be employed in Data Processing Systems where a change in say the contents of a file cannot be tolerated </p><p>0002 <b>Flow Control</b>To make sure that source does not overwhelm destination by sending data faster than it can be handled and processed </p><p>0002 <b>Addressing & Routing</b>If TX facility is shared by two or more devices, source must specify the identity orthe address of the destination system and if Tx. System is itself a system, a proper route must be allocated that the data will take in order to reach the desireddestination</p><p>0002 <b>Recovery</b>If a data transmission is interrupted due to a fault somewhere in the system,recovery techniques are needed. The objective is either to resume activity at thepoint of interruption and to restore the state of the system to what it was prior tothe interruption</p><p>0002 <b>Security</b></p><p>Security is very important issue in a Data Communication System. The sender needs to be assured that </p><p>0004 Only the Intended receiver receives the data 0004 Data is delivered unaltered</p><p><b>Introduction to Protocol </b>In computer Networks, communication occurs between two entities in different systems.</p><p>o Entity is anything sending and receiving informationo SYSTEM is a physical object containing more than one entities </p><p>docsity.com</p></div></div><div><div><p>Now, two entities in different systems cannot just send data and expect to be understood. For communication to occur, these entities must agree on a PROTOCOL</p><p><b>PROTOCOLS</b>As discussed earlier<b>, “Protocol is a set of rules governing communication”</b></p><p>o Two computers cannot just send bit streams to each other and expect to beunderstood</p><p>o Entities must agree on a PROTOCOL </p><p>0003 Same Example French and German</p><p><b>Protocol defines</b>:</p><p>0004 What is Communicated? 0004 How it is Communicated? 0004 When it is Communicated?</p><p><b>KEY elements of a PROTOCOL </b>0002 <b>Syntax:</b></p><p>0004 Represents the Structure or the format of the Data0004 Meaning the order in which data is presented </p><p>For Example0003 First eight bits to be Sender address 0003 Next eight to be Receiver’s Address0003 The Rest to be Data </p><p>0002 <b>Semantics:</b></p><p>0004 Refer to the Meaning of each section of bits 0004 How is a particular pattern to be interpreted?0004 What action should be taken based on interpretation?</p><p>For Example0003 Does an address identify the route to be taken or the final destination of the </p><p>message?0002 <b>Timing</b></p><p>Refers to 2 characteristics:0004 When data should be sent?0004 How fast it should be sent?</p><p>For Example0003 If sender produces data at 100 Mbps 0003 But Receiver can only process data at 1 Mbps0003 The TX. will overload receiver and data will be lost</p><p>docsity.com</p></div></div><div><div><p><b>Protocol Architecture</b>Instead of having a single Module for performing communication, there is a structured set of modules that implement communications function” This structure is called Protocol Architecture Let’s explain it by an example of File transfer system.</p><p><b>Simplified File Transfer Architecture</b></p><p>•In the above example File transfer could use three modules</p><p>0004 File transfer application0004 Communication service module 0004 Network access module</p><p>0002 <b>File transfer application</b></p><p>File Transfer contains all of the logic is unique to the file transfer application such as: 0004 Transmitting passwords0004 File Commands</p><p>0003 Checking File System on other machine if it is ready 0003 Check File System Compatibility </p><p>0004 File records</p><p>0002 <b>Communication service module</b>Instead of allowing File Transfer Module to deal with actual transfer of data and commands, we can have a separate module for this transfer. This module must makesure that the receiver system is ready to receive and look into the reliable exchange of data</p><p>0002 <b>Network access module</b></p><p>Nature of the exchange between systems is independent of the network that connects them. That allows us to have a 3rd module that handles the details of the Network interface and interacts with the network. If Network to be used changes, only Network access Module has to change</p><p>docsity.com</p></div></div><div><div><p><b>Characteristics of a Protocol </b></p><p>0004 Direct or indirect0004 Monolithic or structured0004 Symmetric or asymmetric0004 Standard or nonstandard </p><p>0002 <b>Direct</b></p><p>0004 Systems share a point to point link or 0004 Data can pass without intervening active agent 0004 Simple Protocol </p><p>0002 <b>Indirect</b></p><p>0004 Switched networks or 0004 Interne works or internets0004 Data transfer depend on other entities 0004 Complex Protocol </p><p>0002 <b>Monolithic or Structured </b></p><p>0004 Communications is a complex task 0004 To complex for single unit 0004 Structured design breaks down problem into smaller units 0004 Layered structure </p><p>0002 <b>Symmetric or Asymmetric</b></p><p><b>Symmetric</b>0004 Communication between peer entities </p><p><b>Asymmetric</b>0004 Client/server</p><p><b>Standard or Nonstandard </b>0004 Nonstandard protocols built for specific computers and tasks </p><p><b>Summary</b>0005 Communication Tasks 0005 Protocols0005 Protocol Architecture 0005 Characteristics of a Protocol</p><p><b>Reading Sections </b>0005 Section 1.4 “Data Communications and Networking” 4th Edition by Behrouz A. </p><p>Forouzan0005 Sections 1.1,2.1 “Data and Computer Communication” 6th Edition by William</p><p>Stallings</p><p>docsity.com</p></div></div></div></div></div></div></div></div><div><div><div><div></div></div></div></div></main><div><div></div></div><div><div><div><div><div></div></div><div><div><div></div></div></div><div><div><div></div></div></div><div><div><div></div></div></div><div><div><div></div></div></div><div><div></div></div></div><div></div></div></div><div><div><div><div><div><div></div></div></div><div><div><div></div></div></div><div><div><div></div></div></div><div><div><div></div></div></div><div><div><div></div></div></div></div></div></div></aside></div></div></div></div></div></div></div></div></body>