Data Communication Lecture 2
Data Communication Lecture 2
Communication Protocols:
UDP (User Datagram Protocol): A connectionless, faster protocol that does not guarantee
delivery but is suitable for real-time applications where speed is critical.
Internet Protocols:
IP (Internet Protocol): The core protocol of the Internet, responsible for addressing and routing
packets between devices on a network.
ICMP (Internet Control Message Protocol): Used for error reporting and diagnostics in IP
networks, often associated with the "ping" command.
HTTP (Hypertext Transfer Protocol): Used for transmitting hypermedia documents on the
World Wide Web.
HTTPS (Hypertext Transfer Protocol Secure): A secure version of HTTP that uses encryption
(SSL/TLS) to protect data during transmission.
FTP (File Transfer Protocol): Used for transferring files between computers on a network.
SMTP (Simple Mail Transfer Protocol): Handles the sending of email messages.
POP3 (Post Office Protocol 3) and IMAP (Internet Message Access Protocol): Protocols for
retrieving emails from a server.
What is network?
A network is a set of devices (often referred to as nodes) connected by communication links. A node
can be a computer, printer, or any other device capable of sending and/or receiving data generated
by other nodes on the network.
Network Criteria
A network must be able to meet a certain number of criteria. The most important of these are
performance, reliability, and security.
Performance:
Performance can be measured in many ways, including transit time and response time. Transit time is
the amount of time required for a message to travel from one device to another. The performance of a
network depends on a number of factors, including the number of users, the type of transmission
medium, the capabilities of the connected hardware, and the efficiency of the software.
Reliability:
Network reliability is measured by the frequency of failure, the time it takes a link to recover from a
failure.
Security:
Network security issues include protecting data from unauthorized access, protecting data from
damage and development, and implementing policies and procedures for recovery from breaches
and data losses.
Point to Point
In the below picture you can see both ends of the cable have a line
terminator. The terminator removes the data from the line. Bus
technology as soon as it reaches the extreme end. Data flow in Bust
topology is one-directional and this topology is mainly used for small
networks like LAN, etc.
This topology is also mostly used in small areas like LAN's (Local Area
Network) and it provides security and speed.
Advantages of Star Network Topology:
In-ring topology, each node connects to exactly two other nodes, like a
ring. When a host tries to send a message to a non-adjoining host, the
data will transmit across all intermediate hosts. You need only one cable
to expand this network.
Failure of any one host will stop the working of the whole ring. Here all
the machines are connected with each other in a closed-loop. This
topology mainly used on token-based systems where the token travel in
a loop in a particular direction.
In Mesh network topology hosts are interconnected with each other. This
is the topology where every host that is present in the network are
directly connected with each other without any centralized device.
1. Full Mesh: In this network each node connected with every host
that reconnected to the network.
2. Partial Mesh: As its name here some nodes are not connected to
every node.
Advantages of Mesh Network Topology:
In Tree network topology all nodes are connected to the same cable and
those connections can be directly and indirectly. You can also say that
this topology is a mix of bus and star topology.
This topology is a hierarchy i.e, The entire network is divided into parts,
so that can be easily managed and maintained. Here a root hub and all
the other sub-hubs are connected to each other.
This topology is multiple layers of the network where three are main
layers that responsible to build Tree network topology: