0% found this document useful (0 votes)
9 views5 pages

Chap - 1,2,3,5 Reviewer

The document outlines the fundamentals of data communication, including standards, history, network architecture, protocols, and error detection methods. It describes the evolution of communication methods, the roles of various standard organizations, and the OSI model layers. Additionally, it discusses network types, topologies, and error correction techniques, emphasizing the importance of protocols and standards for effective data transfer.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views5 pages

Chap - 1,2,3,5 Reviewer

The document outlines the fundamentals of data communication, including standards, history, network architecture, protocols, and error detection methods. It describes the evolution of communication methods, the roles of various standard organizations, and the OSI model layers. Additionally, it discusses network types, topologies, and error correction techniques, emphasizing the importance of protocols and standards for effective data transfer.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Standards

Chapter 1: Introduction to Data Communication -​ Standards = accepted rules and guidelines for ensuring compatible data transfer.
-​ Two types:
-​ Data = processed and stored information (usually in digital form). -​ Proprietary (Closed): Made and controlled by one company.
-​ Data communication = transferring digital information between two or more -​ Open: Any company can use or make compatible products (sometimes
points. with a fee).
-​ The main goal is to transmit, receive, and process digital data. -​ Example: IBM’s PC is an open system standard.​

2. History of Data Communications

-​ Early methods: Smoke signals and drums (not digital or binary)


-​ 1753: Idea of 26 parallel wires
-​ 1832: Samuel Morse ( the telegraph and Morse Code.) ​
-​ 1874: Emile Baudot made a multiplexer (sent multiple signals over one wire).
-​ 1875: Alexander Graham Bell invented the telephone.
-​ 1899: Marconi sent wireless telegraph messages via radio.
-​ 1920: First commercial voice radio stations.
-​ Modern era: Internet, intranets, and the WWW have created huge demand for
faster and better data communication.

3. Data Communications Network Architecture, Protocols, and Standards

Network Architecture

-​ A data communications network = system of computers/devices that send and


receive information.
-​ Architecture defines how the network is arranged and how components interact.
-​ Includes layers (electrical, hardware, software responsibilities).
-​ Two basic types:
-​ Broadcast: One message is shared with all devices (with options like
broadcasting or multicasting).
-​ Point-to-point: Direct connection between two devices.

Protocols

-​ Protocols = rules for how data is exchanged.


-​ Define communication processes (like customs or formal rules).
-​ A protocol stack = list of protocols used (one per layer).
-​ Two main types:
-​ Connection-oriented: A logical connection is made before data transfer
(like a virtual circuit)
-​ Connectionless: Data is sent without prior setup (like a datagram).
CHAPTER 2 REVIEWER: Organizations, OSI & Data Circuits 1 Physical (PHY) Raw bit transmission (cables, signals)

Standard Organizations for Data Communication


Data Communication Circuit Components
●​ ISO – International Organization for Standardization: Global IT standard
●​ Source – Where data originates (PC, terminal).
○​ Creates international standards (e.g., OSI model).
●​ Transmitter – Converts data to signal form.
●​ ITU-T – International Telecommunication Union – Telecom Sector
●​ Transmission Medium – Carries the signal (e.g., copper wire, fiber, air).
○​ UN body for telecom standards (e.g., signaling, TV, network
●​ Receiver – Converts signal back to data.
performance).
●​ Destination – Final target of data (PC, server).
●​ IEEE – Institute of Electrical and Electronics Engineers:
●​ Station/Node – Any endpoint device in the network.
○​ Tech standards (e.g., LAN, Wi-Fi).
●​ ANSI – American National Standards Institute: U.S. official rep to ISO;
○​ sets national standards.
●​ EIA – Electronics Industries Association:
○​ Hardware interface standards (e.g., RS-232).
●​ TIA – Telecommunications Industry Association:
○​ Develops telecom & IT standards.
●​ IAB – Internet Architecture Board:
○​ Oversees Internet protocols & architecture.
●​ IETF – Internet Engineering Task Force:
○​ Builds Internet protocols (e.g., TCP/IP).
●​ IRTF – Internet Research Task Force:
○​ Researches future Internet technologies.

OSI Model

-​ Mnemonic (Top to Bottom): All People Seem To Need Data Processing

Layer Name Function

7 Application (APL) User-level services (HTTP, FTP, email)

6 Presentation (PRS) Data format, encryption, translation

5 Session (SES) Manages sessions (logins, connections)

4 Transport (TRN) Reliable delivery (TCP/UDP)

3 Network (NET) Routing and addressing (IP, routers)

2 Data Link (DLL) Framing, error detection (MAC, switches)


CHAPTER 3 Network Basics, Topologies, and Models ●​ NIC (Network Interface Card):
○​ Sends/receives data
○​ Controls network data flow
Key Network Considerations
●​ LOS (Local OS):
○​ Manages local files/devices on a personal PC
1.​ Network goals (set by management)
●​ NOS (Network OS):
2.​ Security
○​ Allows networked devices to communicate
3.​ Uptime
○​ Manages file sharing, printing, security​
4.​ Response time
5.​ Cost (network + resources)
Network Models

🔹Peer-to-Peer:
Servers & Clients
-​ All computers share their resources equally
🔹Servers: -​ No dedicated server

●​ Store files, programs, and NOS (Network Operating System 🔹Client/Server:


●​ Provide shared resources (virtual disks, files, printers)
●​ File servers manage user access & rights ●​ Server provides services; clients request them
●​
●​
Use file mapping to simulate local access
Security systems protect access 🔹Dedicated Client/Server:
🔹Clients: ●​
●​
One or more devices are assigned as full-time servers
Clients do not act as servers
●​ User computers that request and use network services
●​ Rely on servers for files, printers, and other resources
Network Topologies

Transmission Media 🔹Point-to-Point - Connects exactly two devices directly


●​ Connects computers in a network 🔹Multipoint - Connects 3 or more devices on one medium
●​
●​
Examples: Twisted-pair, coaxial, fiber optics, wireless
Also called: channels, links, or lines
🔹Star - All devices connected to a central hub
Shared Resources
🔹But - One communication line shared by all devices
🔹Ring - Devices connected in a closed loop
●​ Shared Data: Files, email, printer access
●​ Peripherals: Printers, storage, software 🔹Mesh-Every device connects directly to every other device
●​ Provided by servers, used by clients
🔹Hybrid - Combination of two or more topologies
NIC & Operating Systems
Types of Networks

🔹LAN (Local Area Network):


●​ Covers: small area (room/building)
●​ Speed: 10–100 Mbps

🔹MAN (Metropolitan Area Network):


●​ Covers: city-sized area
●​ Speed: 1.5–10 Mbps

🔹WAN (Wide Area Network):


●​ Covers: nationwide or continental
●​ Speed: 1.5 Mbps–2.4 Gbps

🔹GAN (Global Area Network):


●​ Covers: entire globe
●​ Speed: 1.5 Mbps–100 Gbps
CHAPTER 5: 🔹 FEC
●​ Adds redundant bits before sending
Error Detection ●​ Corrects error without needing retransmission​

-​ Detects when errors occur during data transmission (does not correct or locate
the error).
🔹 Hamming Code (a type of FEC)
-​ Redundancy Checking – Duplicates data to detect errors (costly with long
●​ Corrects single-bit errors only
messages)
●​ Requires extra overhead (error bits)​

🔹 VRC (Vertical Redundancy Check / Parity) Hamming bits inserted at agreed locations between sender and receiver​
Combines data + error bits = Hamming code

●​ Adds a parity bit per character


●​ Detects single-bit errors per character

🔹 Checksum
●​ Assigns numeric values to characters
●​ Adds them to form a simple checksum

🔹 LRC (Longitudinal Redundancy Check)


●​ Adds parity bits across multiple characters
●​ Also called message parity

🔹 CRC (Cyclic Redundancy Check)


●​ Uses polynomial division (convolutional code)
●​ Highly reliable (99.999% detection rate)

Error Correction

Two methods:

1.​ ARQ (Automatic Repeat Request) – Retransmits on error


2.​ FEC (Forward Error Correction) – Corrects error on the spot using extra bits

🔹 ARQ Types
●​ Discrete ARQ – Uses positive/negative acknowledgments
●​ Continuous ARQ – Sends blocks of data without waiting, uses sequential
numbering

You might also like