Intro to Data Communications and Computer Networks
Intro to Data Communications and Computer Networks
Networks
Introduction
5. Protocol:
A protocol is a set of rules that govern data communications.
It represents an agreement between the communicating
devices. Without a protocol, two devices may be connected
but not communicating, just as a person speaking French
cannot be understood by a person who speaks only
Japanese.
An effective Data Communication system
Simplex
In simplex mode, the communication is unidirectional, as
on a one-way street. Only one of the two devices on a link
can transmit; the other can only receive. Keyboards and
traditional monitors are examples of simplex devices. The
keyboard can only introduce input; the monitor can only
accept output. The simplex mode can use the entire
capacity of the channel to send data in one direction.
Half-Duplex
Network Criteria
A network must be able to meet a certain number of
principles. The most important of these are
performance, reliability, and security.
Performance
Performance can be measured in many ways, including
transit time and response time.Transit time is the amount of
time required for a message to travel from one device to
another. Response time is the elapsed time between an
inquiry and a response. The performance of a network
depends on factors such as the number of users, the type of
transmission medium, the capabilities of the connected
hardware, and the efficiency of the software.Performance is
often evaluated by two networking metrics: throughput and
delay.We often need more throughput and less delay.
However, these two criteria are often contradictory. If we
try to send more data to the network, we may increase
throughput but we increase the delay because of traffic
congestion in the network
Reliability
In addition to accuracy of delivery, network
reliability is measured by the frequency of
failure, the time it takes a link to recover from a
failure
Security
Network security issues include protecting data
from unauthorized access, protecting data from
damage and development, and implementing
policies and procedures for recovery from
breaches and data losses.
Categories of Networks