- The only creatures on earth with the ability to interact with one another through language are humans.These days, communication is not limited by time, space, or a person's physical presence since people have developed systems that allow them to share and communicate with their loved ones at any time and from any location. These systems include text, photographs, videos, files, and more.
- The process through which many computers exchange information, instructions, and resources is known as communication.
- Stated differently, communication can be defined as an act or process that involves sending and receiving data.
- An independent group of computers connected to one another is called a network of computers. When a computer is autonomous, it cannot control, restart, or shut down another computer.
Components of Data Communication
Message:-
- Information that needs to be communicated from one person to another is called a message. It could be a file with text, music, or video in it.
Sender:-
- It is merely a data message-sending device. It could be a workstation, laptop, phone, tablet, or video camera, among other devices.
Receiver:-
- A device that receives messages is called a receiver. It could be a workstation, phone, computer, or something else entirely.
Channels of Communication / Transmission Medium:-
- The medium that connects two or more workstations is called a communication channel. Workstations can be linked together using wireless or wired media.
A set of guidelines, or protocol:-
- Information sent by the sender must also be understood by the recipient in order for it to have any use. Arti, for instance, messages Akhil. It is a pointless discourse if Arti writes in Hindi and Akhil does not comprehend Hindi.
Therefore, there are some set of rules (protocols) that is followed by every computer connected to the internet and they are:
Transfer Control Protocol, or TCP:-
- It is in charge of breaking up messages into packets on the source computer and reestablishing the packets after they are received at the receiver or destination computer. Additionally, it verifies that the packets contain information about the message's source, destination, and the order in which it should be reassembled. Finally, it assesses if the message was sent accurately to the intended location.
IP(Internet Protocol):-
- Have you ever wondered how a computer determines which packet belongs to which device using IP (Internet Protocol)? What happens if your father receives the message you sent to your friend? Alright, scary. Okay! IP is in charge of managing the target computer's address to ensure that every packet is sent to the right place.
Types of Data Communication
- Data transmission and reception between devices is commonly referred to as data communication. There are three categories for data communication:
Simplex communication:-
- This type of communication is one-way, or more accurately, unidirectional; it involves devices using their whole transmission capacity while one device only sends and receives data.
- IoT, for instance, data entry via a keyboard, music listing via a speaker, etc.
Half-duplex communication:-
- This type of communication is two-way, or we may say bidirectional, and both devices can send and receive data, but not simultaneously.
- One device can only receive data when it is transmitting it, and vice versa. Consider a walkie-talkie.
Full-duplex communication:-
- This type of communication is two-way, or more accurately, bidirectional, allowing data to be sent and received simultaneously between the two devices. For example, landlines, cell phones, etc.
This comment has been removed by the author.
ReplyDeleteData communication refers to the process of transmitting data between devices or systems through a communication medium like cables, fiber optics, or wireless signals. Its key components include the message, sender, receiver, transmission medium, and protocol. With Sky node, you can organize and track data communication protocols, transmission methods, and performance metrics, helping to optimize and secure the flow of data across systems.
ReplyDelete