You are on page 1of 40

Assalamualekum

&
Welcome in the
presentation
Special Thanks to our
Honorable Teacher
Sir
“Liaqat Hussain”
Group Name
“ GBians”
Name ROLL NO.
ZAHOOR ABBASS 84
NAZIR AHMED 86
ATTIULLAH 81
SAFDER HUSSAIN 85
IMRAN KHAN
NIAZ ALI 89
THE TOPICS THAT WILL BE
DISCUSSE:-
1. DATA TRANSMISSION MODE
2. TYPES OF DATA TRANSMISSION
MODES
3. NETWORK PROTOCOL
4. FUNCTIONS OF COMMUNICATION
PROTOCOLS
5. NETWORK SECURITY
6. NETWORK SECURITY RISK
Topic

WHAT IS DATA
TRASMISION
MODE?
WHAT IS
DATA
TRASMISION
MODE?
DEFINATION:

The way in which data is


transmitted from one place to

another place , is called data


transmission mode.
TYPE OF DATA
TANSMISIO N MODE
There are three type of data
transmission mode
simplex mode
half duplex mode
Full duplex mode
SIMPLEX MODE
• Data can flow only in one direction.
• Can’t move in both direction.
• Operate in a manner like similar to a one way
street.
• Direction of flow never changes.
• Device can either receive or send data.
• can’t perform both function

A B
Example of simplex mode

• Traditional television broadcast.


signal is sent from the
transmitter to antenna. No
return signal.
Half duplex mode
 Data can flow in both direction.
 But not at the same time.
It is transmitted one-way at one time
 Device with half duplex mode can send or
receive data but not at the same time.
 Speed of half duplex mode is slow.

A B
EXAMPLE
• A NARROW BRIDGE THAT CAN CARRY
SINGLE VEHECLE AT A TIME. THE
TRAFFIC FROM SIDE (A) STOPS WHILE
THE VEHICLES FROM SIDE (B) CROSS
THE BRIDGE.
• SIMILARLY,TRAFFIC FROM SIDE(B)HAS
TO STOP SO THAT THE VEHICLE FROM
SIDE (A) MAY CROSS
• WALKY TALKY IS ALSO AN EXAMPLE OF
HALF-DUPLEX MODE.
FULL-DUPLEX MODE

 Data can travel in both directions


simultaneously
 Faster way of data transmission as
compared to half-duplex mode.
 Time is not wasted in changing the
direction of data.

A B
Example

• A telephone is full-duplex
device. Both person can talk at
same time.
• Another example of full-duplex
is communication is automobile
traffic on a two-way lane road.
• The traffic can move in both
direction at the same time.
ATTIULLAH
(81)
NETWORK PROTOCOL
• DEFINATION:-
• NETWORK PROTOCOL OR
COMUNICATION PROTOCOL IS SET
OF RULES FOR EXCHANGING
INFORMATION BETWEEN COMPUTER
ON A NETWORK.THESE PROTOCOLS
IS DEFINE:
 How the communication channel is
established
 How information is transmitted
 How errors are detected and corrected.
FUNCION OF NETWORK
PROTOCOL
The main functions of
communication software or
protocols are:
Data sequencing
Data routing
Flow control
Error control
SAFDAR HUSSAIN
ROLL NUMBER 85
GROUP MEMBER
DATA SEQUENCING

• Process of breaking a long message into


smaller blocks.
• This technique reduces the amount of
data that is retransmitted if an error is
detected.
DATA ROUTING

• Process of finding the most efficient path


between source and destination before
sending data.
• It increases efficiency of data
communication.
DATA FLOW

• All computer not equally efficient in


speed.
• Process that controls data transmission
properly if the sender computer is faster
than the receiver computer.
ERROR CONTROL
Error control and recovering is one
the main function of communication
protocol.
It ensures that data is transmitted
without any error.
It also solves the problems if an error
is detected
NETWORK SECURITY
 Practice of protecting and preserving private
resources and information on the network.
 The information transmitted over the
network has high degree of security risk.
 The data sent over the network may travel on
different computers.
 The unauthorized persons can access
personal data and misuse it.
NETWORK SECURITY RISK

Different network security risks as


follow:
Unauthorized access
Spoofing
Denial of service attack
Information theft
IMRAN KHAN
GROUP MEMBER
UNAUTHORIZED ACCESS

Common security risk on the


network.
An unauthorized person may access
computers in the network and get
important data from computer or
copy a virus program in the program
in the system.
SPOOFING

Spoofing is used to break into a


network via the internet.
It is the process of fooling another
computer by pretending that the
packets are sent from legitimate
sources.
DENIAL OF SERVICE ATTTACK

A denial of service (DoS) attack slows


down the computer network.
It floods the network with requests
for information or data.
The server under the attack receives
so many requests that it cannot
respond to legitimate users.
INFORMATION THEFT

It is another critical security risk on


network.
It is a process of stealing personal or
confidential information without
permission.
The stolen information can be
further used for illegal activities.
NIAZ BALTI ROLL
NO. 89
GROUP MEMBER
PROTECTION FROM NETWORK
SECURITY RISKS
Firewall
Encryption
This measure can be
used for protect from internal
security risk.
FIREWALL
 Set of combination of hardware and software.
 It prevent unauthorized access to a network.
 Its work between an organization internal
network.
 It protect data information and storage media
from unauthorized access.
 Also be used to stop internal users from
accessing certain sites.
ENCRYPTION
 Process of encoding data
 Only authorized users may use and understand.
 If any person gets access to the data , he
cannot understand it.
 Many companies used encryption to scramble
the information before it transmitted.
 E-key is used to convert message into
unreadable form.
TYPES OF KEYS
Secret key or private
key
Public key Encryption
SECRET KEY

 It is also called private key

 In this method both customer and


business use the same encryption
key to encrypt and decrypt data.
PUBLIC KEY ENCRYPTION

Its use two encryption keys.


Public encryption keys is used by all
authorized users.

Secret key encryption is used by


sender and receiver.
.
Any Question

You might also like