Data communication are the exchange of data between two nodes via some form of link (transmission medium) such as cable. Now these Data are exchanged in three ways :
- Half Duplex
- Full Duplex
Now let us understand them one by one :
- Simplex :
Communication is always unidirectional, i.e., one device will transmit and other will receive. E.g., Keyboard, traditional monitors, etc.
- Half Duplex :
Communication is in both directions but not at the same time, i.e, if one device is sending, the other will receive and vice-versa. E.g., Walkie-Talkies.
- Full Duplex :
Communication is in both directions simultaneously, i.e, device can send and receive data at the same time. E.g., telephone Line.
What are Network Protocols ?
Network protocols are sets of established rules that dictate how to format, transmit and receive data so computer network devices — from servers and routers to endpoints – can communicate regardless of the differences in their underlying infrastructures, designs or standards.
Why do we need Network Protocols ?
We need Network Protocols for :
- Message encoding
- Message formatting and encapsulation
- Message timing
- Message size
- Message delivery options
Types of Computer Networks :
|The server control over the security of the network.||No central control over security.|
|The server manages the network.||No central control over the network.|
|Clients are dependent on the server.||Clients are not dependent on the central server.|
|The server can be upgraded to be made more powerful to cope with high command.||If machines on the network are slow they will slow down other machines.|
|Data is all backed up on the main server.||Each computer is to be backed u. Data can easily be deleted by users.|
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.
- Networks and Process of Network Communications
- Digital Data Communications Message Protocol (DDCMP)
- Types of Virtual Private Network (VPN) and its Protocols
- Routing v/s Routed Protocols in Computer Network
- Controlled Access Protocols in Computer Network
- Multiple Access Protocols in Computer Network
- Collision-Free Protocols in Computer Network
- Network Protocols
- Difference between Storage Area Network (SAN) and Network Attached Storage (NAS)
- Differences between Wireless Adhoc Network and Wireless Sensor Network
- Difference between Next Generation Network and Traditional Network
- Difference between Software Defined Network and Traditional Network
- Difference between AMQP and HTTP protocols
- Difference between COAP and MQTT protocols
- Trust Based Energy-Efficient and Secure Routing Protocols for IoT
- Difference between MQTT and HTTP protocols
- Critique of OSI Model and Protocols
- Basic Network Attacks in Computer Network
- Protocols in Application Layer
- Sliding Window protocols Summary With Questions
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to firstname.lastname@example.org. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.