× Main Network 1 Network 2

Network

Computer Network

An interconnection of multiple devices, also known as hosts, that are connected using multiple paths for the purpose of sending/receiving data or media. Computer networks can also include multiple devices/mediums which help in the communication between two different devices; these are known as Network devices and include things such as routers, switches, hubs, and bridges.

A computer network is a set of devices connected through links. A node can be computer, printer, or any other device capable of sending or receiving the data. The links connecting the nodes are known as communication channels.

Computer Network is a group of computers connected with each other through wires, optical fibres or optical links so that various devices can interact with each other through a network. The aim of the computer network is the sharing of resources among various devices. In the case of computer network technology, there are several types of networks that vary from simple to complex level.

Computer Network uses distributed processing in which task is divided among several computers. Instead, a single computer handles an entire task, each separate computer handles a subset

Advantages of Distributed processing

Security
Faster problem solving
Security through redundancy

Components Of Computer Network

NIC(National interface card)

A network interface card (NIC) is a hardware component without which a computer cannot be connected over a network. It is a circuit board installed in a computer that provides a dedicated network connection to the computer. It is also called network interface controller, network adapter or LAN adapter.

NIC is a device that helps the computer to communicate with another device. The network interface card contains the hardware addresses, the data-link layer protocol use this address to identify the system on the network so that it transfers the data to the correct destination.

NIC allows both wired and wireless communications.

NIC allows communications between computers connected via local area network (LAN) as well as communications over large-scale network through Internet Protocol (IP).

NIC is both a physical layer and a data link layer device, i.e. it provides the necessary hardware circuitry so that the physical layer processes and some data link layer processes can run on it.

NIC cards are of two types − Internal & External

Every computer on a network, both clients and servers, requires a network interface card (or NIC) in order to access the network. A NIC is usually a separate adapter card that slides into one of the server’s motherboard expansion slots. However, most newer computers have the NIC built into the motherboard, so a separate card isn’t needed

Internal Network Cards

In internal networks cards, motherboard has a slot for the network card where it can be inserted. It requires network cables to provide network access. Internal network cards are of two types. The first type uses Peripheral Component Interconnect (PCI) connection, while the second type uses Industry Standard Architecture (ISA).
PCI NICs fit into a PCI slot on a motherboard. ISA NICs fit into an ISA slot.

ISA and PCI Compared

For many years, ISA and PCI were equivalents. Because PCI was introduced as a complement to, rather than a direct competitor to ISA, it is not uncommon for motherboards to have both ISA and PCI ports. ISA, at least for a time, was concurrent with the PCI standard. ISA would give better performance in some areas, while PCI yielded better performance in other areas.

In physical appearance the ISA and PCI ports are vastly different. The ISA is longer (by about two inches), and thus the I/O cards that connect via ISA tend to be bulkier as well. Their differences do not stop there. PCI is a significantly faster (in theory) bus. PCI has double (or in rare instances, quadruple) the bit-width, resulting in faster data transfer.

When placed head-to-head, PCI is definitely the better and faster option. Which is to be expected, considering PCI is a full ten years newer. While, in 2010, ISA is practically obsolete and PCI is well on its way to extinction as PCI-E and Mini-PCI-E gain steam, they are still in use by many consumers and industries. ISA and PCI made a significant impact on the computer industry.

External Network Cards

In desktops and laptops that do not have an internal NIC, external NICs are used. External network cards are of two types: Wireless and USB based. Wireless network card needs to be inserted into the motherboard, however no network cable is required to connect to the network. They are useful while traveling or accessing a wireless signal.

Hub

Hub is a central device that splits the network connection into multiple devices. When computer requests for information from a computer, it sends the request to the Hub. Hub distributes this request to all the interconnected computers

A hub is a physical layer networking device which is used to connect multiple devices in a network. They are generally used to connect computers in a LAN.

A hub has many ports in it. A computer which intends to be connected to the network is plugged in to one of these ports. When a data frame arrives at a port, it is broadcast to every other port, without considering whether it is destined for a particular destination or not.

They operate in the physical layer of the OSI model.
It is a non-intelligent network device that sends message to all ports.
It primarily broadcasts messages.
Transmission mode is half duplex.
Collisions may occurs during setup of transmission when more than one computers place data simultaneously in the corresponding ports.
They are passive devices, they don’t have any software associated with it.
They generally have fewer ports of 4/12.

switches

Switch is a networking device that groups all the devices over the network to transfer the data to another device. A switch is better than Hub as it does not broadcast the message over the network, i.e., it sends the message to the device for which it belongs to. Therefore, we can say that switch sends the message directly from source to the destination.

A switch is a data link layer networking device which connects devices in a network and uses packet switching to send and receive data over the network.

Like a hub, a switch also has many ports, to which computers are plugged in. However, when a data frame arrives at any port of a network switch, it examines the destination address and sends the frame to the corresponding device(s). Thus, it supports both unicast and multicast communications.

They operate in the data link layer of the OSI model.
It is an intelligent network device that sends message to selected destination ports.
Transmission mode is full duplex.
Collisions do not occur since the communication is full duplex.
They are active devices, equipped with network software.
The number of ports is higher – 24/48.

Cables and connectors

Cable is a transmission media that transmits the communication signals. There are three types of cables:

Twisted pair cable:

It is a high-speed cable that transmits the data over 1Gbps or more. One of the earliest guided transmission media is twisted pair cables. A twisted pair cable comprises of two separate insulated copper wires, which are twisted together and run in parallel. The copper wires are typically 1mm in diameter. One of the wires is used to transmit data and the other is the ground reference.

Reason for Twisting - All transmissions are prone to noise, interferences, and crosstalks. When the wires are twisted, some part of the noise signals is in the direction of data signals while the other parts are in the opposite directions. Thus the external waves cancel out due to the different twists. The receiver calculates the difference in the voltages of the two wires for retrieving data. Thus a much better immunity against noise is obtained.

Applications of Twisted-Pair Cables - In telephone lines, In DSL lines, In LANs.

There are two types of twisted pair cables −
Unshielded Twisted Pair ( UTP ): These generally comprise of wires and insulators.
Shielded Twisted Pair ( STP ): They have a braided wired mesh that encases each pair of insulated wires.

EIA has classified twisted pair cables into seven categories

Coaxial cable:

Coaxial cable resembles like a TV installation cable. Coaxial cable is more expensive than twisted pair cable, but it provides the high data transmission speed.

Coaxial cables, commonly called coax, are copper cables with metal shielding designed to provide immunity against noise and greater bandwidth. Coax can transmit signals over larger distances at a higher speed as compared to twisted pair cables.

Coax has a central core of stiff copper conductor for transmitting signals. This is covered by an insulating material. The insulator is encased by a closely woven braided metal outer conductor that acts as a shield against noise. The outer conductor is again enclosed by a plastic insulating cover.

Coaxial cables are categorized into three types as per radio government (RG) ratings - RG – 59, RG – 58, RG – 11

Applications of Coaxial Cables -
In analog telephone networks: A single coaxial network can carry about 10,000 voice signals.
In digital telephone networks: A coax has a data rate of 600 Mbps.
In cable TV networks
In traditional Ethernet LANs
In MANs

Fibre optic cable:

Fibre optic cable is a high-speed cable that transmits the data using light beams. It provides high data transmission speed as compared to other cables. It is more expensive as compared to other cables, so it is installed at the government level.

Optical fiber cables are transparent, flexible fibers made up of glass or plastic through which light waves can pass

Structure of a Fiber – Optic Cable

A cross section of a fiber optic cable reveals three parts −

Core − It is the innermost portion of an optical fiber through which light propagates. It is cylindrical in shape and it made up of a flexible glass of high refractive index. The diameter of the core of a single mode fiber is 8 – 10 μm while multimode fibers are 50 μm in diameter. It is also called the optical waveguide since it is the main channel through which light signals are transmitted.

Cladding − The core is surrounded by a glass cladding. The glass of cladding has a lower refractive index than the core. This enables total internal reflection of light waves in the core, and eventually propagation of light waves within the core.

Outer Coating or Jacket − The outer jacket is a thin plastic sheath or coating that is opaque to light. It prevents light rays from outside to enter the optical fiber. Fibers are typically bundles together, where each bundle is covered by a protective outer sheath that prevents the fibers from physical damage.

There are two types of fibers −

Step-index fiber : In these, the refractive index of the core is constant and undergoes an abrupt change at the interface with the cladding.

Graded-index fiber: The refractive index of the core varies in a radial manner from the center. The fiber is densest at the core and becomes rarer towards the edge of the core.

Both of these are further divided into two categories depending upon propagation modes of the fibers −

Single-mode fiber
Multi-mode fiber

Router

Router is a device that connects the LAN to the internet. The router is mainly used to connect the distinct networks or connect the internet to multiple computers.

Routers are networking devices operating at layer 3 or a network layer of the OSI model. They are responsible for receiving, analysing, and forwarding data packets among the connected computer networks. When a data packet arrives, the router inspects the destination address, consults its routing tables to decide the optimal route and then transfers the packet along this route.

Features of Routers

A router is a layer 3 or network layer device.
It connects different networks together and sends data packets from one network to another.
A router can be used both in LANs (Local Area Networks) and WANs (Wide Area Networks).
It transfers data in the form of IP packets. In order to transmit data, it uses IP address mentioned in the destination field of the IP packet.
Routers have a routing table in it that is refreshed periodically according to the changes in the network. In order to transmit data packets, it consults the table and uses a routing protocol.
In order to prepare or refresh the routing table, routers share information among each other.
Routers provide protection against broadcast storms.
Routers are more expensive than other networking devices like hubs,bridges and switches.

Routers are manufactured by some popular companies like −
Cisco
D-Link
HP
3Com
Juniper
Nortel

Routing Table

The functioning of a router depends largely upon the routing table stored in it. The routing table stores the available routes for all destinations. The router consults the routing table to determine the optimal route through which the data packets can be sent.

A routing table typically contains the following entities −

IP addresses and subnet mask of the nodes in the network
IP addresses of the routers in the network
Interface information among the network devices and channels

Routing tables are of two types −

Static Routing Table − Here, the routes are fed manually and are not refreshed automatically. It is suitable for small networks containing 2-3 routers.

Dynamic Routing Table − Here, the router communicates with other routers using routing protocols to determine the available routes. It is suited for larger networks having large number of routers.

Types of Routers
A variety of routers are available depending upon their usages. The main types of routers are −

Wireless Router − They provide WiFi connection WiFi devices like laptops, smartphones etc. They can also provide standard Ethernet routing. For indoor connections, the range is 150 feet while its 300 feet for outdoor connections.

Broadband Routers − They are used to connect to the Internet through telephone and to use voice over Internet Protocol (VoIP) technology for providing high-speed Internet access. They are configured and provided by the Internet Service Provider (ISP).

Core Routers − They can route data packets within a given network, but cannot route the packets between the networks. They helps to link all devices within a network thus forming the backbone of network. It is used by ISP and communication interfaces.

Edge Routers − They are low-capacity routers placed at the periphery of the networks. They connect the internal network to the external networks, and are suitable for transferring data packets across networks. They use Border Gateway Protocol (BGP) for connectivity. There are two types of edge routers, subscriber edge routers and label edge routers.

Brouters − Brouters are specialised routers that can provide the functionalities of bridges as well. Like a bridge, brouters help to transfer data between networks. And like a router, they route the data within the devices of a network.

Modem

Modem connects the computer to the internet over the existing telephone line. A modem is not integrated with the computer motherboard. A modem is a separate part on the PC slot found on the motherboard.
The data stored on the computer is digital whereas a telephone line or cable wire can transmit only analog data.

The main function of the modem is to convert digital signal into analog and vice versa. Modem is a combination of two devices − modulator and demodulator. The modulator converts digital data into analog data when the data is being sent by the computer. The demodulator converts analog data signals into digital data when it is being received by the computer.

Depending on direction of data transmission, modem can be of these types −

Simplex − A simplex modem can transfer data in only one direction, from digital device to network (modulator) or network to digital device (demodulator).

Half duplex − A half-duplex modem has the capacity to transfer data in both the directions but only one at a time.

Full duplex − A full duplex modem can transmit data in both the directions simultaneously.

Modem is abbreviation for Modulator – De-modulator. Modems are used for data transfer from one computer network to another computer network through telephone lines. The computer network works in digital mode, while analog technology is used for carrying massages across phone lines.

Modulator converts information from digital mode to analog mode at the transmitting end and de-modulator converts the same from analog to digital at receiving end. The process of converting analog signals of one computer network into digital signals of another computer network so they can be processed by a receiving computer is referred to as digitizing.

When an analog facility is used for data communication between two digital devices called Data Terminal Equipment (DTE), modems are used at each end. DTE can be a terminal or a computer.

The modem at the transmitting end converts the digital signal generated by DTE into an analog signal by modulating a carrier. This modem at the receiving end demodulates the carrier and hand over the demodulated digital signal to the DTE.

The transmission medium between the two modems can be dedicated circuit or a switched telephone circuit. If a switched telephone circuit is used, then the modems are connected to the local telephone exchanges. Whenever data transmission is required connection between the modems is established through telephone exchanges.

Computer Network Architecture

Computer Network Architecture is defined as the physical and logical design of the software, hardware, protocols, and media of the transmission of data. Simply we can say that how computers are organized and how tasks are allocated to the computer.

The two types of network architectures are used:
Peer-To-Peer network
Client/Server Network

Peer-To-Peer network

Peer-To-Peer network is a network in which all the computers are linked together with equal privilege and responsibilities for processing the data.
Peer-To-Peer network is useful for small environments, usually up to 10 computers.
Peer-To-Peer network has no dedicated server.
Special permissions are assigned to each computer for sharing the resources, but this can lead to a problem if the computer with the resource is down.

Advantages Of Peer-To-Peer Network:

It is less costly as it does not contain any dedicated server.
If one computer stops working but, other computers will not stop working.
It is easy to set up and maintain as each computer manages itself.

Disadvantages Of Peer-To-Peer Network:

In the case of Peer-To-Peer network, it does not contain the centralized system . Therefore, it cannot
back up the data as the data is different in different locations.
It has a security issue as the device is managed itself.

Client/Server Network

Client/Server network is a network model designed for the end users called clients, to access the resources such as songs, video, etc. from a central computer known as Server.
The central controller is known as a server while all other computers in the network are called clients.
A server performs all the major operations such as security and network management.
A server is responsible for managing all the resources such as files, directories, printer, etc.
All the clients communicate with each other through a server. For example, if client1 wants to send some data to client 2, then it first sends the request to the server for the permission. The server sends the response to the client 1 to initiate its communication with the client 2.

Advantages Of Client/Server network:

A Client/Server network contains the centralized system. Therefore we can back up the data easily.
A Client/Server network has a dedicated server that improves the overall performance of the whole system.
Security is better in Client/Server network as a single server administers the shared resources.
It also increases the speed of the sharing resources.

Disadvantages Of Client/Server network:

Client/Server network is expensive as it requires the server with large memory.
A server has a Network Operating System(NOS) to provide the resources to the clients, but the cost of NOS is very high.
It requires a dedicated network administrator to manage all the resources.

Topology



Bus Topology

The bus topology is designed in such a way that all the stations are connected through a single cable known as a backbone cable.

Each node is either connected to the backbone cable by drop cable or directly connected to the backbone cable.

When a node wants to send a message over the network, it puts a message over the network. All the stations available in the network will receive the message whether it has been addressed or not.

The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.

The configuration of a bus topology is quite simpler as compared to other topologies.

The backbone cable is considered as a "single lane" through which the message is broadcast to all the stations.

The most common access method of the bus topologies is CSMA (Carrier Sense Multiple Access).

CSMA: It is a media access control used to control the data flow so that data integrity is maintained, i.e., the packets do not get lost. There are two alternative ways of handling the problems that occur when two nodes send the messages simultaneously.

CSMA CD: CSMA CD (Collision detection) is an access method used to detect the collision. Once the collision is detected, the sender will stop transmitting the data. Therefore, it works on "recovery after the collision".

CSMA CA: CSMA CA (Collision Avoidance) is an access method used to avoid the collision by checking whether the transmission media is busy or not. If busy, then the sender waits until the media becomes idle. This technique effectively reduces the possibility of the collision. It does not work on "recovery after the collision".

Advantages of Bus topology:

Low-cost cable: In bus topology, nodes are directly connected to the cable without passing through a hub. Therefore, the initial cost of installation is low.
Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-based networks that support upto 10 Mbps.
Familiar technology: Bus topology is a familiar technology as the installation and troubleshooting techniques are well known, and hardware components are easily available.
Limited failure: A failure in one node will not have any effect on other nodes.

Disadvantages of Bus topology:

Extensive cabling: A bus topology is quite simpler, but still it requires a lot of cabling.
Difficult troubleshooting: It requires specialized test equipment to determine the cable faults. If any fault occurs in the cable, then it would disrupt the communication for all the nodes.
Signal interference: If two nodes send the messages simultaneously, then the signals of both the nodes collide with each other.
Reconfiguration difficult: Adding new devices to the network would slow down the network.
Attenuation: Attenuation is a loss of signal leads to communication issues. Repeaters are used to regenerate the signal.

Ring Topology

Ring topology is like a bus topology, but with connected ends. The node that receives the message from the previous computer will retransmit to the next node. The data flows in one direction, i.e., it is unidirectional. The data flows in a single loop continuously known as an endless loop. It has no terminated ends, i.e., each node is connected to other node and having no termination point. The data in a ring topology flow in a clockwise direction. The most common access method of the ring topology is token passing. Token passing: It is a network access method in which token is passed from one node to another node.

Token: It is a frame that circulates around the network. Working of Token passing A token moves around the network, and it is passed from computer to computer until it reaches the destination. The sender modifies the token by putting the address along with the data. The data is passed from one device to another device until the destination address matches. Once the token received by the destination device, then it sends the acknowledgment to the sender. In a ring topology, a token is used as a carrier.

Advantages of Ring topology:

Network Management: Faulty devices can be removed from the network without bringing the network down.
Product availability: Many hardware and software tools for network operation and monitoring are available.
Cost: Twisted pair cabling is inexpensive and easily available. Therefore, the installation cost is very low.
Reliable: It is a more reliable network because the communication system is not dependent on the single host computer.

Disadvantages of Ring topology:

Difficult troubleshooting: It requires specialized test equipment to determine the cable faults. If any fault occurs in the cable, then it would disrupt the communication for all the nodes.
Failure: The breakdown in one station leads to the failure of the overall network.
Reconfiguration difficult: Adding new devices to the network would slow down the network.
Delay: Communication delay is directly proportional to the number of nodes. Adding new devices increases the communication delay.

Star Topology

Star topology is an arrangement of the network in which every node is connected to the central hub, switch or a central computer. The central computer is known as a server, and the peripheral devices attached to the server are known as clients. Coaxial cable or RJ-45 cables are used to connect the computers. Hubs or Switches are mainly used as connection devices in a physical star topology. Star topology is the most popular topology in network implementation.

Advantages of Star topology

Efficient troubleshooting: Troubleshooting is quite efficient in a star topology as compared to bus topology. In a bus topology, the manager has to inspect the kilometers of cable. In a star topology, all the stations are connected to the centralized network. Therefore, the network administrator has to go to the single station to troubleshoot the problem.
Network control: Complex network control features can be easily implemented in the star topology. Any changes made in the star topology are automatically accommodated.
Limited failure: As each station is connected to the central hub with its own cable, therefore failure in one cable will not affect the entire network.
Familiar technology: Star topology is a familiar technology as its tools are cost-effective.
Easily expandable: It is easily expandable as new stations can be added to the open ports on the hub.
Cost effective: Star topology networks are cost-effective as it uses inexpensive coaxial cable.
High data speeds: It supports a bandwidth of approx 100Mbps. Ethernet 100BaseT is one of the most popular Star topology networks.

Disadvantages of Star topology

A Central point of failure: If the central hub or switch goes down, then all the connected nodes will not be able to communicate with each other.
Cable: Sometimes cable routing becomes difficult when a significant amount of routing is required.

Tree topology

Tree topology combines the characteristics of bus topology and star topology. A tree topology is a type of structure in which all the computers are connected with each other in hierarchical fashion. The top-most node in tree topology is known as a root node, and all other nodes are the descendants of the root node. There is only one path exists between two nodes for the data transmission. Thus, it forms a parent-child hierarchy.

Advantages of Tree topology

Support for broadband transmission: Tree topology is mainly used to provide broadband transmission, i.e., signals are sent over long distances without being attenuated.
Easily expandable: We can add the new device to the existing network. Therefore, we can say that tree topology is easily expandable.
Easily manageable: In tree topology, the whole network is divided into segments known as star networks which can be easily managed and maintained.
Error detection: Error detection and error correction are very easy in a tree topology.
Limited failure: The breakdown in one station does not affect the entire network.
Point-to-point wiring: It has point-to-point wiring for individual segments.

Disadvantages of Tree topology

Difficult troubleshooting: If any fault occurs in the node, then it becomes difficult to troubleshoot the problem.
High cost: Devices required for broadband transmission are very costly.
Failure: A tree topology mainly relies on main bus cable and failure in main bus cable will damage the overall network.
Reconfiguration difficult: If new devices are added, then it becomes difficult to reconfigure.

Mesh topology

Mesh technology is an arrangement of the network in which computers are interconnected with each other through various redundant connections. There are multiple paths from one computer to another computer. It does not contain the switch, hub or any central computer which acts as a central point of communication. The Internet is an example of the mesh topology. Mesh topology is mainly used for WAN implementations where communication failures are a critical concern. Mesh topology is mainly used for wireless networks. Mesh topology can be formed by using the formula: Number of cables = (n*(n-1))/2; Where n is the number of nodes that represents the network.

Mesh topology is divided into two categories:

Fully connected mesh topology
Partially connected mesh topology

Full Mesh Topology: In a full mesh topology, each computer is connected to all the computers available in the network.

Partial Mesh Topology: In a partial mesh topology, not all but certain computers are connected to those computers with which they communicate frequently.

Advantages of Mesh topology:

Reliable: The mesh topology networks are very reliable as if any link breakdown will not affect the communication between connected computers.
Fast Communication: Communication is very fast between the nodes.
Easier Reconfiguration: Adding new devices would not disrupt the communication between other devices.

Disadvantages of Mesh topology

Cost: A mesh topology contains a large number of connected devices such as a router and more transmission media than other topologies.
Management: Mesh topology networks are very large and very difficult to maintain and manage. If the network is not monitored carefully, then the communication link failure goes undetected.
Efficiency: In this topology, redundant connections are high that reduces the efficiency of the network.

Hybrid Topology

The combination of various different topologies is known as Hybrid topology. A Hybrid topology is a connection between different links and nodes to transfer the data. When two or more different topologies are combined together is termed as Hybrid topology and if similar topologies are connected with each other will not result in Hybrid topology. For example, if there exist a ring topology in one branch of ICICI bank and bus topology in another branch of ICICI bank, connecting these two topologies will result in Hybrid topology.

Advantages of Hybrid Topology

Reliable: If a fault occurs in any part of the network will not affect the functioning of the rest of the network.
Scalable: Size of the network can be easily expanded by adding new devices without affecting the functionality of the existing network.
Flexible: This topology is very flexible as it can be designed according to the requirements of the organization.
Effective: Hybrid topology is very effective as it can be designed in such a way that the strength of the network is maximized and weakness of the network is minimized.

Disadvantages of Hybrid topology

Complex design: The major drawback of the Hybrid topology is the design of the Hybrid network. It is very difficult to design the architecture of the Hybrid network.
Costly Hub: The Hubs used in the Hybrid topology are very expensive as these hubs are different from usual Hubs used in other topologies.
Costly infrastructure: The infrastructure cost is very high as a hybrid network requires a lot of cabling, network devices, etc.

Transmission modes

The way in which data is transmitted from one device to another device is known as transmission mode.
The transmission mode is also known as the communication mode.
Each communication channel has a direction associated with it, and transmission media provide the direction. Therefore, the transmission mode is also known as a directional mode.
The transmission mode is defined in the physical layer.

The Transmission mode is divided into three categories:

Simplex mode
Half-duplex mode
Full-duplex mode

Simplex mode

In Simplex mode, the communication is unidirectional, i.e., the data flow in one direction.
A device can only send the data but cannot receive it or it can receive the data but cannot send the data.
This transmission mode is not very popular as mainly communications require the two-way exchange of data.
The simplex mode is used in the business field as in sales that do not require any corresponding reply.
The radio station is a simplex channel as it transmits the signal to the listeners but never allows them to transmit back.
Keyboard and Monitor are the examples of the simplex mode as a keyboard can only accept the data from the user and monitor can only be used to display the data on the screen.
The main advantage of the simplex mode is that the full capacity of the communication channel can be utilized during transmission.
In simplex mode, the station can utilize the entire bandwidth of the communication channel, so that more data can be transmitted at a time.
Communication is unidirectional, so it has no inter-communication between devices.

Half-Duplex mode

In a Half-duplex channel, direction can be reversed, i.e., the station can transmit and receive the data as well.
Messages flow in both the directions, but not at the same time.
The entire bandwidth of the communication channel is utilized in one direction at a time.
In half-duplex mode, it is possible to perform the error detection, and if any error occurs, then the receiver requests the sender to retransmit the data.
A Walkie-talkie is an example of the Half-duplex mode. In Walkie-talkie, one party speaks, and another party listens. After a pause, the other speaks and first party listens. Speaking simultaneously will create the distorted sound which cannot be understood.
In half-duplex mode, both the devices can send and receive the data and also can utilize the entire bandwidth of the communication channel during the transmission of data.
In half-duplex mode, when one device is sending the data, then another has to wait, this causes the delay in sending the data at the right time.

Full-duplex mode

In Full duplex mode, the communication is bi-directional, i.e., the data flow in both the directions. Both the stations can send and receive the message simultaneously.
Full-duplex mode has two simplex channels. One channel has traffic moving in one direction, and another channel has traffic flowing in the opposite direction.
The Full-duplex mode is the fastest mode of communication between devices.
The most common example of the full-duplex mode is a telephone network. When two people are communicating with each other by a telephone line, both can talk and listen at the same time.
Both the stations can send and receive the data at the same time.
If there is no dedicated path exists between the devices, then the capacity of the communication channel is divided into two parts.