Introduction
Computer networks revolve around data; thus, comprehending network functionality requires an understanding of data. This article provides a step-by-step explanation of “What is data in computer networks?” starting with the difference between data and information. It then demonstrates how computers store data as bits, how bits are organized into bytes, and how encoding techniques enable the digital representation of letters, numbers, symbols, pictures, audio, and video.
The article then describes how these bits and bytes are arranged into packets so that data transmission systems may transfer them over a network. Before digging into the idea of big data, it discusses several kinds of data that researchers gather, such as volunteered, observed, and inferred data. The paper concludes by outlining the need for cybersecurity, i.e., data must be safeguarded for availability, confidentiality, and integrity, whether it is kept on a device or sent across a network.
Data vs Information
In computer networks, we often say that data is entered, stored, processed, transmitted, and received. Before explaining how data moves, it is important to understand the difference between data and information.
Data is raw facts, symbols, values, or observations before they are interpreted. NIST defines data as a representation of facts, concepts, or instructions in a form suitable for communication, interpretation, or processing by humans or machines [1].
Information is data that has been organized, interpreted, or given meaning. NIST describes information as including the meaning that humans assign to data using known conventions [2].
| Term | Meaning | Example |
|---|---|---|
| Data | Raw facts, symbols, numbers, or values. | 98.6, 01000001, 0300-1234567 |
| Information | Data with meaning, context, or interpretation. | 98.6°F is normal body temperature; 01000001 represents “A”; 0300-123-4567 is a phone number. |
For example, the number 0300-123-4567 is raw data if it appears alone. When we understand that it is a phone number, it becomes meaningful information. When the same phone number is stored with a name, city, account activity, purchase history, and location records, it becomes part of a larger information system.
Once data enters a computer or network, it cannot retain its human meaning alone. It must be represented in a form that digital systems can process. That representation begins with the bit.
The Bit: The Smallest Unit of Digital Data
Computers and networks do not understand words, pictures, videos, or sounds the way humans do. Humans read sentences, see pictures, and hear voices. Computers process patterns of binary digits. The smallest unit of this digital data is called a bit.
A bit is short for a binary digit. NIST defines a bit as a binary digit that has a value of 0 or 1 [3]. A bit is, therefore, the smallest piece of data that a computer can store, process, or transmit.
A bit is not usually stored as a visible 0 or 1. It is represented by a physical signal or state that a computer system can distinguish. The exact representation depends on the technology being used.
| Technology | How the bit may be represented |
|---|---|
| Electronic circuit | Low voltage may represent 0, and high voltage may represent 1. |
| Fiber-optic cable | Changes in light signals, such as light pulses, represent binary data. |
| Magnetic storage | Different directions or patterns of magnetization represent 0 and 1. |
| Optical storage | Different light reflections from the disc surface represent binary data. |
| Wireless transmission | Changes in radio wave properties, such as amplitude, frequency, or phase, represent bits as they travel through the air. |
From Human Input to Binary Form
When you type, click, speak, take a photo, or upload a file, the device converts human activity into binary data. Input devices perform the first conversion, and output devices later convert binary data back into a human-recognizable form.
| Input device | Human action | The computer receives |
|---|---|---|
| Keyboard | Pressing the letter A | Binary code for A |
| Mouse | Clicking or moving | Binary signals showing position and click |
| Microphone | Speaking | Digital audio bits |
| Camera | Taking a photo | Image data as bits |
| Touchscreen | Finger touch | Binary data showing touch position |
| Output device | Binary data becomes |
|---|---|
| Monitor | Text, images, and video |
| Printer | Printed words and pictures |
| Speaker | Sound |
| Headphones | Audio |
| Projector | Visual display |
Bits, Bytes, and Encoding
A single bit can represent only two possibilities: 0 or 1. Computers need to represent many more things, including letters, numbers, symbols, colors, sounds, images, and videos. For this reason, bits are grouped together.
A group of 8 bits is called a byte. NIST defines a byte as a group or sequence of eight bits [4].
ASCII: How Letters and Symbols Become Bits
Computers also need agreed codes so that the same bit patterns are interpreted consistently. One important standard is ASCII, the American Standard Code for Information Interchange. RFC 20 describes ASCII as a standard character representation used for network interchange [5].
| Character | ASCII binary form |
|---|---|
| A | 01000001 |
| 9 | 00111001 |
| # | 00100011 |
This means that when you type the capital letter A, the computer can store or transmit it as 01000001.
Important Clarification: Character 9 Is Not the Same as Numeric Value 9
The character “9” and the number 9 are not the same thing inside a computer.
When you type 9 on a keyboard, the computer first treats it as a text character, not automatically as a mathematical number. In ASCII, the character “9” has the decimal code 57, which is written in binary as 00111001. But the actual numeric value 9, used for calculation, is written in binary as 00001001. This is because ASCII is a text encoding system designed to represent characters such as A, B, C, 1, 2, 3, 9, #, and @.
So when you type “9”, ASCII stores it as a character code. Later, if a calculator app, spreadsheet, or programming language wants to use it in mathematics, it must interpret or convert that character into the numeric value 9.
| Meaning | Binary |
|---|---|
| Character “9” typed on a keyboard | 00111001 |
| Actual numeric value 9 | 00001001 |
The capital letter A has an ASCII decimal value of 65. Decimal 65 in binary is 01000001. The leading 0 is commonly used because characters are often stored in 8-bit bytes, even though the original ASCII standard used a 7-bit character representation.
How Different Data Types Become Bits
| Type of data | How it becomes bits |
|---|---|
| Text | Characters are encoded using ASCII, Unicode, or similar systems. |
| Images | Pictures are stored as pixels, and each pixel has binary color values. |
| Audio | Sound waves are sampled and stored as digital numbers. |
| Video | Video is stored as a sequence of image frames plus audio. |
| Files | File contents are stored as binary patterns. |
| Network messages | Data is divided into smaller units and transmitted as bits. |
From Bits to Packets: How Data Moves Across a Network
Now we can connect the idea of a bit with that of a packet. A bit is the smallest unit of digital data. A packet is a larger networking unit made of many bits and bytes. In simple terms, bits are the building blocks, bytes are small groups of bits, and packets are structured containers that carry groups of bytes across a network.
A network does not send a WhatsApp photo, a web page, or an email as one human-readable object. The data is first represented as bits and bytes. Then networking protocols organize those bits and bytes into smaller units called packets. Cloudflare explains that a packet is a small segment of a larger message, and data sent over networks such as the Internet is divided into packets and recombined by the receiving device [6].
Each packet usually contains a payload and a header. The payload carries part of the original data. The header contains extra control information, such as source and destination addresses, that helps network devices deliver the packet correctly.
| Packet part | Purpose | Simple example |
|---|---|---|
| Payload | Carries part of the original message or file. | This is part of a photo, email, web page, or message. |
| Header | Carries control information needed for delivery. | The source address, destination address, and other routing information are included. |
Linking Bits and Packets with a Simple Example
Suppose you send the text A#. Using ASCII, the characters become bytes:
| Character | Binary |
|---|---|
| A | 01000001 |
| # | 00100011 |
So the message becomes: 01000001 00100011
Those bits and bytes can become part of a packet payload. The network protocol then adds a header, which is also made of bits. When the packet travels over a medium, all of its bits are represented physically: as voltage changes in copper cable, light signals in fiber-optic cable, or radio wave changes in wireless networks. The receiving device reads the physical signals, reconstructs the bits, interprets the packet, extracts the payload, and converts the data back into “A#”.
Photo Upload Example
When you send a photo on WhatsApp or upload a file to Google Drive, the file does not normally travel as one single piece. The file is represented as many bits and bytes. Those bytes are divided into packets. The packets travel through cables, fiber, Wi-Fi, routers, switches, and other network devices. At the destination, the receiving device reassembles the packets and reconstructs the original file.
The Internet Protocol standard describes how IP datagrams are routed through interconnected networks and, when needed, fragmented and reassembled [7].
Data Communications
The movement of data between devices is called data communications. In simple terms, data communications means the exchange of data between two devices through some form of transmission medium, such as copper cable, fiber optic cable, Wi-Fi, or radio waves.
A complete communication system requires more than two devices. It needs a sender, a receiver, a message, a transmission medium, hardware, software, and protocols. Protocols are the agreed rules that define how data is formatted, transmitted, received, and interpreted.
| Component | Role in data communication |
|---|---|
| Sender | The device that creates or sends the data. |
| Receiver | The device that receives and interprets the data. |
| Message | The data being communicated. |
| Transmission medium | The path used to carry the data, such as cable, fiber, or wireless signals. |
| Hardware | Physical network equipment such as computers, routers, switches, and network cards. |
| Software | Programs and operating systems that create, process, and manage communication. |
| Protocols | Rules that control how data is formatted, addressed, transmitted, and reassembled. |
Types of Data Collected in Digital Systems
After understanding how data is represented and transmitted, the next question is where digital data comes from. Data may be created directly by users, recorded automatically by devices, or inferred by analyzing behavior.
| Type of data | Meaning | Examples |
|---|---|---|
| Volunteered data | Data you knowingly and directly provide. | Name, email address, phone number, profile photo, online forms, uploaded documents, and social media posts. |
| Observed data | Data collected by recording your actions or device activity. | The following types of data are collected: location data, login times, clicks, app usage, browsing activity, IP address, and device information. |
| Inferred data | Data produced by analyzing other data and drawing conclusions. | Shopping habits, travel patterns, spending behavior, food preferences, and lifestyle predictions. |
Big Data
Once large numbers of users, devices, apps, websites, sensors, and cloud services continuously create and transmit data, organizations may collect massive datasets. This leads to the idea of big data.
Big data refers to enormous, complex, and fast-growing collections of data that traditional data management systems cannot easily store, process, or analyze. IBM describes big data as massive and complex data sets that traditional data management systems cannot handle [9]. NIST explains big data in relation to the limits of traditional data architectures and describes it through characteristics such as volume, variety, velocity, veracity, and value [10].
In simple words, big data is not just “a lot of data.” It is data that is large, diverse, fast-moving, and useful for discovering patterns.
| Characteristic | Meaning | Simple example |
|---|---|---|
| Volume | Huge amount of data. | Millions of users, transactions, searches, or videos. |
| Velocity | Speed at which data is created and processed. | Real-time banking alerts, live traffic updates, and social media posts. |
| Variety | Different forms of data. | Text, images, videos, audio, logs, sensor data, and payment records. |
| Veracity | Accuracy and trustworthiness of the data. | Removing duplicate, false, incomplete, or incorrect records. |
| Value | Useful insight gained from data. | Fraud detection, customer recommendations, business decisions, and security monitoring are all important aspects of our operations. |
Why Data Matters in Cybersecurity
Data is the main thing that networks carry. Every online activity depends on data moving between users, devices, servers, routers, applications, websites, databases, and cloud platforms. Because of this, cybersecurity focuses on protecting data while it is stored, processed, and transmitted.
Experts commonly explain these protections through the CIA triad: confidentiality, integrity, and availability.
| CIA principle | Meaning | Example | Common controls |
|---|---|---|---|
| Confidentiality | Data should only be accessible to authorized people or systems. | A student’s exam result or a patient’s medical record should not be visible to everyone. | Passwords, encryption, access controls, and user permissions are all important security measures. |
| Integrity | Data should not be changed in an unauthorized or incorrect way while it is stored, processed, or transmitted. | A bank balance of Rs. 50,000 should not be changed to Rs. 5,000 or Rs. 500,000 without authorization. | Checksums, digital signatures, audit logs, validation, and access control are all important security measures. |
| Availability | Data and systems should be accessible when authorized users need them. | A bank app or hospital record system should be available when users need important services. | Backups, redundant systems, disaster recovery planning, and DDoS protection are all important components of a comprehensive IT security strategy. |
NIST defines data integrity as protection against unauthorized modification or destruction of information, including ensuring the non-repudiation and authenticity of that information [11]. In beginner terms, integrity means the data remains accurate, complete, and trustworthy.
Summary
- Data is raw facts, symbols, values, or observations. Information is data given meaning and context.
- A bit is the smallest unit of digital data, represented physically as voltage, light, magnetism, or radio waves depending on the medium.
- Eight bits make a byte. Standards like ASCII allow computers to encode text, symbols, and numbers consistently as binary patterns.
- Packets are structured groups of bits with a payload and a header that carry data across a network and are reassembled at the destination.
- Data may be volunteered (provided by the user), observed (recorded automatically), or inferred (derived from analysis).
- Big data is characterized by volume, velocity, variety, veracity, and value datasets too large for traditional systems to handle.
- Cybersecurity protects data through the CIA triad: confidentiality, integrity, and availability.
Data in computer networks is digital information that is created, collected, stored, processed, and transmitted between devices. It may be something a user provides directly, something observed from device or app activity, or something inferred from their behavior. Before data can move across a network, it is represented as bits. Those bits are grouped into bytes, encoded into meaningful digital forms, organized into packets, transmitted through physical media, and reconstructed at the receiving device.
References
| [#] | Author / Body | Source |
|---|---|---|
| [1] | NIST CSRC | Glossary — Data |
| [2] | NIST CSRC | Glossary — Information |
| [3] | NIST CSRC | Glossary — Bit |
| [4] | NIST CSRC | Glossary — Byte |
| [5] | IETF | RFC 20 — ASCII Format for Network Interchange |
| [6] | Cloudflare | Learning Center — What is a packet? |
| [7] | IETF | RFC 791 — Internet Protocol |
| [8] | OpenLearn | Volunteered, Observed, and Inferred Data |
| [9] | IBM | IBM Think — What is Big Data? |
| [10] | NIST | Big Data Interoperability Framework, Vol. 1: Definitions |
| [11] | NIST CSRC | Glossary — Data Integrity |



