Computer Network Notes
Computer Network Notes
Computer Network Notes
[Author]
SECTION - I
Chapter 1 - Introduction to Data Communication (Marks 8)
Introduction to communication
Types of communication:
1. Analog Communication,
2. Digital Communication
Data Communication: Data communication is the exchange of data between
two devices by means of any transmission medium.
Modulation: Modulation means changing the digital signal to an analog signal
for transmission.
There are three types of modulation:
1. Amplitude Modulation (AM)
2. Frequency Modulation (FM)
3. Phase Modulation (PM)
What is signal? What are the types of signals?
Signal: It is an energy applied to a circuit to cause it to perform an intended
actions, such as transmission or reception of information.
There are two types of signals:
1. Analog signal
2. Digital signal
1. Analog signal:
Analog signal, takes on continuous range of values.
When someone speaks, an analog wave is captured by a microphone and
converted to analog signal or sampled and converted to a digital signal.
An analog signal has infinitely many levels of intensity over a period of
time.
As the wave moves from value A to value B, it passes through and
includes an infinite number of values along its path.
Figure shows analog signal.
2. Digital signal:
Digital signal take on discrete values. Example, Data is stored in computer
memory in the form of 0s and 1s. They can be converted to digital signal
or modulated into an analog for transmission across a medium.
2
[Author]
Data Transmission:
Data transmission refers to movement of the bits over some physical medium
connecting two or more digital devices. As shown in figure, there are two options
of transmitting the bits, namely,
1. Parallel Transmission,
2. Serial Transmission
1. Parallel Transmission:
Binary data, consisting of 1s and 0s, may be organized into groups of n
bits each. Computers produce and consume data in groups of bits much as
we conceive of and use spoken language in the form of words rather than
letters. By grouping, we can send data n bits at a time instead of 1. This is
called parallel transmission.
The mechanism for parallel transmission is a conceptually simple one: Use
n wires to send n bits at one time. That way each bit has its own wire, and
all n bits of one group can be transmitted with each clock tick from one
device to another.
Figure shows how parallel transmission works for n=8. Typically, the eight
wires are bundled in a cable with a connector at each end.
3
[Author]
4
[Author]
The advantage of serial over parallel transmission is that with only one
communication channel, serial transmission reduces the cost of
transmission over parallel by roughly a factor of n.
Since communication within devices is parallel, conversion devices are
required at the interface between the sender and the line (parallel-toserial) and between the line and the receiver (serial-to-parallel).
Serial transmission occurs in one of three ways: asynchronous,
synchronous, and isochronous.
2.
3.
4.
5.
Throughput is constant.
6.
7.
5
[Author]
Advantages:
2. Very inexpensive to implement.
3. It can provide requires performance at low cost.
4. Both sides buffering is not required.
Disadvantages:
1. Performance is poor.
2. Efficiently is low.
3. Considerable amount of communication time is lost between characters.
3. Synchronous Transmission:
With synchronous transmission much larger bit groups are sent. Instead of
sending many characters separately, each with its own start and stop bit,
they are grouped together and then transmitted as a whole. We call this
group a data frame or frame.
In this, transmission is carried out under the control of a timing source.
The frame contains SYN characters, unique bit patterns that alert the
receiver that a frame is arriving. SYN character is similar to start bit.
Figure shows format for synchronous transmission.
The data bit define the information being sent. There are no start bit and
stop bit between the characters. The error checking bits are used to detect
and correct transmission errors.
Synchronous transmission is much faster than asynchronous transmission.
Synchronous transmission is more useful for high speed application.
Advantages:
4. Capable for high performance.
5. Efficiency is high.
6. Error checking and acknowledgement schemes work well.
7. Data transfer rate is high.
Disadvantages:
1. Expensive to implement.
2. Both sides need buffering.
Communication Modes:
Communication between two devices can simplex, half-duplex, or full duplex.
1. Simplex:
6
[Author]
2. Half Duplex:
In half-duplex mode, each station can both transmit and receive, but not
at the same time: When one device is sending, the other can only receive,
and vice versa as shown in figure.
The half-duplex mode is like a one-lane road with traffic allowed in both
directions. When cars are traveling in one direction, cars going the other
way must wait.
In a half-duplex transmission, the entire capacity of a channel is taken
over by whichever of the two devices is transmitting at the time.
Walkie-Talkies and CB (citizen band) radios are both half-duplex systems.
3. Full Duplex:
In full-duplex mode (also called duplex), both stations can transmit and
receive simultaneously as shown in figure.
The full-duplex mode is like a two-way street with traffic flowing in both
direction at the same time.
In full-duplex mode, signals going in one direction share the capacity of
the link: with signals going in the other direction. This sharing can occur in
two ways: Either the link must contain two physically separate
transmission paths, one for sending and the other for receiving; or the
capacity of the channel is divided between signals traveling in both
directions.
7
[Author]
8
[Author]
6. Electronic data interchange (EDI): EDI allows business information,
including documents such as purchase orders and invoices, to be
transferred without using paper.
7. Electronic mail: Probably it's the most widely used computer network
application. It allows you to send and receive mail over internet.
8. Teleconferencing: Teleconferencing allows conference to occur without
the participants being in the same place. Applications include simple text
conferencing (where participants communicate through their normal
keyboards and monitor) and video conferencing where participants can
even see as well as talk to other fellow participants. Different types of
equipments are used for video conferencing depending on what quality of
the motion you want to capture (whether you want just to see the face of
other fellow participants or do you want to see the exact facial
expression).
9. Voice over IP: Computer networks are also used to provide voice
communication. This kind of voice communication is pretty cheap as
compared to the normal telephonic conversation.
10.
Video on demand: Future services provided by the cable
television networks may include video on request where a person can
request for a particular movie or any clip at any time he wish to see.
11.
Home applications: Surfing on internet may be for fun, to acquire
information and for playing games. Information on every field is available
on internet such as arts, science, technology, business, government,
health, music, travels, cooking, sports, etc. Many newspapers are available
online and selected articles can be downloaded. Email, instance
messaging, chatting, internet telephony provided personal communication
by using internet and WWW.
Benefits of Computer Network:
1. The computers, staff and information can be well managed.
2. A network provides the means to exchange data among the computers
and to make programs and data available to people.
3. It permits the sharing of the resources of the machine.
4. Networking also provides the function of back-up.
5. Networking provides a flexible networking environment. Employees can
work at home by using through networks ties through networks into the
computer at office.
Component of Computer Network:
1. Client: Any computer that is the part of a common network other than the
Server is called as client. The division is based on the storage capacity and
responsibility of the computer. For example a Server has a large storage
area and its responsibilities are pretty different than client computers.
2. Server: A server is just like any other computer of the network however it
can be distinguished with its large storage capacity and the role that is
assigned to it. This is the administrator that controls functioning of other
computers and responsible for the division of labour among computers in
a shared network.
9
[Author]
3. Media: The physical device through which various components of a
computer network are connected with each other is called as the Media it
may include wire, cable or any other thing. However, these days with
advances in technology wireless communication between various
components of a computer is also possible. Thanks to those scientists and
research scholars who work day-in and day-out to bestow us with such
technologies.
4. Network Interface Card (NIC): Network Interface card is also known as
Network Adaptor. The Network Interface Card (NIC) is a circuit board that
regulates exchange of data between the network and computers or in
other words we can say that it is necessary for receiving and sending data
between the network and the computers. Each PC comes up with an
inbuilt slot where NIC is plugged in which itself remain connected with a
cable or wire.
5. Protocols: Generally any set of rules is a Protocol. A Network Protocol is
usually an agreed-upon or standardized set of rules used for transmitting
data and/or establishing communication between them. Just as two people
need to have a common language between them to exchange their views,
so computers need to have a common language so as to share information
and the Protocol is something that offers that platform.
6. Cables: There are many cables such as co-axial, twisted pair, or fiber
optics used to link between the computers.
7. Switches: It is used to direct the signals across the network. It creates
temporary link between two computer and computer station.
8. Hubs: The main part of the network joins multiple computers together to
form a single network.
9. Bridges: It is a midway between two networks. Two LANs can be
connected using bridges.
10.
Router: It transfers data between one network to another i.e. it
also helps to select route or way for the data to each destination address.
11.
Repeaters: It is an electronic device that receive a signal and
retransmit it at higher level, so that the signal can cover longer distance.
12.
Gateways: Gateways connects two independent network. A
gateway is protocol converter.
Computer Network Classifications:
Classification of Network by their Geography:
1. Local Area Network (LAN):
LAN is usually privately owned computer network that links the devices in
a single office, building or campus of up to few kilometres in size.
LANs are easy to design and troubleshoot. The personal computers and
workstations in the offices are interconnected via LAN.
These are used to share resources (may be hardware or software
resources) and to exchange information. LANs are distinguished from
10
[Author]
For example, a company can use a MAN to connect the LANs in all its
offices in a city. MAN is wholly owned and operated by a private company
or may be a service provided by a public company.
11
[Author]
3.
4.
WAN
WAN can be private or it can be
public leased type network.
WAN is used for the network that
spans over a large distance such
as
system
spanning
states,
countries etc.
WAN is not so easy to design and
maintain.
The communication medium used
in WAN can be PSTN or satellite
links due to longer distances
involved.
12
[Author]
5.
6.
7.
8.
each
station
cannot
13
[Author]
Advantages:
1. Less expensive.
2. Easy to administer.
3. Network OS is not required.
4. No more built in redundancy. If one PC failed we have other shared
resources.
Disadvantages:
1. Not very secure.
2. Hard to backup.
3. No central point to storage list.
4. Additional load on computer because of absent of server.
2. Server-Client Network:
The most common networking relationship is the client-server model. In
the client server model computer did all of the processing and simply
transmitted the results to a user at a remote terminal.
The model contains three components: a client, a server, and a service as
shown in figure.
A service is a task that a machine can perform such as offering files over a
network or the ability to execute a command.
A server is a computer running a process that provides a service to other
computer when they request it.
A client is the computer running a program that request the service from
the server.
Advantages:
1. Very secure.
2. Better performance compared to P2P.
3. Centralized backup.
4. Very reliable.
Disadvantages:
14
[Author]
1.
2.
3.
4.
5.
1) Mesh Topology:
In mesh topology (also called complete topology) every node has a
dedicated point-to-point link to all the nodes within network.
Figure shows network topology.
15
[Author]
The term dedicated means that the link carries traffic only between the
two devices it connects.
The link shares traffic between the two nodes only.
Mesh topology does not have traffic congestion problems, due to
dedicated links.
As the links are not shared, a special Media Access Control (MAC) protocol
is not needed.
Advantages:
1. Dedicated link between nodes ensure optimum data rate and eliminated
traffic problem.
2. Better privacy and security.
3. Mesh topology is robust.
4. Failure of any link will not cause failure of entire network.
5. Point-to-point links make fault identification and fault isolation easy.
6. MAC protocol is not needed.
Disadvantages:
1. Large amount of cabling and I/O ports are required.
2. Hardware required for each link (I/O ports) and redundant link increases
cost.
3. Difficulty in installation.
4. Difficulty to reconfigure.
2) Star Topology:
A star topology consists of number of devices connected by point-to-point
links to a central hub. The devices are not directly linked to one another.
Figure shows star topology.
Unlike a mesh topology, a star topology does not allow direct traffic
between devices. The hub acts as an exchange: If one device wants to
send data to another, it sends the data to the hub, which then relays the
data to the other connected device.
In a star, each device needs only one link and one I/O port to connect it to
any number of others. This factor also makes it easy to install and
reconfigure.
Advantages:
16
[Author]
1. A star topology is less expensive than a mesh topology.
2. Each device needs only one link and one I/O port to connect it to any
number of others. This factor also makes it easy to install and reconfigure.
3. Robust topology.
4. If any links fails, it does not affect network.
5. Easy fault identification and fault isolation.
6. It is easy to modify and add new nodes to a star network without
disturbing to the rest of the network.
Disadvantages:
1. If the central hub fails, the whole network fails to operate.
2. Each device requires its own cable segment.
3. In hierarchical network, installation and configuration is difficult.
3) Tree Topology:
Tree topology can be derived from star topology. Tree has a hierarchy of
various hubs, like branches in tree.
Figure shows tree topology.
In this case, every node is connected to some hub. However, only a few
nodes are connected directly to the central hub (head-end).
The central hub contains a repeater, which looks at the incoming bits and
regenerates them afresh as the full-blown signals for 0 or 1 as required.
This allows the digital signals to traverse over longer distances. Therefore,
the central hub is also called active hub.
The tree topology also contains many secondary hubs, which may be
active hubs or passive hubs. The merits and demerits of tree topology are
almost similar to those of the star topology.
Advantages:
1. It allows devices to be attached to a single hub and can therefore
increases the distance of a signal can travel between devices.
2. It allows the network to isolate and priorities communications from
different computers.
Disadvantages:
1. If the central hub (head-end) fails system breaks down.
2. The cabling cost is more.
17
[Author]
4) Ring Topology:
In ring topology, each node is directly connected to only its two adjacent
neighbour. If a node wants to send something to a distant node on a ring,
it has to go through many intermediate nodes, which act like repeaters,
reproducing the incoming bit stream with full signals on the outgoing line.
Figure shows ring topology.
The signal travels along the ring in one direction from device-to-device till
it reaches to the destination. In between the signal is regenerated by the
repeater in the ring, therefore it is an active network and termination is
not required.
A ring is easy to reconfigure and install. In a ring, normally a signal
circulates all the time. A node not receiving any signal for a long time
indicates fault. Therefore, fault isolation is relatively easy in ring.
However, if a node in a simple ring fails, the whole ring cannot function.
Therefore, some ring topologies use dual rings.
Another demerit is that traffic is only in one direction.
This topology is not used if the number of nodes to be connected is very
high.
Advantages:
1. A ring is relatively easy to install and reconfigure.
2. Link failure can be easily found as each device is connected to its
immediate neighbour only.
3. Because of every node is given equal access to the token no one node can
monopolize the network.
Disadvantages:
1. Maximum ring length and number of devices is limited.
2. Failure of one node on the ring can affect the entire network.
3. Adding or removing nodes disturbs the networks.
5) Bus Topology:
Bus topology uses multipoint cabling i.e. multipoint devices are connected
by means of connectors or drop cables. One long cable acts as a backbone
18
[Author]
to link all the devices in a network. The signal becomes weak as it travel
along the backbone link.
Figure shows bus topology.
A node wanting to send some data to some other node pushes the data on
the bus, which carries it to the other node, where it is received in the same
way as passengers get in a bus and get out of it at their destination.
Hence this topology has the name bus.
A tap is a connector that connects the node with the metallic core of the
bus via a drop line. As the signal traverses across the bus, some of the
energy is converted into the heat energy, thus weakening the signals. This
puts a limit on the number of taps and the distance between them.
Therefore, this topology cannot be used for a very large number of
computers.
Bus is passive topology because it requires termination. Cable cannot be
left unterminated in a bus network.
Advantages:
1. Bus topology is easy to install.
2. Because of backbone, less cable is required.
3. Number of I/O ports required is less also the hardware is reduced.
4. The backbone can be extended by using repeater.
5. Cost of the network is low.
Disadvantages:
1. Heavy network traffic can slow a bus considerably.
2. Difficult reconnection and fault isolation (troubleshooting).
3. Difficult to add new node/device.
4. Signal reflection at the tapes can cause degradation in quality.
5. Failure of backbone affects failure of all devices on the network.
6) Hybrid Topology:
Hybrid topology is one that uses two or more of the topologies together.
Figure shows hybrid topology.
19
[Author]
In this case, the bus, star and ring topologies are used to create this
hybrid topologies are used to create this hybrid topology. There are
multiple ways in which this can be created. In practice, many networks are
quite complex but they can be reduced to some form of hybrid topology.
It is difficult to troubleshoot.
4.
5.
6.
Adding
and
removing
the
computers is relatively easier.
7.
8.
Easy to troubleshoot.
The failure of single computer or
cable doesnt bring the network
down.
Star Topology
1.
2.
Baseband or
cable is used.
coaxial
3.
broadband
20
[Author]
4.
5.
Signals that carry information within a network can travel a fixed distance
before attenuation endangers the integrity of the data. A repeater receives
a signal and, before it becomes too weak or corrupted, regenerates the
original bit pattern. The repeater then sends the refreshed signal.
A repeater does not actually connect two LANs; it connects two segments
of the same LAN. The segments connected are still part of one single LAN.
A repeater is not a device that can connect two LANs of different protocols.
A repeater can overcome the 10Base5 Ethernet length restriction.
A repeater does not amplify the signal; it regenerates the signal. When it
receives a weakened or corrupted signal, it creates a copy, bit for bit, at
the original strength.
The location of a repeater on a link is vital. A repeater must be placed so
that a signal reaches it before any noise changes the meaning of any of its
bits.
2) Hubs:
A repeater with multiple ports is known as hub. It is a device for
connecting multiple Ethernet devices together and making them act as a
single network segment.
Hub can be used to create multiple levels of hierarchy of stations. The
stations connect to the hub with RJ-45 connector having maximum
segment length is 100 meters. This type of interconnected set of stations
is easy to maintain and diagnose.
Figure shows the hub.
21
[Author]
Figure 19 Hub
1.
2.
3.
Functions of Hub:
Facilitate adding, deleting or moving work stations.
Extend the length of the network.
Provide flexibility by supporting multiple interfaces. For example, Ethernet,
token ring, FDDI.
4. It offers fault tolerance feature.
5. Provide centralize management services.
3) Bridges:
The device that can be used to interconnect two separate LANs is known
as a bridge. It is attached to two or more LANs to create extended LAN as
shown in figure.
22
[Author]
1.
2.
3.
1.
2.
The bridge operates in layer 2, that is data-link layer and that is why it is
called level-2 relay with reference to the OSI model.
It links similar or dissimilar LANs, designed to store and forward frames, it
is protocol independent and transparent to the end stations. The flow of
information through a bridge is shown in Figure.
1. Transparent Bridges:
The transparent bridge uses two processes known as bridge forwarding
and bridge learning.
If the destination address is present in the forwarding database already
created, the packet is forwarded to the port number to which the
destination host is attached. If it is not present, forwarding is done on all
parts (flooding). This process is known as bridge forwarding.
23
[Author]
1.
2.
3.
4.
5.
24
[Author]
4) Switches:
A switch is essentially a fast bridge having additional sophistication that
allows faster processing of frames.
It provides reaching functionality with greater efficiency.
It supports transmitting, receiving and controlling traffic with other
computers on the network.
Figure shows switch.
Figure 22 Switch
1.
2.
3.
4.
25
[Author]
a. Cut-through: A switch forwards a frame immediately after receiving the
destination address. As a consequence, the switch forwards the frame
without collision and error detection.
b. Collision-free: In this case, the switch forwards the frame after receiving
64 bytes, which allows detection of collision. However, error detection is
not possible because switch is yet to receive the entire frame.
c. Fully buffered: In this case, the switch forwards the frame only after
receiving the entire frame. So, the switch can detect both collision and
error free frames are forwarded.
Layer 1 Switch:
It is a hub or repeater.
Layer 2 Switch:
Layer 2 switch performs at the physical and data link layer.
It is a bridge with many ports and a design that allows better performance.
Layer 2 switch operate using physical network addresses, identify
individual devices.
Switching operating at layer are very fast because they are just storing
physical addresses, but they usually arent very smart.
They dont take at the data packet very closely to learn anything more
about where its headed.
Layer 3 Switch:
Layer 3 switches use network or IP addresses that identify locations on the
network. They read network addresses more closely than layer 2 switches.
Layer 3 switch is kind of router. They identify network locations as well as
the physical device. A location can be LAN workstation, a location in
computer memory or even a different packet of data travelling through a
network.
Switches operating at layer 3 are smarter than layer 2 devices and
incorporate routing functions to actively calculate the best way to send a
packet to its destination.
Layer 4 switches:
Layer 4 switches are capable of identifying which application protocols
(HTTP, FTP, SNTP, etc.) are included with each packet, and they use this
information to hand off the packet to the appropriate higher-layer
software.
Layer 4 switches make packet forwarding decisions based not only on the
MAC address and IP address, but also on the application to which a packet
belongs.
Layer 4 switches also provides an effective wire-speed security shield for
network because any computer or industry-specific protocols can be
confined to only authorized switched ports or users. This security feature
is often reinforced with traffic filtering and forwarding features.
Layer 7 switches:
Layer-7 switches may distribute loads based on Uniform Resource Locator
URL or by some installation-specific technique to recognize applicationlevel transactions. A layer-7 switch may include a web cache and
participate in a content delivery network.
26
[Author]
Difference between Hub and Switch.
No.
Hub
Switch
1.
Switch
is
point-to-point
communication device.
2.
3.
4.
5.
6.
Switch
is
very
sophisticated
device and widely used.
5) Routers:
A router is a device which translates information from one network to
another.
A router is a three-layer device that routes packets based on their logical
addresses (Host-to-host addressing).
A router normally connects LANs and WANs in the Internet and has a
routing table that is used for making decisions about the route.
Routers connect dissimilar networks together and have access to
information from physical, data link, and network layer.
The routing tables are normally dynamic and are updated using routing
protocols.
A router isolates LANs in to subnets to manage and control network traffic.
However, unlike bridges it is not transparent to end stations.
A schematic diagram of the router is shown in figure.
As shown in figure a router has four basic components: Input ports, output
ports, the routing processor and the switching fabric. The functions of the
four components are briefly mentioned below.
a. Input port: Input port performs physical and data-link layer functions of
the router. The ports are also provided with buffer to hold the packet
before forwarding to the switching fabric.
27
[Author]
b. Output ports: Perform the same functions as the input ports, but in the
reverse order.
c. The routing processor: Performs the function of the network layer. The
process involves table lookup.
d. The switching fabric: It moves the packet from the input queue to the
output queue by using specialized mechanisms. The switching fabric is
realized with the help of multistage interconnection networks.
Routers use one or more routing algorithms to calculate the best path
through an internetwork.
6) Gateways:
Gateway is a device that can interface and translate the different protocols
that are used for system.
Gateway operates in all seven layers of the OSI model.
Gateway connect to independent network. A gateway is protocol
converter.
A gateway can accept a packet formatted for one protocol (e.g. TCP/IP)
and convert it to a packet formatted for another protocol (e.g. Apple Talk)
before forwarding it.
The gateway must adjust the rate, size and data format. Gateway is
generally software installed within a router.
Figure shows the gateway.
Figure 24 Gateway
7) Modem:
Modem is the bidirectional device consisting of a modulator and a
demodulator which converts a digital signal into an analog signal
(modulation) and vice versa (demodulation).
Phone lines are designed for analog, voice signals. Data communication
using phone lines requires a special communication device, which
converts the data signals to those more compatible with the phone line
capabilities. Special communication device modem is used with
telephone line for data transfer. Modem means Modulator-demodulator.
Modem uses the data signal to modulate a waveform that is usable with
the telephone system. Any system, whether simplex, half duplex or full
duplex requires a modem at the transmitting end and the receiving end.
Figure shows block diagram of modem.
28
[Author]
Modem works on the following concept. The concept is to use tones (i.e.
sine-waves) of various frequencies, phases or amplitudes to represent the
binary data. Tones are what the phone system is designed to handle, since
voice is made up of many tones combined.
Different modems use frequency modulation (FM), phase modulation (PM),
and amplitude modulation (AM) or some combination of these to achieve
the desired data rates and low-error performance over different types of
telephone lines.
Digital modulation uses three types of modulation for the conversion of a
binary signal into a suitable form transmission over the public switched
telephone network (PSTN). When binary data is to be transmitted, only two
signal levels are required. The signal switches (shifts) between these two
levels as the binary data signal alternates between a binary 1 and 0. The
three basic modulation types are known as amplitude shift keying
(ASK), frequency shift keying (FSK), and phase shift keying (PSK)
respectively.
Functions of Modem:
a. At the transmitting end, the modem must do the following
function: It takes data from the RS-232 interface and convert this data
into the appropriate tones. It perform line control and signaling to the
other end of the phone line. Sends the dialing signal if this modem is
designed to dial without the user present.
b. At the receiving end, the modem must perform corresponding
functions: Receive tones from the phone line. Demodulate these tones
into 1s and 0s (ones and zeros) put the demodulated signal into RS-232
29
[Author]
format and convert to the RS-232 interface. Perform line control and
signaling.
Operation of Modem:
1. Consider a modem which uses FSK. It uses 1000Hz to send binary 0 and
2000Hz for binary 1. Binary input consists of 1 and 0 so modem generate
tones of 1000Hz and 2000Hz according to input. These frequencies are
reasonably within the bandwidth range of telephone lines, they are
transmitted without much attenuation.
2. The rate at which modulation level is changed is called baud rate. The
tones of 1000Hz and 2000Hz are transmitted on the telephone line from
sender. At the receiving modem, the receiving circuitry, first amplify the
signal and reduce the noise. There are two filters in the receiving circuitry
tuned to 2000Hz and 1000Hz. If signal contains 2000Hz frequencies, then
output of 2000Hz filters will be maximum whereas output of 1000Hz filter
will be minimum. Using these two output, detector decide that symbol 1 is
transmitted and same way 0 is detected. The timing circuitry in the
receiving modem regenerates the sequence of binary data with correct
time durations.
Features of Modem:
1. Modem supports the following features:
2. Speed: Speed is measured in bits per second. The special at which the
modem can send data is in bps. Typically modem speeds are: 300 bps, 600
bps, 1200 bps, 2400 bps, 4800 bps, 9600 bps, 14.4 kbps, 19.2 kbps, 28.8
kbps, and 56 kbps.
3. Self-Testing: Modem can test the digital connection to the computer and
the analog connection to a remote modem. This features is added to the
new modem.
4. Auto Answer: Most modem can automatically answers the phone when an
incoming call comes in.
5. Auto Dial/Redial: Smart modem can dial the phone number and auto redial
if a busy signal is received.
6. Asynchronous and Synchronous Transmission: Modem support both type of
transmission.
8) Firewall:
A firewall is a device installed between the internal network of an
organization and the rest of the Internet.
A firewall system is an electronic security guard and electronic barrier at
the same time. It protects and controls the interface between a private
network and an insecure public network.
The purpose of the Firewall is to protect a private network from the threats
of hackers coming from the Internet (a public network).
It is designed to forward some packets and filter (not forward) others.
Figure shows firewall.
Figure 27 Firewall
30
[Author]
For example, a firewall may filter all incoming packets destined for a
specific host or a specific server such as HTTP. A firewall can be used to
deny access to a specific host or a specific service in the organization.
The firewall acts as a packet filter. It inspects each and every incoming
and outgoing packet.
It is responsible for partitioning a designated area such that any damage
on one side cannot spread to the other side. It prevents bad things from
happening, i.e. loss of information, without preventing good things from
happening that is controlled exchange of information with the outside
world.
A firewall is usually classified as a packet-filter firewall and
application-level gateways firewall.
1. Packet Filter:
A firewall can be used as a packet filter. It can forward or block packets
based on the information in the network layer and transport layer headers:
source and destination IP addresses, source and destination port
addresses, and type of protocol (TCP or UDP).
A packet-filter firewall is a router that uses a filtering table to decide which
packets must be discarded (not forwarded).
A packet filter Firewall blocks or forwards packets based on the transport
and network layer addresses and protocols. It is typically set up as a list of
rules based on matches of fields in the IP or TCP header.
2. Application-level Gateway:
Application level gateway, also called a Proxy Server acts as a relay of
application level traffic. Users contact gateways using an application and
the request is successful after authentication. The application gateway is
service specific such as FTP, TELNET, SMTP or HTTP.
An Application Gateway blocks or forwards packets based on the
information in the application layers.
When the user client process sends a message, the application-level
gateway firewall runs a server process to receive the request. The server
opens the packet at the application level and finds out if the request is
legitimate. If it is, the server acts as a client process and sends the
message to the real server in the corporation. If it is not, the message is
dropped and an error message is sent to the external user. In this way, the
requests of the external users are filtered based on the contents at the
application layer.
Network Connector
1) RJ45 Connector:
The most common UTP connector is RJ45. RJ stands for registered jack and
45 simply refers to the number of the interface standard.
RJ45 connector is shown in Figure.
31
[Author]
2) BNC Connector:
To connect coaxial cable to devices, we need coaxial connectors. The most
common type of connector used today is the Bayone-Neill-Concelman
(BNC), connector.
Figure shows three popular types of these connectors: the BNC connector,
the BNC T connector, and the BNC terminator.
The BNC connector is used to connect the end of the cable to a device,
such as a TV set. The BNC T connector is used in Ethernet networks (see
Chapter 13) to branch out to a connection to a computer or other device.
The BNC terminator is used at the end of the cable to prevent the
reflection of the signal.
32
[Author]
4)
1.
NIC can be installed in computer expansion bus via ISA or PCI slot. ISA slot
is 8 or 16 bit and PCI slot is 32 bits. Now a days NIC card are inbuilt in the
motherboard itself.
A NIC is specific to a particular type of LAN architecture. For example,
fiber-optic, Token ring and Ethernet. NIC has one or more external parts
with which network cable can be attached. Most NICs support both
10BaseT and 100BaseTX.
MAC address is hard coded on to the card by manufacturer. This MAC
address is globally unique and is of 48 bits. The MAC address provides a
way to distinguish one NIC from other NIC. These MAC address are also
called physical address.
Optical Fiber Cable Connector:
There are two types of connectors for fiber-optic cables, SC and ST.
Subscriber Channel (SC) Connector:
The subscriber channel (SC) connector is used for cable TV. It uses a
push/pull locking system.
Figure shows SC connector.
33
[Author]
34
[Author]
1) Twisted Pair:
A twisted pair consists of two conductors (normally copper), each with its
own plastic insulation, twisted together, as shown in Figure.
One of the wires is used to carry signals to the receiver, and the other is
used only as a ground reference. The receiver uses the difference between
the two.
In addition to the signal sent by the sender on one of the wires,
interference (noise) and crosstalk may affect both wires and create
unwanted signals.
Twisted pair can carry both analog and digital signals. Actually, they carry
only analog signals. However, the analog signals can very closely
correspond to the square waves representing bits, so we often think of
them as carrying digital data.
In twisted pair data rates of several Mbps. It spans distances of several
kilometers.
Data rate determined by wire thickness and length. In addition, shielding
to eliminate interference from other wires impacts signal-to-noise ratio,
and ultimately, the data rate.
There are two types of twisted pairs:
1. Shielded Twisted-Pair (STP)
2. Unshielded Twisted-Pair (UTP).
1. Unshielded Twisted-Pair (STP):
UTP is a set of twisted pairs of cable within a plastic sheet. UTP is ordinary
telephone wire. This is the least expensive of all the transmission media
commonly used for LAN, and is easy to work and simple install.
UTP is subject to external electromagnetic interface. Category 3 and
Category 5 UTP are commonly used in computer networks. UTP can
transfer data at 1 to 100 mbps over a distance of 100 meters. The
difference between cat 3 and cat 5 is the number of twists in the cable per
unit distance. Cat 5 is much more tightly twisted.
Figure shows UTP cable.
35
[Author]
1.
2.
3.
4.
5.
6.
Characteristics of UTP:
Transmission rate of 10-100 Mbps.
UTP is less expensive than fiber optic cable and coaxial cable.
Maximum cable segment of UTP is 100 meters.
UTP cable is very flexible and easy to work.
UTP uses RJ45 connector.
Most susceptible to electrical interface or cross talk.
Advantages:
1. UTP is easy to terminate.
2. Cost of installation is less.
3. High installed base.
Disadvantages:
1. It is very noisy.
2. It covers less distance.
3. UTP suffers from interference.
2. Shielded Twisted Pair (STP) Cable:
STP offers a protective sheathing around the copper wire. STP provides
better performance at lower data rates. They are not commonly used in
networks.
Figure shows STP cable.
36
[Author]
1. Twisted pair cable used for both analog and digital signals.
2. Twisted pair cable are used in telephone network.
3. In LAN, twisted pair mainly use for low cost, low performance application.
Comparison of UTP and STP.
2) Co-axial Cable:
Coaxial cable (or coax) carries signals of higher frequency ranges than
those in twisted pair cable, in part because the two media are constructed
quite differently.
Instead of having two wires, coax has a central core conductor of solid or
stranded wire (usually copper) enclosed in an insulating sheath, which is,
in turn, encased in an outer conductor of metal foil, braid, or a
combination of the two.
The outer metallic wrapping serves both as a shield against noise and as
the second conductor, which completes the circuit. This outer conductor is
also enclosed in an insulating sheath, and the whole cable is protected by
a plastic cover as shown in figure.
Co-axial cable is used to transmit both analog and digital signals. Data
transfer rate of co-axial cable is used to transmit both analog and digital
signals. Data transfer rate of co-axial cable is in between twisted pair and
fiber optic cable.
Co-axial is relatively inexpensive. The cost for thin co-axial cable is less
than STP. Thick co-axial is more expensive than STP. Installation is
relatively simple. Co-axial cable must be grounded and terminated.
A typical data rate for todays co-axial network is 10 Mbps, although
potential is higher. It suffers from attenuation.
37
[Author]
5. Less expensive than fiber optics but more expensive than twisted pair.
6. Good resistance to electrical interference.
Advantages:
1. Co-axial used for both data transmission i.e. analog and digital data
transmission.
2. It has higher bandwidth.
3. Easy to handle and relatively inexpensive as compared to fiber optic
cables.
4. It uses for longer distances at higher data rates.
5. Excellent noise immunity.
Disadvantages:
1. Distance is limited.
2. Number of node connection is limited.
3. Proper connectors and termination is must.
Applications of Co-axial Cable:
1. In analog and digital data transmission.
2. In telephone networks.
3. In Ethernet LANs.
4. In cable television network.
3) Fiber Optic Cable (FOC):
A fiber-optic cable is made of glass or plastic and transmits signals in the
form of light.
A fiber optic cable is a light pipe which is used to carry a light beam from
one place to another.
Light is an electromagnetic signal and can be modulated by information.
Since the frequency of light is extremely high it can accommodate wide
bandwidth of information, also higher data rate can be achieved with
excellent reliability.
The modulated light travel along the fiber and at the far end, are
converted to an electrical signal by means of a photo electric cell. Thus
the original input signal is recovered at the far end.
Figure shows FOC.
Fiber optic cables are similar to coax, except without the braid. Figure (a)
shows a single fiber viewed from the side. At the center is the glass core
through which the light propagates. In multimode fibers, the core is
typically 50 microns in diameter, about the thickness of a human hair. In
single-mode fibers, the core is 8 to 10 microns. The core is surrounded by
38
[Author]
a glass cladding with a lower index of refraction than the core, to keep all
the light in the core. Next comes a thin plastic jacket to protect the
cladding. Fibers are typically grouped in bundles, protected by an outer
sheath. Figure (b) shows a sheath with three fibers.
FOC transmit light signals rather than electrical signals. Each fiber has an
inner core of glass or plastic that conducts light. The inner core is
surrounded by cladding, a layer of glass that reflects the light back into
core.
A cable may contains a single fiber, but often fibers are bundled together
in the centre of the cable.
39
[Author]
Unguided Media:
Unguided media, also called as wireless communication, transport
electromagnetic waves without using a physical conductor.
Unguided transmission is used when running a physical cable (either fiber
or copper) between two end points is not possible. For example, running
wires between buildings is probably not legal if the building is separated
by a public street.
The signals propagates through air (or sometimes water). Signals are
normally broadcast through free space and thus are available to anyone
who has a device capable of receiving them.
Figure 7.17 shows the part of the electromagnetic spectrum, ranging from
3 kHz to 900 THz, used for wireless communication.
40
[Author]
1) Microwave Communication:
Electromagnetic waves having frequencies between 1 and 300 GHz are
called microwaves.
Microwaves are unidirectional. When an antenna transmits microwave
waves, they can be narrowly focused. This means that the sending and
receiving antennas need to be aligned. A pair of antennas can be aligned
without interfering with another pair of aligned antennas.
Microwave signals travels only in one direction at a time. This means that
for two-way communication such as in telephony, two frequencies need to
be allocated.
At both ends, a transceiver is used which is a combination of a transmitter
and receiver operating at the two respective frequencies. Therefore, only
one antenna can serve both the functions and cover both the frequencies.
Figure shows microwave communication.
41
[Author]
Repeaters are used along with the antennas to enhance the signal.
The data rates offered are 1 Mbps to 1 Gbps.
42
[Author]
In the High Frequency (HF) and Very High Frequency (VHF) bands, radio
wave bounce off the ionosphere i.e. they follow sky propagation.
Radio waves are used for multicast communications, such as radio and
television, and paging systems.
43
[Author]
radio, television, maritime radio, cordless phones, and paging are
examples of multicasting.
3) Satellite Communication:
Satellite communication is similar to the terrestrial microwave, except that
the satellite acts as one of the stations.
Figure shows illustrate satellite communication.
The satellite does the functions of an antenna and the repeater together.
For instance figure illustrates, ground station A can send the information to
ground station B via the satellite.
This, however, poses a problem. If the earth along with its ground stations
is revolving and the satellite is stationery, the sending and receiving earth
stations and the satellite can be out of sync over time. Therefore, normally
Geosynchronous Satellites are used, which move at the same
Revolution Per Minute (RPM) as that of the earth in the same direction,
exactly like earth. Thus, both the earth and the satellite complete one
revolution exactly in the same time: the relative position of the ground
station with respect to the satellite never changes.
Normally, Super High Frequency (SHF), which covers the frequency range
of 3 Ghz to 30 Ghz, is used for satellite communications.
Two frequency bands are used for signals from the earth to the satellite
called uplink, and from the satellite to earth called downlink.
There are three methods for communication using satellites. These three
methods use principle that are similar in concept to normal wired
communication. Like the wired world, satellite communication is also
based on modulation techniques. Three primary modulation techniques
used are: Frequency Division Multiple Access (FDMA), Time Division
Multiple Access (TDMA) and Code Division Multiple Access (CDMA).
44
[Author]
Applications:
1. Television broadcasting.
2. Regional, national and international global communications.
3. Telephone and data circuits.
4. Mobile telephone services.
5. Private networks for corporations, government agencies.
6. Military applications.
Latest Technologies in Wireless Network:
1) Bluetooth:
Bluetooth is a wireless LAN technology designed to connect devices of
different functions such as telephones, notebooks, computers (desktop
and laptop), cameras, printers, coffee makers, and so on.
A Bluetooth LAN is an ad hoc network, which means that the network is
formed spontaneously; the devices, sometimes called gadgets, find each
other and make a network called a piconet.
A Bluetooth LAN can even be connected to the Internet if one of the
gadgets has this capability.
A Bluetooth LAN, by nature, cannot be large. They can cover up to range
of 10 meters.
Bluetooth technology is the implementation of a protocol defined by the
IEEE 802.15 standard. The standard defines a wireless personal-area
network (PAN) operable in an area the size of a room or a hall.
Advantages:
1. It is cheap.
2. Easy to install.
3. It makes connecting to different devices convenient.
4. It is free to use if the device is installed with it.
Disadvantages:
1. If installed on a cellphone it is possible to receiving cell phone viruses
2. It only allows short range communication between devices
3. It can only connect two devices at once
4. It can lose connection in certain conditions
Applications:
1. Peripheral devices such as a wireless mouse or keyboard can
communicate with the computer through this technology.
2. Monitoring devices can communicate with sensor devices in a small health
care center.
3. Home security devices can use this technology to connect different
sensors to the main security controller.
4. Conference attendees can synchronize their laptop computers at a
conference with the help of Bluetooth.
Bluetooth Architecture:
The Bluetooth architecture, showing all the major layers in the Bluetooth
system, are depicted in the Figure.
45
[Author]
1. Radio Layer:
This is the lowest layer in the Bluetooth protocol stack. Bluetooth uses a
technique called frequency hopping, as explained in the context of
wireless LANs, in establishing radio links with other Bluetooth devices.
Suppose we have a data packet then the whole packet is never
transmitted at the same frequency. It is always split into different parts
and transmitted at different frequencies. This is the frequency hopping
technique. This partly gives the necessary protection to the transmitted
data and avoids tampering. Standard hop values are 79 hops, which are
spaced at an interval of 1 MHz.
2. Baseband Layer:
The baseband is the digital engine of a Bluetooth system. It is responsible
for constructing and decoding packets, encoding and managing error
correction, encrypting and decrypting for secure communications,
calculating
radio
transmission
frequency
patterns,
maintaining
synchronization, controlling the radio, and all of the other low level details
necessary to realize Bluetooth communications.
Bluetooth operates in the 2.4 GHz ISM band.
3. Logical Link Control and Adaptation Protocol (L2CAP) Layer:
The Logical Link Control and Adaptation Layer Protocol (L2CAP) is layered
over the Baseband Protocol and resides in the data link layer.
The L2CAP is the big picture brains of a Bluetooth system. It manages the
high level aspects of each connection (who is connected to who, whether
to use encryption or not, what level of performance is required, etc.). In
addition it is responsible for converting the format of data as necessary
between the APIs and the lower level Bluetooth protocols.
The L2CAP is implemented in software and can execute either on the host
system processor or on a local processor in the Bluetooth system.
L2CAP provides connection oriented and connectionless data services to
upper layer protocols with protocol multiplexing capability, segmentation
and reassembly operation, and group abstractions.
L2CAP permits higher-level protocols and applications to transmit and
receive L2CAP data packets up to 64 kilobytes in length.
Two link types are supported for the Baseband layer: Synchronous
Connection-Oriented (SCO) links and Asynchronous Connection-Less (ACL)
links. SCO links support real-time voice traffic using reserved bandwidth.
ACL links support best effort traffic. The L2CAP Specification is defined for
only ACL links and no support for SCO links is planned.
46
[Author]
4. Application Program Interface (API) libraries:
These are software modules which connect the host application program
to the Bluetooth communications system. As such they reside and execute
on the same processing resource as the host system application.
2) Wi-Fi:
Wi-Fi is a popular technology that allows an electronic device to exchange
data or connect to the internet wirelessly using radio waves.
Wi-Fi is based on IEEE 802.11 standards.
Many devices can use Wi-Fi, e.g. personal computers, video-game
consoles, smartphones, some digital cameras, tablet computers and
digital audio players.
These can connect to a network resource such as the Internet via a
wireless network access point. Such an access point (or hotspot) has a
range of about 20 meters (65 feet) indoors and a greater range outdoors.
Hotspot coverage can comprise an area as small as a single room with
walls that block radio waves, or as large as many square miles achieved
by using multiple overlapping access points.
Wi-Fi can be less secure than wired connections (such as Ethernet)
because an intruder does not need a physical connection. Web pages that
use SSL are secure but unencrypted internet access can easily be
detected by intruders. Because of this, Wi-Fi has adopted various
encryption technologies such as WEP, WPA, WPA2, etc.
Wi-Fi networks have limited range. A typical wireless access point using
802.11b or 802.11g with a stock antenna might have a range of 35 m (120
ft) indoors and 100 m (300 ft) outdoors. IEEE 802.11n, however, can more
than double the range.
Range also varies with frequency band. Wi-Fi in the 2.4 GHz frequency
block has slightly better range than Wi-Fi in the 5 GHz frequency block
which is used by 802.11a and optionally by 802.11n.
Advantages:
1. Convenience: The wireless nature of such networks allows users to
access network resources from nearly any convenient location within their
primary networking environment (a home or office). With the increasing
saturation of laptop-style computers, this is particularly relevant.
2. Mobility: With the emergence of public wireless networks, users can
access the internet even outside their normal work environment. Most
chain coffee shops, for example, offer their customers a wireless
connection to the internet at little or no cost.
3. Productivity: Users connected to a wireless network can maintain a
nearly constant affiliation with their desired network as they move from
place to place. For a business, this implies that an employee can
potentially be more productive as his or her work can be accomplished
from any convenient location.
4. Deployment: Initial setup of an infrastructure-based wireless network
requires little more than a single access point. Wired networks, on the
other hand, have the additional cost and complexity of actual physical
cables being run to numerous locations (which can even be impossible for
hard-to-reach locations within a building).
5. Expandability: Wireless networks can serve a suddenly-increased
number of clients with the existing equipment. In a wired network,
additional clients would require additional wiring.
47
[Author]
6. Cost: Wireless networking hardware is at worst a modest increase from
wired counterparts. This potentially increased cost is almost always more
than outweighed by the savings in cost and labor associated to running
physical cables.
Disadvantages:
1. Security: To combat this consideration, wireless networks may choose to
utilize some of the various encryption technologies available. Some of the
more commonly utilized encryption methods, however, are known to have
weaknesses that a dedicated adversary can compromise.
2. Range: The typical range of a common 802.11g network with standard
equipment is on the order of tens of meters. While sufficient for a typical
home, it will be insufficient in a larger structure. To obtain additional
range, repeaters or additional access points will have to be purchased.
Costs for these items can add up quickly.
3. Reliability: Like any radio frequency transmission, wireless networking
signals are subject to a wide variety of interference, as well as complex
propagation effects that are beyond the control of the network
administrator.
4. Speed: The speed on most wireless networks (typically 1-54 Mbps) is far
slower than even the slowest common wired networks (100Mbps up to
several Gbps). However, in specialized environments, the throughput of a
wired network might be necessary.
Guided Vs. Unguided Media:
No.
Guided
Unguided
1.
2.
3.
It
uses
point
communication.
4.
It
leads
topology.
5.
6.
Installation
is
costly,
consuming and complicated.
7.
to
point
time
continuous
network
Referenced books:
COMPUTER NETWORKS 5th edition by ANDREW S. TANENBAUM.
DATA COMMUNICATIONS AND NETWORKING 4th edition by Behrouz A. Forouzan.
Data Communications and Networks by Achyut Godbole.
Computer Networks Notes by Prof. Ajit Pal (Indian Institute of Technology (IIT),
Kharagpur)