CN r20 Unit 1 Ref 2
CN r20 Unit 1 Ref 2
Syllabus:
Introduction: Network Types, LAN, MAN, WAN, Network Topologies Reference models- The OSI
Reference Model- the TCP/IP Reference Model - A Comparison of the OSI and TCP/IP Reference Models,
OSI Vs TCP/IP, Lack of OSI models success, Internet History.
Physical Layer Introduction to Guided Media- Twisted-pair cable, Coaxial cable and Fiber optic cable
and unguided media: Wireless-Radio waves, microwaves, infrared.
Definition:
The term ''computer network'' to mean a collection of autonomous computers interconnected by a single
technology. Two computers are said to be interconnected if they are able to exchange information.
CLASSIFICATION OF NETWORKS:
There is no generally accepted taxonomy into which all computer networks fit, but two dimensions stand
out as important:
• transmission technology
• scale
TRANSMISSION TECHNOLOGY:
There are two types of transmission technology that are in widespread use. They are as follows:
1. Broadcast links.
2. Multicast links.
3. Point-to-point links.
1. Broadcast links:
Broadcast networks have a single communication channel that is shared by all the machines on the
network. Short messages, called packets in certain contexts, sent by any machine are received by all the others. An
address field within the packet specifies the intended recipient. Upon receiving a packet, a machine checks the
address field. If the packet is intended for the receiving machine, that machine processes the packet; if the packet
is intended for some other machine, it is just ignored.
2. Multicast links.
Some broadcast systems also support transmission to a subset of the machines, something known as
multicasting. Each machine can ''subscribe'' to any or all of the groups. When a packet is sent to a certain group, it
is delivered to all machines subscribing to that group.
3. Point-to-point links(Unicasting):
In contrast, point-to-point networks consist of many connections between individual pairs of machines. To
go from the source to the destination, a packet on this type of network may have to first visit one or more
intermediate machines. Often multiple routes, of different lengths, are possible, so finding good ones is important
in point-to-point networks. Point-to-point transmission with one sender and one receiver is sometimes called
unicasting.
BASED ON SCALE:
An alternative criterion for classifying networks is their scale. We classify multiple processor systems by
their physical size.
Networks that communicate over the range of a person, For example, a wireless network
connecting a computer with its mouse, keyboard, and printer is a personal area network. Also, a PDA that
controls the user's hearing aid or pacemaker fits in this category. Without wireless, this connection must be
done with cables. Short range wireless network called Bluetooth to connect these components without
wires.
A LAN is a privately owned network that operates within and nearby a single building like a home,
office or factory. LANs are widely used to connect personal computers and consumer electronics to let
them share resources (e.g., printers) and exchange information.
Wireless LANs are very popular these days, especially in homes, older office buildings, cafeterias,
and other places where it is too much trouble to install cables. In these systems, every computer has a radio
modem and an antenna that it uses to communicate with other computers called an AP (Access Point),
wireless router, or base station, relays packets between the wireless computers and also between them and
the Internet. There is a standard for wireless LANs called IEEE 802.11, popularly known as WiFi.
Wired LANs use a range of different transmission technologies. Most of them use copper wires, but
some use optical fiber. Wired LANs run at speeds of 100 Mbps to 1 Gbps the topology of many wired
LANs is built from point-to-point links. IEEE 802.3, popularly called Ethernet, is, by far, the most
common type of wired LAN. The most common type of wired LAN is switched Ethernet. Each computer
speaks the Ethernet protocol and connects to a box called a switch with a point-to-point link. A switch has
multiple ports, each of which can connect to one computer. The job of the switch is to relay packets
between computers that are attached to it, using the address in each packet to determine which computer to
send it to.
3. Metropolitan Area Network:
A metropolitan area network, or MAN, covers a city. The best-known example of a MAN is the
cable television network available in many cities. This system grew from earlier community antenna
systems used in areas with poor over-the-air television reception. In these early systems, a large antenna
was placed on top of a nearby hill and signal was then piped to the subscribers' houses. At first, these were
locally-designed, ad hoc systems. Then companies began jumping into the business, getting contracts from
city governments to wire up an entire city. The next step was television programming and even entire
channels designed for cable only. Often these channels were highly specialized, such as all news, all sports,
all cooking, all gardening, and so on. But from their inception until the late 1990s, they were intended for
television reception only. To a first approximation, a MAN might look something like the system shown in
Fig. In this figure both television signals and Internet are fed into the centralized head end for subsequent
distribution to people's homes. Cable television is not the only MAN. Recent developments in high-speed
wireless Internet access resulted in another MAN, which has been standardized as IEEE 802.16. A MAN is
implemented by a standard called DQDB (Distributed Queue Dual Bus) or IEEE 802.16. DQDB has two
unidirectional buses (or cables) to which all the computers are attached.
A wide area network, or WAN, spans a large geographical area, often a country or continent. It
contains a collection of machines intended for running user (i.e., application) programs. These machines
are called as hosts. The hosts are connected by a communication subnet, or just subnet for short. The hosts
are owned by the customers (e.g., people's personal computers), whereas the communication subnet is
typically owned and operated by a telephone company or Internet service provider. The job of the subnet is
to carry messages from host to host, just as the telephone system carries words from speaker to listener.
Separation of the pure communication aspects of the network (the subnet) from the application aspects (the
hosts), greatly simplifies the complete network design. In most wide area networks, the subnet consists of
two distinct components: transmission lines and switching elements. Transmission lines move bits between
machines. They can be made of copper wire, optical fiber, or even radio links. In most WANs, the network
contains numerous transmission lines, each one connecting a pair of routers. If two routers that do not
share a transmission line wish to communicate, they must do this indirectly, via other routers. When a
packet is sent from one router to another via one or more intermediate routers, the packet is received at
each intermediate router in its entirety, stored there until the required output line is free, and then
forwarded. A subnet organized according to this principle is called a store-and-forward or packet-switched
subnet. Nearly all wide area networks (except those using satellites) have store-and-forward subnets.
NETWORK TOPOLOGIES:
The topology of a network is the geometric representation of the relationship of all the links and
linking devices (usually called nodes) to one another.
There are four basic topologies possible: mesh, star, bus, and ring.
1. Mesh topologies:
In a mesh topology, every device has a dedicated point-to-point link to every other device. The term
dedicated means that the link carries traffic only between the two devices it connects. To find the number
of physical links in a fully connected mesh network with n nodes by using the formula
n(n -1) /2.
Advantages:
1. the use of dedicated links guarantees that each connection can carry its own data load, thus eliminating the
traffic problems
2. a mesh topology is robust. I one link becomes unusable, it does not incapacitate the entire system
3. there is the advantage of privacy or security
Disadvantages
1. Mesh is related to the amount of cabling and the number of I/O ports required. First, because every device
must be connected to every other device, installation and reconnection are difficult
2. the hardware required to connect each link (I/O ports and cable) can be prohibitively expensive
2. Star Topology:
In a star topology, each device has a dedicated point-to-point link only to a central controller,
usually called a hub. The devices are not directly linked to one another. Unlike a mesh topology, a star
topology does not allow direct traffic between devices. The controller acts as an exchange: I one device
wants to send data to another, it sends the data to the controller, which then relays the data to the other
connected device
Advantages:
1. A star topology is less expensive than a mesh topology. In a star, each device needs only one link and one I/O
port to connect it to any number of others
2. This factor also makes it easy to install and reconfigure. Far less cabling needs to be housed
3. Robustness. I one link fails; only that link is affected. All other links remain active
Disadvantage:
1) Star topology is the dependency of the whole topology on one single point, the hub. Ifthe hub goes down, the
whole system is dead.
3. Bus Topology
A bus topology, on the other hand, is multipoint. One long cable acts as a backbone to link all the devices
in a network Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection running
between the device and the main cable. A tap is a connector that either splices into the main cable or punctures the
sheathing of a cable to create a contact with the metallic core.
Bus topology was the one of the first topologies used in the design of early local area networks.
Advantages:
1. Bus topology includes ease of installation. Backbone cable can be laid along the most efficient path
Disadvantages:
1. Difficult reconnection and fault isolation. A bus is usually designed to be optimally efficient at installation.
It can therefore be difficult to add new devices.
2. A fault or break in the bus cable stops all transmission, even between devices on the same side of the
problem.
4. Ring Topology
In a ring topology, each device has a dedicated point-to-point connection with only the two devices on
either side of it. A signal is passed along the ring in one direction, from device to device, until it reaches its
destination. Each device in the ring incorporates a repeater. When a device receives a signal intended for another
device, its repeater regenerates the bits and passes them along
Advantages:
1. A ring is relatively easy to install and reconfigure
2. Each device is linked to only its immediate neighbors (either physically or logically). To add or delete a
device requires changing only two connections
3. Fault isolation is simplified. Generally in a ring, a signal is circulating at all times. If one device does not
receive a signal within a specified period, it can issue an alarm
Disadvantages:
1. a break in the ring (such as a disabled station) can disable the entire network
5. Hybrid Topology
A network can be hybrid. For example, we can have a main star topology with each branch connecting
several stations in a bus topology
PROTOCOL HIERARCHIES:
To reduce their design complexity, most networks are organized as a stack of layers or levels, each one
built upon the one below it. The number of layers, the name of each layer, the contents of each layer, and the
function of each layer differ from network to network. The purpose of each layer is to offer certain services to the
higher layers while shielding those layers from the details of how the offered services are actually implemented
This concept is actually a familiar one and is used throughout computer science, where it is variously
known as information hiding, abstract data types, data encapsulation, and object-oriented programming.
The fundamental idea is that a particular piece of software (or hardware) provides a service to its users but
keeps the details of its internal state and algorithms hidden from them (which is called Encapsulation)
The entities comprising the corresponding layers on different machines are called peers. The peers may be
software processes, hardware devices, or even human beings. In other words, it is the peers that communicate by
using the protocol to talk to each other.
In reality, no data are directly transferred from layer n on one machine to layer n on another machine.
Instead, each layer passes data and control information to the layer immediately below it, until the lowest layer is
reached. Below layer 1 is the physical medium through which actual communication occurs. In above Fig., virtual
communication is shown by dotted lines and physical communication by solid lines.
Between each pair of adjacent layers is an interface. The interface defines which primitive operations and
services the lower layer makes available to the upper one. When network designers decide how many layers to
include in a network and what each one should do, one of the most important considerations is defining clean
interfaces between the layers
The principles that were applied to arrive at the seven layers can be briefly summarized as follows:
1. A layer should be created where a different abstraction is needed.
2. Each layer should perform a well-defined function.
3. The function of each layer should be chosen with an eye toward defining internationally standardized protocols.
4. The layer boundaries should be chosen to minimize the information flow across the interfaces.
5. The number of layers should be large enough that distinct functions need not be thrown together in the same
layer out of necessity and small enough that the architecture does not become unwieldy.
Physical Layer:
The physical layer is concerned with transmitting raw bits over a communication channel. The design
issues have to do with making sure that when one side sends a 1 bit, it is received by the other side as a 1 bit, not
as a 0 bit.
Data Link Layer:
The main task of the data link layer is to transform a raw transmission facility into a line that appears free
of undetected transmission errors to the network layer. It accomplishes this task by having the sender break up the
input data into data frames (typically a few hundred or a few thousand bytes) and transmits the frames
sequentially. If the service is reliable, the receiver confirms correct receipt of each frame by sending back an
acknowledgement frame.
Another issue that arises in the data link layer (and most of the higher layers as well) is how to keep a fast
transmitter from drowning a slow receiver in data. Some traffic regulation mechanism is often needed to let the
transmitter know how much buffer space the receiver has at the moment. Frequently, this flow regulation and the
error handling are integrated.
Network Layer:
The network layer controls the operation of the subnet. A key design issue is determining how packets are
routed from source to destination. Routes can be based on static tables that are ''wired into'' the network and rarely
changed. They can also be determined at the start of each conversation, for example, a terminal session (e.g., a
login to a remote machine). Finally, they can be highly dynamic, being determined anew for each packet, to reflect
the current network load.
If too many packets are present in the subnet at the same time, they will get in one another's way, forming
bottlenecks. The control of such congestion also belongs to the network layer. More generally, the quality of
service provided (delay, transit time, jitter, etc.) is also a network layer issue.
When a packet has to travel from one network to another to get to its destination, many problems can arise.
The addressing used by the second network may be different from the first one. The second one may not accept the
packet at all because it is too large. The protocols may differ, and so on. It is up to the network layer to overcome
all these problems to allow heterogeneous networks to be interconnected. In broadcast networks, the routing
problem is simple, so the network layer is often thin or even nonexistent.
Transport Layer:
The basic function of the transport layer is to accept data from above, split it up into smaller units if need
be, pass these to the network layer, and ensure that the pieces all arrive correctly at the other end. Furthermore, all
this must be done efficiently and in a way that isolates the upper layers from the inevitable changes in the
hardware technology. The transport layer also determines what type of service to provide to the session layer, and,
ultimately, to the users of the network. The most popular type of transport connection is an error-free point-to-
point channel that delivers messages or bytes in the order in which they were sent. However, other possible kinds
of transport service are the transporting of isolated messages, with no guarantee about the order of delivery, and
the broadcasting of messages to multiple destinations. The type of service is determined when the connection is
established.
The transport layer is a true end-to-end layer, all the way from the source to the destination. In other words,
a program on the source machine carries on a conversation with a similar program on the destination machine,
using the message headers and control messages. In the lower layers, the protocols are between each machine and
its immediate neighbors, and not between the ultimate source and destination machines, which may be separated
by many routers.
Session Layer:
The session layer allows users on different machines to establish sessions between them. Sessions offer
various services, including dialog control (keeping track of whose turn it is to transmit), token management
(preventing two parties from attempting the same critical operation at the same time), and synchronization (check
pointing long transmissions to allow them to continue from where they were after a crash).
Presentation Layer:
The presentation layer is concerned with the syntax and semantics of the information transmitted. In order
to make it possible for computers with different data representations to communicate, the data structures to be
exchanged can be defined in an abstract way, along with a standard encoding to be used ''on the wire.'' The
presentation layer manages these abstract data structures and allows higher-level data structures (e.g., banking
records), to be defined and exchanged.
Application Layer:
The application layer contains a variety of protocols that are commonly needed by users. One widely-used
application protocol is HTTP (Hypertext Transfer Protocol), which is the basis for the World Wide Web. When a
browser wants a Web page, it sends the name of the page it wants to the server using HTTP. The server then sends
the page back. Other application protocols are used for file transfer, electronic mail, and network news.
Host-to-Network Layer:
The TCP/IP reference model does not really say much about what happens here, except to point out that the
host has to connect to the network using some protocol so it can send IP packets to it. This protocol is not defined
and varies from host to host and network to network.
Internet Layer:
This layer, called the internet layer, is the linchpin that holds the whole architecture together. Its job is to
permit hosts to inject packets into any network and have they travel independently to the destination (potentially
on a different network). They may even arrive in a different order than they were sent, in which case it is the job of
higher layers to rearrange them, if in-order delivery is desired. Note that ''internet'' is used here in a generic sense,
even though this layer is present in the Internet.
The internet layer defines an official packet format and protocol called IP (Internet Protocol). The job of
the internet layer is to deliver IP packets where they are supposed to go. Packet routing is clearly the major issue
here, as is avoiding congestion. For these reasons, it is reasonable to say that the TCP/IP internet layer is similar in
functionality to the OSI network layer. Fig. shows this correspondence.
Transport Layer:
The layer above the internet layer in the TCP/IP model is now usually called the transport layer. It is
designed to allow peer entities on the source and destination hosts to carry on a conversation, just as in the OSI
transport layer. Two end-to-end transport protocols have been defined here.
The first one, TCP (Transmission Control Protocol), is a reliable connection oriented protocol that allows a
byte stream originating on one machine to be delivered without error on any other machine in the internet. It
fragments the incoming byte stream into discrete messages and passes each one on to the internet layer. At the
destination, the receiving TCP process reassembles the received messages into the output stream. TCP also
handles flow control to make sure a fast sender cannot swamp a slow receiver with more messages than it can
handle
The second protocol in this layer, UDP (User Datagram Protocol), is an unreliable, connectionless protocol
for applications that do not want TCP's sequencing or flow control and wish to provide their own. It is also widely
used for one-shot, client-server-type request-reply queries and applications in which prompt delivery is more
important than accurate delivery, such as transmitting speech or video. The relation of IP, TCP, and UDP is shown
in Fig. above since the model was developed; IP has been implemented on many other networks.
Application Layer:
The TCP/IP model does not have session or presentation layers. On top of the transport layer is the
application layer. It contains all the higher-level protocols. The early ones included virtual terminal (TELNET),
file transfer (FTP), and electronic mail (SMTP), as shown in Fig.6.2. The virtual terminal protocol allows a user
on one machine to log onto a distant machine and work there. The file transfer protocol provides a way to move
data efficiently from one machine to another. Electronic mail was originally just a kind of file transfer, but later a
specialized protocol (SMTP) was developed for it. Many other protocols have been added to these over the years:
the Domain Name System (DNS) for mapping host names onto their network addresses, NNTP, the protocol for
moving USENET news articles around, and HTTP, the protocol for fetching pages on the World Wide Web, and
many others.
EXAMPLE NETWORKS:
•Novell NetWare
•ARPANET
•INTERNET
Novell NetWare:
The most popular network system in the PC world is Novell NetWare. This is based on client-server
model – PCs operate as servers, providing file services, database service, and other services to clients. The
physical and data link layers can be chosen from among various industry standards, including Ethernet, IBM token
ring, and ARC net.
The network layer runs an unreliable connectionless internetwork protocol called IPX(internet packet
exchange)
The format of an IPX packet is:
THE ARPANET
The story begins in the late 1950s. At the height of the Cold War, the U.S. DoD wanted a command-and-
control network that could survive a nuclear war. At that time, all military communications used the public
telephone network, which was considered vulnerable. The reason for this belief can be gleaned from Fig.(a). Here
the black dots represent telephone switching offices, each of which was connected to thousands of telephones.
These switching offices were, in turn, connected to higher-level switching offices (toll offices), to form a national
hierarchy with only a small amount of redundancy. The vulnerability of the system was that the destruction of a
few key toll offices could fragment it into many isolated islands.
Around 1960, the DoD awarded a contract to the RAND Corporation to find a solution. One of its
employees, Paul Baran, came up with the highly distributed and fault-tolerant design of Fig. (b). Since the paths
between any two switching offices were now much longer than analog signals could travel without distortion,
Baran proposed using digital packet-switching technology
Figure: (a) Structure of the telephone system. (b) Baran’s proposed distributed switching system.
Several years went by and still the DoD did not have a better command-andcontrol system. To understand
what happened next, we have to go back all the way to October 1957, when the Soviet Union beat the U.S. into
space with the launch of the first artificial satellite, Sputnik. When President Eisenhower tried to find out who was
asleep at the switch, he was appalled to find the Army, Navy, and Air Force squabbling over the Pentagon’s
research budget. His immediate response was to create a single defense research organization, ARPA, the
Advanced Research Projects Agency.
• Advanced research projects agency(ARPA) had a mission of advancing technology that might be useful to
the military.
• ARPA decided that the network should be packet- switched network, consisting of subnet and host
computers. later became known as the ARPANET
• The subnet would consist of minicomputers called IMPs (Interface Message Processors) connected by 56-
kbps transmission lines. For high reliability, each IMP would be connected to at least two other IMPs. The
subnet was to be a datagram subnet, so if some lines and IMPs were destroyed, messages could be
automatically rerouted along alternative paths. Each node of the network was to consist of an IMP and a
host, in the same room, connected by a short wire
• The software was split into two parts: subnet and host. The subnet software consisted of the IMP end of the
host-IMP connection, the IMP-IMP protocol, and a source IMP to destination IMP protocol designed to
improve reliability. The original ARPANET design is shown in Fig.
THE INTERNET
The Internet is not really a network at all, but a vast collection of different networks that use certain
common protocols and provide certain common services. It is an unusual system in that it was not planned by
anyone and is not controlled by anyone.
The architecture of the Internet has also changed a great deal as it has grown explosively. The big picture
is shown in Fig. Let us examine this figure piece by piece, starting with a computer at home (at the edges of
the figure). To join the Internet, the computer is connected to an Internet Service Provider, or simply ISP, from
who the user purchases Internet access or connectivity. This lets the computer exchange packets with all of the
other accessible hosts on the Internet. The user might send packets to surf the Web or for any of a thousand
other uses, it does not matter. There are many kinds of Internet access, and they are usually distinguished by
how much bandwidth they provide and how much they cost, but the most important attribute is connectivity.
A common way to connect to an ISP is to use the phone line to your house, in which case your phone
company is your ISP. DSL, short for Digital Subscriber Line, reuses the telephone line that connects to your
house for digital data transmission. The computer is connected to a device called a DSL modem that converts
between digital packets and analog signals that can pass unhindered over the telephone line. At the other end, a
device called a DSLAM (Digital Subscriber Line Access Multiplexer) converts between signals and packets.
Several other popular ways to connect to an ISP are shown in Fig. DSL is a higher-bandwidth way to use the
local telephone line than to send bits over a traditional telephone call instead of a voice conversation. That is
called dial-up and done with a different kind of modem at both ends. The word modem is short for ‘‘modulator
demodulator’’ and refers to any device that converts between digital bits and analog signals. Another method
is to send signals over the cable TV system. Like DSL, this is a way to reuse existing infrastructure, in this
case otherwise unused cable TV channels. The device at the home end is called a cable modem and the device
at the cable headend is called the CMTS (Cable Modem Termination System).
DSL and cable provide Internet access at rates from a small fraction of a megabit/sec to multiple
megabit/sec, depending on the system. These rates are much greater than dial-up rates, which are limited to 56
kbps because of the narrow bandwidth used for voice calls. Internet access at much greater than dial-up speeds
is called broadband. The name refers to the broader bandwidth that is used for faster networks, rather than any
particular speed. The access methods mentioned so far are limited by the bandwidth of the ‘‘last mile’’ or last
leg of transmission. By running optical fiber to residences, faster Internet access can be provided at rates on the
order of 10 to 100 Mbps. This design is called FTTH (Fiber to the Home). For businesses in commercial areas,
it may make sense to lease a high-speed transmission line from the offices to the nearest ISP.
GUIDED MEDIA:
Guided media, which are those that provide a conduit from one device to another, include twisted-pair
cable, coaxial cable, and fiber-optic cable. A signal traveling along any of these media is directed and contained by
the physical limits of the medium.
1. TWISTED-PAIR CABLE:
A twisted pair consists of two conductors (normally copper), each with its own plastic insulation, twisted
together, as shown in Figure
One of the wires is used to carry signals to the receiver, and the other is used only as a ground reference.
The receiver uses the difference between the two.
In addition to the signal sent by the sender on one of the wires, interference (noise) and crosstalk may
affect both wires and create unwanted signals.
If the two wires are parallel, the effect of these unwanted signals is not the same in both wires because they
are at different locations relative to the noise or crosstalk sources (eg., one is closer and the other is farther). This
results in a difference at the receiver. By twisting the pairs, a balance is maintained. For example, suppose in one
twist, one wire is closer to the noise source and the other is farther; in the next twist, the reverse is true. Twisting
makes it probable that both wires are equally affected by external influences (noise or crosstalk). This means that
the receiver, which calculates the difference between the two, receives no unwanted signals. The unwanted signals
are mostly canceled out. From the above discussion, it is clear that the number of twists per unit of length (e.g.,
inch) has some effect on the quality of the cable.
Categories:
The Electronic Industries Association (EIA) has developed standards to classify unshielded twisted-pair cable
into seven categories. Categories are determined by cable quality, with 1 as the lowest and 7 as the highest. Each
EIA category is suitable for specific uses.
Applications:
Twisted-pair cables are used in telephone lines to provide voice and data channels. The local loop-the line
that connects subscribers to the central telephone office---commonly consists of unshielded twisted-pair cables.
Local-area networks, such as lOBase-T and lOOBase-T, also use twisted-pair cables.
2. COAXIAL CABLE:
In Coaxial Cable Instead of having two wires, coax has a central core conductor of solid or stranded wire
(usually copper) enclosed in an insulating sheath, which is, in turn, encased in an outer conductor of metal foil,
braid, or a combination of the two. The outer metallic wrapping serves both as a shield against noise and as the
second conductor which completes the circuit. This outer conductor is also enclosed in an insulating sheath, and
the whole cable is protected by a plastic cover.
Applications
Coaxial cable was widely used in analog telephone networks where a single coaxial network could carry
10,000 voice signals. Later it was used in digital telephone networks where a single coaxial cable could carry
digital data up to 600 Mbps. Another common application of coaxial cable is in traditional Ethernet LANs.
3. FIBER-OPTIC CABLE
A fiber-optic cable is made of glass or plastic and transmits signals in the form of light.
Light travels in a straight line as long as it is moving through a single uniform substance. If a ray of light
traveling through one substance suddenly enters another substance (of a different density), the ray changes
direction
As the figure shows, if the angle of incidence is less than the critical angle, the ray refracts and moves
closer to the surface. If the angle of incidence is equal to the critical angle, the light bends along the interface. If
the angle is greater than the critical angle, the ray reflects (makes a turn) and travels again in the denser substance.
Note that the critical angle is a property of the substance, and its value differs from one substance to another.
Optical fibers use reflection to guide light through a channel. A glass or plastic core is surrounded by a
cladding of less dense glass or plastic. The difference in density of the two materials must be such that a beam of
light moving through the core is reflected off the cladding instead of being refracted into it.
Propagation Modes
Current technology supports two modes (multimode and single mode) for propagating light along optical
channels, each requiring fiber with different physical characteristics. Multimode can be implemented in two forms:
step-index or graded-index.
i. Multimode
Multimode is so named because multiple beams from a light source move through the core in different
paths. How these beams move within the cable depends on the structure of the core,
a. In multimode step-index fiber, the density of the core remains constant from the center to the edges.
A beam of light moves through this constant density in a straight line until it reaches the interface of
the core and the cladding. At the interface, there is an abrupt change due to a lower density; this alters
the angle of the beam's motion. The term step index refers to the suddenness of this change, which
contributes to the distortion of the signal as it passes through the fiber.
b. A second type of fiber, called multimode graded-index fiber, decreases this distortion of the signal
through the cable. The word index here refers to the index of refraction. As we saw above, the index of
refraction is related to density. A graded-index fiber, therefore, is one with varying densities. Density is
highest at the center of the core and decreases gradually to its lowest at the edge
ii. Single-Mode
Single-mode uses step-index fiber and a highly focused source of light that limits beams to a small range of
angles, all close to the horizontal. The single mode fiber itself is manufactured with a much smaller diameter
than that of multimode fiber, and with substantiall Y lowers density (index of refraction). The decrease in
density results in a critical angle that is close enough to 90° to make the propagation of beams almost
horizontal. In this case, propagation of different beams is almost identical, and delays are negligible. All the
beams arrive at the destination "together" and can be recombined with little distortion to the signal
Fiber-Optic Cable Connectors
There are three types of connectors for fiber-optic cables,
The subscriber channel (SC) connector is used for cable TV. It uses a push/pull locking system. The
straight-tip (ST) connector is used for connecting cable to networking devices. It uses a bayonet locking system
and is more reliable than SC. MT-RJ is a connector that is the same size as RJ45.
Applications
Fiber-optic cable is often found in backbone networks because its wide bandwidth is cost-effective. Today,
with wavelength-division multiplexing (WDM), we can transfer data at a rate of 1600 Gbps.
Advantages Fiber-optic cable has several advantages over metallic cable (twisted pair or coaxial).
• Higher bandwidth. Fiber-optic cable can support dramatically higher bandwidths (and hence data rates)
than either twisted-pair or coaxial cable.
• Less signal attenuation. Fiber-optic transmission distance is significantly greater than that of other guided
media. A signal can run for 50 km without requiring regeneration. We need repeaters every 5 km for
coaxial or twisted-pair cable.
• Immunity to electromagnetic interference. Electromagnetic noise cannot affect fiber-optic cables.
• Resistance to corrosive materials. Glass is more resistant to corrosive materials than copper.
• Light weight. Fiber-optic cables are much lighter than copper cables.
Below Table lists these bands, their ranges, propagation methods, and some applications.
We can divide wireless transmission into three broad groups: radio waves, microwaves, and infrared
waves.
1. RADIO WAVES:
Although there is no clear-cut demarcation between radio waves and microwaves, electromagnetic waves
ranging in frequencies between 3 kHz and 1 GHz are normally called radio waves; waves ranging in frequencies
between 1 and 300 GHz are called microwaves.
Radio waves, for the most part, are omnidirectional. When an antenna transmits radio waves, they are
propagated in all directions. This means that the sending and receiving antennas do not have to be aligned. A
sending antenna sends waves that can be received by any receiving antenna. The omnidirectional property has a
disadvantage, too. The radio waves transmitted by one antenna are susceptible to interference by another antenna
that may send signals using the same frequency or band.
Radio waves, particularly those waves that propagate in the sky mode, can travel long distances. This
makes radio waves a good candidate for long-distance broadcasting such as AM radio.
Radio waves, particularly those oflow and medium frequencies, can penetrate walls.
OmnidirectionalAntenna
Radio waves use omnidirectional antennas that send out signals in all directions. Based on the wavelength,
strength, and the purpose of transmission, we can have several types’ of antennas. Figure 7.20 shows an
omnidirectional antenna.
Applications: Radio waves are used for multicast communications, such as radio and television, and
paging systems
2. MICROWAVES
Electromagnetic waves having frequencies between I and 300 GHz are called microwaves.
Microwaves are unidirectional. When an antenna transmits microwave waves, they can be narrowly
focused. This means that the sending and receiving antennas need to be aligned. The unidirectional property has an
obvious advantage. A pair of antennas can be aligned without interfering with other pair of aligned antennas.
Unidirectional Antenna
Microwaves need unidirectional antennas that send out signals in one direction. Two types of antennas are
used for microwave communications: the parabolic dish and the horn
A parabolic dish antenna is based on the geometry of a parabola: Every line parallel to the line of
symmetry (line of sight) reflects off the curve at angles such that all the lines intersect in a common point called
the focus.
A horn antenna looks like a gigantic scoop. Outgoing transmissions are broadcast up a stem (resembling a
handle) and deflected outward in a series of narrow parallel beams by the curved head. Received transmissions are
collected by the scooped shape of the horn, in a manner similar to the parabolic dish, and are deflected down into
the stem.
Applications: Microwaves are used for unicast communication such as cellular telephones, satellite
networks, and wireless LANs.
3. INFRARED
Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from 1 mm to 770 nm), can be
used for short-range communication. Infrared waves, having high frequencies, cannot penetrate walls. This
advantageous characteristic prevents interference between one system and another; a short-range communication
system in one room cannot be affected by another system in the next room. When we use our infrared remote
control, we do not interfere with the use of the remote by our neighbors. However, this same characteristic makes
infrared signals useless for long-range communication. In addition, we cannot use infrared waves outside a
building because the sun's rays contain infrared waves that can interfere with the communication.
Applications: Infrared signals can be used for short-range communication in a closed area using line-of-sight
propagation.