CN (Unit 1)
CN (Unit 1)
CN (Unit 1)
NETWORKS
A network is a set of devices (often referred to as nodes) connected by communication links.
A node can be a computer, printer, or any other device capable of sending and/or receiving
data generated by other nodes on the network.
“Computer network’’ to mean a collection of autonomous computers interconnected by a
single technology. Two computers are said to be interconnected if they are able to exchange
information.
The connection need not be via a copper wire; fibre optics, microwaves, infrared, and
communication satellites can also be used. Networks come in many sizes, shapes and forms,
as we will see later. They are usually connected together to make larger networks, with the
Internet being the most well-known example of a network of networks.
There is considerable confusion in the literature between a computer network and a
distributed system. The key distinction is that in a distributed system, a collection of
independent computers appears to its users as a single coherent system. Usually, it has a
single model or paradigm that it presents to the users. Often a layer of software on top of
the operating system, called middleware, is responsible for implementing this model. A well-
known example of a distributed system is the World Wide Web. It runs on top of the
Internet and presents a model in which everything looks like a document (Web page).
USES OF COMPUTER NETWORKS
Business Applications
peer-to-peer communication
person-to-person communication
electronic commerce
entertainment.(game playing,)
Mobile Users
Physical Structures
Before discussing networks, we need to define some network attributes.
Type of Connection
A network is two or more devices connected through links. A link is a communications
pathway that transfers data from one device to another. There are two possible types of
connections: point-to-point and multipoint.
Point-to-Point
A point-to-point connection provides a dedicated link between two devices. The
entire capacity of the link is reserved for transmission between those two devices. Most
point-to-point connections use an actual length of wire or cable to connect the two ends,
but other options, such as microwave or satellite links, are also possible When you change
television channels by infrared remote control, you are establishing a point-to-point
connection between the remote control and the television's control system.
Multipoint
A multipoint (also called multi-drop) connection is one in which more than two specific
devices share a single link in a multipoint environment, the capacity of the channel is
shared, either spatially or temporally. If several devices can use the link simultaneously, it is
a spatially shared connection. If users must take turns, it is a timeshared connection.
Physical Topology
The term physical topology refers to the way in which a network is laid out physically.
Two or more devices connect to a link; two or more links form a topology. The topology of a
network is the geometric representation of the relationship of all the links and linking
devices (usually called nodes) to one another. There are four basic topologies possible:
mesh, star, bus, and ring.
MESH
A mesh topology is the one where every node is connected to every other node in the
network.
A mesh topology can be a full mesh topology or a partially connected mesh topology.
In a full mesh topology, every computer in the network has a connection to each of the
other computers in that network. The number of connections in this network can be
calculated using the following formula (n is the number of computers in the network): n(n-
1)/2.
In a partially connected mesh topology, at least two of the computers in the network have
connections to multiple other computers in that network. It is an inexpensive way to
implement redundancy in a network. In the event that one of the primary computers or
connections in the network fails, the rest of the network continues to operate normally.
Advantages of a mesh topology
Can handle high amounts of traffic, because multiple devices can transmit data
simultaneously.
A failure of one device does not cause a break in the network or transmission of data.
Adding additional devices does not disrupt data transmission between other devices.
Disadvantages of a mesh topology
The cost to implement is higher than other network topologies, making it a less desirable
option.
The chance of redundant connections is high, which adds to the high costs and potential
for reduced efficiency.
STAR
A star network, star topology is one of the most common network setups. In this
configuration, every node connects to a central network device, like a hub, switch, or
computer. The central network device acts as a server and the peripheral devices act as
clients. Depending on the type of network card used in each computer of the star topology,
a coaxial cable or a RJ-45 network cable is used to connect computers together.
Advantages of star topology.
Centralized management of the network, through the use of the central computer, hub,
or switch.
If one computer on the network fails, the rest of the network continues to function
normally.
The star topology is used in local-area networks (LANs), High-speed LANs often use a star
topology with a central hub.
Disadvantages of star topology
Can have a higher cost to implement, especially when using a switch or router as the
central network device.
The central network device determines the performance and number of nodes the
network can handle.
If the central computer, hub, or switch fails, the entire network goes down and all
computers are disconnected from the network
BUS
A line topology, a bus topology is a network setup in which each computer and network
device are connected to a single cable or backbone.
Advantages of bus topology
It's the easiest network topology for connecting computers or peripherals in a linear
fashion.
It can be difficult to identify the problems if the whole network goes down.
All data flows in one direction, reducing the chance of packet collisions.
The hardware needed to connect each workstation to the network is more expensive than
Ethernet cards and hubs/switches.
Hybrid Topology
A network can be hybrid. For example, we can have a main star topology with each branch
connecting several stations in a bus topology as shown in Figure
Wired Personal Area Network: Wired Personal Area Network is created by using
the USB.
o Security issue: A WAN network has more security issues as compared to LAN and
MAN network as all the technologies are combined together that creates the security
problem.
o Needs Firewall & antivirus software: The data is transferred on the internet which
can be changed or hacked by the hackers, so the firewall needs to be used. Some
people can inject the virus in our system so antivirus is needed to protect from such a
virus.
o High Setup cost: An installation cost of the WAN network is high as it involves the
purchasing of routers, switches.
o Troubleshooting problems: It covers a large area so fixing the problem is difficult.
Internetwork
o An internetwork is defined as two or more computer network LANs or WAN or
computer network segments are connected using devices, and they are configured
by a local addressing scheme. This process is known as internetworking.
o An interconnection between public, private, commercial, industrial, or government
computer networks can also be defined as internetworking.
o An internetworking uses the internet protocol.
o The reference model used for internetworking is Open System
Interconnection(OSI).
Types Of Internetwork:
1. Extranet: An extranet is a communication network based on the internet protocol
such as Transmission Control protocol and internet protocol. It is used for
information sharing. The access to the extranet is restricted to only those users who
have login credentials. An extranet is the lowest level of internetworking. It can be
categorized as MAN, WAN or other computer networks. An extranet cannot have a
single LAN, atleast it must have one connection to the external network.
Intranet advantages:
o Communication: It provides a cheap and easy communication. An employee of the
organization can communicate with another employee through email, chat.
o Time-saving: Information on the intranet is shared in real time, so it is time-saving.
o Collaboration: Collaboration is one of the most important advantage of the intranet.
The information is distributed among the employees of the organization and can only
be accessed by the authorized user.
o Platform independency: It is a neutral architecture as the computer can be
connected to another device with different architecture.
o Cost effective: People can see the data and documents by using the browser and
distributes the duplicate copies over the intranet. This leads to a reduction in the cost.
OSI Model
o OSI stands for Open System Interconnection is a reference model that
describes how information from a software application in
one computer moves through a physical medium to the software application
in another computer.
o OSI consists of seven layers, and each layer performs a particular network
function.
o OSI model was developed by the International Organization for
Standardization (ISO) in 1984, and it is now considered as an architectural
model for the inter-computer communications.
o OSI model divides the whole task into seven smaller and manageable tasks.
Each layer is assigned a particular task.
o Each layer is self-contained, so that task assigned to each layer can be
performed independently.
o The OSI model is divided into two layers: upper layers and lower layers.
o The upper layer of the OSI model mainly deals with the application related
issues, and they are implemented only in the software. The application layer is
closest to the end user. Both the end user and the application layer interact
with the software applications. An upper layer refers to the layer just above
another layer.
o The lower layer of the OSI model deals with the data transport issues. The
data link layer and the physical layer are implemented in hardware and
software. The physical layer is the lowest layer of the OSI model and is closest
to the physical medium. The physical layer is mainly responsible for placing
the information on the physical medium.
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
1) Physical layer
o The main functionality of the physical layer is to transmit the individual bits
from one node to another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
o It specifies the mechanical, electrical and procedural network interface
specifications.
o Line Configuration: It defines the way how two or more devices can be
connected physically.
o Data Transmission: It defines the transmission mode whether it is simplex,
half-duplex or full-duplex mode between the two devices on the network.
o Topology: It defines the way how network devices are arranged.
o Signals: It determines the type of the signal used for transmitting the
information.
2) Data-Link Layer
o Framing: The data link layer translates the physical's raw bit stream into
packets known as Frames. The Data link layer adds the header and trailer to
the frame. The header which is added to the frame contains the hardware
destination and source address.
o Physical Addressing: The Data link layer adds a header to the frame that
contains a destination address. The frame is transmitted to the destination
address mentioned in the header.
o Flow Control: Flow control is the main functionality of the Data-link layer. It is
the technique through which the constant data rate is maintained on both the
sides so that no data get corrupted. It ensures that the transmitting station
such as a server with higher processing speed does not exceed the receiving
station, with lower processing speed.
o Error Control: Error control is achieved by adding a calculated value CRC
(Cyclic Redundancy Check) that is placed to the Data link layer's trailer which
is added to the message frame before it is sent to the physical layer. If any
error seems to occur, then the receiver sends the acknowledgment for the
retransmission of the corrupted frames.
o Access Control: When two or more devices are connected to the same
communication channel, then the data link layer protocols are used to
determine which device has control over the link at a given time.
3) Network Layer
o It is a layer 3 that manages device addressing, tracks the location of devices
on the network.
o It determines the best path to move data from source to the destination
based on the network conditions, the priority of service, and other factors.
o The Data link layer is responsible for routing and forwarding the packets.
o Routers are the layer 3 devices, they are specified in this layer and used to
provide the routing services within an internetwork.
o The protocols used to route the network traffic are known as Network layer
protocols. Examples of protocols are IP and Ipv6.
4) Transport Layer
o The Transport layer is a Layer 4 ensures that messages are transmitted in the
order in which they are sent and there is no duplication of data.
o The main responsibility of the transport layer is to transfer the data
completely.
o It receives the data from the upper layer and converts them into smaller units
known as segments.
o This layer can be termed as an end-to-end layer as it provides a point-to-
point connection between source and destination to deliver the data reliably.
5) Session Layer
o It is a layer 3 in the OSI model.
o The Session layer is used to establish, maintain and synchronizes the
interaction between communicating devices.
o Dialog control: Session layer acts as a dialog controller that creates a dialog
between two processes or we can say that it allows the communication
between two processes which can be either half-duplex or full-duplex.
o Synchronization: Session layer adds some checkpoints when transmitting the
data in a sequence. If some error occurs in the middle of the transmission of
data, then the transmission will take place again from the checkpoint. This
process is known as Synchronization and recovery.
6) Presentation Layer
o A Presentation layer is mainly concerned with the syntax and semantics of the
information exchanged between the two systems.
o It acts as a data translator for a network.
o This layer is a part of the operating system that converts the data from one
presentation format to another format.
o The Presentation layer is also known as the syntax layer.
7) Application Layer
o Attenuation: Attenuation means the loss of energy, i.e., the strength of the signal
decreases with increasing the distance which causes the loss of energy.
o Distortion: Distortion occurs when there is a change in the shape of the signal. This
type of distortion is examined from different signals having different frequencies.
Each frequency component has its own propagation speed, so they reach at a
different time which leads to the delay distortion.
o Noise: When data is travelled over a transmission medium, some unwanted signal is
added to it which creates the noise.
Twisted pair:
Twisted pair is a physical media made up of a pair of cables twisted with each other.
A twisted pair cable is cheap as compared to other transmission media. Installation of
the twisted pair cable is easy, and it is a lightweight cable. The frequency range for
twisted pair cable is from 0 to 3.5KHz.
A twisted pair consists of two insulated copper wires arranged in a regular spiral
pattern.
o Category 1: Category 1 is used for telephone lines that have low-speed data.
o Category 2: It can support upto 4Mbps.
o Category 3: It can support upto 16Mbps.
o Category 4: It can support upto 20Mbps. Therefore, it can be used for long-distance
communication.
o Category 5: It can support upto 200Mbps.
o It is cheap.
o Installation of the unshielded twisted pair is easy.
o It can be used for high-speed LAN.
Disadvantage:
o This cable can only be used for shorter distances because of attenuation.
o The cost of the shielded twisted pair cable is not very high and not very low.
o An installation of STP is easy.
o It has higher capacity as compared to unshielded twisted pair cable.
o It has a higher attenuation.
o It is shielded that provides the higher data transmission rate.
Disadvantages
Coaxial Cable
o Coaxial cable is very commonly used transmission media, for example, TV wire is
usually a coaxial cable.
o The name of the cable is coaxial as it contains two conductors parallel to each other.
o It has a higher frequency as compared to Twisted pair cable.
o The inner conductor of the coaxial cable is made up of copper, and the outer
conductor is made up of copper mesh. The middle core is made up of non-
conductive cover that separates the inner conductor from the outer conductor.
o The middle core is responsible for the data transferring whereas the copper mesh
prevents from the EMI(Electromagnetic interference).
Fibre Optic
o Fibre optic cable is a cable that uses electrical signals for communication.
o Fibre optic is a cable that holds the optical fibres coated in plastic that are used to
send the data by pulses of light.
o The plastic coating protects the optical fibres from heat, cold, electromagnetic
interference from other types of wiring.
o Fibre optics provide faster data transmission than copper wires.
o Core: The optical fibre consists of a narrow strand of glass or plastic known as a core.
A core is a light transmission area of the fibre. The more the area of the core, the
more light will be transmitted into the fibre.
o Cladding: The concentric layer of glass is known as cladding. The main functionality
of the cladding is to provide the lower refractive index at the core interface as to
cause the reflection within the core so that the light waves are transmitted through
the fibre.
o Jacket: The protective coating consisting of plastic is known as a jacket. The main
purpose of a jacket is to preserve the fibre strength, absorb shock and extra fibre
protection.
o Greater Bandwidth: The fibre optic cable provides more bandwidth as compared
copper. Therefore, the fibre optic carries more data as compared to copper cable.
o Faster speed: Fibre optic cable carries the data in the form of light. This allows the
fibre optic cable to carry the signals at a higher speed.
o Longer distances: The fibre optic cable carries the data at a longer distance as
compared to copper cable.
o Better reliability: The fibre optic cable is more reliable than the copper cable as it is
immune to any temperature changes while it can cause obstruct in the connectivity of
copper cable.
o Thinner and Sturdier: Fibre optic cable is thinner and lighter in weight so it can
withstand more pull pressure than copper cable.
Un-Guided Transmission
o An unguided transmission transmits the electromagnetic waves without using any
physical medium. Therefore it is also known as wireless transmission.
o In unguided media, air is the media through which the electromagnetic energy can
flow easily.
Radio waves
o Radio waves are the electromagnetic waves that are transmitted in all the directions
of free space.
o Radio waves are omnidirectional, i.e., the signals are propagated in all the directions.
o The range in frequencies of radio waves is from 3Khz to 1 khz.
o In the case of radio waves, the sending and receiving antenna are not aligned, i.e., the
wave sent by the sending antenna can be received by any receiving antenna.
o An example of the radio wave is FM radio.
o A Radio wave is useful for multicasting when there is one sender and many receivers.
o An FM radio, television, cordless phones are examples of a radio wave.
o Radio transmission is mainly used for wide area networks and mobile cellular phones.
o Radio waves cover a large area, and they can penetrate the walls.
o Radio transmission provides a higher transmission rate.
Microwaves
o Terrestrial microwave
o Satellite microwave communication.
Characteristics of Microwave:
o Frequency range: The frequency range of terrestrial microwave is from 4-6 GHz to
21-23 GHz.
o Bandwidth: It supports the bandwidth from 1 to 10 Mbps.
o Short distance: It is inexpensive for short distance.
o Long distance: It is expensive as it requires a higher tower for a longer distance.
o Attenuation: Attenuation means loss of signal. It is affected by environmental
conditions and antenna size.
Advantages of Microwave:
The satellite accepts the signal that is transmitted from the earth station, and it
amplifies the signal. The amplified signal is retransmitted to another earth station.
o The coverage area of a satellite microwave is more than the terrestrial microwave.
o The transmission cost of the satellite is independent of the distance from the centre
of the coverage area.
o Satellite communication is used in mobile and wireless communication applications.
o It is easy to install.
o It is used in a wide variety of applications such as weather forecasting, radio/TV signal
broadcasting, mobile communication, etc.
o Satellite designing and development requires more time and higher cost.
o The Satellite needs to be monitored and controlled on regular periods so that it
remains in orbit.
o The life of the satellite is about 12-15 years. Due to this reason, another launch of the
satellite has to be planned before it becomes non-functional.
Infrared
o An infrared transmission is a wireless technology used for communication over short
ranges.
o The frequency of the infrared in the range from 300 GHz to 400 THz.
o It is used for short-range communication such as data transfer between two cell
phones, TV remote operation, data transfer between a computer and cell phone
resides in the same closed area.
Characteristics Of Infrared:
o It supports high bandwidth, and hence the data rate will be very high.
o Infrared waves cannot penetrate the walls. Therefore, the infrared communication in
one room cannot be interrupted by the nearby rooms.
o An infrared communication provides better security with minimum interference.
o Infrared communication is unreliable outside the building because the sun rays will
interfere with the infrared waves.
Network Standards
Networking standards define the rules for data communications that are
needed for interoperability of networking technologies and processes.
Standards help in creating and maintaining open markets and allow different
vendors to compete on the basis of the quality of their products while being
compatible with existing market products.
Types of Standards
Standards are of two types
De facto − These are the standards that are followed without any formal plan or approval
by any organization. They have come into existence due to traditions or facts. For
example, the HTTP had started as a de facto standard.
De jure − These standards are the ones which have been adopted through legislation by
any officially recognized standards organization. Most of the communication standards
that are used today are de jure standards.
Standards Organizations
Some of the noted standards organizations are
Network Software
Network software is an umbrella term used to describe a wide range
of software that streamlines the operations, design, monitoring, and
implementation of computer networks.
To understand how it works, let’s look at the components that frame network
software.
1. Application layer
The first component is the application layer or the application plane, which
refers to the applications and services running on the network. It is a program
that conveys network information, the status of the network, and the network
requirements for particular resource availability and application. This is done
through the control layer via application programming interfaces (APIs). The
application layer also consists of the application logic and one or more API
drivers.
2. Control layer
The control layer lies at the centre of the architecture and is one of the most
important components of the three layers. You could call it the brain of the
whole system. Also called the controller or the control plane, this layer also
includes the network control software and the network operating system within
it. It is the entity in charge of receiving requirements from the applications and
translating the same to the network components. The control of the
infrastructure layer or the data plane devices is also done via the controller. In
simple terms, the control layer is the intermediary that facilitates
communication between the top and bottom layers through APIs interfaces.
3. Infrastructure layer
The infrastructure layer, also called the data plane, consists of the actual
network devices (both physical and virtual) that reside in this layer. They are
primarily responsible for moving or forwarding the data packets after receiving
due instructions from the control layer. In simple terms, the data plane in the
network architecture components physically handles user traffic based on the
commands received by the controller.
The application program interface (API) ties all three components together.
Communication between these three layers is facilitated through northbound
and southbound application program interfaces. The northbound API ties
communication between the application and the control layers, whereas the
southbound API enables communication between the infrastructure and the
control layers.
1. Northbound API
Northbound APIs are majorly RESTful APIs. The control layer decides how the
applications are allotted the resources available in the network. Through
its automated intelligence, the control layer also finds an ideal route for the
application as per its latency and security.
2. Southbound API
The control layer communicates with the infrastructure layer (routers and
switches) via southbound APIs. The network infrastructure is informed about
the route the application data must move on based on the configurations made
by the controller. The controller can control and change how the routers and
switches move the data.
In many ways, data within networks is like a child. With time, it only grows,
and as it does, it requires adequate attention. Soon enough, data needs to be
stored spanning multiple locations and a wide range of devices. Network
storage software allows businesses to utilize a standard interface that manages
countless databases between users or clients. It serves as a good manager of
access between various departments or essential communities within an
organization. This way, anybody having access can view or retrieve information
with just a click, and at the same time, security concerns are also taken care of.
In today’s day and age of dynamic networks spread across various functioning
corporate entities, data once misplaced is data lost. Hence, it is vital to take
regular backups. As organizations grow and networks evolve in size, it gets
especially tricky to save data appropriately. In addition to that, data that needs
to be stored increases at a rapid pace, and its management gets costlier. In such
a situation, data archiving software is a perfect choice.
Organizations have heaps of data that might not have to be utilized daily but is
still essential to be stored for various purposes, one of them being for regular
compliance. Data archiving software enables better management of such
information and is an optimal solution to reduce costs while ensuring that the
data is being protected. However, as a word of caution, archive software does
not function the same way as regular standard backups. Hence, it is always
recommended to ensure that the archived data doesn’t need to be accessed soon.
One of the most challenging tasks in any organization is to keep the network up
and running efficiently. Achieving this demands greater visibility of the
network infrastructure as well as regular tracking and monitoring of essential
metrics. That’s where asset management software comes to the rescue.
Compared to most of its counterparts, asset management software operates from
a centralized server room or hub and is not connected to any hardware. This is
good in terms of cost reduction and offers an excellent experience to the users
and clients.
Printers and fax machines are indispensable equipment for any working
organization. As an organization grows, so does the number of assets involved
within its network. Standard options such as Wi-Fi printing might not always be
the best choice, especially for big corporations or schools that span across many
floors. This software provides an easy-to-use interface that enables the
undertaking and maintenance of multiple tasks. That’s not it! With this
software, one can easily set IP printing across networks or even deploy updates.
What’s more? In some cases, it can also enable organizations to fax or print
important documents and correspondence across different locations.
8. Network management software
Network Hardware
Network hardware is a set of physical or network devices that are essential for interaction and
communication between hardware units operational on a computer network. These are
dedicated hardware components that connect to each other and enable a network to function
effectively and efficiently.
Today, technology has penetrated its tentacles into every nook and corner of our lives. It has
gone from being just an industry add-on to an inevitable necessity. As tech enablement is
driving the industrial transformation, it’s important for businesses to build a network that is
secure, reliable and keeps the users in touch with their applications. The core of this very
foundation is leveraged by the basic network hardware.
Network hardware plays a key role as industries grow as it supports scalability. It integrates
any number of components depending on the enterprise’s needs. Network hardware helps
establish an effective mode of communication, thereby improving the business standards. It
also promotes multiprocessing and enables sharing of resources, information, and software
with ease.
Network equipment is part of advancements of the Ethernet network protocol and utilizes a
twisted pair or fibre cable as a connection medium. Routers, hubs, switches, and bridges are
some examples of network hardware.
Setting up the layout of the network architecture is critical, as it can either enhance or hamper
the overall performance of the entire system. For example, selecting inappropriate
transmission media or equipment for an expected server load in a network can cause
slowdowns in different parts of the network.
As more user devices connect to the network, network architecture becomes even more
significant by adding a security layer to protect connected devices. Additionally, modern
network architectures support advanced user recognition and authorization.
Most network architectures are built on the open systems interconnection (OSI) model. Here,
network tasks are segregated into seven logical layers, right from the lowest to the highest
abstraction. For example, the lowest physical layer manages the wire and cable connections
of the network, while the highest application layer deals with APIs that perform application-
specific functions such as chat or file sharing. Overall, with the OSI model, troubleshooting
the network is easier as the problems are isolated from each other at different layers.
What is a Telephone?
A telephone or simply referred to as a phone, is a device that sends and receives
sound across a certain distance. A telephone's primary job is to transform analogue
sounds into electrical signals that may be transmitted to other phone users. The
name telephone comes from the Greek roots tele, which has a meaning of phone
and afar that means sound or voice. The main credit for inventing the telephone is
Alexander Graham Bell in 1876. It makes people capable of communicating with
others over almost any distance.
In 1887, there were around 200,000 telephones in the world, and in 1928, about 30
million, and in 1958, approximately 118 million, and over 330 million in 1995.
According to the University of California at Berkeley, there were around 1.3 billion
main telephone lines in use worldwide in 2004.
Telephone Network
The structure of the telephone network may be described in terms of whole plant
connections available between telephone exchanges. The three broad categories,
long-haul networks, exchange area, and local, are included in the telephone network.
The local network functions for linking telephones in businesses and residences to a
central office in order to serve a specific geographical area. The size may be different
in the cities and country. In cities, it can be 11.5 sq. mi and 123.5 sq. mi in the
country.
Local lines or loops are telephone lines that connect a subscriber to the central office.
Central offices are linked through the exchange area network. The telephone
connections that connect one telephone exchange to another are known as trunks in
North America and junctions in Europe. For indicating the location in the system,
every telephone is assigned a number. The switching network identifies that the call
is initiating from which telephone and from which is receiving the call. For a signal
path, it sets up the circuit connection from this information.
Parts of a telephone
A telephone is a complete system, not just a thing, which only sits on the table at
home. A whole slew of communication devices, including the cable that runs through
the wall and the handset on your end that sends phone signals all over the country.
Additionally, some switching equipment aids in the proper routing of calls.
But at the same time, like Bell, some other inventors were also working on the idea of
making the telephone. For example, mere hours after Bell filed his own patent
application, Elisha Gray (1835-1901) filed a patent on a comparable innovation.
Antonio Meucci, a third inventor, came before either Bell or Gray. He is said to have
invented the telephone in the 1840s. When the US Congress passed a bill in his
honor, finally his contribution was recognized in 2002.
Types of phones
Smartphones, cordless or wireless phones, regular mobile phones, and classic corded
phones are the four main types of phones (uses a rotary dial or has buttons). Cell
phones and smartphones have mostly supplanted the landline telephone in modern
times. This is because smartphones and cell phones provide better service, as well as
their prices have come down drastically.
Assume, in the street, there are five people. They want to chat with each other;
therefore, they need telephones. Actually, it is easier to wire some baked bean cans.
A connection is needed for all people to connect with all of the others, but that
means there is a very complicated mess; here are requirements for four lines
stretching and four baked bean cans in each home. We might be able to live with it,
but it isn't ideal. Assume there are 5,000 people in your community who all wish to
talk to each other. There would be needed 4999 lines for each house. And, think
about if there are more than 10 million people in the city and they all want to talk
with each other.
This is why telephone exchanges come into use. Rather than being linked to
everyone else, everyone is connected to their local exchange, which is connected to
the other exchanges. In the above example, only one line is needed by four people,
and the exchange would have the potential to provide a connection between any
pair of them. In another example, only one line is still needed by 10 million people.
But there is a need to add more local exchanges when the number of people
increases. And, now one person is not connecting with another, but one person is
connecting with another local exchange through their local exchange (a potentially a
series of exchanges).
Any connection between one line and another is not permanent. When there was
less of a rush of people using the telephone, it was much easier for operators at
telephone exchanges to manually keep track of the calls; they used to accomplish
this by plugging leads in and out of switchboards. But as people came to expect
faster calls and the size of the system was rapidly increased, it became difficult. Also,
if anyone thinks that the invention of telephones was first before exchanges, he
would be wrong. Exchanges for the telegraph were implemented a few years before
Bell patented his phone, therefore the basic notion of central switching offices
emerged before. This concept aided in the exchange of electrical messages between
locations.
Now, there are a variety of different ways to travel the calls; however, most calls still
travel from homes to local exchanges with old-style copper wires. But calls have the
potential to go between exchanges down ultra-fast cables. Also, with the help of
using microwave towers, longer-distances calls are often beamed between urban
centers. Typically, international calls are bounced all over the world with the help of
using space satellites.
Microwave towers, fibre-optics, and satellites transmit and receive phone calls as
pulses of electromagnetic radiation travelling at the speed of light, rather than as
electrical impulses. Therefore, as compared to before, modern international phone
calls are more reliable, much cheaper, and faster. Additionally, now calls took very
little time to connect.
Introduction:
ISDN is a set of protocols that is based on high-speed fully digitized telephone
service. The main aim of ISDN is to provide a fully integrated digital service to the
users.
Bearer Services:
This type of services is used to transfer information such as voice, data, and video
between the users without manipulating the content of the network information. It
belongs to the first 3 layers of the OSI reference model.
Tele Services:
In these types of services, the network may change the contents of the data. It
belongs to the last 4 layers of the OSI reference model. It includes telephony, tele
box, fax, and teleconferencing etc.
Supplementary Services:
Principles of ISDN:
Following are the principles of ISDN are:
o It supports both circuit switching & packet switching with the connections at 64 kbps.
o In ISDN layered protocol architecture is used for specification.
o ISDN services provides maintenance.
o ISDN services includes some network management functions.
o In ISDN network several configurations are possible for implementing.
ISDN SERVICES:
Following are the two types of services associated with ISDN:
Basic Rate Interface allows the concurrent use of voice and various data applications
such as packet-switched access, a link to a central alarm service, video, tax, etc. The
signalling information for the two channels is sent onto the D channel. The two B
channels can be used for one 128 kbps connection or two independent connections
on the two channels.
The following figure shows the basic structure of the frame in the Basic Rate
Interface is:
This service is used to meet the needs of most individual users, including residential
and small offices. In this case, the two B channels and the D channel are multiplexed
with overhead bits in the form of the frame structure. The overhead bits include
framing, DC balancing, and other bits.
o 16 bits of B1 Channel
o 16 bits of B2 Channel
o 4 bits of D channel
o 12 overhead bits
The frame is transmitted in 250 µsec, which results in the following bit rates:
The following figure shows the basic structure of the frame in the Primary Rate
Interface is:
ISDN CHANNELS:
ISDN structure have a central ISDN office in which all the users are linked to this
through a digital pipe. This digital pipe has different capacities and have a different
data transfer rates and these are organized into multiple channels of different sizes.
B Channel:
It stands for Bearer channel. It has a 64 kbps standard data rate. It is a basic user
channel and can carry any digital information in full-duplex mode. In this
transmission rate does not exceed 64 kbps. It can carry digital voice, digital data, and
any other low data rate information.
D Channel:
It stands for Data Channel. This channel carry control signal for bearer services. This
channel is required for signalling or packet-switched data and all-controlling signals
such as establishing calls, ringing, call interrupt, etc.
H Channel:
It stands for Hybrid Channel. It provides user information at higher bit rates.
There are 3 types of Hybrid Channel depending on the data rates. Following are the
hybrid channels types:
ISDN Devices:
Following are the types of ISDN devices:
TE1:Terminal equipment type (TE1) are specialized ISDN terminals. It includes digital
telephone instruments such as FAX, or data terminal equipment. All these devices
have an S-bus ISDN interface.
TA: It stands for Terminal Adapter. This device acts as an intermediary device for
non-ISDN terminal devices. It converts the non-ISDN interface of these devices to the
ISDN interface. The ISDN terminal Adapter can be either a standalone device or a
board inside the Terminal equipment type 2. Some of the examples of Terminal
adapter are EIA/TIA-232-C, V.24 etc.
NT1: It stands for Network termination type 1. It provides a line termination at the
customer's premise. They can also provide line monitoring, power feeding, error
statistics, and proper timing.
o R:It stands for Rate transfer point. It is an interface for non-ISDN devices and
therefore is the reference point between non-ISDN equipment and a Terminal
Adapter. It can be RS-232-C, V, or X series of ITU-T standard or ordinary telephone
interface with two wires.
o S:It stands for System transfer point. The interface between the user terminal and
NT2. It is a four-wire balanced to which upto eight ISDN terminals can be connected.
The physical connector for S - interface on terminals and NT1 is an 8-pin RJ-45
connector.
o T:It stands for Terminal transfer point. It is the interface between Network
termination type 1 and Network termination type 2
o U: It is the interface between Network termination type 1 device and the line
termination equipment in the carrier network. The U interface is the local copper pair
of the access network. The same pair is used for full-duplex transmission of digital
signals.