Module 1.........
Module 1.........
Module 1
INTRODUCTION TO
NETWORKS
1.1 INTRODUCTION
Computers have made spectacular progress in a short time. During the first two decades of their
existence, computer systems were highly centralized, usually within a single large room. A
medium-sized company or university might have had one or two computers, while very large
institutions had at most a few dozen. The idea that within forty years vastly more powerful
computers smaller than postage stamps would be mass produced by the billions was pure
science fiction.
The merging of computers and communications has had a profound influence on the way
computer systems are organized. The once-dominant concept of the ‘‘computer center’’ as a
room with a large computer to which users bring their work for processing is now totally
obsolete. The old model of a single computer serving all of the organization’s computational
needs has been replaced by one in which a large number of separate but interconnected
computers do the job. These systems are called computer networks.
‘‘Computer network’’ means a collection of autonomous computers interconnected by a
single technology. Two computers are said to be interconnected if they are able to exchange
information. The connection need not be via a copper wire; fiber optics, microwaves, infrared,
and communication satellites can also be used. Networks come in many sizes, shapes and
forms, as we will see later. They are usually connected together to make larger networks, with
the Internet being the most well-known example of a network of networks.
Networks called VPNs (Virtual Private Networks) may be used to join the individual
networks at different sites into one extended network. In other words, the mere fact that a user
happens to be 15,000 km away from his data should not prevent him from using the data as
though they were local. In the simplest of terms, one can imagine a company’s information
system as consisting of one or more databases with company information and some number of
employees who need to access them remotely. In this model, the data are stored on powerful
computers called servers. Often these are centrally housed and maintained by a system
administrator. In contrast, the employees have simpler machines, called clients, on their
desks, with which they access remote data, The client and server machines are connected by a
network, as illustrated in Fig. 1-1. This whole arrangement is called the client-server model.
If we look at the client-server model in detail, we see those two processes (i.e., running
programs) are involved, one on the client machine and one on the server machine.
Communication takes the form of the client process sending a message over the network to the
server process. The client process then waits for a reply message. When the server process gets
the request, it performs the requested work or looks up the requested data and sends back a
reply. These messages are shown in Fig. 1-2
Telephone calls between employees may be carried by the computer network instead of by the
phone company. This technology is called IP telephony or Voice over IP (VoIP) when
Internet technology is used. The microphone and speaker at each end may belong to a VoIP-
enabled phone or the employee’s computer. Companies find this a wonderful way to save on
their telephone bills
Point-to-point links connect individual pairs of machines. To go from the source to the
destination on a network made up of point-to-point links, short messages, called packets may
have to first visit one or more intermediate machines. Often multiple routes, of different
lengths, are possible, so finding good ones is important in point-to-point networks. Point-to-
point transmission with exactly one sender and exactly one receiver is sometimes called
unicasting.
In contrast, on a broadcast network, the communication channel is shared by all the machines
on the network; packets sent by any machine are received by all the others. An address field
within each packet specifies the intended recipient. Upon receiving a packet, a machine checks
the address field. If the packet is intended for the receiving machine, that machine processes
the packet; if the packet is intended for some other machine, it is just ignored.
Broadcast systems usually also allow the possibility of addressing a packet to all destinations
by using a special code in the address field. When a packet with this code is transmitted, it is
received and processed by every machine on the network. This mode of operation is called
broadcasting. Some broadcast systems also support transmission to a subset of the machines,
which known as multicasting.
The worldwide Internet is certainly the best-known (but not the only) example of an
internetwork. Soon we will have even larger internetworks with the Interplanetary Internet
that connects networks across space (Burleigh et al., 2003).
Bluetooth networks use the master-slave paradigm of Fig. 1-7. The system unit (the PC) is
normally the master, talking to the mouse, keyboard, etc., as slaves. The master tells the slaves
what addresses to use, when they can broadcast, how long they can transmit, what frequencies
they can use, and so on.
PANs can also be built with other technologies that communicate over short ranges, such as
RFID on smartcards and library books.
Wireless LANs are very popular these days, especially in homes, older office buildings,
cafeterias, and other places where it is too much trouble to install cables. In these systems,
every computer has a radio modem and an antenna that it uses to communicate with other
computers. In most cases, each computer talks to a device in the ceiling as shown in Fig. 1-
8(a). This device, called an AP (Access Point), wireless router, or base station, relays packets
between the wireless computers and also between them and the Internet.
There is a standard for wireless LANs called IEEE 802.11, popularly known as WiFi, which
has become very widespread. It runs at speeds anywhere from 11 to hundreds of Mbps.
Wired LANs use a range of different transmission technologies. Most of them use copper wires,
but some use optical fiber. LANs are restricted in size, which means that the worst-case
transmission time is bounded and known in advance. Typically, wired LANs run at speeds of
100 Mbps to 1 Gbps, have low delay (microseconds or nanoseconds), and make very few errors.
Newer LANs can operate at up to 10 Gbps. Compared to wireless networks, wired LANs
exceed them in all dimensions of performance.
The topology of many wired LANs is built from point-to-point links. IEEE 802.3, popularly
called Ethernet, is, by far, the most common type of wired LAN. Fig. 1-8(b) shows a sample
topology of switched Ethernet. Each computer speaks the Ethernet protocol and connects to a
box called a switch with a point-to-point link. Hence the name. A switch has multiple ports,
each of which can connect to one computer. The job of the switch is to relay packets between
computers that are attached to it, using the address in each packet to determine which computer
to send it to. To build larger LANs, switches can be plugged into each other using their ports.
Both wireless and wired broadcast networks can be divided into static and dynamic designs,
depending on how the channel is allocated. A typical static allocation would be to divide time
into discrete intervals and use a round-robin algorithm, allowing each machine to broadcast
only when its time slot comes up. Static allocation wastes channel capacity when a machine
has nothing to say during its allocated slot, so most systems attempt to allocate the channel
dynamically (i.e., on demand).
Dynamic allocation methods for a common channel are either centralized or decentralized.
In the centralized channel allocation method, there is a single entity, for example, the base
station in cellular networks, which determines who goes next. It might do this by accepting
multiple packets and prioritizing them according to some internal algorithm. In the
decentralized channel allocation method, there is no central entity; each machine must decide
for itself whether to transmit.
the communication subnet, or just subnet for short. The job of the subnet is to carry messages
from host to host.
In most WANs, the subnet consists of two distinct components: transmission lines and
switching elements. Transmission lines move bits between machines. They can be made of
copper wire, optical fiber, or even radio links. Switching elements, or just switches, are
specialized computers that connect two or more transmission lines. When data arrive on an
incoming line, the switching element must choose an outgoing line on which to forward them.
These switching computers are also called by the name router.
The WAN is similar to a large wired LAN, but there are some important differences. Usually
in a WAN, the hosts and subnet are owned and operated by different people. A second
difference is that the routers will usually connect different kinds of networking technology.
The networks inside the offices may be switched Ethernet, for example, while the long-distance
transmission lines may be SONET links. This means that many WANs will in fact be
internetworks, or composite networks that are made up of more than one network. A final
difference is in what is connected to the subnet. This could be individual computers, or it could
be entire LANs.
There are two other varieties of WANs. First, rather than lease dedicated transmission lines, a
company might connect its offices to the Internet This allows connections to be made between
the offices as virtual links that use the underlying capacity of the Internet. This arrangement,
shown in Fig. 1-11, is called a VPN (Virtual Private Network).
A VPN has the usual advantage of virtualization, i.e; it provides flexible reuse of a resource
(Internet connectivity). It is very easy to add a fourth office to see this. A VPN also has the
usual disadvantage of virtualization, which is a lack of control over the underlying resources.
With a dedicated line, the capacity is clear. With a VPN your mileage may vary with your
Internet service.
The second variation is that the subnet may be run by a different company. The subnet operator
is known as a network service provider and the offices are its customers. This structure is
shown in Fig. 1-12. The subnet operator will connect to other customers too, as long as they
can pay and it can provide service. The subnet operator will also connect to other networks that
are part of the Internet. Such a subnet operator is called an ISP (Internet Service Provider)
and the subnet is an ISP network. Its customers who connect to the ISP receive Internet
service.
In most WANs, the network contains many transmission lines, each connecting a pair of
routers. If two routers that do not share a transmission line wish to communicate, they must do
this indirectly, via other routers. There may be many paths in the network that connect these
two routers. The decision about which path to use is done using routing algorithm. Each router
makes the decision about where to send packets next using Forwarding algorithm.
1.2.5 Internetworks
A collection of interconnected networks is called an internetwork or internet. The Internet
uses ISP networks to connect enterprise networks, home networks, and many other networks.
The term ‘‘subnet’’ refers to the collection of routers and communication lines owned by the
network operator. As an analogy, the telephone system consists of telephone switching offices
connected to one another by high-speed lines, and to houses and businesses by low-speed lines.
These lines and equipment, owned and managed by the telephone company, form the subnet
of the telephone system.
A network is formed by the combination of a subnet and its hosts. An internet is formed when
distinct networks are interconnected. There are two rules of thumb that are useful in the case
of Internetworks. First, if different organizations have paid to construct different parts of the
network and each maintains its part, we have an internetwork rather than a single network.
Second, if the underlying technology is different in different parts (e.g., broadcast versus point-
to-point and wired versus wireless), we probably have an internetwork.
The general name for a machine that makes a connection between two or more networks and
provides the necessary translation, both in terms of hardware and software, is a gateway.
Gateways are distinguished by the layer at which they operate in the protocol hierarchy.
When layer n on one machine carries on a conversation with layer n on another machine, the
rules and conventions used in this conversation are collectively known as the layer n protocol.
Basically, a protocol is an agreement between the communicating parties on how
communication is to proceed.
A five-layer network is illustrated in Fig. 1-13. The entities comprising the corresponding
layers on different machines are called peers. The peers may be software processes, hardware
devices, or even human beings. In other words, it is the peers that communicate by using the
protocol to talk to each other.
In reality, no data are directly transferred from layer n on one machine to layer n on another
machine. Instead, each layer passes data and control information to the layer immediately
below it, until the lowest layer is reached. Below layer 1 is the physical medium through which
actual communication occurs. In Fig. 1-13, virtual communication is shown by dotted lines and
physical communication by solid lines.
Between each pair of adjacent layers is an interface. The interface defines which primitive
operations and services the lower layer makes available to the upper one. When network
designers decide how many layers to include in a network and what each one should do, one
of the most important considerations is defining clean interfaces between the layers. In addition
to minimizing the amount of information that must be passed between layers, clear cut
interfaces also make it simpler to replace one layer with a completely different protocol or
implementation (e.g., replacing all the telephone lines by satellite channels).
Consider a more technical example: how to provide communication to the top layer of the five-
layer network in Fig. 1-15. A message, M, is produced by an application process running in
layer 5 and given to layer 4 for transmission. Layer 4 puts a header in front of the message to
identify the message and passes the result to layer 3. The header includes control information,
such as addresses, to allow layer 4 on the destination machine to deliver the message.
In many networks, no limit is placed on the size of messages transmitted in the layer 4 protocol
but there is nearly always a limit imposed by the layer 3 protocol. Consequently, layer 3 must
break up the incoming messages into smaller units, packets, prepending a layer 3 header to
each packet. In this example, M is split into two parts, M1 and M2, that will be transmitted
separately. Layer 3 decides which of the outgoing lines to use and passes the packets to layer
2. Layer 2 adds to each piece not only a header but also a trailer, and gives the resulting unit to
layer 1 for physical transmission. At the receiving machine the message moves upward, from
layer to layer, with headers being stripped off as it progresses. None of the headers for layers
below n are passed up to layer n.
called Flow control. Sometimes the problem is that the network is oversubscribed because too
many computers want to send too much traffic, and the network cannot deliver it all. This
overloading of the network is called congestion. One strategy is for each computer to reduce
its demand when it experiences congestion.
The last major design issue is to secure the network by defending it against different kinds
of threats. One of the threats we have mentioned previously is that of eavesdropping on
communications. Mechanisms that provide confidentiality defend against this threat, and they
are used in multiple layers. Mechanisms for authentication prevent someone from
impersonating someone else.
When the packet arrives at the server, the operating system sees that the packet is requesting a
connection. It checks to see if there is a listener, and if so it unblocks the listener. The server
process can then establish the connection with the ACCEPT call. This sends a response (2)
back to the client process to accept the connection. The arrival of this response then releases
the client. At this point the client and server are both running and they have a connection
established.
The next step is for the server to execute RECEIVE to prepare to accept the first request. The
RECEIVE call blocks the server.
Then the client executes SEND to transmit its request (3) followed by the execution of
RECEIVE to get the reply. The arrival of the request packet at the server machine unblocks the
server so it can handle the request. After it has done the work, the server uses SEND to return
the answer to the client (4). The arrival of this packet unblocks the client, which can now
inspect the answer. If the client has additional requests, it can make them now.
When the client is done, it executes DISCONNECT to terminate the connection (5). Usually,
an initial DISCONNECT is a blocking call, suspending the client and sending a packet to the
server saying that the connection is no longer needed. When the server gets the packet, it also
issues a DISCONNECT of its own, acknowledging the client and releasing the connection (6).
When the server’s packet gets back to the client machine, the client process is released and the
connection is broken. In a nutshell, this is how connection-oriented communication works.
4. The layer boundaries should be chosen to minimize the information flow across the
interfaces.
5. The number of layers should be large enough that distinct functions need not be thrown
together in the same layer out of necessity and small enough that the architecture does not
become unwieldy
by the first one. The second one may not accept the packet at all because it is too large. The
protocols may differ, and so on. It is up to the network layer to overcome all these problems to
allow heterogeneous networks to be interconnected.
for the World Wide Web. When a browser wants a Web page, it sends the name of the page it
wants to the server hosting the page using HTTP. The server then sends the page back.
The second protocol in this layer, UDP (User Datagram Protocol), is an unreliable,
connectionless protocol for applications that do not want TCP’s sequencing or flow control and
wish to provide their own. It is also widely used for one-shot, client-server-type request-reply
queries and applications in which prompt delivery is more important than accurate delivery,
such as transmitting speech or video. The relation of IP, TCP, and UDP is shown in Fig. 1-22
addresses, HTTP, the protocol for fetching pages on the World Wide Web, and RTP, the
protocol for delivering real-time media such as voice or movies.
The network layer deals with how to combine multiple links into networks, and networks of
networks, into internetworks so that we can send packets between distant computers. This
includes the task of finding the path along which to send the packets.
The transport layer strengthens the delivery guarantees of the Network layer, usually with
increased reliability, and provide delivery abstractions, such as a reliable byte stream, that
match the needs of different applications.
Finally, the application layer contains programs that make use of the network.
PHYSICAL LAYER
Physical layer is the lowest layer in the protocol model. It defines the electrical, timing and
other interfaces by which bits are sent as signals over channels. The physical layer is the
foundation on which the network is built.
media, such as copper wire and fiber optics, and unguided media, such as terrestrial wireless,
satellite, and lasers through the air.
2.1.1 Magnetic Media
One of the most common ways to transport data from one computer to another is to write them
onto magnetic tape or removable media (e.g., recordable DVDs), physically transport the tape
or disks to the destination machine, and read them back in again. This method is cost-effective,
especially for applications in which high bandwidth or cost per bit transported is the key factor.
2.1.2 Twisted Pairs
One of the oldest and still most common transmission media is twisted pair. A twisted pair
consists of two insulated copper wires, typically about 1 mm thick. The wires are twisted
together in a helical form, just like a DNA molecule. Twisting is done because two parallel
wires constitute a fine antenna. When the wires are twisted, the waves from different twists
cancel out, so the wire radiates less effectively. A signal is usually carried as the difference in
voltage between the two wires in the pair. This provides better immunity to external noise
because the noise tends to affect both wires the same, leaving the differential unchanged.
The most common application of the twisted pair is the telephone system. Nearly all telephones
are connected to the telephone company (telco) office by a twisted pair. Both telephone calls
and ADSL Internet access run over these lines. Twisted pairs can run several kilometers
without amplification, but for longer distances the signal becomes too attenuated and repeaters
are needed. When many twisted pairs run in parallel for a substantial distance, such as all the
wires coming from an apartment building to the telephone company office, they are bundled
together and encased in a protective sheath. The pairs in these bundles would interfere with
one another if it were not for the twisting.
Twisted pairs can be used for transmitting either analog or digital information. The bandwidth
depends on the thickness of the wire and the distance traveled, but several megabits/sec can be
achieved for a few kilometers in many cases. Due to their adequate performance and low cost,
twisted pairs are widely used
Twisted-pair cabling comes in several varieties. A category 5 (Cat 5) twisted pair consists of
two insulated wires gently twisted together. Four such pairs are typically grouped in a plastic
sheath to protect the wires and keep them together. This arrangement is shown in Fig. 2-3.
Cat 5 replaced earlier Category 3 cables with a similar cable that uses the same connector, but
has more twists per meter. More twists result in less crosstalk and a better-quality signal over
longer distances, making the cables more suitable for high-speed computer communication,
especially 100-Mbps and 1-Gbps Ethernet LANs.
Category 6 or even Category 7 has more stringent specifications to handle signals with greater
bandwidths. Some cables in Category 6 and above are rated for signals of 500 MHz and can
support the 10-Gbps links. Category 6 wiring types are referred to as UTP (Unshielded Twisted
Pair) as they consist simply of wires and insulators. In contrast to these, Category 7 cables have
shielding on the individual twisted pairs, as well as around the entire cable (but inside the
plastic protective sheath).
Different LAN standards may use the twisted pairs differently. For example, 100-Mbps
Ethernet uses two (out of the four) pairs, one pair for each direction. To reach higher speeds,
1-Gbps Ethernet uses all four pairs in both directions simultaneously;
Links that can be used in both directions at the same time are called full-duplex links. In
contrast, links that can be used in either direction, but only one way at a time, are called half-
duplex links. A third category consists of links that allow traffic in only one direction, are
called simplex links.
A coaxial cable consists of a stiff copper wire as the core, surrounded by an insulating material.
The insulator is encased by a cylindrical conductor, often as a closely woven braided mesh.
The outer conductor is covered in a protective plastic sheath
The coaxial cable has high bandwidth and excellent noise immunity. The bandwidth depends
on the cable quality and length. Modern cables have a bandwidth of up to a few GHz. Coax or
Coaxial cables is still widely used for cable television and metropolitan area networks
The difficulty with using household electrical wiring for a network is that it was designed to
distribute power signals. This task is quite different than distributing data signals, at which
household wiring does a horrible job. Electrical signals are sent at 50–60 Hz and the wiring
attenuates the much higher frequency (MHz) signals needed for high-rate data communication.
The electrical properties of the wiring vary from one house to the next and change as appliances
are turned on and off, which causes data signals to bounce around the wiring. Transient currents
when appliances switch on and off create electrical noise over a wide range of frequencies.
And without the careful twisting of twisted pairs, electrical wiring acts as a fine antenna,
picking up external signals and radiating signals of its own.
Despite these difficulties, it is practical to send at least 100 Mbps over typical household
electrical wiring by using communication schemes that resist impaired frequencies and bursts
of errors.
This transmission system would leak light and be useless in practice were it not for an
interesting principle of physics. When a light ray passes from one medium to another—for
example, from fused silica to air—the ray is refracted (bent) at the silica/air boundary, as shown
in Fig. 2-6(a). Here we see a light ray incident on the boundary at an angle α1 emerging at an
angle β1 . The amount of refraction depends on the properties of the two media (in particular,
their indices of refraction). For angles of incidence above a certain critical value, the light is
refracted back into the silica; none of it escapes into the air. Thus, a light ray incident at or
above the critical angle is trapped inside the fiber, as shown in Fig. 2-6(b), and can propagate
for many kilometers with virtually no loss.
The sketch of Fig. 2-6(b) shows only one trapped ray, but since any light ray incident on the
boundary above the critical angle will be reflected internally, many different rays will be
bouncing around at different angles. Each ray is said to have a different mode, so a fiber having
this property is called a multimode fiber.
However, if the fiber’s diameter is reduced to a few wavelengths of light the fiber acts like a
wave guide and the light can propagate only in a straight line, without bouncing, yielding a
single-mode fiber. Currently available single-mode fibers can transmit data at 100 Gbps for
100 km without amplification.
Three wavelength bands are most commonly used at present for optical communication. They
are centered at 0.85, 1.30, and 1.55 microns, respectively. All three bands are 25,000 to 30,000
GHz wide. The 0.85-micron band was used first. It has higher attenuation and so is used for
shorter distances. The last two bands have good attenuation properties (less than 5% loss per
kilometer). The 1.55-micron band is now widely used with erbium-doped amplifiers that work
directly in the optical domain.
Light pulses sent down a fiber spread out in length as they propagate. This spreading is called
chromatic dispersion. The amount of it is wavelength dependent. One way to keep these
spread-out pulses from overlapping is to increase the distance between them, but this can be
done only by reducing the signaling rate. It is also possible to send pulses for thousands of
kilometers without appreciable shape distortion. These pulses are called solitons.
Fiber Cables
Fiber optic cables are similar to coax, except without the braid. Figure 2-8(a) shows a single
fiber viewed from the side. At the center is the glass core through which the light propagates.
In multimode fibers, the core is typically 50 microns in diameter, about the thickness of a
human hair. In single-mode fibers, the core is 8 to 10 microns.
The core is surrounded by a glass cladding with a lower index of refraction than the core, to
keep all the light in the core. Next comes a thin plastic jacket to protect the cladding. Fibers are
typically grouped in bundles, protected by an outer sheath. Figure 2-8(b) shows a sheath with
three fibers.
Fibers can be connected in three different ways. First, they can terminate in connectors and be
plugged into fiber sockets. Second, they can be spliced mechanically. Mechanical splices just
lay the two carefully cut ends next to each other in a special sleeve and clamp them in place.
Alignment can be improved by passing light through the junction and then making small
adjustments to maximize the signal. Third, two pieces of fiber can be fused (melted) to form a
solid connection. For all three kinds of splices, reflections can occur at the point of the splice,
and the reflected energy can interfere with the signal.
Two kinds of light sources are typically used to do the signaling. These are LEDs (Light
Emitting Diodes) and semiconductor lasers. They have different properties. They can be tuned
in wavelength by inserting Fabry-Perot or Mach-Zehnder interferometers between the source
and the fiber. Fabry-Perot interferometers are simple resonant cavities consisting of two
parallel mirrors. The light is incident perpendicular to the mirrors. The length of the cavity
selects out those wavelengths that fit inside an integral number of times. Mach-Zehnder
interferometers separate the light into two beams. The two beams travel slightly different
distances. They are recombined at the end and are in phase for only certain wavelengths.
The receiving end of an optical fiber consists of a photodiode, which gives off an electrical
pulse when struck by light. Issue lies in Thermal noise, so a pulse of light must carry enough
energy to be detected. By making the pulses powerful enough, the error rate can be made
arbitrarily small.
The electromagnetic spectrum is shown in Fig. 2-10. The radio, microwave, infrared, and
visible light portions of the spectrum can all be used for transmitting information by modulating
the amplitude, frequency, or phase of the waves. Ultraviolet light, X-rays, and gamma rays
would be even better, due to their higher frequencies, but they are hard to produce and
modulate, do not propagate well through buildings, and are dangerous to living things. In the
figure shown below, The terms LF, MF, and HF refer to Low, Medium, and High Frequency,
respectively. Also the higher bands are named as Very, Ultra, Super, Extremely, and
Tremendously High Frequency bands.
Most transmissions use a relatively narrow frequency band (i.e., Δf/f << 1). They concentrate
their signals in this narrow band to use the spectrum efficiently and obtain reasonable data rates
by transmitting with enough power. However, in some cases, a wider band is used, with three
variations. In frequency hopping spread spectrum, the transmitter hops from frequency to
frequency hundreds of times per second. It is popular for military communication because it
makes transmissions hard to detect and next to impossible to jam.
A second form of spread spectrum, direct sequence spread spectrum, uses a code sequence
to spread the data signal over a wider frequency band. It is widely used commercially as a
spectrally efficient way to let multiple signals share the same frequency band. These signals
can be given different codes, a method called CDMA (Code Division Multiple Access).
information. The rapid transitions lead to a signal that is spread thinly over a very wide
frequency band
In the VLF, LF, and MF bands, radio waves follow the ground, as illustrated in Fig. 2-12(a).
These waves can be detected for perhaps 1000 km at the lower frequencies, less at the higher
ones. Radio waves in these bands pass through buildings easily, which is why portable radios
work indoors. The main problem with using these bands for data communication is their low
bandwidth.
In the HF and VHF bands, the ground waves tend to be absorbed by the earth. However, the
waves that reach the ionosphere, a layer of charged particles circling the earth at a height of
100 to 500 km, are refracted by it and sent back to earth, as shown in Fig. 2-12(b). Under certain
atmospheric conditions, the signals can bounce several times.
the familiar satellite TV dish) gives a much higher signalto-noise ratio, but the transmitting and
receiving antennas must be accurately aligned with each other. In addition, this directionality
allows multiple transmitters lined up in a row to communicate with multiple receivers in a row
without interference, provided some minimum spacing rules are observed.
Unlike radio waves at lower frequencies, microwaves do not pass through buildings well. In
addition, even though the beam may be well focused at the transmitter, there is still some
divergence in space. Some waves may be refracted off low-lying atmospheric layers and may
take slightly longer to arrive than the direct waves. The delayed waves may arrive out of phase
with the direct wave and thus cancel the signal. This effect is called multipath fading and is
often a serious problem. It is weather and frequency dependent.
Microwave communication is so widely used for long-distance telephone communication,
mobile phones, television distribution, and other purposes that a severe shortage of spectrum
has developed. It has several key advantages over fiber. There is no need to lay down cables .
It is also relatively inexpensive.
2.3.4 Infrared Transmission
Unguided infrared waves are widely used for short-range communication. The remote controls
used for televisions, VCRs, and stereos all use infrared communication. They are relatively
directional, cheap, and easy to build but have a major drawback: they do not pass through solid
objects
security of infrared systems against eavesdropping is better than that of radio systems.
Therefore, no government license is needed to operate an infrared system, in contrast to radio
systems, which must be licensed outside the ISM bands.
2.3.5 Light Transmission
Unguided optical signaling or free-space optics has been in use for centuries. A more modern
application is to connect the LANs in two buildings via lasers mounted on their rooftops.
Optical signaling using lasers is inherently unidirectional, so each end needs its own laser and
its own photodetector. This scheme offers very high bandwidth at very low cost and is
relatively secure because it is difficult to tap a narrow laser beam. It is also relatively easy to
install and, unlike microwave transmission, does not require an FCC license.
Wind and temperature changes can distort the beam and laser beams also cannot penetrate rain
or thick fog, although they normally work well on sunny days.