1st Unit CN Notes
1st Unit CN Notes
1st Unit CN Notes
Unit-01
Physical Layer
Instructor: Md. Shahid
Syllabus: Introductory concepts: Goals and applications of
networks, categories of networks, organization of the
Internet, ISP, Network structure and architecture (layering
principles, services, protocols and standards). The OSI
reference model, TCP/IP protocol suite, Network devices
and components.
Health care: Computer networks enable the sharing of medical records, remote
consultation with specialists, and telemedicine.
Categories of Networks
[On the basis of geographic area, they cover. ]
Main categories:
1. LAN (Local Area Network) – range is around 2 miles.
2. MAN (Metropolitan-Area Network) – range around 10 miles.
3. WAN (Wide Area Network) – range can be world-wide.
1. Peer-to-peer
2. Client-server
Peer-to-peer
o Peer-To-Peer network is a network in which all the computers are linked together with
equal privilege and responsibilities for processing the data.
o Peer-To-Peer network is useful for small environments, usually up to 10 computers.
o Peer-To-Peer network has no dedicated server.
o Special permissions are assigned to each computer for sharing the resources, but this can
lead to a problem if the computer with the resource is down.
Client-Server
o Client/Server network is a network model designed for the end users called clients, to
access the resources such as songs, video, etc. from a central computer known as Server.
o The central controller is known as a server while all other computers in the network are
called clients.
o A server performs all the major operations such as security and network management.
o A server is responsible for managing all the resources such as files, directories, printer, etc.
o All the clients communicate with each other through a server. For example, if client1 wants
to send some data to client 2, then it first sends the request to the server for the
permission. The server sends the response to the client 1 to initiate its communication with
the client 2.
Layering principle
1. Physical layer: This layer is concerned with transmitting raw data bits over a
physical medium, such as copper wires or fiber optic cables.
6. Presentation layer: This layer translates data from the application layer into a
format that can be understood by the receiving device. It is also responsible for
data compression and encryption.
7. Application layer: This layer provides interfaces for applications to access the
network services. It is responsible for providing services such as email, file
transfer, and remote login.
Note-- The OSI model provides a common language for describing and
understanding communication systems. It is not a protocol in itself, but it provides
a framework for developing protocols that can be used to implement the functions
of each layer.
Layers, Interfaces, and Protocols
Protocol— It is a set of rules governing the format and meaning of the packets
that are exchanged by the peer entities within a layer ( same layer on two different
machines). It means protocols are related to the packets sent between peer
entities on different machines.
The layers in the OSI model Offer two types of services to the layers
above them: connection-oriented and connectionless
Connection-Oriented service
It is modeled after the telephone system. To talk to someone, you pick up the
phone, key in the number, talk, and then hang up. Similarly, to use a connection-
oriented network service, the service user first establishes a connection, uses the
connection, and then releases the connection. The essential aspect of a connection
is that it acts like a tube: the sender pushes bits in at one end, and the receiver
takes them out at the other end.
Connectionless service
In contrast to connection-oriented service, connectionless service is modeled after
the postal system. Each message (letter) carries the full destination address, and
each one is routed through the intermediate nodes inside the system independent
of all the subsequent messages.
Note -- The TCP/IP model is the foundation of the internet and is used by a wide
range of devices, including computers, smartphones, and servers. It provides a
standardized way for devices to communicate with each other, making it possible
for applications and services to be developed that can be used across different
platforms and devices.
Question. What is the main difference between TCP/IP reference model and OSI
reference model?
While they share some similarities, there are also several differences between
them:
Layers: The TCP/IP model consists of four layers (Application, Transport, Internet,
and Link layer), while the OSI model consists of seven layers (Application,
Presentation, Session, Transport, Network, Data Link, and Physical).
Protocols: The TCP/IP model is based on the protocols developed for the Internet,
such as TCP, IP, UDP, and ICMP, while the OSI model is a more general framework
that does not specify any particular protocols.
Approach: The TCP/IP model is a practical model that was developed based on
existing protocols and practices, while the OSI model is a theoretical model that
was developed based on the principles of layered network architecture.
Scope: The TCP/IP model is widely used in practice and is the de facto standard for
the Internet, while the OSI model is primarily used as a reference model for
teaching and understanding networking concepts.
Flexibility: The TCP/IP model is more flexible and adaptable than the OSI model, as
it can be easily extended and modified to suit different applications and network
environments.
Note:
1. Passive hubs operate below physical layer.
2. Repeaters and active hubs operate only in the physical layer (L1).
3. Bridges and two-layer switches operate in the physical and data link layer (L2).
4. Routers and three-layer switches operate in L1, L2 and L3 layers.
5. A Gateway device operates in the all layers.
Repeater
The function of a repeater device in a LAN (Local Area Network) is to regenerate
signals to extend the range (length) of the network.
In a LAN, signals can weaken as they travel along the cables between devices. This
can cause data loss, errors, and a reduction in network performance. A repeater
device is used to overcome these limitations by receiving and regenerating the
original signals before re-transmitting them on to the next device in the network.
This process effectively extends the range of the network and ensures that all
devices can communicate with each other effectively.
Repeater devices are typically used in Ethernet LANs (IEEE 802.3) and can be used
to connect devices over long distances, such as in large buildings or across
campuses. However, it's worth noting that repeaters can introduce some latency
(delay) in the network, so they should be used wisely and only when necessary.
Note – Thinnet and Thicknet are terms associated with two different types of
coaxial cables used in Ethernet networking (IEEE 802.3 LAN).
Thinnet (10 BASE2): Thinnet refers to a type of coaxial cable with a thinner
diameter, typically with a diameter of 0.2 inches (5 mm).10 represents the data
transfer rate of 10 Mbps, "BASE" indicates baseband signaling, and "2" indicates a
maximum segment length of 200 meters.
Thicknet (10 BASE5): Thicknet refers to a type of coaxial cable with a thicker
diameter, typically with a diameter of 0.4 inches (10 mm).10 represents the data
transfer rate of 10 Mbps, "BASE" indicates baseband signaling, and 5 indicates a
maximum segment length of 500 meters.
Note – In modern LANs, other technologies such as switches are often used
instead of repeaters to overcome the limitations of signal attenuation and improve
network performance.
An active hub contains electronic components, such as a power supply and a signal
regenerator, that allow it to boost the strength of the signals it receives from
connected devices before retransmitting them to other devices on the network.
This helps to overcome signal degradation that can occur when signals are
transmitted over long distances or through multiple devices.
Active hubs are typically used in larger network installations where multiple devices
need to be connected over a greater distance. They can also provide additional
features such as the ability to monitor network traffic and support for different
network protocols. However, like passive hubs, active hubs have become less
common in recent years due to the popularity of switches and routers, which
offer even greater control and functionality for network connectivity.
Bridges
A bridge is a network device used to connect two different LANs. For example, a
bridge with two ports can connect an Ethernet LAN on one side and a token ring
LAN on the other. The bridge uses a forwarding table to filter and forward data
packets between the LANs. It operates in both the physical and the data link layer.
As a physical layer device, it regenerates the signal it receives. As a data link layer
device, the bridge can check the physical (MAC) addresses contained in the frame.
Note – You will get to learn more about bridges in the second unit.
A three-layer switch (L3 switch) is used at the network layer; it’s a kind of router.
Router
…………………………………………………………………………………….
Physical Layer ( Layer-1)
The physical layer deals with the electrical, mechanical, functional and procedural
characteristics of the physical links between computing devices.
Question. Sketch the Unipolar NRZ encoding for the bit stream: 10110
Note – The name NRZ (non-return-to-zero) comes from the fact that the
signal does not return to zero between the transmission of two
consecutive bits.
Bit period (bit interval)– It is the duration of time required to transmit a single bit
over the communication channel.
Bit rate (data rate) – Bit rate is a measure of the number of bits that are transmitted
over a communication channel per unit of time, usually expressed in bits per second
(bps).
The relationship between bit rate and bit period is given by the following formula:
For example, if the bit period is 1 microsecond (1 µs), then the bit rate is:
Signal rate (baud rate/modulation rate/pulse rate)— The baud rate is the number
of signal elements transmitted in 1s. The unit is baud.
Polar encoding— In polar scheme, the voltages are on the both sides of the
time axis. Examples of polar encoding are NRZ, RZ and biphase.
Polar RZ encoding—
Symbol “0” is represented by - A/2 for the half bit period and remaining half is for
the zero voltage .
Symbol “1” is represented by + A/2 for the half bit period and remaining half is for
the zero voltage.
Question. Sketch the polar RZ encoding for the bit stream: 01001
Note – The name RZ (return-to-zero) comes from the fact that the signal
returns to zero between the transmission of two consecutive bits.
Polar NRZ—We have two versions of polar NRZ:
1. Polar NRZ-L
2. Polar NRZ-I
Question. Sketch the polar NRZ-L and NRZ-I encodings for the bit
stream: 01001110
Manchester Encoding
Question. Sketch the Biphase Manchester and Differential Manchester
encoding for the bit stream: 0101110101
Manchester Encoding
Note: There are two types of conventions in Manchester encoding:
1. Dr. Thomas: In this Manchester encoding “0” is represented as low-to-
high voltage and 1 is represented as high-to-low voltage.
2. IEEE802.3: In this Manchester encoding, 0 is represented as high-to-low
and 1 is represented as low-to-high.
Differential Manchester
o The bus topology is designed in such a way that all the stations are connected through a
single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or directly connected
to the backbone cable.
o When a node wants to send a message over the network, it puts a message over the
network. All the stations available in the network will receive the message whether it has
been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.
o The configuration of a bus topology is quite simpler as compared to other topologies.
o The backbone cable is considered as a "single lane" through which the message is
broadcast to all the stations.
o The most common access method of the bus topologies is CSMA (Carrier Sense Multiple
Access).
o Low-cost cable: In bus topology, nodes are directly connected to the cable without
passing through a hub. Therefore, the initial cost of installation is low.
o Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-based
networks that support up to 10 Mbps.
o Familiar technology: Bus topology is a familiar technology as the installation and
troubleshooting techniques are well known, and hardware components are easily
available.
o Limited failure: A failure in one node will not have any effect on other nodes.
o Extensive cabling: A bus topology is quite simpler, but still it requires a lot of cabling.
o Difficult troubleshooting: It requires specialized test equipment to determine the cable
faults. If any fault occurs in the cable, then it would disrupt the communication for all the
nodes.
o Signal interference: If two nodes send the messages simultaneously, then the signals of
both the nodes collide with each other.
o Reconfiguration difficult: Adding new devices to the network would slow down the
network.
o Attenuation: Attenuation is a loss of signal leads to communication issues. Repeaters are
used to regenerate the signal.
Ring Topology
o Ring topology is like a bus topology, but with connected ends.
o The node that receives the message from the previous computer will retransmit to the next
node.
o The data flows in one direction, i.e., it is unidirectional.
o The data flows in a single loop continuously known as an endless loop.
o It has no terminated ends, i.e., each node is connected to other node and having no
termination point.
o The data in a ring topology flow in a clockwise direction.
o The most common access method of the ring topology is token passing.
o Token passing: It is a network access method in which token is passed from one
node to another node.
o Token: It is a frame that circulates around the network.
o A token moves around the network, and it is passed from computer to computer until it
reaches the destination.
o The sender modifies the token by putting the address along with the data.
o The data is passed from one device to another device until the destination address
matches. Once the token received by the destination device, then it sends the
acknowledgment to the sender.
o In a ring topology, a token is used as a carrier.
o Network Management: Faulty devices can be removed from the network without
bringing the network down.
o Product availability: Many hardware and software tools for network operation and
monitoring are available.
o Cost: Twisted pair cabling is inexpensive and easily available. Therefore, the installation
cost is very low.
o Reliable: It is a more reliable network because the communication system is not
dependent on the single host computer.
Disadvantages of Ring topology:
Star Topology
o Star topology is an arrangement of the network in which every node is connected to the
central hub, switch or a central computer.
o The central computer is known as a server, and the peripheral devices attached to the
server are known as clients.
o Coaxial cable or RJ-45 cables are used to connect the computers.
o Hubs or Switches are mainly used as connection devices in a physical star topology.
o Star topology is the most popular topology in network implementation.
Advantages of Star topology
Dependence on Central Hub: The star topology depends heavily on the central hub or switch. If
the central hub or switch fails, the entire network can be disrupted. This means that the network
may be less resilient and reliable than other topologies such as the mesh topology.
Cost: Implementing a star topology can be more expensive than other topologies, particularly in
larger networks. Each device requires its own cable to connect to the central hub or switch, which
can increase the cost of cabling.
Limited scalability: The star topology may not be as scalable as other topologies. As the number
of devices in the network increases, the central hub or switch may become overloaded, which can
lead to network congestion and slow performance.
Single Point of Failure: Since all devices are connected to the central hub or switch, it becomes
a single point of failure. If the central hub or switch fails, all the devices connected to it lose
connectivity.
Limited Distance: The distance between the central hub or switch and the devices connected to
it is limited by the length of the cables used. This means that the star topology may not be suitable
for large geographic areas.
Overall, while the star topology is a popular choice for small to medium-sized networks, its
limitations should be considered when designing larger or more complex networks.
Tree topology
o Tree topology combines the characteristics of bus topology and star topology.
o A tree topology is a type of structure in which all the computers are connected with each
other in hierarchical fashion.
o The top-most node in tree topology is known as a root node, and all other nodes are the
descendants of the root node.
o There is only one path exists between two nodes for the data transmission. Thus, it forms
a parent-child hierarchy.
o Difficult troubleshooting: If any fault occurs in the node, then it becomes difficult to
troubleshoot the problem.
o High cost: Devices required for broadband transmission are very costly.
o Failure: A tree topology mainly relies on main bus cable and failure in main bus cable will
damage the overall network.
o Reconfiguration difficult: If new devices are added, then it becomes difficult to
reconfigure.
Mesh topology
o Mesh technology is an arrangement of the network in which computers are interconnected
with each other through various redundant connections.
o There are multiple paths from one computer to another computer.
o It does not contain the switch, hub or any central computer which acts as a central point
of communication.
o The Internet is an example of the mesh topology.
o Mesh topology is mainly used for WAN implementations where communication failures
are a critical concern.
o Mesh topology is mainly used for wireless networks.
o Mesh topology can be formed by using the formula:
Number of cables = (n*(n-1))/2;
o Full Mesh Topology: In a full mesh topology, each computer is connected to all the
computers available in the network.
o Partial Mesh Topology: In a partial mesh topology, not all but certain computers are
connected to those computers with which they communicate frequently.
Advantages of Mesh topology:
Reliable: The mesh topology networks are very reliable as if any link breakdown will not
affect the communication between connected computers.
Easier Reconfiguration: Adding new devices would not disrupt the communication
between other devices.
o Cost: A mesh topology contains a large number of connected devices such as a router and
more transmission media than other topologies.
o Management: Mesh topology networks are very large and very difficult to maintain and
manage. If the network is not monitored carefully, then the communication link failure
goes undetected.
o Efficiency: In this topology, redundant connections are high that reduces the efficiency of
the network.
Hybrid Topology
o Reliable: If a fault occurs in any part of the network will not affect the functioning of the
rest of the network.
o Scalable: Size of the network can be easily expanded by adding new devices without
affecting the functionality of the existing network.
o Flexible: This topology is very flexible as it can be designed according to the requirements
of the organization.
o Effective: Hybrid topology is very effective as it can be designed in such a way that the
strength of the network is maximized and weakness of the network is minimized.
o Complex design: The major drawback of the Hybrid topology is the design of the Hybrid
network. It is very difficult to design the architecture of the Hybrid network.
o Costly Hub: The Hubs used in the Hybrid topology are very expensive as these hubs are
different from usual Hubs used in other topologies.
o Costly infrastructure: The infrastructure cost is very high as a hybrid network requires a
lot of cabling, network devices, etc.
1. Point-to-point connection
A point to point connection provides a dedicated link between two
devices. The entire capacity of the link is reserved for transmission between
those two devices only.
2. Multipoint connection
A multipoint (also called multidrop) connection is one in which more
than two specific devices share a single link.
Transmission Media
Twisted pair:
Twisted pair is a physical media made up of a pair of cables twisted with each other.
A twisted pair cable is cheap as compared to other transmission media. Installation
of the twisted pair cable is easy, and it is a lightweight cable. The frequency range
for twisted pair cable is from 0 to 3.5KHz.
A twisted pair consists of two insulated copper wires arranged in a regular spiral pattern.
1M
Taking a Look at the Upcoming Linux Mint 20.3 'Una' Before 2021 Ends
The degree of reduction in noise interference is determined by the number of turns per
foot. Increasing the number of turns per foot decreases noise interference.
o It is cheap.
o Installation of the unshielded twisted pair is easy.
o It can be used for high-speed LAN.
Disadvantage:
o This cable can only be used for shorter distances because of attenuation.
o The cost of the shielded twisted pair cable is not very high and not very low.
o An installation of STP is easy.
o It has higher capacity as compared to unshielded twisted pair cable.
o It has a higher attenuation.
o It is shielded that provides the higher data transmission rate.
Disadvantages
Coaxial Cable
o Coaxial cable is very commonly used transmission media, for example, TV wire is usually a
coaxial cable.
o The name of the cable is coaxial as it contains two conductors parallel to each other.
o It has a higher frequency as compared to Twisted pair cable.
o The inner conductor of the coaxial cable is made up of copper, and the outer conductor is
made up of copper mesh. The middle core is made up of non-conductive cover that
separates the inner conductor from the outer conductor.
o The middle core is responsible for the data transferring whereas the copper mesh prevents
from the EMI(Electromagnetic interference).
Coaxial cable is of two types:
Fiber Optic
o It uses electrical signals for communication.
o It holds the optical fibers coated in plastic that are used to send the data by pulses of light.
o The plastic coating protects the optical fibers from heat, cold, electromagnetic interference
from other types of wiring.
o It provides faster data transmission than copper wires.
o Core: The optical fiber consists of a narrow strand of glass or plastic known as a core. A
core is a light transmission area of the fiber. The more the area of the core, the more light
will be transmitted into the fiber.
o Cladding: The concentric layer of glass is known as cladding. The main functionality of the
cladding is to provide the lower refractive index at the core interface as to cause the
reflection within the core so that the light waves are transmitted through the fiber.
o Jacket: The protective coating consisting of plastic is known as a jacket. The main purpose
of a jacket is to preserve the fiber strength, absorb shock and extra fiber protection.
o Greater Bandwidth: The fiber optic cable provides more bandwidth as compared copper.
Therefore, the fiber optic carries more data as compared to copper cable.
o Faster speed: Fiber optic cable carries the data in the form of light. This allows the fiber
optic cable to carry the signals at a higher speed.
o Longer distances: The fiber optic cable carries the data at a longer distance as compared
to copper cable.
o Better reliability: The fiber optic cable is more reliable than the copper cable as it is
immune to any temperature changes while it can cause obstruct in the connectivity of
copper cable.
o Thinner and Sturdier: Fiber optic cable is thinner and lighter in weight so it can withstand
more pull pressure than copper cable.
UnGuided Transmission
o An unguided transmission transmits the electromagnetic waves without using any physical
medium. Therefore, it is also known as wireless transmission.
o In unguided media, air is the media through which the electromagnetic energy can flow
easily.
Radio waves
o Radio waves are the electromagnetic waves that are transmitted in all the directions of free
space.
o Radio waves are omnidirectional, i.e., the signals are propagated in all the directions.
o The range in frequencies of radio waves is from 3Khz to 1 GHz.
o In the case of radio waves, the sending and receiving antenna are not aligned, i.e., the
wave sent by the sending antenna can be received by any receiving antenna.
o An example of the radio wave is FM radio.
o A Radio wave is useful for multicasting when there is one sender and many receivers.
o An FM radio, television, cordless phones are examples of a radio wave.
Microwaves
o Terrestrial microwave
o Satellite microwave communication.
o Frequency range: The frequency range of terrestrial microwave is from 4-6 GHz to 21-23
GHz.
o Bandwidth: It supports the bandwidth from 1 to 10 Mbps.
o Short distance: It is inexpensive for short distance.
o Long distance: It is expensive as it requires a higher tower for a longer distance.
o Attenuation: Attenuation means loss of signal. It is affected by environmental conditions
and antenna size.
Advantages of Microwave:
o A satellite is a physical object that revolves around the earth at a known height.
o Satellite communication is more reliable nowadays as it offers more flexibility than cable
and fiber optic systems.
o We can communicate with any point on the globe by using satellite communication.
The satellite accepts the signal that is transmitted from the earth station, and it amplifies
the signal. The amplified signal is retransmitted to another earth station.
o The coverage area of a satellite microwave is more than the terrestrial microwave.
o The transmission cost of the satellite is independent of the distance from the center of the
coverage area.
o Satellite communication is used in mobile and wireless communication applications.
o It is easy to install.
o It is used in a wide variety of applications such as weather forecasting, radio/TV signal
broadcasting, mobile communication, etc.
o Satellite designing and development requires more time and higher cost.
o The Satellite needs to be monitored and controlled on regular periods so that it remains
in orbit.
o The life of the satellite is about 12-15 years. Due to this reason, another launch of the
satellite has to be planned before it becomes non-functional.
Infrared
o An infrared transmission is a wireless technology used for communication over short
ranges.
o The frequency of the infrared in the range from 300 GHz to 400 THz.
o It is used for short-range communication such as data transfer between two cell phones,
TV remote operation, data transfer between a computer and cell phone resides in the same
closed area.
Characteristics of Infrared:
o It supports high bandwidth, and hence the data rate will be very high.
o Infrared waves cannot penetrate the walls. Therefore, the infrared communication in one
room cannot be interrupted by the nearby rooms.
o An infrared communication provides better security with minimum interference.
o Infrared communication is unreliable outside the building because the sun rays will
interfere with the infrared waves.
Transmission Modes
o The way in which data is transmitted from one device to another device is known
as transmission mode.
o The transmission mode is also known as the communication mode.
o Each communication channel has a direction associated with it, and transmission
media provide the direction. Therefore, the transmission mode is also known as a
directional mode.
o The transmission mode is defined in the physical layer.
The Transmission mode is divided into three categories:
Simplex mode
Half-duplex mode
Full-duplex mode
Send/Receive A device can only send the Both the devices can Both the devices can send and
data but cannot receive it or send and receive the receive the data simultaneously.
it can only receive the data data, but one at a time.
but cannot send it.
Performance The performance of half- The performance of The Full-duplex mode has better
duplex mode is better than full-duplex mode is performance among simplex and
the simplex mode. better than the half- half-duplex mode as it doubles the
duplex mode. utilization of the capacity of the
communication channel.
Example Examples of Simplex mode Example of half-duplex Example of the Full-duplex mode is
are radio, keyboard, and is Walkie-Talkies. a telephone network.
monitor.
Network performance
Network performance refers to the efficiency, reliability, and speed with which a
computer network can transmit data from one device to another. There are several
factors that can impact network performance, mainly:
1. Bandwidth
2. Throughput
3. Latency (delay)
For example, we can have a link with a bandwidth of 100 Mbps, but the device
connected to the end of the link may handle only 10 Mbps. Here, 100 Mbps is
bandwidth ( max speed) and 10 Mbps is throughput (actual speed).
3. Latency (delay) — How long it takes for an entire message to completely
arrive at the destination from the time first bit is sent out from the source. It
consists of mainly four components:
a. Transmission delay
b. Propagation delay
c. Queuing delay
d. Processing delay
a. Transmission delay ( Tt )—Time it takes to place the complete data packet on the
transmission medium.
d. Processing delay—How much time the node takes to process the message.
Transmission Impairment
It refers to any type of degradation or distortion of a signal as it travels through a
transmission medium from the sender to the receiver.
Causes of impairment
Attenuation: The weakening of the signal as it travels over a distance due to factors
such as cable resistance or absorption.
The decibel (Db) measures the relative strength of two signals or one signal at two
different points.
Note—The decibel is negative if a signal is attenuated and positive if a signal is
amplified.
Db = 10 log10 P2/P1
Variables P2 and P1 are the powers of a signal at point 1 and 2, respectively.
Distortion: The alteration of the signal waveform due to factors such as signal
reflection, dispersion, or delay.
Switching techniques are used to forward data from one network node (router or
gateway) to another.
2. Packet switching:
a. Virtual packet switching, also known as virtual circuit switching, involves establishing a
dedicated, logical connection between two nodes in a network before transmitting any
data. This connection is called a virtual circuit, and it is maintained throughout the
duration of the communication session. Each packet sent over the virtual circuit is labeled
with a connection identifier that is used by the network to route the packet to its
destination. This method provides a more predictable and reliable communication
experience, as packets are delivered in order and with a consistent delay.
Multiplexing
Multiplexing is the process of combining multiple data streams into a single data stream
that can be transmitted over a shared medium. In the data link layer, multiplexing is used
to efficiently use the available bandwidth and to allow multiple devices to share the same
communication channel.
The main function of multiplexing in the data link layer is to enable the transmission of
multiple data streams over a single communication channel. This is achieved through
various techniques such as time division multiplexing (TDM), frequency division
multiplexing (FDM), and code division multiplexing (CDM).
In TDM, each data stream is given a dedicated time slot for transmission, so that multiple
streams can be transmitted one after the other, in a round-robin fashion. In FDM, the
frequency band is divided into multiple sub-bands, and each data stream is assigned to a
specific sub-band. In CDM, each data stream is assigned a unique code, and all the data
streams are transmitted simultaneously using the same frequency band.
Multiplexing in the data link layer also helps to reduce the overhead associated with
transmitting multiple data streams separately. By combining multiple data streams into a
single data stream, the overhead associated with data framing, error checking, and flow
control can be reduced, leading to more efficient use of the available bandwidth.
Overall, the function of multiplexing in the data link layer is to improve the efficiency of
data transmission by enabling multiple data streams to be transmitted over a single
communication channel, while minimizing the overhead associated with transmitting
multiple streams separately.
Solution
f = 1/T
Question.
Question. In a certain communication channel, the signal power is 100 W and noise
power is 10 W. In order to send information at the rate of 10 kbps, what is require
bandwidth?
Solution:
We can use Shannon's formula to calculate the required bandwidth of the communication
channel:
C = B log2(1 + S/N)
where C is the channel capacity (bits per second), B is the bandwidth (hertz), S is
the signal power, and N is the noise power.
signal power is 100 W, noise power is 10 W and data rate of 10 kbps
Max data rate = bandwidth * log2 (1 + (Signal power / Noise power))
10 = bandwidth * log (1 + (100 / 10)) { log (1 + (100 / 10)) = 3.4594 approx. equal
to 4 is taken here}
10 = bandwidth * 4
bandwidth = 2.5 Kbps
Question. What is the transmission delay of a packet sent by a station if
the length of the packet is 2 million bytes and the bandwidth of the
channel is 300 kbps?
Solution
To calculate the transmission delay of a packet, we use the following
formula:
Transmission delay = packet length / bandwidth
Given that the length of the packet is 2 million bytes and the bandwidth
of the channel is 300 kbps, we can convert the units as follows:
2 million bytes = 2,000,000 * 8 bits = 16,000,000 bits