Computer Networks_Unit I
Computer Networks_Unit I
(21UCS05)
LECTURE NOTES
UNIT - 1
III SEMESTER
1
Unit - I
1.1 Introduction
Conference calling
Call waiting
Voice mail
Caller ID
1. Delivery
• The system must deliver data to the correct destination. Data must be received by the
intended device or user and only by that device or user.
2. Accuracy
• The system must deliver the data accurately. Data that have been altered in
transmission and left uncorrected are unusable.
3. Timeliness
• The system must deliver data in a timely manner. Data delivered late are useless. In
the case of video and audio, timely delivery means delivering data as they are
produced, in the same order that they are produced, and without significant delay.
This kind of delivery is called real-time transmission.
2
4. Jitter
• Jitter refers to the variation in the packet arrival time. It is the uneven delay in the
delivery of audio or video packets. For example, let us assume that video packets are
sent every 30 ms. If some of the packets arrive with 30-ms delay and others with 40-
ms delay, an uneven quality in the video is the result.
• The word data refers to information presented in whatever form is agreed upon by the
parties creating and using the data.
• Data communications are the exchange of data between two devices via some form of
transmission medium such as a wire cable.
2. Sender: The sender is the device that sends the data message. It can be a computer,
workstation, telephone handset, video camera, and so on.
3. Receiver: The receiver is the device that receives the message. It can be a
computer, workstation, telephone handset, television, and so on.
4.Medium: The transmission medium is the physical path by which a message travels from
sender to receiver. Some examples of transmission media include twisted-pair wire, coaxial
cable, fiber-optic cable, and radio waves.
5. Protocol: A protocol is a set of rules that govern data communications. It represents an
agreement between the communicating devices. Without a protocol, two devices may be
connected but not communicating, just as a person speaking French cannot be understood by
a person who speaks only Japanese.
3
1.1.2 Data flow (simplex, half-duplex, and full-duplex)
The communication is unidirectional. Only one device on a link can transmit and
the other can only receive. The simplex mode can use the entire capacity of the
channel to send data in one direction. Example: Keyboards, Monitors
2. Half-Duplex (one-lane with two-directional traffic)
Each station can both transmit and receive, but not at the same time. When one
device is sending, the other can only receive, and vice versa. The entire capacity of
a channel is taken over by the transmitting device. Example: Walkie-talkies
3. Full-Duplex (Duplex) (two-way street)
In full-duplex, both stations can transmit and receive simultaneously. One common
example of full-duplex communication is the telephone network. When two people are
communicating by a telephone line, both can talk and listen at the same time. The full-
duplex mode is used when communication in both directions is required all the time.
Example: Telephone network
• Computer network consists of two or more computers that are linked in order to
share resources, exchange data files or to allow electronic communication.
• The computers on a network may be linked through cables, telephone lines,
radio waves, satellites or infrared light beams.
• There are two aspects of computer networks – hardware and software.
• Hardware includes physical connection between two machines by using adaptors,
cables, routers, bridges etc.
4
• Software includes a set of protocols. Protocols define a formal language among
various components. It makes hardware usable by applications.
1. Business Applications
2. Home Applications
3. Mobile Users
4. Social Issues
1. Business Applications
A company may have a computer for each worker and use them to design
products, write brochures, and do the payroll. Resource sharing is to make all
programs, equipment, and especially data available to anyone on the network
without regard to the physical location of the user. Networks called VPNs (Virtual
Private Networks) may be used to join the individual networks at different
sites into one extended networks.
Client –Server Model: It is widely used and forms the basis of much network usage.
• Telephone calls between employees may be carried by the computer network instead
of by the phone company. This technology is called IP telephony or Voice over IP
(VoIP)
5
Many companies is doing business electronically, especially with customers and
suppliers is called e-commerce (electronic commerce).
2. Home Applications
Many people pay their bills, manage bank accounts, and handle their investments
electronically. On-line newspaper which can be personalized. Access to information system
like World Wide Web, which contains information about arts, business, cooking,
government, health, history, science, sports, travel etc. All the above applications involve in
interactions between a person and remote database.
2.Person-to-person communication
3.Interactive entertainment
Video
Game playing
4.Electronic Commerce
6
Some Forms of E- commerce
3. Mobile Users
Mobile computers, such as laptop and handheld computers, are one of the fastest-
growing segments of the computer industry.
Wireless hotspots based on the 802.11 standard are another kind of wireless network
for mobile computers.
Text messaging or texting is allows a mobile phone user type a short message that is
then delivered by the cellular network to another mobile subscriber.
Smart phones, such as the popular iPhone, combine aspects of mobile phones and
mobile computers.
NFC (Near Field Communication) technology the mobile can act as an RFID
smartcard and interact with a nearby reader for payment.
Sensor networks are made up of nodes that gather and wirelessly relay information
they sense about the state of the physical world
4. Social Issues
Network neutrality is the communications that are not differentiated by their content
or source or who is providing the content.
7
Digital Millennium Copyright Act was passed in 1998 as an anti-piracy statute
effectively making it illegal to circumvent copy protections designed to prevent
pirates from duplicating digital copyrighted works and selling or freely distributing
them
1. Point-to-Point
A point-to-point connection provides a dedicated link between two devices. The entire
capacity of the link is reserved for transmission between those two devices. Most
point-to-point connections use an actual length of wire or cable to connect the two
ends, but other options, such as microwave or satellite links, are also possible. When
we change television channels by infrared remote control, we are establishing a point-
to-point connection between the remote control and the television's control system.
8
2. Multipoint (multi drop)
Multipoint (also called multi drop) connection is one in which more than two specific
devices share a single link. In a multipoint environment, the capacity of the channel is
shared, either spatially or temporally. If several devices can use the link
simultaneously, it is a spatially shared connection.
Figure 7: Multipoint
The term physical topology refers to the way in which a network is laid out
physically. Two or more devices connect to a link; two or more links form a topology. The
topology of a network is the geometric representation of the relationship of all the links and
linking devices (nodes) to one another.
Figure 8: Topology
1. Mesh Topology
In a mesh topology, every device has a dedicated point-to-point link to every other
device. The term dedicated means that the link carries traffic only between the two devices it
connects. To link n devices fully connected mesh has: n ( n - 1) / 2 physical channels (Full-
Duplex). Every Device on the network must have n - 1 ports
9
Example Problem:
Mesh : Advantages
Each connection carry its own data load (no traffic problems)
A mesh topology is robust
Privacy or security
Fault identification and fault isolation.
Mesh: Disadvantages
2. Star Topology
In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub. The devices are not directly linked to one another. Unlike a
mesh topology, a star topology does not allow direct traffic between devices. The controller
acts as an exchange: If one device wants to send data to another, it sends the data to the
controller, which then relays the data to the other connected device.
10
Star : Advantages
Star : Disadvantages
3. Bus Topology
A bus topology is multipoint. One long cable acts as a backbone to link all the devices
in a network. Nodes are connected to the bus cable by drop lines and taps. A drop line is a
connection running between the device and the main cable. A tap is a connector that either
splices into the main cable or joined in cable to create a contact with the metallic core.
Bus : Advantages
Ease of installation
Less cables than mesh, star topologies
Bus : Disadvantages
11
The damaged area reflects signals back in the direction of the origin, creating noise in both
directions.
4. Ring Topology
Each device has dedicated point-to-point connection with only the two devices on
either side of it. A signal is passed along the ring in one direction from device to device until
it reaches its destination. Each devices incorporates a Repeater
Ring : Advantages
Ring : Disadvantage
Unidirectional
One broken device can disable the entire network. This weakness can be solved by using a
dual ring or a switch capable of closing off the break
5. Hybrid Topology
12
Figure 13: Hybrid Topology
Advantages
It can be utilize the strongest aspects of other networks, e.g., signal strength.
Disadvantages
Network Category depends on its size and it is divided into 5 categories. The primary
categories are :
5. Internetworks
13
1. Personal Area Network (PAN)
It is a computer network organized around an individual person within a single
building. A typical PAN would include one or more computers, telephones, peripheral
devices, video game consoles and other personal entertainment devices. To help these users,
some companies got together to design a short-range wireless network called Bluetooth to
connect these components without wires. PANs can also be built with other technologies
that communicate over short ranges, such as RFID on smartcards and library books.
Figure 15: Wireless and wired LANs. (a) 802.11. (b) Switched Ethernet
Data Rates (speed):
Early: 4 to 16 Mbps
Today: 100 to 1000 Mbps
14
3. Metropolitan Area Networks (MAN)
A metropolitan area network (MAN) is a network with a size between a LAN and a
WAN. It normally covers the area inside a town or a city. It is designed for customers who
need a high-speed connectivity, normally to the Internet, and have endpoints spread over a
city or part of city. A good example of a MAN is the part of the telephone company network
that can provide a high-speed DSL line to the customer. Another example is the cable TV
network.
15
Figure 18: Leased line from a telephone company
5. Internetworks
There are International service providers (ISPs) offer services to the end users.
• International service providers
• National service providers
• Regional service providers
• Local service providers
16
Figure 19: Hierarchical organization of the Internet
1. Protocol hierarchies
2. Design issues for the layers
3. Connection-oriented versus connectionless service
4. Service primitives
5. Relationship of services to protocols
1. Protocol Hierarchies
To reduce the design complexity, most networks are organized as a series of layers or
levels. Each one built upon the one below it.
The number of layers, name of each layer, contents of each layer and the function of
each layer differ from network to network.
Layer n on one machine carries on a conversation with layer n on another machine.
The rules and conventions used in this conversation are collectively known as the layer
n protocol.
17
Figure 20: Layering
• Between each pair of adjacent layers there is an interface.
• A set of layers and protocols is called a network architecture.
• A list of protocols used by a certain system , one protocol per layer, is called a
protocol stack.
18
Figure 22: Layer Concepts
2. Design Issues for the Layers
• Addressing - Each layer needs a mechanism for identifying senders and receivers.
• Data transfer – simplex, half-duplex, full duplex
• Error Control – error-correction and error – detection.
• Flow Control - The communication channels must preserve the order of messages
sent on them – disassembling, transmitting, and then reassembling.
• Multiplexing – inconvenient or expensive to set up a connection for each pair of
communication process.
• Routing – multiple paths between source and destination, a route must be chosen
19
4. Service Primitives
20
• Each communicating user or program is at a computer that can provide those seven layers
of function.
• The seven layers of function are provided by a combination of applications, operating
systems, network card device drivers and networking hardware that enable a system to put a
signal on a network cable or out over Wi-Fi or other wireless protocol.
The OSI model has seven layers. The principles that were applied to arrive at the
seven layers are
21
1. Physical layer
It Converts bits into electronic signals for outgoing messages and Converts electronic
signals into bits for incoming messages. The physical layer is concerned with transmitting
raw bits over a communication channel. The design issues have to do with making sure that
when one side sends a 1 bit, it is received by the other side as a 1 bit, not as a 0 bit.
1. Bit synchronization: The physical layer provides the synchronization of the bits by
providing a clock. This clock controls both sender and receiver thus providing
synchronization at bit level.
2. Bit rate control: The Physical layer also defines the transmission rate i.e. the number of
bits sent per second.
3. Physical topologies: Physical layer specifies the way in which the different, devices/nodes
are arranged in a network i.e. bus, star or mesh topolgy.
4. Transmission mode: Physical layer also defines the way in which the data flows between
the two connected devices. The various transmission modes possible are: Simplex, half-
duplex and full-duplex.
22
The main task of the data link layer is to transform a raw transmission facility into a
line that appears free of undetected transmission errors to the network layer. It accomplishes
this task by having the sender break up the input data into data frames (typically a few
hundred or a few thousand bytes) and transmits the frames sequentially.
At the receiving end, this layer packages raw data from the physical layer into data
frames for delivery to the Network layer. At the sending end this layer handles conversion of
data into raw formats that can be handled by the Physical Layer. If the service is reliable, the
receiver confirms correct receipt of each frame by sending back an acknowledgement frame.
The physical layer accepts and transmits stream of bits, the data link layer should
create and recognize frame boundaries. This can be accomplished by attaching special bit
patterns to the beginning and ending of frame. A duplicate frame could be sent if the
acknowledgement frame from receiver back to the sender were lost.
1. Framing: Framing is a function of the data link layer. It provides a way for a sender to
transmit a set of bits that are meaningful to the receiver. This can be accomplished by
attaching special bit patterns to the beginning and end of the frame.
2. Physical addressing: After creating frames, Data link layer adds physical addresses (MAC
address) of sender and/or receiver in the header of each frame.
3. Error control: Data link layer provides the mechanism of error control in which it detects
and retransmits damaged or lost frames.
4. Flow Control: The data rate must be constant on both sides else the data may get
corrupted thus , flow control coordinates that amount of data that can be sent before receiving
acknowledgement.
Data Link layer is handled by the NIC (Network Interface Card) and device drivers
of host machines. Switch & Bridge are Data Link Layer devices.
23
3. Network layer
The network layer controls the operation of the subnet.The network layer is
responsible for the delivery of individual packets from the source host to the destination host.
The network layer controls the operation of the subnet. A key design issue is determining
how packets are routed from source to destination.
Routes can be based on static tables that are ''wired into'' the network and rarely
changed. They can also be determined at the start of each conversation. If too many packets
are present in the subnet at the same time, they will get in one another's way, forming
bottlenecks. The control of such congestion also belongs to the network layer.
When a packet has to travel from one network to another to get to its destination,
many problems can arise. The addressing used by the second network may be different from
the first one. The second one may not accept the packet at all because it is too large.
The protocols may differ, and so on. It is up to the network layer to overcome all
these problems.
1. Routing: The network layer protocols determine which route is suitable from source to
destination. This function of network layer is known as routing.
24
4. Transport layer
It Manages the transmission of data across a network. Manages the flow of data
between parties by segmenting long data streams into smaller data chunks (based on allowed
“packet” size for a given transmission medium). Reassembles chunks into their original
sequence at the receiving end. It Provides acknowledgements of successful transmissions and
requests resends for packets which arrive with errors.
The basic function of the transport layer is to accept data from above, split it up into
smaller units if need be, pass these to the network layer, and ensure that the pieces all arrive
correctly at the other end. The transport layer is responsible for the delivery of a message
from one process to another. If transport connection requires a high throughput, the transport
layer might create multiple network connections. (if expensive multiple several transport
connections onto the same network connection).
The transport layer also determines what type of service to provide to the session
layer, and, ultimately, to the users of the network. The most popular type of transport
connection is an error-free point-to-point channel that delivers messages or bytes in the order
in which they were sent. The type of service is determined when the connection is
established. The transport layer is a true end-to-end layer, all the way from the source to the
destination.
1. Segmentation and Reassembly: This layer accepts the message from the (session) layer,
breaks the message into smaller units. Each of the segment produced has a header associated
with it. The transport layer at the destination station reassembles the message.
2. Service Point Addressing: In order to deliver the message to correct process, transport
layer header includes a type of address called service point address or port address. Thus by
specifying this address, transport layer makes sure that the message is delivered to the correct
process
25
5. Session layer
The session layer allows users on different machines to establish sessions between them.
Sessions offer various services, including dialog control (keeping track of whose turn it is to
transmit), token management (preventing two parties from attempting the same critical
operation at the same time), and synchronization (check pointing long transmissions to
allow them to continue from where they were after a crash).
1. Session establishment, maintenance and termination: The layer allows the two
processes to establish, use and terminate a connection.
2. Synchronization : This layer allows a process to add checkpoints which are considered as
synchronization points into the data. These synchronization point help to identify the error so
that the data is re-synchronized properly, and ends of the messages are not cut prematurely
and data loss is avoided.
3. Dialog Controller : The session layer allows two systems to start communication with
each other in half-duplex or full-duplex.
6. Presentation layer
26
The presentation layer is concerned with the syntax and semantics of the information
transmitted. In order to make it possible for computers with different data representations to
communicate, the data structures to be exchanged can be defined, along with a standard
encoding to be used ''on the wire.'' The presentation layer manages these abstract data
structures and allows higher-level data structures (e.g., banking records), to be defined and
exchanged.
2. Encryption/ Decryption: Data encryption translates the data into another form or code.
The encrypted data is known as the cipher text and the decrypted data is known as plain text.
A key value is used for encrypting as well as decrypting data.
3. Compression: Reduces the number of bits that need to be transmitted on the network.
7. Application layer
The application layer is responsible for providing services to the user. The application
layer contains a variety of protocols that are commonly needed by users.
27
2. FTAM-File transfer access and management
3. Mail Services
4. Directory Services
1. The ARPANET
The Internet is not a network, but a vast collection of different networks that use
certain common protocols and provide certain common services.
US created a single defense research organization, ARPA, the Advanced Research
Projects Agency – it had no scientists or laboratories but did its work by issuing
grants and contracts to universities and companies.
Figure 34: (a) Structure of the telephone system (b) Baran’s proposed distributed switching System
28
Figure 35: The ARPANET design
During the 1980s, additional networks, mainly LANs, were connected to the
ARPANET. Finding hosts became increasingly expensive, so DNS (Domain Name
System) was created to organize machines into domains and map host names onto IP
addresses.
DNS has become a generalized, distributed database system for storing a variety of
information
2. NSFNET
In 1970s, NSF (the U.S. National Science Foundation) found the major impact of the
ARPANET and designed a successor to the ARPANET that is open to all university
research groups
NSF decided to build a backbone network to connect its six supercomputer centers, in
San Diego, Boulder, Champaign, Pittsburgh, Ithaca, and Princeton
NSF also funded some regional networks that connected to the backbone to allow
users at thousands of universities, research labs, libraries, and museums to access any
of the supercomputers and to communicate with one another.
This complete network was called NSFNET
NSF awarded contracts to four different network operators to establish a NAP
(Network Access Point)
During the 1990s, many other countries and regions also built national research
networks, often patterned on the ARPANET and NSFNET. They are Europa NET and
EBONE in Europe.
29
When NSFNET and the ARPANET were interconnected, the growth became
exponential. Many regional networks joined up, and connections were made to
networks in Canada, Europe, and the Pacific
The glue that holds the Internet together is the TCP/IP reference model and TCP/IP
protocol stack
To be on the Internet - a machine is on the Internet if it runs the TCP/IP protocol
stack, has an IP address, and can send IP packets to all the other machines on the
Internet.
Up to 1990s, the Internet was largely populated by academic, government, and
industrial researchers.
WWW (World Wide Web) changed all that and brought millions of new, non-
academic users to the net.
30
The essence of frame relay is that it is a connection-oriented network with no error
control and no flow control
ATM (Asynchronous Transfer Mode) - merging voice, data, cable television, telex,
telegraph, etc into a single integrated system that could do everything for everyone .
ATM transmits all information in small, fixed-size packets called cells - an ATM cell.
5. Ethernet
Internet and ATM are designed for wide area networking
The most popular LAN is Ethernet
Up to 256 machines could be attached to the system via transceivers screwed onto the
cable.
A cable with multiple machines attached to it in parallel is called a multidrop cable
A computer first listened to the cable to see if someone else was already transmitting,
the computer held back until the current transmission finished
Architecture of the original Ethernet.
If two or more computers start transmitting at once each computer listens during its
own transmission and if it detects interference, jam the ether to alert all senders
Then the station/computer backs off and waits a random time before retrying
31
If a second collision happens, the random waiting time is doubled, and so on, to
spread out the competing transmissions and give one of them a chance to go first
In 1978 Xerox drew the 10-Mbps Ethernet standard – became IEEE 802.3 standard in
1983.
Figure 40: (a) Wireless networking with a base station. (b) Ad hoc networking.
Ethernet had dominated local area networking, so the committee decided to make
802.11 compatible with Ethernet above the data link layer.
Possible to send an IP packet over the wireless LAN the same way a wired computer
sent an IP packet over Ethernet.
Another problem is that a radio signal can be reflected off solid objects, so it may be
received multiple times (along multiple paths). This interference results in what is
called multipath fading.
32
Figure 41: The range of a single radio may not cover the entire system.
1. Fourier Analysis
In the early 19th century, the French mathematician Jean-Baptiste Fourier proved that
any reasonably behaved periodic function, g(t) with period T can be constructed as the sum of
a (possibly infinite) number of sines and cosines:
(1)
where f = 1/T is the fundamental frequency, an and bn are the sine and cosine
amplitudes of the nth harmonics (terms), and c is a constant. Such a decomposition is called a
Fourier series. From the Fourier series, the function can be reconstructed; that is, if the
period, T, is known and the amplitudes are given, the original function of time can be found
by performing the sums of Eq. (1).
A data signal that has a finite duration (which all of them do) can be handled by just
imagining that it repeats the entire pattern over and over forever (i.e., the interval from T to
2T is the same as from 0 to T, etc.).
33
The an amplitudes can be computed for any given g(t) by multiplying both sides of
Eq. (1) by sin(2?kft) and then integrating from 0 to T. Since only one term of the summation
survives: an. The bn summation vanishes completely. Similarly, by multiplying Eq. (2-1) by
cos(2?kft) and integrating between 0 and T, we can derive bn. By just integrating both sides
of the equation as it stands, we can find c. The results of performing these operations are as
follows:
2. Bandwidth-Limited Signals
To see what all this has to do with data communication, let us consider a specific
example: the transmission of the ASCII character ''b'' encoded in an 8-bit byte. The bit pattern
that is to be transmitted is 01100010. The left-hand part of Fig. 43 (a) shows the voltage
output by the transmitting computer. The Fourier analysis of this signal yields the
coefficients:
(2)
The root-mean-square amplitudes, , for the first few terms are shown on the right-
hand side of Figure (a). These values are of interest because their squares are proportional to
the energy transmitted at the corresponding frequency.
No transmission facility can transmit signals without losing some power in the
process. If all the Fourier components were equally diminished, the resulting signal would be
reduced in amplitude but not distorted [i.e., it would have the same nice squared-off shape as
Figure 43(a)].
34
Figure 43: (a) A binary signal and its root-mean-square Fourier amplitudes. (b)-(e)
Successive approximations to the original signal.
35
The range of frequencies transmitted without being strongly attenuated is called the
bandwidth. In practice, the cutoff is not really sharp, so often the quoted bandwidth is from 0
to the frequency at which half the power gets through.
The bandwidth is a physical property of the transmission medium and usually depends
on the construction, thickness, and length of the medium. In some cases a filter is introduced
into the circuit to limit the amount of bandwidth available to each customer.
For example, a telephone wire may have a bandwidth of 1 MHz for short distances,
but telephone companies add a filter restricting each customer to about 3100 Hz. This
bandwidth is adequate for intelligible speech and improves system-wide efficiency by
limiting resource usage by customers.
Now let us consider how the signal of Figure 43(a) would look if the bandwidth were
so low that only the lowest frequencies were transmitted [i.e., if the function were being
approximated by the first few terms of Eq. (1)]. Figure 43(b) shows the signal that results
from a channel that allows only the first harmonic (the fundamental, f) to pass through.
Similarly, Figure 43(c)-(e) show the spectra and reconstructed functions for higher-
bandwidth channels.
Given a bit rate of b bits/sec, the time required to send 8 bits (for example) 1 bit at a
time is 8/b sec, so the frequency of the first harmonic is b/8 Hz. An ordinary telephone line,
often called a voice-grade line, has an artificially-introduced cutoff frequency just above
3000 Hz. This restriction means that the number of the highest harmonic passed through is
roughly 3000/(b/8) or 24,000/b, (the cutoff is not sharp).
For some data rates, the numbers work out as shown in the above Figure. From these
numbers, it is clear that trying to send at 9600 bps over a voice-grade telephone line will
transform Figure 43(a) into something looking like Figure 43(c), making accurate reception
of the original binary bit stream tricky. It should be obvious that at data rates much higher
than 38.4 kbps, there is no hope at all for binary signals, even if the transmission facility is
completely noiseless. In other words, limiting the bandwidth limits the data rate, even for
perfect channels. However, sophisticated coding schemes that make use of several voltage
levels do exist and can achieve higher data rates. We will discuss these later in this chapter.
36
Figure 44: Relation between data rate and harmonics.
As early as 1924, an AT&T engineer, Henry Nyquist, realized that even a perfect
channel has a finite transmission capacity. He derived an equation expressing the maximum
data rate for a finite bandwidth noiseless channel. In 1948, Claude Shannon carried Nyquist's
work further and extended it to the case of a channel subject to random (that is,
thermodynamic) noise (Shannon, 1948). We will just briefly summarize their now classical
results here.
Nyquist proved that if an arbitrary signal has been run through a low-pass filter of
bandwidth H, the filtered signal can be completely reconstructed by making only 2H (exact)
samples per second. Sampling the line faster than 2H times per second is pointless because
the higher frequency components that such sampling could recover have already been filtered
out. If the signal consists of V discrete levels, Nyquist's theorem states:
For example, a noiseless 3-kHz channel cannot transmit binary (i.e., two-level)
signals at a rate exceeding 6000 bps.
So far we have considered only noiseless channels. If random noise is present, the
situation deteriorates rapidly. And there is always random (thermal) noise present due to the
motion of the molecules in the system. The amount of thermal noise present is measured by
the ratio of the signal power to the noise power, called the signal-to-noise ratio. If we denote
the signal power by S and the noise power by N, the signal-to-noise ratio is S/N. Usually, the
ratio itself is not quoted; instead, the quantity 10 log10 S/N is given. These units are called
decibels (dB). An S/N ratio of 10 is 10 dB, a ratio of 100 is 20 dB, a ratio of 1000 is 30 dB,
and so on. The manufacturers of stereo amplifiers often characterize the bandwidth
37
(frequency range) over which their product is linear by giving the 3-dB frequency on each
end. These are the points at which the amplification factor has been approximately halved
(because log103 0.5).
Shannon's major result is that the maximum data rate of a noisy channel whose
bandwidth is H Hz, and whose signal-to-noise ratio is S/N, is given by
For example, a channel of 3000-Hz bandwidth with a signal to thermal noise ratio of
30 dB (typical parameters of the analog part of the telephone system) can never transmit
much more than 30,000 bps, no matter how many or how few signal levels are used and no
matter how often or how infrequently samples are taken. Shannon's result was derived from
information-theory arguments and applies to any channel subject to thermal noise.
Counterexamples should be treated in the same category as perpetual motion machines. It
should be noted that this is only an upper bound and real systems rarely achieve it.
1. Magnetic Media
2. Twisted Pairs
3. Coaxial Cable
4. Power Lines
5. Fiber Optics
1. Magnetic Media
One of the most common ways to transport data from one computer to another is to
write them onto magnetic tape or removable media (e.g., recordable DVDs). Write data onto
magnetic media
• Disks
• Tapes
38
2. Twisted Pairs
A twisted pair consists of two insulated copper wires, typically about 1 mm thick. The
wires are twisted together in a helical form, just like a DNA molecule. Twisting is done
because two parallel wires constitute a fine antenna. When the wires are twisted, the waves
from different twists cancel out, so the wire radiates less effectively. A signal is usually
carried as the difference in voltage between the two wires in the pair. This provides better
immunity to external noise because the noise tends to affect both wires the same, leaving the
differential unchanged.
The most common application of the twisted pair is the telephone system. Nearly all
telephones are connected to the telephone company (telco) office by a twisted pair. Both
telephone calls and ADSL Internet access run over these lines. Twisted pairs can run several
kilometers without amplification, but for longer distances the signal becomes too attenuated
and repeaters are needed. When many twisted pairs run in parallel for a substantial distance,
such as all the wires coming from an apartment building to the telephone company office,
they are bundled together and encased in a protective sheath. The pairs in these bundles
would interfere with one another if it were not for the twisting. In parts of the world where
telephone lines run on poles above ground, it is common to see bundles several centimeters in
diameter.
Twisted pairs can be used for transmitting either analog or digital information. The
bandwidth depends on the thickness of the wire and the distance traveled, but several
megabits/sec can be achieved for a few kilometers in many cases. Due to their adequate
performance and low cost, twisted pairs are widely used and are likely to remain so for years
to come.
39
Unshielded Versus Shielded Twisted-Pair Cable
The most common UTP connector is RJ45 (RJ stands for registered jack)
Applications. Twisted-pair cables are used in telephone lines to provide voice and data
channels. Local-area networks, such as l0Base-T and l00Base-T, also use twisted-pair cables.
3. Coaxial Cable
Coaxial cable (or coax) carries signals of higher frequency ranges than those in
twisted pair cable. coax has a central core conductor of solid or stranded wire (usually
copper) enclosed in an insulating sheath, which is, in turn, encased in an outer conductor of
metal foil, braid, or a combination of the two. The outer metallic wrapping serves both as a
shield against noise and as the second conductor, which completes the circuit. This outer
conductor is also enclosed in an insulating sheath, and the whole cable is protected by a
plastic cover.
40
A coaxial cable consists of a stiff copper wire as the core, surrounded by an insulating
material. The insulator is encased by a cylindrical conductor, often as a closely woven
braided mesh. The outer conductor is covered in a protective plastic sheath. A cutaway view
of a coaxial cable is shown in the following Fig.
The construction and shielding of the coaxial cable give it a good combination of high
bandwidth and excellent noise immunity. The bandwidth possible depends on the cable
quality and length. Modern cables have a bandwidth of up to a few GHz. Coaxial cables used
to be widely used within the telephone system for long-distance lines but have now largely
been replaced by fiber optics on long haul routes. Coax is still widely used for cable
television and metropolitan area networks, however. The most common type of connector
used today is the Bayone-Neill-Concelman (BNe), connector.
Applications
Coaxial cable was widely used in analog telephone networks, digital telephone
networks
Cable TV networks also use coaxial cables.
Another common application of coaxial cable is in traditional Ethernet LANs
4. Power Lines
Power lines deliver electrical power to houses, and electrical wiring within houses
distributes the power to electrical outlets. Power lines have been used by electricity
companies for low-rate communication such as remote metering for many years, as well in
the home to control devices. The convenience of using power lines for networking should be
41
clear. Simply plug a TV and a receiver into the wall, which you must do anyway because
they need power, and they can send and receive movies over the electrical wiring.
The difficulty with using household electrical wiring for a network is that it was
designed to distribute power signals. This task is quite different than distributing data signals,
at which household wiring does a horrible job. Electrical signals are sent at 50–60 Hz and the
wiring attenuates the much higher frequency (MHz) signals needed for high-rate data
communication. The electrical properties of the wiring vary from one house to the next and
change as appliances are turned on and off, which causes data signals to bounce around the
wiring. Transient currents when appliances switch on and off create electrical noise over a
wide range of frequencies. And without the careful twisting of twisted pairs, electrical wiring
acts as a fine antenna, picking up external signals and radiating signals of its own. This
behavior means that to meet regulatory requirements, the data signal must exclude licensed
frequencies such as the amateur radio bands.
5. Fiber Optics
A fiber-optic cable is made of glass or plastic and transmits signals in the form of
light. Light travels in a straight line as long as it is moving through a single uniform
substance. If a ray of light traveling through one substance suddenly enters another substance
(of a different density), the ray changes direction.
Fiber optics are used for long-haul transmission in network backbones, highspeed
LANs (although so far, copper has always managed catch up eventually), and high-speed
Internet access such as FttH (Fiber to the Home). An optical transmission system has three
key components: the light source, the transmission medium, and the detector. Conventionally,
a pulse of light indicates a 1 bit and the absence of light indicates a 0 bit.
42
electrical signal, converts and transmits it by light pulses, and then reconverts the output to an
electrical signal at the receiving end.
This transmission system would leak light and be useless in practice were it not for an
interesting principle of physics.
Optical fibers use reflection to guide light through a channel. A glass or plastic core is
surrounded by a cladding of less dense glass or plastic.
Propagation Modes
43
i) Multimode:
Multimode is so named because multiple beams from a light source move through the
core in different paths. How these beams move within the cable depends on the structure of
the core, as shown in below Figure.
In multimode step-index fiber, the density of the core remains constant from the
center to the edges. A beam of light moves through this constant density in a straight line
until it reaches the interface of the core and the cladding. The term step index refers to the
suddenness of this change, which contributes to the distortion of the signal as it passes
through the fiber.
ii) Single-Mode:
Single-mode uses step-index fiber and a highly focused source of light that limits
beams to a small range of angles, all close to the horizontal
The subscriber channel (SC) connector, The straight-tip (ST) connector, MT-
RJ(mechanical transfer registered jack) is a connector
Applications
1. Fiber-optic cable is often found in backbone networks because its wide bandwidth is cost-
effective.
2. Some cable TV companies use a combination of optical fiber and coaxial cable,thus
creating a hybrid network.
3. Local-area networks such as 100Base-FX network (Fast Ethernet) and 1000Base-X also
use fiber-optic cable
44
Advantages and Disadvantages of Optical Fiber
Advantages
Fiber-optic cable has several advantages over metallic cable (twisted pair or coaxial).
1. Higher bandwidth.
2. Less signal attenuation. Fiber-optic transmission distance is significantly greater than that
of other guided media. A signal can run for 50 km without requiring regeneration. We need
repeaters every 5 km for coaxial or twisted pair cable.
5. Light weight. Fiber-optic cables are much lighter than copper cables.
6. Greater immunity to tapping. Fiber-optic cables are more immune to tapping than copper
cables. Copper cables create antenna effects that can easily be tapped.
Disadvantages
3. Cost. The cable and the interfaces are relatively more expensive than those of other guided
media. If the demand for bandwidth is not high, often the use of optical fiber cannot be
justified.
45