Module-1-Introduction to Data Communication
Module-1-Introduction to Data Communication
DATA COMMUNICATIONS
Data communications are the exchange of data between two devices via some form of
transmission medium such as a wire cable. For data communications to occur, the communicating
devices must be part of a communication system made up of a combination of hardware (physical
equipment) and software (programs). The effectiveness of a data communications system depends
on four fundamental characteristics: delivery, accuracy, timeliness, and jitter.
1. Delivery. The system must deliver data to the correct destination. Data must be received
by the intended device or user and only by that device or user.
2. Accuracy. The system must deliver the data accurately. Data that have been altered in
transmission and left uncorrected are unusable.
3. Timeliness. The system must deliver data in a timely manner. Data delivered late are
useless. In the case of video and audio, timely delivery means delivering data as they are
produced, in the same order that they are produced, and without significant delay. This
kind of delivery is called real-time transmission.
4. Jitter. Jitter refers to the variation in the packet arrival time. It is the uneven delay in the
delivery of audio or video packets. For example, let us assume that video packets are sent
every 30 ms. If some of the packets arrive with 30-ms delay and others with 40-ms delay,
an uneven quality in the video is the result.
DATA REPRESENTATION
1. Text
• In data communications, text is represented as a bit pattern, a sequence of bits (0s or 1s).
The American Standard Code for Information Interchange (ASCII), developed some
decades ago in the United States, now constitutes the first 127 characters in Unicode and
is also referred to as Basic Latin. Appendix A includes part of the Unicode.
2. Numbers
• Numbers are also represented by bit patterns. However, a code such as ASCII is not used
to represent numbers; the number is directly converted to a binary number to simplify
mathematical operations.
3. Images
• Images are also represented by bit patterns. In its simplest form, an image is composed of
a matrix of pixels (picture elements), where each pixel is a small dot.
• The size of the pixel depends on the resolution. For example, an image can be divided
into 1000 pixels or 10,000 pixels. In the second case, there is a better representation of the
image (better resolution), but more memory is needed to store the image.
• After an image is divided into pixels, each pixel is assigned a bit pattern. The size and the
value of the pattern depend on the image. For an image made of only black-and-white
dots (e.g., a chessboard), a 1-bit pattern is enough to represent a pixel. If an image is not
made of pure white and pure black pixels, we can increase the size of the bit pattern to
include gray scale. For example, to show four levels of gray scale, we can use 2-bit
patterns. A black pixel can be represented by 00, a dark gray pixel by 01, a light gray
pixel by 10, and a white pixel by 11.
• There are several methods to represent color images. One method is called RGB, so
called because each color is made of a combination of three primary colors: red, green,
and blue. The intensity of each color is measured, and a bit pattern is assigned to it.
Another method is called YCM, in which a color is made of a combination of three other
primary colors: yellow, cyan, and magenta.
4. Audio
• Audio refers to the recording or broadcasting of sound or music. Audio is by nature
different from text, numbers, or images. It is continuous, not discrete. Even when we use
a microphone to change voice or music to an electric signal, we create a continuous
signal.
5. Video
• Video refers to the recording or broadcasting of a picture or movie. Video can either be
produced as a continuous entity (e.g., by a TV camera), or it can be a combination of
images, each a discrete entity, arranged to convey the idea of motion.
DATA FLOW
Communication between two devices can be simplex, half-duplex, or full-duplex as shown in
Figure 1.2.
1. Simplex
• In simplex mode, the communication is unidirectional, as on a one-way street. Only one
of the two devices on a link can transmit; the other can only receive (see Figure 1.2a).
• Keyboards and traditional monitors are examples of simplex devices. The keyboard can
only introduce input; the monitor can only accept output.
• The simplex mode can use the entire capacity of the channel to send data in one direction.
3. Full-Duplex
• In full-duplex mode (also called duplex), both stations can transmit and receive
simultaneously.
• The full-duplex mode is like a two-way street with traffic flowing in both directions at the
same time. In full-duplex mode, signals going in one direction share the capacity of the
link with signals going in the other direction.
• One common example of full-duplex communication is the telephone network. When two
people are communicating by a telephone line, both can talk and listen at the same time.
The full-duplex mode is used when communication in both directions is required all the
time. The capacity of the channel, however, must be divided between the two directions.
NETWORKS
• A network is the interconnection of a set of devices capable of communication. In this
definition, a device can be a host (or an end system as it is sometimes called) such as a
large computer, desktop, laptop, workstation, cellular phone, or security system.
• A device in this definition can also be a connecting device such as a router, which
connects the network to other networks, a switch, which connects devices together, a
modem (modulator-demodulator), which changes the form of data, and so on.
Network Criteria
• A network must be able to meet a certain number of criteria. The most important of these
are performance, reliability, and security.
1. Performance
• Performance can be measured in many ways, including transit time and response
time. Performance is often evaluated by two networking metrics: throughput and
delay.
• We often need more throughput and less delay. However, these two criteria are often
contradictory. If we try to send more data to the network, we may increase throughput
but we increase the delay because of traffic congestion in the network.
2. Reliability
• Network reliability is measured by the frequency of failure, the time it takes a link to
recover from a failure, and the network’s robustness in a catastrophe.
3. Security
• Network security issues include protecting data from unauthorized access, protecting
data from damage and development, and implementing policies and procedures for
recovery from breaches and data losses.
PHYSICAL STRUCTURE
Type of Connection
• A network is two or more devices connected through links. A link is a communications
pathway that transfers data from one device to another.
• There are two possible types of connections: point-to-point and multipoint.
1. Point-to-Point
• A point-to-point connection provides a dedicated link between two devices.
• The entire capacity of the link is reserved for transmission between those two devices.
Most point-to-point connections use an actual length of wire or cable to connect the two
ends, but other options, such as microwave or satellite links, are also possible.
2. Multipoint
• A multipoint (also called multidrop) connection is one in which more than two specific
devices share a single link.
• In a multipoint environment, the capacity of the channel is shared, either spatially or
temporally. If several devices can use the link simultaneously, it is a spatially shared
connection. If users must take turns, it is a timeshared connection.
• The term physical topology refers to the way in which a network is laid out physically.
Two or more devices connect to a link; two or more links form a topology. The topology
of a network is the geometric representation of the relationship of all the links and linking
devices (usually called nodes) to one another.
1. Mesh Topology
• In a mesh topology, every device has a dedicated point-to-point link to every other
device. The term dedicated means that the link carries traffic only between the two
devices it connects.
• In mesh topology we need n (n – 1) physical links if links are of type simplex and we
need n (n – 1) /2 physical links if links are of type duplex.
Physical Topology
.
Figure 1.4 Mesh Topology
Advantages
• First, the use of dedicated links guarantees that each connection can carry its own data
load.
• Second, a mesh topology is robust. If one link becomes unusable, it does not incapacitate
the entire system. Third, there is the advantage of privacy or security.
• Finally, point-to-point links make fault identification and fault isolation easy.
Disadvantages
• First, because every device must be connected to every other device, installation and
reconnection are difficult.
• Second, the sheer bulk of the wiring can be greater than the available space (in walls,
ceilings, or floors) can accommodate.
• Finally, the hardware required to connect each link (I/O ports and cable) can be
prohibitively expensive.
2. Star Topology
• In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub.
• The devices are not directly linked to one another. Unlike a mesh topology, a star
topology does not allow direct traffic between devices.
• The controller acts as an exchange: If one device wants to send data to another, it sends
the data to the controller, which then relays the data to the other connected device.
Advantages
• A star topology is less expensive than a mesh topology. As it needs farr less cable
compared to mesh topology.
• In a star, each device needs only one link and one I/O port to connect it to any number of
others. This factor also makes it easy to install and reconfigure.
• Robustness. If one link fails, only that link is affected. All other links remain active.
• Easy fault identification and fault isolation.
Disadvantages
• One big disadvantage of a star topology is the dependency of the whole topology on one
single point, the hub. If the hub goes down, the whole system is dead.
• Although a star requires far less cable than a mesh, each node must be linked to a central
hub.
3. Bus Topology
• The preceding examples all describe point-to-point connections. A bus topology, on the
other hand, is multipoint. One long cable acts as a backbone to link all the devices in a
network.
• Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection
running between the device and the main cable. A tap is a connector that either splices
into the main cable or punctures the sheathing of a cable to create a contact with the
metallic core.
Disadvantages
• Difficult reconnection and fault isolation.
• A bus is usually designed to be optimally efficient at installation. It can therefore be
difficult to add new devices.
• A fault or break in the bus cable stops all transmission, even between devices on the same
side of the problem.
4. Ring Topology
• In a ring topology, each device has a dedicated point-to-point connection with only the
two devices on either side of it.
• A signal is passed along the ring in one direction, from device to device, until it reaches
its destination. Each device in the ring incorporates a repeater. When a device receives a
signal intended for another device, its repeater regenerates the bits and passes them along.
Advantages
• A ring is relatively easy to install and reconfigure.
• Fault Identification and isolation is simplified.
Disadvantages
• Unidirectional traffic can be a disadvantage. In a simple ring, a break in the ring can
disable the entire network.
NETWORK TYPES
• The criteria of distinguishing one type of network from another are difficult and
sometimes confusing. We use a few criteria such as size, geographical coverage, and
ownership to make this distinction.
• In the past, all hosts in a network were connected through a common cable, which meant
that a packet sent from one host to another was received by all hosts. The intended
recipient kept the packet; the others dropped the packet.
• Today, most LANs use a smart connecting switch, which is able to recognize the
destination address of the packet and guide the packet to its destination without sending it
to all other hosts.
Point-to-Point WAN
• A point-to-point WAN is a network that connects two communicating devices through a
transmission media (cable or air). Figure 1.9 shows an example of a point-to-point WAN.
Internetwork
• Today, it is very rare to see a LAN or a WAN in isolation; they are connected to one
another. When two or more networks are connected, they make an internetwork, or
internet.
• As an example, assume that an organization has two offices, one on the east coast and the
other on the west coast. Each office has a LAN that allows all employees in the office to
communicate with each other.
• To make the communication between employees at different offices possible, the
management leases a point-to-point dedicated WAN from a service provider, such as a
telephone company, and connects the two LANs.
• Now the company has an internetwork, or a private internet (with lowercase i).
Communication between offices is now possible. Figure 1.11 shows this internet.
• When a host in the west coast office sends a message to another host in the same office,
the router blocks the message, but the switch directs the message to the destination. On
the other hand, when a host on the west coast sends a message to a host on the east coast,
router R1 routes the packet to router R2, and the packet reaches the destination.
PROTOCOL LAYERING
• In data communication and networking, a protocol defines the rules that both the sender
and receiver and all intermediate devices need to follow to be able to communicate
effectively.
• When communication is simple, we may need only one simple protocol; when the
communication is complex, we may need to divide the task between different layers, in
which case we need a protocol at each layer, or protocol layering.
Scenarios
• Let us develop two simple scenarios to better understand the need for protocol layering.
First Scenario
• In the first scenario, communication is so simple that it can occur in only one layer.
Assume Maria and Ann are neighbors with a lot of common ideas. Communication
between Maria and Ann takes place in one layer, face to face, in the same language, as
shown in Figure 1.11.
Second Scenario
• In the second scenario, we assume that Ann is offered a higher-level position in her
company, but needs to move to another branch located in a city very far from Maria.
• They decide to continue their conversation using regular mail through the post office.
However, they do not want their ideas to be revealed by other people if the letters are
intercepted.
• They agree on an encryption/decryption technique. The sender of the letter encrypts it to
make it unreadable by an intruder; the receiver of the letter decrypts it to get the original
letter.
• Now we can say that the communication between Maria and Ann takes place in three
layers, as shown in Figure 1.13. We assume that Ann and Maria each have three machines
(or robots) that can perform the task at each layer.
1. Physical Layer
• We can say that the physical layer is responsible for carrying individual bits in a frame
across the link.
• We need to know that the transmission medium does not carry bits; it carries electrical or
optical signals. So the bits received in a frame from the data-link layer are transformed
and sent through the transmission media, but we can think that the logical unit between
two physical layers in two devices is a bit.
2. Data-link Layer
• We have seen that an internet is made up of several links (LANs and WANs) connected
by routers.
• The routers are responsible for choosing the best links. However, when the next link to
travel is determined by the router, the data-link layer is responsible for taking the
datagram and moving it across the link.
• The link can be a wired LAN with a link-layer switch, a wireless LAN, a wired WAN, or
a wireless WAN.
• In each case, the data-link layer is responsible for moving the packet through the link.
• The data-link layer takes a datagram and encapsulates it in a packet called a frame.
3. Network Layer
• The network layer is responsible for creating a connection between the source computer
and the destination computer.
• he communication at the network layer is host-to-host. However, since there can be
several routers from the source to the destination, the routers in the path are responsible
for choosing the best route for each packet.
• We can say that the network layer is responsible for host-to-host communication and
routing the packet through possible routes.
• The network layer in the Internet includes the main protocol, Internet Protocol (IP) that
defines the format of the packet, called a datagram at the network layer. IP also defines
the format and the structure of addresses used in this layer. IP is also responsible for
routing a packet from its source to its destination, which is achieved by each router
forwarding the datagram to the next router in its path. IP is a connectionless protocol that
provides no flow control, no error control, and no congestion control services. This means
that if any of these services is required for an application, the application should rely only
on the transport-layer protocol.
• The network layer also has some auxiliary protocols such as Dynamic Host Configuration
Protocol (DHCP), Address Resolution Protocol (ARP) these help IP in its delivery and
routing tasks.
4. Transport Layer
• The logical connection at the transport layer is end-to-end. The transport layer at the
source host gets the message from the application layer, encapsulates it in a transport
layer packet (called a segment or a user datagram) and sends it, through the logical
(imaginary) connection, to the transport layer at the destination host.
• In other words, the transport layer is responsible for giving services to the application
layer: to get a message from an application program running on the source host and
deliver it to the corresponding application program on the destination host.
• In addition, we will see that we have more than one protocol in the transport layer, which
means that each application program can use the protocol that best matches its
requirement.
• The main protocol, Transmission Control Protocol (TCP), is a connection-oriented
protocol that first establishes a logical connection between transport layers at two hosts
before transferring data. It creates a logical pipe between two TCPs for transferring a
stream of bytes. TCP provides flow control (matching the sending data rate of the source
host with the receiving data rate of the destination host to prevent overwhelming the
destination), error control (to guarantee that the segments arrive at the destination without
error and resending the corrupted ones), and congestion control to reduce the loss of
segments due to congestion in the network.
• The other common protocol, User Datagram Protocol (UDP), is a connectionless protocol
that transmits user datagrams without first creating a logical connection. In UDP, each
user datagram is an independent entity without being related to the previous or the next
one. UDP is a simple protocol that does not provide flow, error, or congestion control.
5. Application Layer
• The two application layers exchange messages between each other as though there were a
bridge between the two layers. However, we should know that the communication is done
through all the layers. Communication at the application layer is between two processes
(two programs running at this layer). To communicate, a process sends a request to the
other process and receives a response. Process-to-process communication is the duty of
the application layer.
• The Hypertext Transfer Protocol (HTTP) is a vehicle for accessing the World Wide Web
(WWW). The Simple Mail Transfer Protocol (SMTP) is the main protocol used in
electronic mail (e-mail) service. The File Transfer Protocol (FTP) is used for transferring
files from one host to another.
Addressing
• It is worth mentioning another concept related to protocol layering in the Internet,
addressing. As we discussed before, we have logical communication between pairs of
layers in this model.
• Any communication that involves two parties needs two addresses: source address and
destination address. Although it looks as if we need five pairs of addresses, one pair per
layer, we normally have only four because the physical layer does not need addresses; the
unit of data exchange at the physical layer is a bit, which definitely cannot have an
address. Figure 1.17 shows the addressing at each layer.
• The OSI model is a layered framework for the design of network systems that allows
communication between all types of computer systems.
• It consists of seven separate but related layers, each of which defines a part of the process
of moving information across a network (see Figure 1.18).
Transmission media are actually located below the physical layer and are directly controlled by
the physical layer. We could say that transmission media belong to layer zero. Figure 2.1 shows the
position of transmission media in relation to the physical layer.
A transmission medium can be broadly defined as anything that can carry information from a source
to a destination. For example, the transmission medium for two people having a dinner conversation is
the air. The air can also be used to convey the message in a smoke signal or semaphore. For a written
message, the transmission medium might be a mail carrier, a truck, or an airplane.
In data communications the definition of the information and the transmission medium is more
specific. The transmission medium is usually free space, metallic cable, or fiber-optic cable. The
information is usually a signal that is the result of a conversion of data from another form.
In telecommunications, transmission media can be divided into two broad categories: guided and
unguided. Guided media include twisted-pair cable, coaxial cable, and fiber-optic cable. Unguided
medium is free space. Figure 2.2 shows this taxonomy.
Guided media, which are those that provide a conduit from one device to another, include
twisted-pair cable, coaxial cable, and fiber-optic cable. A signal traveling along any of these media is
directed and contained by the physical limits of the medium. Twisted-pair and coaxial cable use
metallic (copper) conductors that accept and transport signals in the form of electric current. Optical
fiber is a cable that accepts and transports signals in the form of light.
Twisted-Pair Cable
A twisted pair consists of two conductors (normally copper), each with its own plastic
insulation, twisted together, as shown in Figure 2.3.
A twisted pair consists of two insulated copper wires, typically about 1 mm thick. The wires are
twisted together in a helical form, just like a DNA molecule. Twisting is done because two parallel
wires constitute a fine antenna.
• When the wires are twisted, the waves from different twists cancel out, so the wire radiates less
effectively. A signal is usually carried as the difference in voltage between the two wires in the pair.
This provides better immunity to external noise because the noise tends to affect both wires the same,
leaving the differential unchanged.
• The most common application of the twisted pair is the telephone system. Nearly all telephones are
connected to the telephone company (telco) office by a twisted pair. Both telephone calls and ADSL
Internet access run over these lines.
• Twisted pairs can be used for transmitting either analog or digital information. The bandwidth
depends on the thickness of the wire and the distance traveled, but several megabits/sec can be
achieved for a few kilometer’s.
The garden variety deployed in many office buildings is called Category 5 cabling, or ‘‘Cat 5.
A category 5 twisted pair consists of two insulated wires gently twisted together. Four such pairs are
typically grouped in a plastic sheath to protect the wires and keep them together. To reach higher
speeds, 1-Gbps Ethernet uses all four pairs in both directions simultaneously.
Full duplex Links that can be used in both directions at the same time, like a two-lane road, are called
full-duplex links.
Half duplex Links that can be used in either direction, but only one way at a time, like a single-track
railroad line, called half duplex links.
Simplex Links that allow traffic in only one direction, like a one-way street are called simplex links.
Category 3
Cable uses a same connector, but has more twists per meter. More twists result in less crosstalk and a
better quality signal over longer distances, making the cables more suitable for high-speed computer
communication, especially 100-Mbps and 1-Gbps Ethernet LANs.
Coaxial Cable
• Coaxial cable has better shielding and greater bandwidth than unshielded twisted pairs, so it can span
longer distances at higher speeds.
• Two kinds of coaxial cable are widely used. One kind, 50-ohm cable, is commonly used when it is
intended for digital transmission from the start. The other kind, 75-ohm cable, is commonly used for
analog transmission and cable television.
• A coaxial cable consists of a stiff copper wire as the core, surrounded by an insulating material. The
insulator is encased by a cylindrical conductor, often as a closely woven braided mesh. The outer
conductor is covered in a protective plastic sheath.
. The outer metallic wrapping serves both as a shield against noise and as the second conductor, which
completes the circuit. This outer conductor is also enclosed in an insulating sheath, and the whole cable
is protected by a plastic cover (see Figure 2.4).
• The bandwidth possible depends on the cable quality and length. Coaxial cables used to be widely
used within the telephone system for long-distance lines but have now largely been replaced by fiber
optics on long haul routes. Coax is still widely used for cable television and metropolitan area
networks.
Fiber Optics
• Fiber optics are used for long-haul transmission in network backbones, highspeed LANs (although so
far, copper has always managed catch up eventually), and high-speed Internet access such as FttH
(Fiber to the Home).
• An optical transmission system has three key components: the light source, the transmission medium,
and the detector. The transmission medium is an ultra-thin fiber of glass. The detector generates an
electrical pulse when light falls on it.
• By attaching a light source to one end of an optical fiber and a detector to the other, we have a
unidirectional data transmission system that accepts an electrical signal, converts and transmits it by
light pulses, and then reconverts the output to an electrical signal at the receiving end.
Fig(a): When a light ray passes from one medium to another—for example, from fused silica to air—
the ray is refracted (bent) at the silica/air boundary. A light ray incident on the boundary at an angle α1
emerging at an angle β1. The amount of refraction depends on the properties of the two media (in
particular, their indices of refraction)
Fig (b): The light is refracted back into the silica; none of it escapes into the air. Thus, a light ray
incident at or above the critical angle is trapped inside the fiber. The fig shows the only one trapped
ray, but since any light ray incident on the boundary above the critical angle will be reflected
internally, many different rays will be bouncing around at different angles. Each ray is said to have a
different mode, so a fiber having this property is called a multimode fiber.
The figure shows the near- infrared part of the spectrum. Visible light has slightly shorter wavelengths,
from 0.4 to 0.7 microns. The true metric purist would refer to these wavelengths as 400 nm to 700 nm.
Three wavelength bands are most commonly used at present for optical communication. They are
centered at 0.85, 1.30, and 1.55 microns, respectively. All three bands are 25,000 to 30,000 GHz wide.
The 0.85- micron band was used first. It has higher attenuation and so is used for shorter distances. The
last two bands have good attenuation properties (less than 5% loss per kilometer). The 1.55- micron
band is now widely used with erbium-doped amplifiers that work directly in the optical domain.
Chromatic Dispersion
Light pulses sent down a fiber spread out in length as they propagate.
Soliton: A soliton is a pulse that can collide with another similar pulse and still retain its shape after
the collision, again in the presence of both dispersion and non-linearities.
Fiber Cables
• Fiber optic cables are similar to coax, except without the braid. At the center is the glass core
through which the light propagates. In multimode fibers, the core is typically 50 microns in diameter,
about the thickness of a human hair. In single-mode fibers, the core is 8 to 10 microns.
• The core is surrounded by a glass cladding with a lower index of refraction than the core, to keep all
the light in the core. Next comes a thin plastic jacket to protect the cladding. Fibers are typically
grouped in bundles, protected by an outer sheath.
• Fibers can be connected in three different ways. First, they can terminate in connectors and be
plugged into fiber sockets. Connectors lose about 10 to 20% of the light, but they make it easy to
reconfigure systems.
• Second, they can be spliced mechanically. Mechanical splices just lay the two carefully cut ends next
to each other in a special sleeve and clamp them in place. Alignment can be improved by passing light
through the junction and then making small adjustments to maximize the signal.
• Third, two pieces of fiber can be fused (melted) to form a solid connection. A fusion splice is almost
as good as a single drawn fiber, but even here, a small amount of attenuation occurs. For all three kinds
of splices, reflections can occur at the point of the splice, and the reflected energy can interfere with
the signal.
WIRELESS TRANSMISSION
Wireless communications have many important applications besides providing connectivity to users
from any place.
• The radio, microwave, infrared, and visible light portions of the spectrum can all be used for
transmitting information by modulating the amplitude, frequency, or phase of the waves. Ultraviolet
light, X-rays, and gamma rays would be even better, due to their higher frequencies, but they are hard
to produce and modulate, do not propagate well. The terms LF, MF, and HF refer to Low, Medium,
and High Frequency, respectively.
• Most transmissions use a relatively narrow frequency band (i.e., Δf / f << 1). In frequency hopping
spread spectrum, the transmitter hops from frequency-to-frequency hundreds of times per second. It is
pop ular for military communication because it makes transmissions hard to detect and next to
impossible to jam. This technique is used commercially, for example, in Bluetooth and older versions
of 802.11.
It forms the basis of 3G mobile phone networks and is also used in GPS (Global Positioning System).
Radio Transmission
• Radio frequency (RF) waves are easy to generate, can travel long distances, and can
penetrate buildings easily, so they are widely used for communication, both indoors and outdoors.
Radio waves also are omni directional, meaning that they travel in all directions from the source, so the
transmitter and receiver do not have to be carefully aligned physically.
• The properties of radio waves are frequency dependent. At low frequencies, radio waves
pass through obstacles well, but the power falls off sharply with distance from the source—at least as
fast as 1/r 2 in air—asthe signal energy is spread more thinly over a larger surface. This attenuation is
called path loss.
• At high frequencies, radio waves tend to travel in straight lines and bounce off obstacles.
Path loss still reduces power, though the received signal can depend strongly on reflections as well.
High- frequency radio waves are also absorbed by rain and other obstacles to a larger extent than are
low-frequency ones. At all frequencies, radio waves are subject to interference from motors and other
electrical equipment.
From fig(a): In the VLF, LF, and MF bands, radio waves follow the ground. These waves can
be detected for perhaps 1000 km at the lower frequencies, less at the higher ones. AM radio
broadcasting uses the MF band.
Microwave Transmission
• Microwaves travel in a straight line. Thus, repeaters are needed periodically. The distance
between repeaters is square root of the tower height. For 100- meter-high towers, repeaters can be 80
km apart. Microwaves do not pass through buildings well.
• Some waves may be refracted off low- lying atmospheric layers and may take slightlylonger
to arrive than the direct waves. The delayed waves may arrive out of phase with the direct wave and
thus cancel the signal. This effect is called multipath fading.
• Bands up to 10 GHz are now in routine use. These waves are only a few centimetres long and
are absorbed by rain. Microwave communication is so widely used for long-distance telephone
communication, mobile phones, television distribution. It does not require to lay down cables. By
buying a small plot of ground every 50 km and putting a microwave tower on it, one can bypass the
telephone system entirely. Microwave is also relatively inexpensive.
Beauty Contest
Oldest algorithm requires each carrier to explain why its proposal serves the public interest
best. Government officials then decide which of the nice stories they enjoy most.
Lottery
Second algorithm which holds lottery among the interested companies. The problem with that
idea is that companies with no interest in using the spectrum can enter the lottery.
Auction
Random companies has been severely criticized by many, which led to algorithm 3: auction
off the bandwidth to the highest bidder.
A completely different approach to allocating frequencies is to not allocate them at all.
Accordingly, most governments have set aside some frequency bands, called the ISM (Industrial,
Scientific, Medical) bands for unlicensed usage. To minimize interference between these
uncoordinated devices, the FCC mandates that all devices in the ISM bands limit their transmit power.
The 900-MHz band was used for early versions of 802.11, but it is crowded. The 2.4-GHz band is
available in most countries and widely used for 802.11b/g and Bluetooth, though it is subject to
interference from microwave ovens and radar installations. The 5-GHz part of the spectrum includes
U-NII (Unlicensed National Information Infrastructure) bands.
One exciting development in the U.S. is the FCC decision in 2009 to allow unlicensed use of
InfraRed Transmission
• Unguided infrared waves are widely used for short-range communication. The remote
controls used for televisions, VCRs, and stereos all use infrared communication.
• They are relatively directional, cheap, and easy to build but have a major drawback: they do
not pass through solid objects. It means that an infrared system in one room of a building will not
interfere with a similar system in adjacent rooms or buildings.
• Infrared communication has a limited use on the desktop, for example, to connect notebook
computers and printers with the IrDA (Infrared Data Association) standard, but it is not a major
player in the communication game.
]