0% found this document useful (0 votes)
34 views21 pages

405 CN Unit 3

Uploaded by

vinaydodiya22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views21 pages

405 CN Unit 3

Uploaded by

vinaydodiya22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE

CC- 405. COMPUTER NETWORK


B.SC.IT SEMESTER - 4
UNIT - 3
Unit - 3
Network Topology, Architecture and Standards

 Introduction to LAN, WAN, MAN:


 Network generally categorized into three primary categories :
o LAN (Local Area Networks)
o MAN (Metropolitan Area Networks)
o WAN (Wide Area Networks)
 Into which category, a network falls is determined by its size, its ownership, the distance
it covers and its physical architecture.

LAN:
 A LAN is usually privately owned and links the devices in a single office, building or
campus.
 Depending on the needs of an organization and the type of technology used, a LAN can
be as simple as two PCs and a printer in someone’s home office, or it can extend
throughout a company and include voice, sound and video peripherals.
 LANs are designed to allow resource to be shared between personal computers or
workstations.
 The resources to be shared can include hardware, software or data.
 In addition to size, LANs are distinguished from other types of networks by their
transmission media and topology.
 Traditionally, LANs have data rates in the 4 to 16 Mbps range. Today, however, speeds
are increasing and can reach 100 Mbps with gigabit systems in development.

PREPARED BY : Jahnavi Parekh Page 1 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3

MAN
 A metropolitan area network is designed to extend over an entire city. It may be a single
network such as a cable television network, or it may be a means of LAN-to-LAN as well
as device-to-device.
 A MAN may be wholly owned and operated by a private company, or it may be a service
provided by a public company, such as a local telephone company.

WAN:

 A wide area network provides long-distance transmission of data, voice, image and video
information over large geographical areas that may comprise a country, a continent, or even
the whole world.
 In contrast to LAN, WAN may utilize public, leased or private communication devices,
usually in combinations and can therefore span an unlimited number of miles.
 A WAN that is wholly owned and used by a single company is often referred to as an
enterprise network

PREPARED BY : Jahnavi Parekh Page 2 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3
 NETWORK TOPOLOGY

 Def: Topology is the way networks are physically connected.


 Topology defines the structure of the network of how all the components are
interconnected to each other. There are two types of topology: physical and logical
topology.
 It determines the complexity and therefore the cost of network cable installation.

 Bus Topology

PREPARED BY : Jahnavi Parekh Page 3 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3
o The bus topology is designed in such a way that all the stations are connected through a single
cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or directly connected to the
backbone cable.
o When a node wants to send a message over the network, it puts a message over the network. All
the stations available in the network will receive the message whether it has been addressed or
not.
o It transmits the data from one end to another in a single direction. No bi-directional feature is in
bus topology.
o Both ends of the shared channel have line terminator. The data is sent in only one direction and
as soon as it reaches the extreme end, the terminator removes the data from the line.
o Bus topology may have problem while multiple hosts sending data at the same time. Therefore
Bus topology uses CSMA/CD technology
o CSMA CD: CSMA CD (Carrier Sense Multiple Access / Collision detection) is an access
method used to detect the collision. Once the collision is detected, the sender will stop
transmitting the data. Therefore, it works on "recovery after the collision"
o The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.
o The configuration of a bus topology is quite simpler as compared to other topologies.

Advantages
 If N devices are connected to each other in a bus topology, then the number of cables required
to connect them is 1
 Low-cost cable: In bus topology, nodes are directly connected to the cable without passing
through a hub. Therefore, the initial cost of installation is low.
 Limited failure: A failure in one node will not have any effect on other nodes.

Disadvantages
 If the common cable fails, then the whole system will crash down.
 If the network traffic is heavy, it increases collisions in the network.
 Security is very low.

 Ring Topology/Circular Topology


 This layout is similar to the linear bus, except that the nodes are connected in a circle using
cable segments.
 In this layout, each node is physically connected to only two others.

PREPARED BY : Jahnavi Parekh Page 4 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3

 Ring topology is like a bus topology, but with connected ends.


 The node that receives the message from the previous computer will retransmit to the next node.
 The data flows in one direction, i.e., it is unidirectional.
 The data flows in a single loop continuously known as an endless loop.
 It has no terminated ends, i.e., each node is connected to other node and having no termination
point.
 The data in a ring topology flow in a clockwise direction.
 The most common access method of the ring topology is token passing.
 Token passing: It is a network access method in which token is passed from one node to another
node.
 Token: It is a frame that circulates around the network.

Working of Token passing


 A token moves around the network, and it is passed from computer to computer until it reaches
the destination.
 The sender modifies the token by putting the address along with the data.
 The data is passed from one device to another device until the destination address matches. Once
the token received by the destination device, then it sends the acknowledgment to the sender. 

Advantages
o The possibility of collision is minimum in this type of topology.
o Cheap to install and expand.

PREPARED BY : Jahnavi Parekh Page 5 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3
Disadvantage
o Difficult troubleshooting: It requires specialized test equipment to determine the cable
faults. If any fault occurs in the cable, then it would disrupt the communication for all the
nodes.
o The addition of stations in between or removal of stations can disturb the whole topology.
o Less secure.

 STAR TOPOLOGY
 Each computer on a star network communicates with a central hub that re-sends the
message either to all the computers or only to the destination computer.

 The hub in broadcast star network can be active or passive.


 An active hub regenerates the electrical signal and sends it to all the computers connected toit.
This type of hub is often called a multiport repeater.
 A passive hub acts as a connector point and does not amplify or regenerate the signal.

Advantages:
o It is easy to modify and add new computers to a star network. You simply require a new line
from the computer to the central location and plug it into hub. When capacity of the hub
exceeds, you can replace it with one that has large number of ports.
o The center of a star network is a good place to find faults.
o Single computer failures do not necessarily bring down the whole star network.
o You can use several cable types to connect to the central hub.

PREPARED BY : Jahnavi Parekh Page 6 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3
Disadvantages:
o If the central hub fails, the whole network fails to operate.
o Many star networks require a device at central point to rebroadcast or switch network traffic.
o It costs more to cable a star network.

 Mesh Topology

 Mesh technology is an arrangement of the network in which computers are interconnected with
each other.
 There are multiple paths from one computer to another computer.
 It does not contain the switch, hub or any central computer which acts as a central point of
communication.
 The Internet is an example of the mesh topology.
 In mesh topology each device is connected to every other device on the network through
channels.
 These channels are known as links.
 Mesh topology is used for wireless network
 The internet is an example of mesh topology
 If we have n devices in the network, then each device must be connected with (n-1)
 Number of link in mesh topology of n devices should be n(n-1)/2

PREPARED BY : Jahnavi Parekh Page 7 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3
 Tree Topology

 Tree topology known as hierarchical topology


 Most common form of network topology in use.
 In this data flows from top to bottom or bottom to top.

PREPARED BY : Jahnavi Parekh Page 8 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3
 It is multi point connection
 There is only one path exist between two nodes for data transmission. It form parent – child
relationship.

Advantages
 This topology is mainly used for broadband transmission. (Long distance)
 We can add new device to the existing network
 The whole network divided into segments, which can be easily manage and maintained.
 The break down in one section does not affect the entire network.
Disadvantages
 If the central hub fails the entire system fails.
 The cost is high because of hub and cabling.

 Hybrid Topology
 A hybrid topology is a type of network topology that uses two or more differing network
topologies. These topologies can include a mix of bus topology, mesh topology, ring topology,
star topology, and tree topology.
 The choice to use a hybrid topology over a standard topology depends on the needs of a
business, school, or the users.

PREPARED BY : Jahnavi Parekh Page 9 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3

Types of hybrid topologies


 The two most commonly used types of hybrid topologies are the following.

Star-Ring hybrid topology


 A star-ring hybrid topology is a combination of the star topology and ring topology.
 Two or more star topologies are connected together through a ring topology.

Star-Bus hybrid topology


 A star-bus hybrid topology is a combination of the star topology and bus topology. Two or
more star topologies are connected together through a bus topology.

Advantages
 This type of topology combines the benefits of different types of topologies in one topology.
 Can be modified as per requirement.
 It is very reliable.
 It is used for create large network.
 Handles large volume of traffic.

Disadvantages
 It is a type of network expensive.
 Design of a hybrid network is very complex.
 Installation is a difficult process.
 Hubs which are used to connect two distinct networks, are very costly. And hubs are different
from usual hubs as they need to be intelligent enough to work with different architectures.

 ETHERNET / IEEE Standard 802.3


 ―Any wired network called ethernet‖
 It starts in 1976 by Xerox company and later extended by a Digital Equipment corporation
(DEC), Intel Corporation and Xerox.
 It creates a network between 5 computers and transfer data between each others.
 802.3 defines two categories
o Base band
o Broad band
 The word base specifies a digital signal, where as broad specifies an analog signals

PREPARED BY : Jahnavi Parekh Page 10 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3
 There are basic 4 components are required :
1. Wire or Cable
2. Connector
3. NIC (Network Interface Card)
4. Network Devices (Hub, Switch, Routers, Bridge, Repeaters)

 There are 3 types of Ethernet


1. Traditional Ethernet
2. Fast Ethernet
3. Gigabits Ethernet

Traditional Ethernet (10 Mbps)


There are 4 types of techniques are used in Traditional Ethernet.
 10 base5
 10 base2
 10 baseT
 10 baseF

 10 Base5
 10 defines the data transfer rate in Mbps
 Base defines the data transfer type / method.
 5 defines the types of transmission media.
 AUI (Attachment Unit Interface) is used for transmission media.
 5 indicates 500 Meter length and we can use 5 cable, so we can use 2500 (500 * 5) Meter
length for transmission media.
 It is also called Thicknet or Thick ethernet because its size of cable is 0.5‖
 DB9, DB11, DB25, DB37, DB50 and DB117 connectors are used in 10 base5 ethernet.
 Only Bus topology is used.

 10 Base2
 10 base is same as 10 base5
 Maximum cable 185 M is used.
 Maximum 5 cable can used.
 Total length is 925 M (185 * 5)
 Diameter is 0.25‖, half than 10 base5
 10 base2 is also called Thinnet or Thin Ethernet
 DB9, DB11, DB25, DB37, DB50 and DB117 connectors are used in 10 base2 ethernet.
 Only Bus topology is used and AUI cable is used.

PREPARED BY : Jahnavi Parekh Page 11 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3
 10 Base T
 T for twisted pair cable is used
 Maximum length is 100 M.
 Bridge or Repeaters are used for more than 100 M
 Preferable topology is star, but we can also used Mesh, Ring or Bus.
 RJ11(Radio Jacket), RJ13, RJ45 connectors are used.

 10 BaseF
 2 Fiber optic cable is used.
 Maximum length is 2000 M.
 LC,DLC and ST connectors are used in 10 baseF ethernet.
 Preferable topology is star, also another main 3 topologies are used.

FAST ETHERNET
 The Fast Ethernet standard (IEEE 802.3u) has been established for Ethernet networks that
need higher transmission speeds.
 This standard raises the Ethernet speed limit from 10 Mbps to 100 Mbps with only
minimal changes to the existing cable structure in LAN.
 It was launched as the IEEE 802.3u standard in 1995, and stayed the fastest network till
the introduction of Gigabit Ethernet.
 Fast Ethernet provides faster throughput for video, multimedia, graphics, Internet surfing
and stronger error detection and correction.
 It is 10 times faster compare to traditional ethernet

 Preferable topology is star, also another main 3 topologies are used.


 Data transfer rate is 100 Mbps.
 There are two types of fast ethernet

PREPARED BY : Jahnavi Parekh Page 12 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3

 100 base X
 100 is the maximum throughput, i.e. 100 Mbps.
 BASE denoted use of baseband transmission, and X is the type of medium used, which is
TX or FX.
 There are two types of techniques are used in 100 base X fast ethernet
a. 100 base TX
⚫ This has either two pairs of unshielded twisted pairs (UTP) wires or two shielded
twisted pairs (STP) wires.
⚫ One pair transmits data from hub to the device and the other from device to hub.
⚫ Maximum distance between hub and station is 100m.(Maximum length is 100 M.)
⚫ Preferable topology is star, but ring, mesh or bus can also used.
⚫ RJ11, RJ13, RJ45 connectors are used.

b. 100 base FX
⚫ This has two pairs of optical fibers. One pair transmits data from hub to the device
and the other from device to hub.
⚫ 2 fiber optic cable are used.
⚫ Maximum distance between hub and station is 2000m. (Maximum length is 2000
M.)
⚫ LC, DLC and ST connectors are used in 100 base Fx Fast ethernet.
Preferable topology is star and ring, mesh or bus can also used.

PREPARED BY : Jahnavi Parekh Page 13 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3
b. 100 base FX
⚫ This has two pairs of optical fibers. One pair transmits data from hub to the device
and the other from device to hub.
⚫ 2 fiber optic cable are used.
⚫ Maximum distance between hub and station is 2000m. (Maximum length is 2000
M.)
⚫ LC, DLC and ST connectors are used in 100 base Fx Fast ethernet.
Preferable topology is star and ring, mesh or bus can also used.

Gigabits Ethernet
⚫ Gigabit Ethernet (GbE) is the family of Ethernet technologies that achieve data
rates of 1 gigabit per second (1 Gbps).
⚫ It was introduced in 1999 and was defined by the IEEE 802.3z standard.
⚫ It is 10 times faster than fast ethernet
⚫ Twisted pair and fiber optic cable are used.
⚫ There are two types of Gigabit Ethernet : 1000 Base – X and 1000 Base - T

 Token bus (IEEE 802.4)


• Token Bus (IEEE 802.4) is a popular standard for token passing LANs.
• In a token bus LAN, the physical media is a bus or a tree, and a logical ring is created
using coaxial cable.
• The token is passed from one user to another in a sequence (clockwise or anticlockwise).
• Each station knows the address of the station to its ―left‖ and ―right‖ as per the sequence
in the logical ring. A station can only transmit data when it has the token.

PREPARED BY : Jahnavi Parekh Page 14 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3
⚫ A token is a small message that circulates among the stations of a computer network providing
permission to the stations for transmission.
⚫ If a station has data to transmit when it receives a token, it sends the data and then passes the
token to the next station; otherwise, it simply passes the token to the next station.
⚫ Frame Format of Token Bus

1. Preamble – It is used for bit synchronization. It is 1-byte field.


2. Start Delimiter – These bits mark the beginning of the frame. It is 1-byte field.
3. Frame Control – This field specifies the type of frame – data frame and control frames.
It is 1-byte field.
4. Destination Address – This field contains the destination address. It is a 2 to 6 bytes
field.
5. Source Address – This field contains the source address. It is a 2 to 6 bytes field.
6. Data – If 2-byte addresses are used then the field may be up to 8182 bytes and 8174
bytes in case of 6-byte addresses.
7. Checksum – This field contains the checksum bits which are used to detect errors in the
transmitted data. It is 4 bytes field.
8. End Delimiter – This field marks the end of a frame. It is 1-byte field.

 Token Ring((IEEE 802.5)


 It is defined by the IEEE 802.5 standard. In the token ring network the token is passed over a
physical ring instead of virtual ring.
 Ring or star topology is used in Token Ring.
 It is founded as solution of Token Bus because Token bus takes much time for transfer the
token.
 A token is a special frame of 3 bytes that circulates along the ring of stations. A station can
send data only if it holds a token.
 If a station has a frame to transmit when it receives a token, it sends the frame and then passes
the token to the next station; otherwise it simply passes the token to the next station. Passing

PREPARED BY : Jahnavi Parekh Page 15 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3
the token means receiving the token from the preceding station and transmitting to the
successor station.

 Average waiting time is 50% less than token bus.\


 When token value is 0, it is free and if token value is 1 then token is busy.
 The data flow is unidirectional in the direction of the token passing. In order that tokens are not
circulated infinitely, they are removed from the network once their purpose is completed.

Token
 Token frames are 3-byte long and consist of a start delimiter, an access control byte, and an end
delimiter.

 Start delimiter: Alerts each station of the arrival of a token.


 Access-control byte : Contains the priority field ( the most significant 3 bits ) and the
Reservation field (the least significant 3 bits) as well as a token bit.
 When token value is 0 then it is free and if token value is 1 then token is busy.
 End delimiter: Signals the end of the token.

PREPARED BY : Jahnavi Parekh Page 16 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3

 IEEE STANDARDS FOR LAN AND MAN OR WAN IEEE FAMILY


 The Institute of Electrical and Electronic Engineers (IEEE) is one of the largest
professionalorganizations in the world, and is extremely influential with regard to setting
standards.
 In February of 1980, the IEEE implemented a task force to develop a set of standards for
connectivity between Network Interface Cards (NICs) and transmission media
 These IEEE standards have also been adopted by ISO, and they are referred to as ISO 8802.
 The IEEE 802 series of standards, as well as all the other IEEE standards and research,

IEEE 802.1 (Network Management/ Internetworking / Bridging)


 This standard is actually one that goes beyond the Data Link layer of the OSI model.
 This standard related to network management.
 The Data link layer corrects any error that may have occurred at the physical layer.
 It founded data link layer for network management like error control, access control etc…
 It responsible for reliable transmission of data frames between connected nodes.

IEEE 802.2 (LLC)


 The IEEE 802.2 standard defines an LLC (LOGICAL LINK CONTROL) sub layer
that is used byother lower-layer protocols. Because these lower -layer protocols can use a
single LLC protocol layer, Network layer protocols can be designed independently of both
the network’s Physical layer and MAC sublayer implementations.
 The LLC appends to packets a header that identifies the upper-layer protocols associated
with the frame.
 This header also declares the processes that are the source and destination of each packet.
The workgroup for this set of standards is currently inactive

IEEE 802.3 (Ethernet)


 The IEEE 802.3 standard defines a network derived from the Ethernet network
originallydeveloped by Digital, Intel, and Xerox.
 This standard defines characteristics related to the MAC sub layer of the Data Link layer
and the OSI Physical layer.
 With one minor distinction —frame type—IEEE 802.3 the MAC sub layer uses a type of
contention access called Carrier Sense Multiple Access with Collision Detection
(CSMA/CD).
 Not working while deadlock.
 The workgroup for this standard is currently inactive.

IEEE 802.4 (Token Bus)


 The 802.4 standard describes a network with a bus physical topology that controls

PREPARED BY : Jahnavi Parekh Page 17 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3
mediaaccess with a token mechanism.
 This standard was designed to meet the needs of industrial automation systems but has
gained little popularity.
 Both baseband and broadband configurations are available. The workgroup for this set of
standards is currently inactive

IEEE 802.5 (Token Ring)


 The IEEE 802.5 standard was derived from IBM’s Token Ring network, which employs
a ring logical topology and token-based media access control. Data rates of 1, 4, and
16Mbps havebeen defined for this standard.

IEEE 802.6 MAN/(DQDB


 The IEEE 802.6 standard describes a MAN standard called Distributed Queue Dual
Bus(DQDB).
 Much more than a data network technology, DQDB is suited to data, voice, and
videotransmissions.
 The network is based on fiber-optic cable in a dual-bus topology, and traffic on
each bus isunidirectional.
 When operated in pairs, the two buses provide a fault-tolerant configuration. ·
Bandwidth is allocated by using time slots, and both synchronous and asynchronous
modes are supported.
 The workgroup for this set of standards is currently inactive.

IEEE 802.7 (Broadband Tag- Technical advisory group)


 This standard deals with integrating broadband solutions into a network
environment. Thisstandard is currently under development. The workgroup for this set
of standards is currentlyinactive.

IEEE 802.8 FDDI (Fiber Distributed Data Interface) / Fiber Optic TAG
 This standard deals with methods of implementing fiber optic technology into
networkingenvironments.
 This standard is currently under development.

IEEE 802.9 (IsoEthernet)


 The IEEE 802.9 standard supports a 10Mbps asynchronous channel, along with 96
64Kbps(6Mbps total bandwidth) channels that can be dedicated to specific data

PREPARED BY : Jahnavi Parekh Page 18 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3
streams.
 The total bandwidth is 16Mbps. This standard is called Isochronous Ethernet (IsoEnet)
and isdesigned for settings with a mix of bursty and time-critical traffic.

IEEE 802.10 (Network Security)


 This standard deals with security and encryption standards. This standard is
currently underdevelopment.

IEEE 802.11 ( Wireless LAN)


 IEEE 802.11 is a standard for wireless LANs and is currently under development.
 A CSMA/CD method has been approved, but the final standard is pending.

IEEE 802.12 (High Speed Networking)


 The IEEE 802.12 standard is based on a 100Mbps proposal promoted by AT&T, IBM,
and Hewlett-Packard. Called 100VG-AnyLAN, the network is based on a star-wiring
topology and acontention based access method whereby devices signal the wiring hub
when they need to transmit data.
 This standard is based on 100 Mbps plus.

IEEE 802.13
 This standard is unused and reversed for fast ethernet development.

IEEE 802.14 (Cable Modems)


 The 802.13 designation is not used, hence the last standard is known as 802.14. This standard is
for transmitting data over cable TV lines.
 The committee is currently looking at a hybrid fiber/coax media. This is one of the up
andcoming areas for fast Internet access from a person’s home.

IEEE 802.15 (Bluetooth)


 This standard develops for short distance wireless network.

PREPARED BY : Jahnavi Parekh Page 19 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3
 Bluetooth

 Bluetooth is a telecommunications industry specification that describes how mobile


devices, computers and other devices can easily communicate with each other using
a short- range wireless connection.
 Bluetooth is a radio communication technology that enables low-power, short distance
wireless networking between phones, computers and other network devices.
 The name Bluetooth is borrowed from Harald Bluetooth, a king in Denmark who lived
more than1,000 years ago.
 Bluetooth is wireless technology standard‖ for exchanging data over short distance.
 Bluetooth use the UHF (Ultra High Radio) wave for the data communication.
 Bluetooth technology was designed primarily to support networking of portable consumer
devices and peripherals that run on batteries.
 The band of bluetooth is starting from 2.402 GHz to 2.480 GHz.
 Invented in netherland 1994.

Using Bluetooth
 Bluetooth technology was designed primarily to support networking of portable consumer
devices and peripherals that run on batteries.
 Bluetooth support can be found in a wide range of devices including:
 cell phones
 wireless headsets (including hands-free car kits)
 wireless keyboards
 printers
 wireless speakers

PREPARED BY : Jahnavi Parekh Page 20 of 21


SHREE SWAMINARAYAN COLLEGE OF COMPUTER SCIENCE
CC- 405. COMPUTER NETWORK
B.SC.IT SEMESTER - 4
UNIT - 3
 PCs

How Bluetooth Works


 Two Bluetooth devices connect to each other by a process called pairing.
 By pressing a button or setting a menu option on the unit, a Bluetooth device will
initiate a newconnection.
 Details vary depending on the type of device. Here are some examples:
o Many mobile devices have Bluetooth radios embedded into the unit. PCs and
other devicescan also be enabled through the use of Bluetooth dongles.
o Bluetooth networks feature a dynamic topology contains a minimum of two and
a maximumof eight Bluetooth peer devices.
o Devices communicate using network protocols that are part of the Bluetooth
Specification.
o The Bluetooth standards have been revised over many years starting with version
1.0 (not widely used) and 1.1 up to version 4.2.
o Radio signals transmitted with Bluetooth cover only short distances, typically up
to 30 feet (10 meters). Bluetooth was originally designed for lower-speed
wireless connections although technology advancements over the years have
increased its performance considerably.
o Early versions of the standard supported connections below 1 Mbps while
modern versions are rated up to 25 Mbps.
o Bluetooth technology requires that a low-cost transceiver chip be included in each
device.
o The transceiver transmits and receives in a previously unused frequency
band of
2.45 GHz that is available globally -- with some variation of bandwidth in different
countries.
o In addition to data, up to three voice channels are available. Each device has a
unique 48-bit address from the IEEE 802 standard. Bluetooth connections can be
point to point or multipoint.

PREPARED BY : Jahnavi Parekh Page 21 of 21

You might also like