Chapter 6
Chapter 6
CHAPTER- 6
Simplex transmission: - In this transmission, signals are transmitted in only one direction:
One station is transmitter and the other is receiver.
Simplex channels are not often used because it is not possible to send back error(s) or control
signals to transmitter end. Computers rarely use this mode transmission as a receiver cannot send
an acknowledgement signals.
E.g. TV, Radio transmission, door bell etc.
Half-duplex transmission: - Transmission is possible in both directions but only one way
at a time i.e. both stations may transmit, but only one at a time. It is possible to perform error
detection and request the sender to retransmit information that arrived corrupted.A common
situation is for device A, acting as transmitter, to send a series of characters to device B, acting
as receiver. Then A and B simultaneously switch roles and B sends acknowledgement.
E.g. Police radio (wacky talky) or talk back radio
A/ Narrow-band: - It is the smaller band and has slow data transmission rate.
Example: Telegraph line
B/ Voice- -band: - It is the wider band and has better data transmission rate than the narrow
band. Example, Telephone lines are used for voice-band channel.
C/ Broad-band: - It is the widest band has used to transmit large volume of data with high
speed. Example: circuits, satellite communication and optical fibers are used for broad band
channels.
6.4 Network
What is a Computer Network?
Computer Network is a communication system where a group of Computers and other
devices like printers, scanners, etc are connected by cables and other hardware for the
purpose of sharing resources like hardware, software and exchanging data or information
from one computer to another.
Types of Networks
Examples:
a. Two computers connected by a cable in an office
b. 100s of computers in a corporation
Whatever the type of the Network, they have the following components and features in
common:
Servers: Computers that provide shared resources to the Network users.
Clients: computers that access shared resources provided by servers.
Media: the way in which computers are connected.
Resources: files, printers or other items to be used by network users.
On the basis of functioning of these components Networks can be divided into two broad
categories:
A. Peer-to-Peer network (p-2-p)
B. Client/server based network
A. Peer-to-Peer network
Each computer is equal on a network.
They can share the same devices (printers, disk drives etc…) as well as files and
software applications, with another computer on a network.
The computers perform their activities without relaying on a centralized computer.
Each computer has equally weighted in terms of their role and responsibility on a
network. And each computer acts as both a client and a server.
Summary: In peer-to-peer network
No dedicated servers
No hierarchy among computers (all are equal, and known as peers)
Each computer functions as both a client and a server
No overall network administrator
Each user determines what data/resources he/she will share
Typically used for 10 users or less
Simple, cheap to construct
Usually no additional software required
Advantages
B. Client/server network
If a Network has to serve a large number of clients and they are dispersed, a server based
network is feasible.
Disadvantages
High initial expense.
Maintenance – Large networks will require a staff to ensure efficient operation.
Dependence – When the server goes down, operations will fail across the network.
Summary: Server-based networks
Server(s) dedicated to providing particular resources, e.g. File server,
print server, mail server, etc.
Single administrator to provide security privileges to users
Typically used for >10 users
More complex to install & maintain
Specialized server software required
The most common type of network
Network Topology
The term network topologyrefers to the shape of how the computers and other network
components are connected to each other. It is the arrangement or physical layout of computers,
cables, and other components on the network. Topology also determines how computers
communicate on the network.
Topology also implies a number of conditions. For example, a particular topology can determine
not only the type of cable used but also how the cable is run through floors and walls. It can also
determine how the computers communicate on the network. Different topologies require
different communication methods.
Determining which topology needs for the network depends on several factors such as:
Network budget
Network size
Level of security required
Physical layout
Type of business or organizations etc.
Bus topology
Star topology
Ring topology
Hybrid topology : mesh topology
1. Bus topology
The first type of network topology is called a bus, in which nodes are strung together in a line, as
shown in Figure4.3. Bus topology is commonly used for LANs.
Fig.4.3Bus topology
A bus topology is also known as linear bus. It consists of several computers attached to a
common cable called the trunk line.
In this type of topology, data on a network is sent to all the computers on the network.
Every node uses a common communication link (the trunk, backbone or segment) usually
made from coaxial cable.
All nodes compete with each other to use the link, if two try to transmit at the same time,
there is a collision.
The more computers there are on the network, the slower the network will be.
If 1 computer fails, it does not affect the rest of the network.
Must have terminators at the ends of the trunk, otherwise signals will bounce back.
Any break in the trunk will cause the entire network to stop working (there will be un
terminated cables, so signals will bounce, causing all network activity to stop).
Simple, easy to set up, no extra hardware costs. (e.g. hubs).
Bus is a passive topology (computers only listen).
2. Star topology
In a star topology, each network node is connected to a central device called a hub or a switch, as
shown in Figure 4.4. Star topologies are also commonly used with LANs.
One method of transmitting data around a ring is called token passing. A token is a special series
of bits that travels around a token-ring network. Each network has only one token. The receiving
computer returns a message to the sending computer indicating that the data has been received.
Advantages
Very orderly network where every device has access to the token and the opportunity to
transmit
Performs better than a star topology under heavy network load
Can create much larger network using Token Ring
Does not require network server to manage the connectivity between the computers
Does not require cabling space-a place for hubs.
Disadvantages
One malfunctioning workstation or bad port can create problems for the entire network
Moves, adds and changes of devices can affect the network.
Network adapter cards are much more expensive than Ethernet cards and hubs
Other topologies
Mesh topology
Mesh networks are fully-interconnected, i.e. every node has a link to
every other node
Number of links L = (N(N-1))/2, where L=Links and
N=Nodes
Expensive to build, not feasible for large networks
Fast communication between nodes
Robust (i.e. if a link fails, the network will still operate)
Passive topology
Ring - System provides equal access - Failure of one computer can affect the
for all computers. rest of the network.
- Performance is even despite - Problems are hard to isolate.
many users. - Network reconfiguration disrupts
operation.
Star - Modifying system and adding - If the centralized point fails, the
new computers is easy. network fails.
- Failure of one computer does
not affect the rest of the
network.
6.5 Internets
Internet is a wide area network, which is the network of networks that provides access to a
vast array of information stored in computer systems throughout the world. Internet has a lot of
services.
Electronic- Mail (E-mail)
E-mail is one of the most widely used services on the internet, E-mail is easy to send, read,
reply to and manage, and it is fast and convenient. E-mail is also global, allowing messages to
pass from Japan to the U.S in minutes, regardless or the time they were sent. It is much cheaper
to send an e-mail message then a letter, or to make a long distance telephone call. Another
advantage of e-mail is, it is possible to send the same message to any number of individuals as
long as you know their e-mail address.
World Wide Web (WWW)
Is one of the newest Internet services? The WWW allows you to combine text, a video,
graphics, and even animation to make a document a viewed easy. Links within WWW
documents can take you quickly to other related documents. WWW is a set of sites that you can
go for information. To access the WWW, it is necessary that you run a WWW browser on your
computer.
Telnet
It is a program that lets you log into a remote computer directly through the Internet and you
can work on that computer.
File Transfer Protocol (FTP)
This enables you to examine the files of remote hosts on the Internet and to transfer files b/n
your hosts and the others. Using FTP programs we can upload or download files. But to do this
there should be an admission from the remote computer.
Video Conferencing
The internet is, in its raw form, communication. Video conferencing means making a
conference on the internet by individuals who live in different locations. The individuals speak
and see each other.
6.5.1 Applications of Internet
As rightly mentioned earlier the Internet was originally meant for research purposes, and now
it has drastically changed for commercial purposes. Due to this drastically change the
applications of Internet are increasing day by day. Following are the few applications of
Internet.
a) Accessing and obtaining Information
The faster growing part of the Internet is the World Wide Web (WWW). The World Wide
Web or simply the Web consists of an interconnected system of sites called Websites. To access
a website, web browser software like Microsoft’s Internet Explorer or Netscape Navigator has to
be used. It is very difficult to conceive how much information is available on the web. Any
information can be obtained from the web, say for example, about travel agent, financial
investment groups, restaurant guides, mail-order shopping sites… etc. Online versions of
newspapers and magazines are also available. How to search and find such information?
By using Web search engines information of interest can be obtained. Search engines are
nothing but tools to search and find information from the web. These search engines are
software called ―Spiders‖ to crawl around the Web for searching information.
Examples of some popular search engines are
Alta vista
Info seek
Yahoo
Google
b) Communication
The World Wide Web is getting all the headlines, but for many people the main attraction of
Internet is the Electronic Main or E-Mail – the fastest way of sending messages from one user to
another. It hardly takes few fractions of a second to transfer a message. There are several
websites offering this service. For example,
Yahoo.com
Hotmail.com
Rediffmail.com
Freemail.com
c) Marketing and Business on the Web
Many people are now putting their business online. To do this, one needs to develop a
website with online order forms. This concept is developing very fast day by day. Of course, it
costs money to make more money.
But networks are not limited to physical cabling; many wireless media are used as well. These
include Infrared and Laser devices, radio and cellular connections, microwave antennas, and
digital satellites. These media may increase the range of a network, and are often much more
expensive than their physical counterparts, and are susceptible to more types of interference.
Network Interface Card (NIC)
A NIC is the expansion card that is added to a computer to enable it to communicate on a
network. The NIC translates the signals from the network into a form the computer can
understand and vice versa for outgoing data.
The NIC connects a computer with the network medium. A NIC can be a standard
expansion card, a PCMCIA card, or even an external device connected through a
communications port (such as a serial or parallel port).
NIC usually have a memory buffer where information is temporarily stored and is
transmitted to or from the network. This buffer enables the NIC to handle information
bursting and chunking without bogging down the attached computer.
Modem
Modems are the devices used to communicate data over telephone lines. Modems get their name
from their function, Modulation-Demodulation. This function is the translation of digital
computer data into a signal that can be transmitted over a phone line and vice versa. Similar to a
NIC, modems enable computers to communicate over the connection medium of the telephone
system. Networks can be created using modems instead of NICs, but, more often, they are used
to provide temporary connections for remote users.
Hubs:-
Hubs are also called as concentrators.They are network devices that are used to connect multiple
network connections into more manageable configurations. The benefits of hub include the
following:
Simplification of cabling
Increased reliability
Trouble shooting is simplified for communication problems.
Hubs can either be simply cable connecting devices or intelligent hubs. Intelligent hubs can
perform additional tasks, such a fault tolerance, remote management, and re-broadcasting. The
term repeater refers to an intelligent hub that can re-send or repeat garbled data.
Bridges, routers, and gateways are devices that enable one network to communicate or connect
with another network. These specialized devices are required to link networks that use different
connection media, NOS, or platforms. They are also used to link networks located at different
locations, whether in the same building, city, country, or planet.
End of chapter
six