0% found this document useful (0 votes)
52 views22 pages

DCC UNIT5 Notes Final

The document outlines the concepts of network topologies and devices, detailing client-server and peer-to-peer network architectures, their advantages and disadvantages, as well as various types of network topologies including star, mesh, tree, and hybrid. It emphasizes the roles of servers and clients in a client-server network and the decentralized nature of peer-to-peer networks. Additionally, it discusses selection criteria for network topologies and provides insights into the characteristics and functionalities of each topology type.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views22 pages

DCC UNIT5 Notes Final

The document outlines the concepts of network topologies and devices, detailing client-server and peer-to-peer network architectures, their advantages and disadvantages, as well as various types of network topologies including star, mesh, tree, and hybrid. It emphasizes the roles of servers and clients in a client-server network and the decentralized nature of peer-to-peer networks. Additionally, it discusses selection criteria for network topologies and provides insights into the characteristics and functionalities of each topology type.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

DCC (22414) MRS. S.S.

KADAM

UNIT: 5

Network Topologies and Network Devices


(8 Marks)
________________________________________________________
Contents:

Course Outcome:

5.1 Network Architecture::Peer to Peer network, Client-Server network.

5.2 Network Topologies: Introduction, Definition, Selection Criteria, Types Of Topology-

i)Star, ii) Mesh iii)Tree, iv) Hybrid

5.3 Network Connecting devices: Switch, Router, Repeater, Bridge, Gateway, Modem,

References:

a. www.nptelvideos.in/2012/11/data-communication.html

b.http://www.myreadingroom.co.in/notes-and-studymaterial/68-den/750-analog-to-analog-
conversion-techniques.html

c. http://www.tutorial reports.com/wireless/wlanwifi/wifi_architecture.php

d. http://standards.ieee.org/about/get/802/802.11.html

e. www.tutorialspoint.com/data_communication_computer_network/

f. http://www.studytonight.com/computer-networks/overview-of-computer-networks

1
DCC (22414) MRS. S.S.KADAM

5.1 Network Architecture:


• There are two types of Computer Network based on Component Role:

• These two types of networks decide the relationship between each computer on the network

1. Client Server Network

2. Peer to Peer Network

Client Server Network:

• Client –Server network uses centralized management system., where decision are made in
central location

• There are two types of computer used in client server network.

1. Client

2. Server

• In client-Server network , certain computers act as servers and others act as client.

• Server is simply a computer that has the network resources and provides services to other
computer when they request for it.

• A client is the computer running a program and request the services from a server.

• Server is more powerful than clients.

• Server has more priority than client due to storage, speed or disk space.

• Server provides security and administration of a network.

2
DCC (22414) MRS. S.S.KADAM

Communication between Client & Server :

 Functions of Server:
1. Accept the query which is coming from Client

2. Process Query 3. Send Response to the Client

• Functions of Client:

1. Client place a request on the server. i.e. ask the services from Server

2. Use the services

• Advantages of Client Server Network:

1. More Secure

2. More Reliable

3. Better Performance

4. Centralized Backup

• Disadvantages of Client Server Network:

1. Dedicated server is required

2. Professional Administration

3
DCC (22414) MRS. S.S.KADAM

3. More Maintenance required

Types of Server :

1. File Server

2. Print Server

3. Application Server

4. Message Server

5. Database Server

1.File Server :

• File server manages user access and use of file resources

• File server provides services for storing, retrieving and moving the data. User can perform
various operations with the help of file server like read, write, exchange and manage files.

2.Print Server :

4
DCC (22414) MRS. S.S.KADAM

• Print server manages the printing functions on the network. It means that print server is used
for controlling and managing printing on the network.

• Print server provides various print and fax services. For printing, print server uses print
queue.

3.Application Server :

• With the help of application server, the expensive software can be shared in a network

1. Message Server :

• A message server is middle ware program that handles messages that are sent for use by
other programs using messaging application program interface.

•It is used to co-ordinate the interaction between users, documents and applications.

• This interaction can be in different forms like audio, video, binary, text or graphics. File
server cannot handle all those things, so message server came into the picture

5
DCC (22414) MRS. S.S.KADAM

5.Database Server :

• Database server allows user to access centralized database. It performs various tasks
such as data analysis, storage data manipulation, archiving and other non-user
specific task

Peer to Peer Network:

• Peer to Peer network uses decentralized management system.


• In this network, decision are made locally and resources are managed according to
the needs.
• In Peer to Peer network every computer is equal and works as a Client and Server.

6
DCC (22414) MRS. S.S.KADAM

• Peer-to-peer network is generally limited to 10 or 15 nodes


• No additional software is required to set up the peer to peer network

❖ The peer-to-peer networks are suitable for the following conditions:


i. Number of users are less than 10
ii. All users are situated in the same area.

ii. Security is not important.


iii. The possibility of future expansion is less.
iv.

Advantages of Peer to Peer Network:


• Less secure

• Hard to backup

• Data is scattered in various computers

• Possibility of future expansion is less

• All users should be present in the same area

• Only suitable for small network

• Due to absence of server, additional load on computer

• Users are supposed to manage their own resources.

Disadvantages of Peer to Peer Network:


• Less expensive

• Network operating system(NOS) is not required

• Easy to install and maintain

• Server is not required

• Administration is very easy

• User can control their resource sharing

• More built-in redundancy

• User is not depend on other computer for its operation

7
DCC (22414) MRS. S.S.KADAM

Compare Client Server & Peer to Peer Network

5.2 Network Topologies:


5.2.1 Introduction
Network Topology is a geographical representation of the relationship of all the links
connecting the devices.
Topology means a way of connecting the computers in LAN.
In LAN, various computers are connected to one another with the help of network topology.
There are two basic categories of network topologies:
i.Physical topology: The shape of the cabling layout used to link the devices is called the
physical topology of the network. This refers to the layout of cabling, the location of nodes
and the interconnections between the nodes and cabling.
The physical topology of a network is determined by the capabilities of the network access
devices and media, the level of control, and cost associated with cabling.
ii.Logical topology: The logical topology, in contrast, refers to how data is actually
transferred in a network. The logical topology, is the way that the data passes through the
network from one device to the next without regard for the physical interconnection of the
devices.

5.2.2 Selection criteria


i.Size (number of nodes and their geographical distribution) of the system.
ii.Cost of the components and services required to implement the network.

8
DCC (22414) MRS. S.S.KADAM

iii.Management of network.
iv.Architecture of network.
v.Cable type.
vi.Expandability of the system (Future growth).
vii.The desired performance of the system.
viii.The desired reliability of the entire system.
2.Types of Network Topology

Depending on the manner of connecting the computers, we can have different network
topologies:

5.2.3 Types of topologies


i.Star topology
ii.Mesh topology
iii.Tree topology
iv.Hybrid topology

1. Star Topology:

Fig 2.3: Star Topology

In star topology, each computer is connected to a central unit called hub. Each computer on a
star network communicates with a central hub that resends the message either to all the
computers or to the destination computer.
If one device wants to send data to another, it sends the data to the hub (controller), which
then relays the data to the other connected device.
It means that, the data is transmitted in the form of electronic signal, the signal is transferred
from the PC to the HUB and then the hub is responsible for broadcasting the data.
Thus, the source computer sends the data to the hub. A hub broadcasts the data which is
received by all the computers except the source computer, then the destination address is

9
DCC (22414) MRS. S.S.KADAM

checked. If the address gets matched, then that PC accepts the data otherwise it rejects the
data.
The hub in star network can be active or passive. An active hub generates the electrical signal
and sends it to all the computers connected to it. Active hub is also called as multiport
repeater. Active hub requires external power supply.

A passive hub is a wiring panel or punch down block which acts as a connection point. It
does not amplify or regenerate the signal. Passive hub does not require electrical power
supply.
All traffic that traverses the network passes through the central hub. The star topology is
considered the easiest topology to design and implement.
Star topology is an active network because it uses hub which can be of intelligent and passive
types. The intelligent hubs need external power supply, electronic components for
regeneration of signal as well as routing it to the required computer.
Star expansion is possible by placing another hub as shown in figure. This arrangement
allows several more computers or hubs to be connected to that hub.

Fig 2.4: Expansion of Star

Advantages
i. It is very easy to install, manage and reconfigure.
ii. Cabling cost is very less.
iii. Robustness: If one link fails, only that link is affected.
iv. Easy to add new computer to a star network without disturbing the rest of the network.

iv. Single computer failure does not necessarily bring down the whole star network.
v. Star topology eliminates traffic problem.
vi. It is fast as compared to ring topology.

Disadvantages
i. If central node (hub) goes down, then the entire network goes down.
ii. Cost of network is high, because of hub.
iii. Hubs are difficult to install.
iv. More expensive than bus topology.

10
DCC (22414) MRS. S.S.KADAM

Star topology degrades most gracefully in high network load situation. The reason is that with
increased load, there will be a large increase in the number of messages travelling on the
network. There would be a large number of collisions and delays possible for the bus and ring
topologies. Mesh is not suitable for large network.

2. Mesh Topology

Mesh topology is a network where all the nodes are connected to each other and is a complete
network. It means that each device in mesh topology has a dedicated point-to-point link to
every other device. The term dedicated means that the link carries traffic only between two
devices it connects.

Fig 2.5: Mesh Topology

Every node not only sends its own signals but also relays data from other nodes. Mesh
topology is very expensive as there are many redundant connections, thus it is not mostly
used in computer networks. It does not have traffic congestion problem because dedicated
links are being used.
This topology is difficult and expensive, as there are a number of to have redundant
connections to every computer. If one network cable fails, the data always has an alternative
path to get its destination.

Full mesh topology


In full mesh topology, each component is connected to every other component.
The main advantage of mesh topology is that the network can be redirected to other nodes, if
one of the nodes goes down. Full mesh topology is used only for backbone networks.
In fully connected mesh topology, n(n – 1)/2 physical channels are required to link n devices.
Each device must have (n – 1) input/output port.
As shown in fig 2.5 nodes, will require 5(5 – 1)/2 = 10 cable or links and each node must
have
(5 – 1) = 4 input/output port.

11
DCC (22414) MRS. S.S.KADAM

alternative present. So data transfer doesn’t get affected.


It provides privacy and security when every message travels along a dedicated line, only the
intended recipient sees it. Physical boundaries prevent other users from gaining access to
message.

Advantages
i. The use of dedicated link guarantees that each connection can carry its own data load.
Thus, it eliminates traffic problems.
ii. Even if one of the computers fails, there is always an alternative present. So data transfer
doesn’t get affected.
iii. It provides privacy and security when every message travels along a dedicated line, only
the intended recipient sees it. Physical boundaries prevent other users from gaining access to
message.
iv.Point-to-point links make fault identification and fault isolation easy.
v.Expansion and modification in topology can be done without disturbing nodes.

Disadvantages
i.Requires more cable than the other LAN topologies (cabling cost is more).
ii.It is suitable for small network.
iii.Installation and reconnection are difficult.
iv.The hardware required to connect each link (I/O ports and cable) is expensive.

3. Tree Topology

Fig2.6: Tree Topology

A tree topology combines characteristics of linear bus and star topologies. It is a variation of
a star-topology. It consists of groups of star configured workstations connected to a linear bus
backbone cable. This topology allows for the expansion of an existing network.
The signals that are being transmitted by the root node are received by all the nodes at the
same time. This increases the efficiency of the overall functioning of the network. The tree
network topology can be extended easily to function and there are no limitations to how big it

12
DCC (22414) MRS. S.S.KADAM

can be extended. Additional root nodes can be added, and they can be interconnected within
one single network.
Tree has a hierarchy of various hubs, like you have branches in a tree.
Tree Topology integrates the characteristics of Star and Bus Topology. Earlier we saw how in
Physical Star network Topology, computers (nodes) are connected by each other through
central hub. And we also saw in Bus Topology, work station devices are connected by the
common cable called Bus. After understanding these two network configurations, we can
understand tree topology better. In Tree Topology, the number of Star networks is connected
using Bus. This main cable seems like a main stem of a tree, and other star networks as the
branches. It is also called Expanded Star Topology. Ethernet protocol is commonly used in
this type of topology. The diagram below will make it clear.

Advantages of Tree Topology


1. It is an extension of Star and bus Topologies, so in networks where these topologies can't
be implemented individually for reasons related to scalability, tree topology is the best
alternative.
2. Expansion of Network is possible and easy.
3. Here, we divide the whole network into segments (star networks), which can be easily
managed and maintained.
4. Error detection and correction is easy.
5. Each segment is provided with dedicated point-to-point wiring to the central hub.
6. If one segment is damaged, other segments are not affected.

Disadvantages of Tree Topology


1.Because of its basic structure, tree topology, relies heavily on the main bus cable, if it
breaks whole network is crippled.
2. As more and more nodes and segments are added, the maintenance becomes difficult.
3. Scalability of the network depends on the type of cable used.

4. Hybrid Topology:

Fig 2.7: Hybrid Topology

13
DCC (22414) MRS. S.S.KADAM

Hybrid networks use a combination of any two or more topologies, in such a way that the
resulting network does not exhibit one of the standard topologies (e.g., bus, star, ring, etc.).
For example a tree network connected to a tree network is still a tree network topology. A
hybrid topology is always produced when two different basic network topologies are
connected. Two common examples for Hybrid network are: star ring network and star bus
network

Advantages of Hybrid Network Topology

1) Reliable: Unlike other networks, fault detection and troubleshooting is easy in this type of
topology. The part in which fault is detected can be isolated from the rest of network and
required corrective measures can be taken, WITHOUT affecting the functioning of rest of the
network.
2) Scalable: It’s easy to increase the size of network by adding new components, without
disturbing existing architecture.
3) Flexible: Hybrid Network can be designed according to the requirements of the
organization and by optimizing the available resources. Special care can be given to nodes
where traffic is high as well as where chances of fault are high.
4) Effective: Hybrid topology is the combination of two or more topologies, so we can
design it in such a way that strengths of constituent topologies are maximized while there
weaknesses are neutralized. For example we saw Ring Topology has good data reliability
(achieved by use of tokens) and Star topology has high tolerance capability (as each node is
not directly connected to other but through central device), so these two can be used
effectively in hybrid star-ring topology.

Disadvantages of Hybrid Topology

1) Complexity of Design: One of the biggest drawbacks of hybrid topology is its design. Its
not easy to design this type of architecture and it’s a tough job for designers. Configuration
and installation process needs to be very efficient.
2) Costly Hub: The hubs used to connect two distinct networks, are very expensive. These
hubs are different from usual hubs as they need to be intelligent enough to work with
different architectures and should be function even if a part of network is down.
3) Costly Infrastructure: As hybrid architectures are usually larger in scale, they require a
lot of cables; cooling systems, sophisticate network devices, etc.

4.2 Network Control Devices:

In network, many computers are connected to one another or to the internet. For such
connections, we need to use the connecting devices. These connecting devices are also called
as network control devices. Network control devices can operate on different layers of the
internet model (OSI Reference model). Different network control devices are connector,
transceivers, hubs, switches, repeaters, bridges, routers, modem and gateways.

14
DCC (22414) MRS. S.S.KADAM

1. Repeater:

Fig: 2.8: Repeater

Repeater is also called as regenerator, an electronic device that regenerates a signal.


Repeater allows us to extend the physical length of a network. Repeater only operates at
physical layer of OSI model. Basically repeater is used to connect two segments of the same
LAN. It does not connect two LAN or cannot connect two LAN’s of different protocols. As
the distance between two computers increases, it requires long cable. Thus, longer the cable,
the weaker is the signal. This weakening is called attenuation. Repeater installed on a link,
receives the signal before it becomes too weak or corrupted, regenerates original signal and
puts the refreshed copy back onto the link. Repeater is used to expand the boundaries of a
Local Area Network (LAN). Repeater is regenerator, not an amplifier. An amplifier cannot
intend signal and noise. It amplifies equally everything fed into it. Repeater forwards every
frame, it does not filter it.

Advantages
i. It can extend network.
ii. It regenerates desired information.
iii. It is less expensive for expanding network.

Disadvantages
i. It has no filtering capability.
ii. It does not support different network architectures.
iii. It can operate only at the physical layer.
iv. It cannot connect two LAN’s. It connects two segments of the same LAN.

Types of Repeaters
Types of repeaters are as follows:
i. Single port repeater: This repeater has one input and one output. One segment sends
signal to repeater, it boosts and passes to the next signal that is it operates with only two
segments.
ii. Multi-port repeater: This repeater has one input and multiple output ports. One segment
sends signal and another connects to cable segments.
iii. Smart repeater: It is similar to a bridge in functionality. In smart repeater packet filtering
is done. It is a hybrid device.
iv. Optical repeater: The repeater which operates optical signal is called optical repeater.
Today multiport repeater is mostly used, and is called as hub.

15
DCC (22414) MRS. S.S.KADAM

2. Bridge:

Fig 2.10: bridge


Network bridging is the action taken by network equipment to create an aggregate network
from either two or more communication, or two or more network segments. Bridging is
distinct from routing which allows the networks to communicate independently as separate
networks. Also, if one or more segments of the network are wireless, it is known as wireless
bridging.
A network bridge is a network device that connects multiple network segments. In the OSI
model bridging acts in the first two layers, below the network layer.
There are four types of network-bridging technologies: simple bridging; multiport bridging;
learning, or transparent bridging; and source route bridging.

There are different types of bridges:

i. Simple bridge: The user has to enter the address manually in the table. Simple bridges are
the most primitive and least expensive type of bridge.
Whenever, a new station is added, the table must be modified. If station is removed, its
address must be deleted from the table. It links only two segments (LAN).

ii. Multiport bridge: It is used to connect more than two LANs.

iii. Transparent bridge: The Bridge builds its table of station address on its own as it
performs its bridge function, and it is also called learning bridge. Transparent bridge is
invisible for the devices on the network. It performs the function of blocking or forwarding
data based on MAC address. At the time of installation, table of transparent bridge is empty.
It uses the source address in packet to build a table. It checks address in memory to determine
where to send the data. Filtering frames, forwarding and blocking these are the duties of
transparent bridge.

iv. Translation bridge: It connects network segment running at different speed or using
different protocols, such as token ring and Ethernet network. This bridge takes data link layer

16
DCC (22414) MRS. S.S.KADAM

frame off the packets to be relayed to other segment and packages them in new frame for
transmitting.

v. Source route bridge: In source Route Bridge, sending station defines the bridges that
should be visited by the frames. In frame the address of these bridges are saved. So frame
contains different addresses like source and destination, and bridge address.

Advantages

i. Bridges are self configuring.


ii. It is simple and significant.
iii. It is used to interconnect two LANs.
iv. It can minimize the traffic on a segment.
v. It isolates a busy network from a not so busy one.
vi. It filter traffic and increases throughout on a network.

Disadvantages

i. It is slower than repeater and hub.


ii. It is more expensive than repeater.
iii. Does not scale to extremely large network.
iv. It gives error in bridging of different MAC protocols.

3. Switch:

Fig 2.11: Switch

A network switch is a computer networking device that connects devices together on


a computer network, by using a form of packet switching to forward data to the destination
device. A network switch is considered more advanced than a(repeater) hub because a switch
will only forward a message to one or multiple devices that need to receive it, rather than
broadcasting the same message out of each of its ports.

17
DCC (22414) MRS. S.S.KADAM

Types of switch
There are two types of switch:

i. Store-and-forward switch: It stores the frame in the input buffer until the whole packet
has arrived. This packet is stored in the buffer. Then switch takes the decision about
destination machine with the help of switching table. Then the packet is forwarded towards
the appropriate destination.

ii. Cut-through switch: It forwards the packet to the output buffer as soon as the destination
address is received.
Switches may operate at one or more layers of the OSI model, including the data link and
network layers. A device that operates simultaneously at more than one of these layers is
known as a multilayer switch. In switches intended for commercial use, built-in or modular
interfaces make it possible to connect different types of networks, including Ethernet, Fiber
Channel, ATM, ITU-TG.hn and 802.11. This connectivity can be at any of the layers
mentioned. While layer-2 functionality is adequate for bandwidth-shifting within one
technology, interconnecting technologies such as Ethernet and token ring is easier at layer 3.
Devices that interconnect at layer 3 are traditionally called routers, so layer-3 switches can
also be regarded as (relatively primitive) routers.
Where there is a need for a great deal of analysis of network performance and security,
switches may be connected between WAN routers as places for analytic modules. Some
vendors provide firewall, network intrusion detection,[7] and performance analysis modules
that can plug into switch ports. Some of these functions may be on combined modules.[8]
In other cases, the switch is used to create a mirror image of data that can go to an external
device. Since most switch port mirroring provides only one mirrored stream, network
hubs can be useful for fanning out data to several read-only analyzers, such as intrusion
detection systems and packet sniffers.

4. Router:

Fig 2.12: Router

18
DCC (22414) MRS. S.S.KADAM

Routers are small physical devices that join multiple networks together. Router operates at
the network layer of the OSI model. Home networks typically use a wireless or wired Internet
Protocol (IP) router, IP being the most common OSI network layer protocol. An IP router
such as a DSL or cable modem broadband router joins the home's local area network
(LAN) to the wide-area network (WAN) of the Internet.

Router operates on network layer of OSI reference model. Router is a combination of


hardware and software. The hardware can be a network server, computer or special device
and the software in a router is the operating system and routing protocol. The hardware
includes the physical interfaces to the various network in the inter network. These interfaces
can be token, ring, Ethernet, T1, ATM, frame, relay, etc. Router is an intelligent device,
because it is more capable than the rest of the devices like bridge or repeater. Router has to
find out the best possible path among several others.

Router is an efficient device which performs the task of delivering and forwarding
information. When computer on one network wants to transmit data to a computer on another
network, the computer sends its packet to a router, which then forwards them to destination
network. Router forwards a packet based on the destination address in the network layer
protocol header. Each router consists of routing table, which determines the best way for the
data to reach the destination. Routers use the software configured network address (IP
address) to make a decision. To find out the shortest path, router used some routing
algorithms. These routing algorithms determine the routing decisions, i.e., how to forward a
packet on to its next journey.

Types of router

i. Static router: It can manually set up and configure all routes. This router uses the same
route determined by a routing entry. Static router is more secure because the administrator
specifies each route. An administrator is required to maintain the routing table and the router.
Static router can work well for small inter networks, but do not scale well for large or
dynamically changing inter network due to their manual administrator.

ii. Dynamic router: It manually configures the first route. It automatically detects additional
networks and routers. Dynamic routing consists of routing tables that are built and maintained
automatically through an ongoing communication between routers. This communication is
facilitated by a routing protocol, a series of periodic or on-demand messages containing
routing information that is exchanged between routers.
In dynamic router, security can be improved by manually configuring the router. An
administrator is required to maintain the router.

Advantages
i. Router can connect dissimilar LANs and WANs running at different transmission speeds.
ii. Routers are used to interconnect network.
iii. It is a multiport device, i.e., router with multiple slots that can hold different cable and
other devices.

Disadvantages
i. Routers are slower than other devices because of decision making.
ii. They do not have ability to stop broadcast packets from being forwarded to other
networks.

19
DCC (22414) MRS. S.S.KADAM

5. Gateway:

Fig 2.13: gateway

Gateway is a network device which connects two dissimilar networks. It is a network point
that acts as an entrance to another network. A gateway is required to convert data packets
from one protocol format to another, format. It operates on all seven layers of OSI reference
model. Gateways are application specific interfaces that link all seven layers of the OSI
model. They are dissimilar at any or all levels.

The term gateway is applied to any device, system or software applications that can perform
the function of translating data from one format to another. A gateway not only has the ability
to translate between different frame formats but also between different protocols.

The gateway works with protocols used by each network connected to a router. It can
translate from one to the other. Gateway must take care of differing frame sizes, data rates,
formats, acknowledgement schemes, priority schemes, etc. That means the task of the
gateway is very tough. A gateway is a very powerful device as compared to a bridge or a
router. It is typically used to connect huge and incompatible networks.

Example:

i. If network A is a token ring network using TCP/IP and network B is a Novell network, a
gateway can relay frames between the two.

ii. Many companies use an e-mail system such as Microsoft exchange or Novell group wise.
These systems transmit mail internally in a certain format. When an e-mail is sent across the
internet to users using a different e-mail system, the e-mail must be converted to another
format, usually to Simple Mail Transfer Protocol (SMTP). This conversion is performed by
software gateway.

Advantage:

Gateway allows communication between two dissimilar networks.

20
DCC (22414) MRS. S.S.KADAM

6. Modem:

Fig 2.14: Modem

A modem is a network device that both modulates and demodulates analog carrier signals
(called sine waves) for encoding and decoding digital information for processing. Modems
accomplish both of these tasks simultaneously and, for this reason, the term modem is a
combination of "modulate" and "demodulate."
A modem modulates outgoing digital signals from a computer or other digital device to
analog signals for a conventional copper twisted pair telephone line and demodulates the
incoming analog signal and converts it to a digital signal for the digital device.

Modems are available both as internal modem and external modem. Internal modems are
installed in the computer’s expansion slot or in the motherboard circuit. External modem is a
small box that is connected to a computer by a RS-232 cable. RS-232 cable is used to connect
a PC to its modem. Twisted pair wires and RJ-45 connectors are used to connect two
modems.

Functions of Modem
i. Converts the binary data into analog signal at sending side and converts the analog signal
into binary data at the receiving side.
ii. Takes the data from the RS-232 interface.
iii. Send dialing signals.
iv. Performs line control and signaling to the other end of phone line.

21
DCC (22414) MRS. S.S.KADAM

22

You might also like