UNIT - 1 Gemini Notes
UNIT - 1 Gemini Notes
O
network fundamentals, and transmission techniques:
rotocols play a crucial role in governing this data flow, defining the rules and formats
P
for communication at each stage.16
tandards:
S
Network standards are agreed-upon specifications and guidelines that promote
interoperability and compatibility between networking equipment and software from different
vendors.34 Standards are developed by national and international organizations to ensure
t hat products can work together seamlessly, fostering competition and innovation in the
industry.35
Key standards organizations include:
● IEEE (Institute of Electrical and Electronics Engineers):Develops standards
f or a wide range of technologies, including many networking standards (e.g., IEEE
802.3 for Ethernet, IEEE 802.11 for Wi-Fi).
IETF (Internet Engineering Task Force):Responsible for developing and
●
promoting internet standards, particularly those in the TCP/IP suite.36
● ISO (International Organization for Standardization):A global body that
develops standards across various industries, including the OSI model (ISO/IEC
7498).37
● ITU (International Telecommunication Union):A United Nations specialized
agency for information and communication technologies,38 involved in developing
telecommunication standards.39
OSI Model
he OSI (Open Systems Interconnection) model is a conceptual framework that
T
standardizes the functions of a telecommunication or computing system41 into seven
abstraction layers.42 Developed by the International Organization for Standardization
(ISO), it provides43 a clear picture of how data travels from an application on one
computer to an application on another, even if the underlying hardware and software
are different.44 Each layer provides services to the layer above it and receives services
from the layer below.45
hen data is sent, it originates at the Application Layer, and as it passes down
W
through each layer, the layer adds its own header (and sometimes a trailer) containing
control information.50 This process is calledencapsulation. At the Physical Layer, the
data is transmitted as bits.
hen data is received, it starts at the Physical Layer as bits and moves up through
W
each layer. At each layer, the corresponding header (and trailer) is removed, and the
data is passed up to the next layer.51 This process is calledde-encapsulation. The
Application Layer at the destination receives the original data.
he OSI model is a logical model and not all protocols map perfectly to its layers. The
T
TCP/IP model, for instance, is a more practical model widely used in the internet,
which combines several OSI layers.52 However, the OSI model is valuable for
understanding the different functions involved in network communication.
Transmission Media
ransmission media are the physical pathways or channels through which data travels
T
from one point to another in a network.53 They can be broadly classified into two
categories: Guided Media and Unguided Media.
ired LANs predominantly use Ethernet technology, which is based on the IEEE 802.3
W
standard.64 Ethernet defines the rules for how devices on a wired network access the
transmission medium and transmit data.
● How it Works:Devices in a wired LAN are connected using physical cables,
rimarily twisted-pair (UTP or STP) or, less commonly today, coaxial cable.65
p
Devices use network interface cards (NICs) to connect to the cable.66 Data is
transmitted in Ethernet frames.
Access Method:Older Ethernet used a shared medium and an access method
●
called CSMA/CD (Carrier Sense Multiple Access with Collision Detection).67
Devices would "listen" to the cable before transmitting (Carrier Sense) and if it
was clear, they would transmit. If two devices transmitted simultaneously, a
collision would occur, which the devices would detect (Collision Detection), stop
transmitting, and wait a random amount of time before trying again.68 Modern
switched Ethernet largely eliminates collisions by providing dedicated
connections between devices and the switch.69
● Components:Key components of a wired LAN include:
○ Network Interface Cards (NICs):Hardware installed in devices to connect
t hem to the network cable.70
○ Cabling:Twisted-pair (most common), coaxial, or fiber optic.71
○ Connectors:RJ-45 connectors for twisted-pair.72
○ Hubs (older technology):Simple devices that broadcast data received on
one port to all other ports, leading to collisions in shared Ethernet.
○ Switches (modern technology):Intelligent devices that forward data only to
the intended destination port based on MAC addresses, creating dedicated
segments and reducing collisions.73
Speeds:Ethernet speeds have evolved significantly over time: 10 Mbps
●
(10Base-T), 100 Mbps (Fast Ethernet), 1 Gbps (Gigabit Ethernet), 10 Gbps, 40
Gbps, 100 Gbps, and even higher.
● Advantages:Generally provides higher bandwidth and lower latency compared
to wireless LANs.74 More secure as physical access to the cable is required. More
reliable and less susceptible to interference.
● Disadvantages:Requires physical cabling, which can be inflexible and costly to
install and reconfigure. Limits mobility.
ireless LANs use radio waves to connect devices without physical cables.75 The most
W
common WLAN technology is Wi-Fi, based on the IEEE 802.11 standards.76
● How it Works:Devices with wireless network adapters communicate with a
ireless access point (WAP) using radio waves. The WAP acts as a bridge
w
between the wireless network and a wired network (like an Ethernet LAN).
Access Method:WLANs use CSMA/CA (Carrier Sense Multiple Access with
●
Collision Avoidance). Before transmitting, a device listens to the medium. If it's
busy, it waits. To avoid collisions, devices also use mechanisms like requesting
permission to send (RTS/CTS - Request to Send/Clear to Send) or acknowledging
successful reception.77
● Standards (IEEE 802.11):The IEEE 802.11 family of standards specifies the
different versions of Wi-Fi, each offering different speeds, frequencies, and
features:78
○ 802.11b:Operates in the 2.4 GHz band, speeds up to 11 Mbps.79
○ 802.11a:Operates in the 5 GHz band, speeds up to 54 Mbps.80
○ 802.11g:Operates in the 2.4 GHz band, speeds up to 54 Mbps, backward
compatible with 802.11b.
○ 802.11n (Wi-Fi 4):Operates in both 2.4 GHz and 5 GHz, introduced MIMO
( Multiple-Input Multiple-Output) for increased speed and range, speeds up to
600 Mbps.
○ 802.11ac (Wi-Fi 5):Operates in the 5 GHz band, provides significantly higher
speeds through wider channels and more spatial streams, speeds often in the
Gbps range.81
○ 802.11ax (Wi-Fi 6):Operates in 2.4 GHz, 5 GHz, and the new 6 GHz band
(Wi-Fi 6E). Improves efficiency and performance in crowded environments,
supports more devices simultaneously, speeds up to 9.6 Gbps.
Components:
●
○ Wireless Network Adapters:Built into or added to devices to enable wireless
connectivity.
○ Wireless Access Points (WAPs):Devices that connect wireless devices to a
wired network.
○ Antennas:Used by WAPs and wireless adapters to transmit and receive radio
waves.
● Advantages:Provides mobility and flexibility.82 Easy to install (no need for
extensive cabling).
● Disadvantages:Lower bandwidth and higher latency compared to wired LANs in
many cases.83 Susceptible to interference from other wireless devices and
physical obstacles. Security can be a concern if not properly configured
(encryption is essential). Range is limited.
ANs can be connected to each other and to larger networks (like Wide Area
L
Networks - WANs, and the internet) using various networking devices:84
● Repeaters:Operate at the Physical Layer.85 They regenerate weak signals to
xtend the reach of a network segment. Do not segment network traffic or reduce
e
collisions (in shared media).
Hubs:Operate at the Physical Layer. They connect multiple devices and
●
broadcast incoming data to all connected devices. Create a single collision
domain (in shared Ethernet).
● Bridges:Operate at the Data Link Layer.86 They connect two or more network
segments and forward frames based on MAC addresses.87 They can filter traffic
and divide collision domains.
● Switches:Operate primarily at the Data Link Layer (some have Network Layer
capabilities).88 They connect multiple devices and forward frames intelligently
ased on MAC addresses, creating separate collision domains for each port.89
b
This significantly improves network performance compared to hubs.
Routers:Operate at the Network Layer. They connect different networks (LANs,
●
WANs) and forward packets based on IP addresses.90 They determine the best
path for packets to travel between networks and create broadcast domains.
● Gateways:Can operate at any layer and are used to connect networks that use
different protocols.91
witches and routers are the most fundamental devices used for connecting and
S
managing modern LANs. Switches are used within a single LAN to connect devices
efficiently, while routers are used to connect different LANs and provide access to
external networks.92
Virtual LAN (VLAN) is a logical grouping of devices on a network that are not
A
restricted to a single physical switch.93 VLANs allow administrators to segment a single
physical network into multiple logical broadcast domains.94 Devices within the same
VLAN can communicate with each other as if they were on the same physical
network95 segment, regardless of their actual physical location or the switch port they
are connected to.96
● Purpose of VLANs:
○ Improved Performance:By creating smaller broadcast domains, VLANs
r educe unnecessary broadcast traffic, improving network performance.97
○ Enhanced Security:VLANs isolate traffic between different groups of users
or devices, preventing unauthorized access to sensitive information on other
VLANs.98
○ Flexibility and Scalability:VLANs make it easier to manage and reconfigure
the network as users and devices move.99 Devices can be added or moved to
different physical locations without requiring changes to the network's
physical cabling structure; their VLAN membership is configured in the switch.
○ Simplified Administration:VLANs can simplify network administration by
allowing policies and security settings to be applied to entire groups of users
or devices at once.100
How VLANs Work:Switches that support VLANs are configured to assign ports
●
or devices to specific VLANs.101 When a switch receives a frame, it examines the
VLAN tag (an extra field added to the Ethernet frame) to determine which VLAN
the frame belongs to.102 The switch then forwards the frame only to ports that are
members of the same VLAN. To communicate between different VLANs, a Layer 3
evice (like a router or a Layer 3 switch) is required.103
d
Types of VLANs (Common Implementations):
●
○ Port-Based VLANs:The most common type, where each switch port is
statically assigned to a specific VLAN.104 Any device connecting to that port
becomes a member of the assigned VLAN.
○ MAC-Based VLANs:Devices are assigned to VLANs based on their MAC
addresses. This allows devices to be automatically placed in the correct VLAN
regardless of which port they connect to (requires the switch to learn MAC
addresses).
○ Protocol-Based VLANs:Devices are assigned to VLANs based on the
protocol being used (e.g., IP, IPX).105
LANs are a powerful tool for managing and segmenting networks, providing benefits
V
in terms of performance, security, and flexibility, especially in larger and more complex
LAN environments.106
here are several multiplexing techniques, each suitable for different types of signals
T
and media:110
1. Frequency Division Multiplexing (FDM):
○ Description:FDM is an analog multiplexing technique used when the
andwidth of the transmission medium is greater than the combined
b
bandwidth of the individual signals to be transmitted. The available bandwidth
is divided into multiple distinct frequency bands (channels), and each signal is
modulated onto a different carrier frequency.111 These modulated signals are
then combined and transmitted over the shared medium.
How it Works:Each signal is assigned its own unique frequency range within
○
the overall bandwidth. To prevent interference between adjacent channels,
small unused portions of the spectrum calledguard bandsare placed
between the channels.112
○ Applications:Analog television broadcasting, FM radio broadcasting, older
telephone systems.
○ Characteristics:Suitable for analog signals. Requires careful filtering to
s eparate channels. Inefficient if a channel is not actively transmitting data, as
its allocated frequency band remains unused.
. Time Division Multiplexing (TDM):
2
○ Description:TDM is a digital multiplexing technique used to combine multiple
digital signals into a single high-speed digital stream.113 Instead of dividing the
bandwidth by frequency, TDM divides the transmission time into discrete time
slots.114 Each input signal is allocated a recurring time slot in the combined
stream.
○ How it Works:The multiplexer takes a small segment of data from each input
signal in a round-robin fashion and combines them into a frame. These
frames are then transmitted sequentially over the shared medium. The
demultiplexer at the receiving end separates the data based on the time slot
it occupies in the frame.
○ Types:
■ Synchronous TDM:Each input line is given a fixed time slot, even if it has
no data to send.115 This can be inefficient if many channels are idle.
■ Asynchronous (Statistical) TDM:Time slots are allocated dynamically to
input lines that have data to send.116 This is more efficient as bandwidth is
not wasted on idle channels, but it requires addressing information within
the frame to identify which channel the data belongs to.
○ Applications:Digital telephone systems (like T1/E1 lines), cellular networks
(GSM).
○ Characteristics:Suitable for digital signals. More efficient than FDM when
input signals are not continuous. Requires synchronization between the
multiplexer and demultiplexer.
3. Wave Division Multiplexing (WDM):
○ Description:WDM is a multiplexing technique used in fiber-optic
communication.117 It is analogous to FDM but applied to light waves. Multiple
data streams are transmitted simultaneously over a single optical fiber by
using different wavelengths (colors) of light for each stream.118
○ How it Works:Each data stream is modulated onto a light signal with a
specific wavelength generated by a laser.119 A multiplexer combines these light
signals with different wavelengths onto a single fiber. At the receiving end, a
demultiplexer (like a prism or a grating) separates the light back into its
individual wavelengths, and photodetectors convert the light signals back into
electrical signals.
○ Types:
■ Coarse WDM (CWDM):Uses a smaller number of wavelengths with wider
s pacing.
■ Dense WDM (DWDM):Uses a larger number of wavelengths with much
narrower spacing, allowing for significantly higher data carrying capacity.
Applications:High-capacity long-haul fiber-optic networks, metropolitan
○
area networks.
○ Characteristics:Achieves very high bandwidth utilization over fiber optic
cables. Different wavelengths do not interfere with each other. Passive WDM
can be relatively simple, while DWDM systems are complex and expensive.
pread spectrum techniques, particularly DSSS and FHSS, have been fundamental in
S
the development of various wireless communication technologies, providing
robustness against interference and enabling multiple access schemes like CDMA.131
hese notes cover the essential concepts for each of the topics you requested,
T
providing a detailed overview of data representation, network structures,
communication rules, transmission methods, and bandwidth utilization techniques.