0% found this document useful (0 votes)
3 views45 pages

Unit 1 - Introduction to Computer Network - Lecture

Unit 1 provides an overview of computer networks, including definitions, advantages, and disadvantages. It discusses various network types (PAN, LAN, WAN, etc.), their range of use, and components, as well as network models and topologies. Additionally, it introduces Generative Adversarial Networks (GAN) and their applications in data generation and image processing.

Uploaded by

lalitpal091091
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views45 pages

Unit 1 - Introduction to Computer Network - Lecture

Unit 1 provides an overview of computer networks, including definitions, advantages, and disadvantages. It discusses various network types (PAN, LAN, WAN, etc.), their range of use, and components, as well as network models and topologies. Additionally, it introduces Generative Adversarial Networks (GAN) and their applications in data generation and image processing.

Uploaded by

lalitpal091091
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 45

Unit 1: Introduction to Computer Network

Contents:
1. Definition, merits and demerits of computer network
2. Network models
a. PAN, LAN, CAN (Campus Area Network), MAN, CAN*
(Country Area Network), WAN, GAN
b. Topological models (Bus, Distributed Bus, Ring, Star,
Mesh, Tree, Hybrid)
c. Peer-to-Peer and Client/Server Model
3. ISPs, NSPs Overview and Backbone of Networking
4. Recent Trends in Telecom Technologies: 2G/3G/4G/5G.
---------------------------------------------------------------------------------------
Definition, merits and demerits of computer network
• A computer network is a series of connection points (nodes) that
enables us to transmit, receive and share data in the form of different
file formats.
• It helps us to communicate with each other and share necessary
documents virtually.

Er. Chandan Bhagat


Merits of computer network

The following are some of the main advantages of Computer


Networks:

• Increased storage capacity:


• Higher information security:
• Easy sharing of files:
• Faster resources sharing:
• Enhanced data reliability:
• Improved communication:
• Better collaboration:
• Higher connectivity:
• Enhanced flexibility:
• Reliability:

Er. Chandan Bhagat


Demerits of computer network

The following are some of the main disadvantages of Computer


Networks:

• Network Setup Costs:


• Issues with Independent Usage:
o Because everything is centralized, the network lacks

independence. As a result, individual users cannot use the


computer as they wish.
• Malware Infection:
o Viruses or Malware can propagate easily between the

connected computers in a network.


• Expert Assistance is Required:
• Security of Computer Networks is a Concern:
• Health Issues:
• Poor Internet Accessibility:
• Not robust enough:
o In case a systems’ central linking server or bridging device

fails, or if its principal server detaches, the whole network is


affected. However, you can use a large system as a document
server to resolve this issue.

Er. Chandan Bhagat


What are types of computer networking and their range of use?

Type of Computer Networking and their Use of Range

1. Personal Area Network (PAN):


Range of 10 meters
2. Wide Area Network (WAN):
Up to 100,000 km, capacity to expand global
3. Local Area Network (LAN):
1 km to 5 km
4. Wireless Local Area Network (WLAN):
50 meters to 150 meters
5. Campus Area Network (CAN):
1 km to 5 km, including interconnected LAN within a limited setup
6. Metropolitan Area Network (MAN):
50 km to 60 km
7. Storage Area Network (SAN Storage):
Up to 10 km
8. System Area Network (SAN System):
Few meters to few kilometers
9. Enterprise Private Network (EPN):
Dimensions of the business
10. Virtual Private Network (VPN):
Connect remotely

What are the components of computer network?

A network has a few primary components. A client, a server, a channel,


an interface device, and an operating system

Er. Chandan Bhagat


An interconnected computer network is a group of computers that can
share common devices, features and functions including clients, servers,
shared data and devices (like printers and other computing devices),
communication media, software resources, NIC (network interface
card), LOS (local operating system), and the NOS (network operating
system).

Network models

A computer network is a group of computers linked to each other that


enables the computer to communicate with another computer and share
their resources, data, and applications.

A computer network can be categorized by their size.

• PAN (Personal Area Network)


• LAN (Local Area Network)
• CAN (Campus Area Network),
• MAN (Metropolitan Area Network)
• WAN/CAN* (Country Area Network)
• GAN (Generative Adversarial Network)

A computer network is mainly of four types:

Er. Chandan Bhagat


PAN (Personal Area Network)

• Personal Area Network is a network arranged within an individual


person, typically within a range of 10 meters.
• Personal Area Network is used for connecting the computer devices
of personal use is known as Personal Area Network.
• Thomas Zimmerman was the first research scientist to bring the
idea of the Personal Area Network.
• Personal Area Network covers an area of 30 feet.
• Personal computer devices that are used to develop the personal area
network are the laptop, mobile phones, media player and play
stations.

There are two types of Personal Area Network:

Er. Chandan Bhagat


• Wired Personal Area Network
• Wireless Personal Area Network

Wireless Personal Area Network:

• Wireless Personal Area Network is developed by simply using


wireless technologies such as WiFi, Bluetooth. It is a low range
network.

Wired Personal Area Network:

• Wired Personal Area Network is created by using the USB.

LAN (Local Area Network)

• Local Area Network is a group of computers connected to each other


in a small area such as building, office.
• LAN is used for connecting two or more personal computers
through a communication medium such as twisted pair, coaxial
cable, etc.
• It is less costly as it is built with inexpensive hardware such as hubs,
network adapters, and ethernet cables.
• The data is transferred at an extremely faster rate in Local Area
Network.
• Local Area Network provides higher security.

Er. Chandan Bhagat


Campus Area Network (CAN)

• A corporate area network and it helps to like LAN with small


geographical space.
• The main objective is offering the best accessibility of campus
residential regions like schools, colleges, university, small institutes
(Campus), and corporate area (building).
• It is larger than LAN but small than WAN and MAN networks
• It can cover many buildings in an area.

For example –

• Different buildings in a campus are connected using Campus Area


Network (CAN) they help to interconnect departments, library and
computer laboratories.

Er. Chandan Bhagat


Advantages

The advantages of CAN are as follows −

• Affordability –
o To construct CAN networks we use hardware devices like hub,

routers, switches, cables which are affordable.


• Easy accessibility of data –
o We can easily access the data that are present in different

departments with the help of CAN.


• Wireless medium –
o With the help of wireless connection we are able to link offices

which are present in different buildings.


• Higher speed –
o CAN is supported to transfer large files or data with high speed

over a network with the help of the internet.


• Protection –
o CAN networks have firewalls and proxy servers which are

used for security purposes.


• Share internet connection –
o CAN network will share internet connection.

Er. Chandan Bhagat


Disadvantages

The disadvantages of CAN are as follows −

• It does not support a maximum number of nodes.


• It can connect only up to 64 nodes because of electrical loading.
• CAN maintenance is costly when compared to other networks like
LAN, SAN, WAN etc.
• It can support up to 40 meter length.
• There are undesirable interactions in between all nodes.

Examples

The places where the CAN is used are given below −

• School campus
• University campus
• It is used in large organization and industrial sites.
• It is also used in automotive applications.

MAN (Metropolitan Area Network)

• A network that covers a larger geographic area by


interconnecting a different LAN to form a larger network.
• Government agencies use MAN to connect to the citizens and
private industries.
• In MAN, various LANs are connected to each other through a
telephone exchange line.
• The most widely used protocols in MAN are RS-232, Frame Relay,
ATM, ISDN, OC-3, ADSL, etc.
• It has a higher range than Local Area Network (LAN).

Er. Chandan Bhagat


Applications/ Uses of Metropolitan Area Network:

• MAN is used in communication between the banks in a city.


• It can be used in an Airline Reservation.
• It can be used in a college within a city.
• It can also be used for communication in the military.

WAN (Wide Area Network)

• A network that extends over a large geographical area such as


states or countries.
• A Wide Area Network is quite bigger network than the LAN.
• A Wide Area Network is not limited to a single location, but it spans
over a large geographical area through a telephone line, fibre optic
cable or satellite links.
• The internet is one of the biggest WAN in the world.

Er. Chandan Bhagat


• A Wide Area Network is widely used in the field of Business,
government, and education.

Examples of Wide Area Network:

• Mobile Broadband: A 4G network is widely used across a region


or country.
• Last mile/FTTH: A telecom company is used to provide the
internet services to the customers in hundreds of cities by connecting
their home with fiber.
• Private network: A bank provides a private network that
connects the 77 offices in Nepal.

Er. Chandan Bhagat


Advantages of Wide Area Network:

Following are the advantages of the Wide Area Network:

• Geographical area: A Wide Area Network provides a large


geographical area. Suppose if the branch of our office is in a
different city then we can connect with them through WAN. The
internet provides a leased line through which we can connect with
another branch.
• Centralized data: In case of WAN network, data is centralized.
Therefore, we do not need to buy the emails, files or back up servers.
• Get updated files: Software companies work on the live server.
Therefore, the programmers get the updated files within seconds.
• Exchange messages: In a WAN network, messages are transmitted
fast. The web application like Facebook, Whatsapp, Skype allows
you to communicate with friends.
• Sharing of software and resources: In WAN network, we can
share the software and other resources like a hard drive, RAM.
• Global business: We can do the business over the internet globally.
• High bandwidth: If we use the leased lines for our company then
this gives the high bandwidth. The high bandwidth increases the
data transfer rate which in turn increases the productivity of our
company.

Disadvantages of Wide Area Network:

The following are the disadvantages of the Wide Area Network:

• Security issue: A WAN network has more security issues as


compared to LAN and MAN network as all the technologies are
combined together that creates the security problem.

Er. Chandan Bhagat


• Needs Firewall & antivirus software: The data is transferred on
the internet which can be changed or hacked by the hackers, so the
firewall needs to be used. Some people can inject the virus in our
system so antivirus is needed to protect from such a virus.
• High Setup cost: An installation cost of the WAN network is high
as it involves the purchasing of routers, switches.
• Troubleshooting problems: It covers a large area so fixing the
problem is difficult.

What is a GAN?
A generative adversarial network (GAN) is a deep learning architecture.
It trains two neural networks to compete against each other to generate
more authentic new data from a given training dataset. For instance, you
can generate new images from an existing image database or original
music from a database of songs. A GAN is called adversarial because it
trains two different networks and pits them against each other. One
network generates new data by taking an input data sample and modifying
it as much as possible. The other network tries to predict whether the
generated data output belongs in the original dataset. In other words, the
predicting network determines whether the generated data is fake or real.
The system generates newer, improved versions of fake data values until
the predicting network can no longer distinguish fake from original.

The GAN architecture has several applications across different


industries.
Some examples.

• Generate images
GAN can also edit images—like converting a low-resolution image to a
high resolution or turning a black-and-white image to color. It can also
create realistic faces, characters, and animals for animation and video.
Er. Chandan Bhagat
• Generate training data for other models
In machine learning (ML), data augmentation artificially increases the
training set by creating modified copies of a dataset using existing data.

• Generate 3D models from 2D data


GAN can generate 3D models from 2D photos or scanned images. For
instance, in healthcare, GAN combines X-rays and other body scans to
create realistic images of organs for surgical planning and simulation.
.

Er. Chandan Bhagat


How does a generative adversarial network work?
A generative adversarial network system comprises two deep neural
networks—the generator network and the discriminator network. Both
networks train in an adversarial game, where one tries to generate new
data and the other attempts to predict if the output is fake or real data.
Technically, the GAN works as follows. A complex mathematical
equation forms the basis of the entire computing process, but this is a
simplistic overview:
1. The generator neural network analyzes the training set and identifies
data attributes
2. The discriminator neural network also analyzes the initial training
data and distinguishes between the attributes independently
3. The generator modifies some data attributes by adding noise (or
random changes) to certain attributes
4. The generator passes the modified data to the discriminator
5. The discriminator calculates the probability that the generated
output belongs to the original dataset
6. The discriminator gives some guidance to the generator to reduce
the noise vector randomization in the next cycle
The generator attempts to maximize the probability of mistake by the
discriminator, but the discriminator attempts to minimize the probability
of error. In training iterations, both the generator and discriminator evolve
and confront each other continuously until they reach an equilibrium state.
In the equilibrium state, the discriminator can no longer recognize
synthesized data. At this point, the training process is over.

Er. Chandan Bhagat


GAN training example
Let's contextualize the above with an example of the GAN model in
image-to-image translation.
Consider that the input image is a human face that the GAN attempts to
modify. For example, the attributes can be the shapes of eyes or ears.
Let's say the generator changes the real images by adding sunglasses to
them. The discriminator receives a set of images, some of real people with
sunglasses and some generated images that were modified to include
sunglasses.
If the discriminator can differentiate between fake and real, the generator
updates its parameters to generate even better fake images. If the generator
produces images that fool the discriminator, the discriminator updates its
parameters. Competition improves both networks until equilibrium is
reached.
Topological models
(Bus, Distributed Bus, Ring, Star, Mesh, Tree, Hybrid)
Network Topology - “Physical and logical arrangement of computer
network”

Er. Chandan Bhagat


• A topology is used to explain how a network is physically
connected and the logical flow of information in the network.
• A topology mainly describes how devices are connected and interact
with each other using communication links.
In computer networks, there are mainly two types of topologies, they
are:

1. Physical Topology: A physical topology describes the way in


which the computers or nodes are connected with each other in a
computer network.
2. Logical Topology: A logical topology describes the way, data flow
from one computer to another.

Network topology defines the layout, virtual shape, or structure of the


network, not only physically but also logically. A network can have
one physical topology and multiple logical topologies at the same time.

In a computer network, there are mainly six types of physical


topology, they are:

1. Bus Topology
2. Ring Topology
3. Star Topology
4. Mesh Topology
5. Tree Topology
6. Hybrid Topology

Er. Chandan Bhagat


Bus Topology

• Bus topology is the simplest kind of topology in which a common


bus or channel is used for communication in the network.
• The bus is connected to various taps and droplines.
• Taps are the connectors, while droplines are the cables connecting
the bus with the computer.
• There is only a single transmission line for all nodes.
• Bus technology is mainly suited for small networks like LAN, etc.

Er. Chandan Bhagat


• When a sender sends a message, all other computers can hear it, but
only the receiver accepts it (verifying the mac address attached with
the data frame) and others reject it.
• In this topology, the bus acts as the backbone of the network, which
joins every computer and peripherals in the network
• Both ends of the shared channel have line terminators.
• The data is sent only in one direction and as soon as it reaches the
end, the terminator removes the data from the communication line
(to prevent signal bounce and data flow disruption).
• In a bus topology, each computer communicates to another
computer on the network independently.

Following are the advantages of Bus topology:

Er. Chandan Bhagat


1. Simple to use and install.
2. If a node fails, it will not affect other nodes.
3. Less cabling is required.
4. Cost-efficient to implement.

Following are the disadvantages of Bus topology:

1. Efficiency is less when nodes are more (strength of signal


decreases).
2. If the bus fails, the network will fail.
3. A limited number of nodes can connect to the bus due to limited bus
length.
4. Security issues and risks are more as messages are broadcasted to
all nodes.
5. Congestion and traffic on the bus as it is the only source of
communication.

Ring Topology

• Ring topology is a topology in which each computer is connected


to exactly two other computers to form the ring.
• The message passing is unidirectional and circular in nature.

Er. Chandan Bhagat


• This network topology is deterministic in nature, i.e., each computer
is given access for transmission at a fixed time interval.
• All the nodes are connected in a closed-loop.
• This topology mainly works on a token-based system and the token
travels in a loop in one specific direction.

In a ring topology, if a token is free then the node can capture the
token and attach the data and destination address to the token, and
then leaves the token for communication.

When this token reaches the destination node, the data is removed by
the receiver and the token is made free to carry the next data.

For Example, Token Ring, etc.

Advantages of Ring topology:

1. Easy Installation.
Er. Chandan Bhagat
2. Less Cabling Required.
3. Reduces chances of data collision (unidirectional).
4. Easy to troubleshoot (the faulty node does not pass the token).
5. Each node gets the same access time.

Disadvantages of Ring topology:

1. If a node fails, the whole network will fail.


2. Slow data transmission speed (each message has to go through the
ring path).
3. Difficult to reconfigure (we have to break the ring).

Star Topology

• Star topology is a computer network topology in which all the


nodes are connected to a centralized hub/switch.
• The hub or switch acts as a middleware between the nodes.
• Any node requesting for service or providing service, first contact
the hub/ switch for communication.
• In a star topology, hub and switch act as a server, and the other
connected devices act as clients. Only one input-output port and one
cable are required to connect a node to the central device.
• This topology is better in terms of security because the data does
not pass through every node.

For Example High-Speed LAN, etc.

Er. Chandan Bhagat


• The central device (hub or switch) has point to point communication
link (the dedicated link between the devices which cannot be
accessed by some other computer) with the devices.
• The central device then broadcast or unicast the message based
on the central device used.
• The hub broadcasts the message, while the switch unicasts the
messages by maintaining a switch table. Broadcasting increases
unnecessary data traffic in the network.

Following are the advantages of Star topology:

1. Centralized control.
2. Less Expensive.
3. Easy to troubleshoot (the faulty node does not give response).
4. Good fault tolerance due to centralized control on nodes.
5. Easy to scale (nodes can be added or removed to the network easily).
Er. Chandan Bhagat
6. If a node fails, it will not affect other nodes.
7. Easy to reconfigure and upgrade(configured using a central device).

Following are the disadvantages of Star topology:

1. If the central device fails, the network will fail.


2. The number of devices in the network is limited (due to limited
input-output port in a central device).

Mesh Topology

• Mesh topology is a computer network topology in which nodes


are interconnected with each other.
• In other words, direct communication takes place between the nodes
in the network.

Er. Chandan Bhagat


There are mainly two types of Mesh:

1. Full Mesh: In which each node is connected to every other node in


the network.
2. Partial Mesh: In which, some nodes are not connected to every
node in the network.

For Example, the Internet (WAN), etc.

Er. Chandan Bhagat


Following are the advantages of Mesh topology:

1. Dedicated links facilitate direct communication.


2. No congestion or traffic problems on the channels.
3. Good Fault tolerance due to the dedicated path for each node.
4. Very fast communication.
5. Maintains privacy and security due to a separate channel for
communication.
6. If a node fails, other alternatives are present in the network.

Following are the disadvantages of Mesh topology:

1. Very high cabling required.


2. Cost inefficient to implement.
3. Complex to implement and takes large space to install the network.
4. Installation and maintenance are very difficult.

5. Tree Topology:

• Tree topology is a computer network topology in which all the


nodes are directly or indirectly connected to the main bus cable.
• Tree topology is a combination of Bus and Star topology.

Er. Chandan Bhagat


Following are the advantages of Tree topology:

1. Large distance network coverage.


2. Fault finding is easy by checking each hierarchy.
3. Least or no data loss.
4. A Large number of nodes can be connected directly or indirectly.
5. Other hierarchical networks are not affected if one of them fails.

Following are the disadvantages of Tree topology:

1. Cabling and hardware cost is high.


2. Complex to implement.
3. Hub cabling is also required.
4. A large network using tree topology is hard to manage.
5. It requires very high maintenance.
6. If the main bus fails, the network will fail.

Er. Chandan Bhagat


Hybrid Topology:

• A Hybrid topology is a computer topology which is a


combination of two or more topologies.
• In practical use, they are the most widely used.

Following are the advantages of Hybrid topology:

1. It can handle a large volume of nodes.


2. It provides flexibility to modify the network according to our needs.
3. Very Reliable (if one node fails it will not affect the whole network).

Following are the disadvantages of Hybrid topology:

Er. Chandan Bhagat


1. Complex design.
2. Expensive to implement.
3. Multi-Station Access Unit (MSAL) required.

Hence, some points need to be considered when selecting a physical


topology:

• Ease of Installation.
• Fault Tolerance.
• Implementation Cost.
• Cabling Required.
• Maintenance Required.
• Reliable Nature.
• Ease of Reconfiguration and upgradation.

Er. Chandan Bhagat


Peer-to-Peer, Client/Server and Active Network Model

Computer Network Architecture

Computer Network Architecture is defined as the physical and logical


design of the software, hardware, protocols, and media of the transmission
of data. Simply we can say that how computers are organized and how
tasks are allocated to the computer.

The two types of network architectures are used:

Er. Chandan Bhagat


• Peer-To-Peer network
• Client/Server network

Peer-To-Peer network

• Peer-To-Peer network is a network in which all the computers are


linked together with equal privilege and responsibilities for
processing the data.
• Peer-To-Peer network is useful for small environments, usually up
to 10 computers.
• Peer-To-Peer network has no dedicated server.
• Special permissions are assigned to each computer for sharing the
resources, but this can lead to a problem if the computer with the
resource is down.

Advantages of Peer-To-Peer Network:

• It is less costly as it does not contain any dedicated server.

Er. Chandan Bhagat


• If one computer stops working but, other computers will not stop
working.
• It is easy to set up and maintain as each computer manages itself.

Disadvantages of Peer-To-Peer Network:

• In the case of Peer-To-Peer network, it does not contain the


centralized system. Therefore, it cannot back up the data as the data
is different in different locations.
• It has a security issue as the device is managed itself.

Client/Server Network

• Client/Server network is a network model designed for the end users


called clients, to access the resources such as songs, video, etc. from
a central computer known as Server.

Er. Chandan Bhagat


• The central controller is known as a server while all other computers
in the network are called clients.
• A server performs all the major operations such as security and
network management.
• A server is responsible for managing all the resources such as files,
directories, printer, etc.
• All the clients communicate with each other through a server. For
example, if client1 wants to send some data to client 2, then it first
sends the request to the server for the permission. The server sends
the response to the client 1 to initiate its communication with the
client 2.

Advantages of Client/Server network:

• A Client/Server network contains the centralized system. Therefore


we can back up the data easily.
• A Client/Server network has a dedicated server that improves the
overall performance of the whole system.
• Security is better in Client/Server network as a single server
administers the shared resources.

Er. Chandan Bhagat


• It also increases the speed of the sharing resources.

Disadvantages of Client/Server network:

• Client/Server network is expensive as it requires the server with


large memory.
• A server has a Network Operating System (NOS) to provide the
resources to the clients, but the cost of NOS is very high.
• It requires a dedicated network administrator to manage all the
resources.

Active Network Model

• Active network model is a communication model in which packets


flowing through a network can - dynamically change or modify the
operation of the network.
• The packets used are known as active packets.
• Active networking places computation within packets traveling
through the network.
• It allows sending code along with packets of information allowing
the data to change its form (code) to match the channel
characteristics.
• One of the challenges of active networking has been the inability of
information theory to mathematically model the active network
paradigm and enable active network engineering.

ISPs, NSPs Overview and Backbone of Networking

ISPs, or Internet Service Providers, are companies that provide access to


the internet for individuals and businesses. They offer a range of services,

Er. Chandan Bhagat


including internet connectivity, email, web hosting, and sometimes even
television services. In Nepal, popular ISPs include Nepal Telecom, Vianet
Communication, Worldlink Communications, and Classic Tech.
Explanation:
• What they do:
ISPs are the companies that connect your devices to the internet, allowing
you to browse websites, communicate, and access online resources.
• How they work:
They assign you a unique IP address and provide a connection to the
broader internet network.
• Various connection types:
ISPs offer different types of internet connections, including cable, fiber,
DSL, Wi-Fi, and satellite, depending on your location and needs.
• Examples in Nepal:
• Nepal Telecom: The incumbent ISP in Nepal, known for its
wide coverage.
• Vianet Communication: A leading provider of internet and
IPTV services in Nepal.
• Worldlink Communications: Known for its fiber-optic
internet services, including FTTH (Fiber to the Home).
• Classic Tech: Another licensed ISP in Nepal, known for its
growth and customer confidence.
• Beyond basic internet:

Er. Chandan Bhagat


ISPs may also offer additional services like website hosting, domain name
registration, and more.

NSPs overview:
In computer networking, NSP stands for Network Service Provider. An
NSP is a company or organization that provides network services, such as
internet access, data transport, and other related services, to businesses
and other organizations. Essentially, they are the backbone of the internet,
providing the infrastructure and connectivity that enables communication
and data transfer.
• Providing Network Infrastructure:
NSPs build and maintain the physical infrastructure that connects
networks, including fiber optic cables, routers, switches, and other
equipment.
• Offering Network Services:
They offer a range of network services, including internet access, data
transport, VPNs, network security, and managed services.
• Serving Businesses and Organizations:

Er. Chandan Bhagat


NSPs provide services to a variety of businesses, including small and
large corporations, government agencies, and educational institutions.
• Connecting to the Internet:
NSPs often work with Internet Service Providers (ISPs) to provide
internet access to end-users.
• Ensuring Network Reliability:
NSPs are responsible for maintaining the reliability and performance of
the networks they provide.
Examples of NSPs:
AT&T, Verizon, CenturyLink, Cogent, Deutsche Telekom, NTT, Orange,
Sprint, Tata, and China Telecom.
Backbone of Networking:

Er. Chandan Bhagat


A network backbone, also known as a core network, is the central high-
capacity infrastructure that interconnects various subnetworks and local
area networks (LANs) within a larger network, such as an enterprise or
the Internet. It serves as the main pathway for data transfer between
different network segments, ensuring efficient communication and
connectivity.

Key Functions of a Backbone Network:


• Interconnectivity:
It connects different LANs, subnetworks, and even other networks,
allowing data to flow between them.
• High Capacity & Speed:
Backbone networks are designed with high bandwidth and low latency to
handle large volumes of data traffic efficiently.
• Reliability:
They are often built with redundancy and fault tolerance to ensure
continued operation even if one part of the network fails.
• Scalability:
Backbones are typically designed to be scalable, allowing for the addition
of new networks or devices as the organization's needs grow.
• Central Infrastructure:
Er. Chandan Bhagat
It forms the foundational layer of a network, providing the main
connectivity for other network components.
Examples of Backbone Networks:
• Internet Backbone:
The core infrastructure of the internet, consisting of high-speed fiber optic
connections and advanced routers.
• Enterprise Backbone:
Connects different locations and departments within a company, enabling
communication and data sharing.
• Campus Backbone:
Interconnects buildings and various networks within a university or
campus environment.
• Data Center Backbone:
Provides high-capacity connectivity within a data center to support
various servers and network devices.
Components of a Backbone Network:
• Cabling:
Fiber optic cables are commonly used for their high bandwidth and low
latency.
• Switches:
Connect different network segments and facilitate data routing.
• Routers:

Er. Chandan Bhagat


Forward data packets between networks, ensuring efficient routing and
delivery.
• Backbone Area (OSPF):
In an OSPF routing domain, the backbone area serves as the central area
to which all other areas must connect, acting as the transit area for traffic
between different areas.
Recent Trends in Telecom Technologies: 2G/3G/4G/5G.

2G, 3G, 4G, and 5G represent different generations of mobile phone


technologies, primarily distinguished by data transmission speeds. Each
generation offers advancements in speed and capacity, leading to faster
downloads, smoother streaming, and improved applications. While older
standards like 2G and 3G focused on basic voice and data, 4G and 5G
enable more demanding applications like video conferencing, online
gaming, and even autonomous vehicles.
Overview:
Er. Chandan Bhagat
• 2G:
Focused on voice communication and basic data transfer.
• 3G:
Introduced faster data speeds, enabling features like web browsing and
video streaming, with speeds in the range of several 10th Mbps.
• 4G (LTE):
Significantly faster than 3G, providing speeds in the hundreds of Mbps,
enabling smoother streaming and more responsive applications.
• 5G:
Offers the highest speeds and lowest latency, enabling applications like
autonomous vehicles, remote surgery, and industrial automation.
In essence:
• Data Speed: 5G offers the fastest data speeds.
• Latency: 5G has the lowest latency, meaning faster response times
for applications.
OR
SECOND GENERATION (2G)
• 2G refers to the second generation of mobile networks based on
GSM. The radio signals used by the 1G network were analog, while
2G networks were digital. 2G capabilities were achieved by
allowing multiple users on a single channel via multiplexing. During
2G, cellular phones were used for data along with voice. Some of
the key features of 2G were:
o Data speeds of up to 64 kbps
Er. Chandan Bhagat
o Use of digital signals instead of analog
o Enabled services such as SMS and MMS (Multimedia
Message)
o Provided better quality voice calls
o It used a bandwidth of 30 to 200 KHz
o

THIRD GENERATION (3G)


• The 3G standard utilises Universal Mobile Telecommunications
System (UMTS) as its core network architecture. 3G network
combines aspects of the 2G network with new technologies and
protocols to deliver a significantly faster data rate. By using packet
switching, the original technology was improved to allow speeds up
to 14 Mbps. It used Wide Band Wireless Network that increased
clarity. It operates at a range of 2100 MHz and has a bandwidth of
15-20 MHz.
Some of the main features of 3G are:
o Speed of up to 2 Mbps
o Increased bandwidth and data transfer rates
o Send/receive large email messages
o Large capacities and broadband capabilities
International Mobile Telecommunications-2000 (IMT-2000) were the
specifications by the International Telecommunication Union for the 3G
network; theoretically, 21.6 Mbps is the max speed of HSPA+.
FOURTH GENERATION (4G)

Er. Chandan Bhagat


• The main difference between 3G and 4G is the data rate. There is
also a huge difference between 3G and 4G technology. The key
technologies that have made 4G possible are MIMO (Multiple Input
Multiple Output) and OFDM (Orthogonal Frequency Division
Multiplexing). The most important 4G standards are WiMAX and
LTE. While 4G LTE is a major improvement over 3G speeds, it is
technically not 4G. What is the difference between 4G and LTE?
• Even after it was widely available, many networks were not up to
the required speed of 4G. 4G LTE is a “fourth generation long term
evolution”, capable of delivering a very fast and secure internet
connection. Basically, 4G is the predetermined standard for mobile
network connections. 4G LTE is the term given to the path which
has to be followed to achieve those predefined standards.
Some of the features of 4G LTE are:
o Support interactive multimedia, voice, video.
o High speed, high capacity and low cost per bit (Speeds of up
to 20 Mbps or more.)
o Global and scalable mobile networks.
o Ad hoc and multi-hop networks.

2G vs 3G vs 4G vs 5G
• Each generation in some way has improved over its predecessor.
There is a lot of ground to compare the cell networks over.
Following is the comparison between 2G, 3G, 4G, 5G.
• The comparison of 2G, 3G, 4G, and 5G clearly shows the
differences in the technologies. The comparison of 2G, 3G, 4G, and

Er. Chandan Bhagat


5G also makes it evident that 5G is going to be one of the most
ambitious leaps in the history of cell network technologies.

Er. Chandan Bhagat

You might also like