Professional Documents
Culture Documents
CN Module 1
CN Module 1
• Data refers to the raw facts that are collected while information refers to
processed data that enables us to take decisions.
• The word data refers to any information which is presented in a form that is
agreed and accepted upon by is creators and users.
• Data Communication is a process of exchanging data or information
• In case of computer networks this exchange is done between two devices over
a transmission medium.
• This process involves a communication system which is made up of hardware
and software.
• The hardware part involves the sender and receiver devices and the
intermediate devices through which the data passes.
• The software part involves certain rules which specify what is to be
communicated, how it is to be communicated and when. It is also called as a
Protocol.
• Message
o Message is the information to be communicated by the sender to the
receiver.
o Popular forms of information include text, numbers, pictures, audio, and
video.
• Sender
o The sender is any device that is capable of sending the data (message).
o It can be a computer, workstation, telephone handset, video camera, and
so on.
• Receiver
o The receiver is a device that the sender wants to communicate the data
(message).
o It can be a computer, workstation, telephone handset, video camera, and
so on.
• Transmission Medium
o It is the path by which the message travels from sender to receiver. It can
be wired or wireless and has many subtypes in both.
o Examples: twisted-pair wire, coaxial cable, fiber-optic cable, and radio
waves
• Protocol
o It is an agreed upon set or rules used by the sender and receiver to
communicate data.
o A protocol is a set of rules that governs data communication.
o A Protocol is a necessity in data communications without which the
communicating entities are like two persons trying to talk to each other in
different languages.
Data Representation
• Information today comes in different forms such as text, numbers, images,
audio, and video.
• Text
o In data communications, text is represented as a bit pattern, a sequence
of bits (0s or 1s).
o Different sets of bit patterns have been designed to represent text
symbols.
o Each set is called a code, and the process of representing symbols is called
coding.
o Today, the prevalent coding system is called Unicode, which uses 32 bits
to represent a symbol or character used in any language in the world.
o The American Standard Code for Information Interchange (ASCII),
developed some decades ago in the United States, now constitutes the
first 127 characters in Unicode and is also referred to as Basic Latin.
• Numbers
o Numbers are also represented by bit patterns.
o A code such as ASCII is not used to represent numbers; the number is
directly converted to a binary number to simplify mathematical
operations.
• Images
o Images are also represented by bit patterns.
o In its simplest form, an image is composed of a matrix of pixels (picture
elements), where each pixel is a small dot. The size of the pixel depends on
the resolution.
o Higher the resolution required, higher will be the memory required.
o After an image is divided into pixels, each pixel is assigned a bit pattern.
o The size and the value of the pattern depend on the image. For an image
made of only black- and white dots (e.g., a chessboard), a 1-bit pattern is
enough to represent a pixel and for images not made of pure white and
pure black pixels, we can increase the size of the bit pattern to include
gray scale.
o For example, to show four levels of gray scale, we can use 2-bit patterns. A
black pixel can be represented by 00, a dark gray pixel by 01, a light gray
pixel by 10, and a white pixel by 11.
o There are several methods to represent color images. One method is
called RGB, so called because each color is made of a combination of three
primary colors: red, green, and blue. The intensity of each color is
measured, and a bit pattern is assigned to it. Another method is called
YCM, in which a color is made of a combination of three other primary
colors: yellow, cyan, and magenta.
• Audio
o Audio refers to the recording or broadcasting of sound or music.
o It is continuous, not discrete.
• Video
o Video refers to the recording or broadcasting of a picture or movie.
o Video can either be produced as a continuous entity (e.g., by a TV camera),
or it can be a combination of images, each a discrete entity, arranged to
convey the idea of motion.
Data Flow
1. Simplex
• In half-duplex mode, each station can both transmit and receive, but not at
the same time
• When one device is sending, the other can only receive, and vice versa.
• The half-duplex mode is like a one-lane road with traffic allowed in both
directions. When cars are traveling in one direction, cars going the other way
must wait.
• In a half-duplex transmission, the entire capacity of a channel is taken over by
whichever of the two devices is transmitting at the time.
• Walkie-talkies and CB (citizens band) radios are both half-duplex systems.
3. Full Duplex
• In full-duplex mode (also called duplex), both stations can transmit and
receive simultaneously.
• The full-duplex mode is like a two-way street with traffic flowing in both
directions at the same time.
• In full-duplex mode, signals going in one direction share the capacity of the
link with signals going in the other direction.
• This sharing can occur in two ways: Either the link must contain two
physically separate transmission paths, one for sending and the other for
receiving; or the capacity of the channel is divided between signals traveling
in both directions.
• One common example of full-duplex communication is the telephone
network.
• When two people are communicating by a telephone line, both can talk and
listen at the same time.
• The full-duplex mode is used when communication in both directions is
required all the time. The capacity of the channel, however, must be divided
between the two direction.
Networks
• A network is the interconnection of a set of devices capable of communication.
• A device can be a host (or an end system as it is sometimes called) such as a
large computer, desktop, laptop, workstation, cellular phone, or security system
or can also be a connecting device such as a router, which connects the network
to other networks, a switch, which connects devices together, a modem
(modulator-demodulator), which changes the form of data, and so on.
• These devices in a network are connected using wired or wireless transmission
media such as cable or air.
• Thus, a computer network can be defined as a collection of nodes. A node can
be any device capable of transmitting or receiving data. The communicating
nodes have to be connected by communication links.
Physical Structures
A network is two or more devices connected through links. A link is a communication
pathway that transfers data from one device to another. For communication to occur,
two devices must be connected in some way to the same link at the same time. There
are two possible types of connections: point-to-point and multipoint.
1. Point-to-Point
• A point-to-point connection provides a dedicated link between two devices.
• The entire capacity of the link is reserved for transmission between those two
devices.
• Most point-to-point connections use an actual length of wire or cable to
connect the two ends, but other options, such as microwave or satellite links,
are also possible.
• Eg: When we change television channels by infrared remote control, we are
establishing a point-to-point connection between the remote control and the
television’s control system.
2. Multipoint
• A multipoint (also called multidrop) connection is one in which more than
two specific devices share a single link.
• In a multipoint environment, the capacity of the channel is shared, either
spatially or temporally. If several devices can use the link simultaneously, it
is a spatially shared connection. If users must take turns, it is a timeshared
connection.
Physical Topology
• The term physical topology refers to the way in which a network is laid out
physically
• Two or more devices connect to a link; two or more links form a topology
• Two or more devices connect to a link; two or more links form a topology
• There are four basic topologies possible: mesh, star, bus, and ring.
Mesh Topology
• In a mesh topology, every device has a dedicated point-to-point link to every other
device.
• To find the number of physical links in a fully connected mesh network with n
nodes, we first consider that each node must be connected to every other node.
• Node 1 must be connected to n – 1 nodes, node 2 must be connected to n – 1
nodes, and finally node n must be connected to n – 1 nodes. We need n (n – 1)
physical links.
• However, if each physical link allows communication in both directions (duplex
mode), we can divide the number of links by 2. In other words, we can say that in a
mesh topology, we need n (n – 1) / 2 duplex-mode links.
• To accommodate that many links, every device on the network must have n – 1
input/output (I/O) ports to be connected to the other n – 1 stations.
Advantages of Mesh Topology
• It guarantees that each connection can carry its own data load, thus eliminating
the traffic problems that can occur when links must be shared by multiple devices.
• Second, a mesh topology is robust. If one link becomes unusable, it does not
incapacitate the entire system.
• Privacy or Security is maintained, i.e., when every message travels along a
dedicated line, only the intended recipient sees it.
• Easy Fault identification and fault isolation
• Traffic can be routed to avoid links with suspected problems. This facility enables
the network manager to discover the precise location of the fault and aids in
finding its cause and solution.
Disadvantages of Mesh Topology
• The amount of cabling and the number of I/O ports required is huge. First, because
every device must be connected to every other device, installation and
reconnection are difficult.
• Physical Limitations can happen(in walls, ceilings, or floors) and hence mesh
topology might be infeasible in such places.
• The hardware required to connect each link (I/O ports and cable) can be
prohibitively expensive.
• For these reasons a mesh topology is usually implemented in a limited fashion, for
example, as a backbone connecting the main computers of a hybrid network that
can include several other topologies.
Star Topology
• In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub. The devices are not directly linked to one another.
• No direct traffic between devices. The controller acts as an exchange: If one device
wants to send data to another, it sends the data to the controller, which then
relays the data to the other connected device.
• The star topology is used in local-area networks (LANs). High-speed LANs often use
a star topology with a central hub.
Advantages of Star Topology
• Less expensive than a mesh topology. • Easy to install and reconfigure.
• In a star, each device needs only one link and one I/O port to connect it to any
number of others.
• Far less cabling needs to be housed. • Easy modifications i.e., Additions, moves,
and deletions involve only one connection: between that device and the hub.
• Robustness is ensured i.e., if one link fails, only that link is affected. All other links
remain active. • Easy fault identification and fault isolation.
Disadvantages of Star Topology
• Dependency of the whole topology on one single point, the hub. If the hub goes
down, the whole system is dead.
• Although a star requires far less cable than a mesh, each node must be linked to a
central hub. For this reason, often more cabling is required in a star than in some
other topologies like bus or ring.
Bus Topology
• One long cable acts as a backbone to link all the devices in a network. (multipoint)
• Nodes are connected to the bus cable by drop lines and taps. A drop line is a
connection running between the device and the main cable.
• A tap is a connector that either splices into the main cable or punctures the
sheathing of a cable to create a contact with the metallic core.
Advantages of Bus Topology
• Ease of installation. It uses less cabling than mesh or star topologies
• Backbone cable can be laid along the most efficient path, then connected to the
nodes by drop lines of various lengths.
• Unlike Star Topology where all network devices in the same room require all the
way cabling to the hub, in a bus topology, this redundancy is eliminated. Only the
backbone cable stretches through the entire facility. Each drop line has to reach
only as far as the nearest point on the backbone
Disadvantages of Bus Topology
• Difficult reconnection and fault isolation. Less scalability - difficult to add new
devices
• Signal reflection at the taps can cause degradation in quality. This degradation can
be controlled by limiting the number and spacing of devices connected to a given
length of cable.
• Adding new devices may require modification or replacement of the backbone.
• In addition, a fault or break in the bus cable stops all transmission, even between
devices on the same side of the problem.
• The damaged area reflects signals back in the direction of origin, creating noise in
both directions.
• As a signal travels along the backbone, some of its energy is transformed into heat.
Therefore, it becomes weaker and weaker as it travels farther and farther. Hence
there is a limit on the number of taps a bus can support and on the distance
between those taps
Ring Topology
• In a ring topology, each device has a dedicated point-to-point connection with only
the two devices on either side of it.
• A signal is passed along the ring in one direction, from device to device, until it
reaches its destination.
• Each device in the ring incorporates a repeater. When a device receives a signal
intended for another device, its repeater regenerates the bits and passes them
along.
Advantages of Ring Topology
• Easy to install and reconfigure. • Each device is linked to only its immediate
neighbours (either physically or logically). • Simple fault isolation
• To add or delete a device requires changing only two connections. The only
constraints are media and traffic considerations (maximum ring length and number
of devices).
• Generally, in a ring, a signal is circulating at all times. If one device does not receive
a signal within a specified period, it can issue an alarm. The alarm alerts the
network operator to the problem and its location
Disadvantages of Ring Topology
• A simple ring, a break in the ring (such as a disabled station) can disable the entire
network. This weakness can be solved by using a dual ring or a switch capable of
closing off the break.
• Ring topology was prevalent when IBM introduced its local-area network, Token
Ring. Today, the need for higher-speed LANs has made this topology less popular.
Hybrid Technology
• A network can be hybrid. For example, we can have a main star topology with each
branch connecting several stations in a bus topology as shown:
Network Types
Basis of
LAN MAN WAN
Comparison
Meaning A network that connects It covers relatively large It spans large locality
a group of computers in region such as cities, and connects countries
a small geographical towns together. Example
area, like building Internet.
Networking Devices
• Repeaters
o When signals leave a transmitting station, they are clean and more
recognizable. However, as the cable length increases, the signals become
weaker and deteriorate in strength.
o Repeaters solve the above problem by regenerating the original signal and
retransmitting it over the network.
• Hubs
o In a star topology, a repeater is a multiport device, often called a hub, that
can be used to serve as the connecting point and at the same time function
as a repeater.
o A hub is similar to the repeater but connects several pieces of a LAN.
• Bridge
o A bridge eliminates unnecessary traffic and minimizes the chances of
collisions occurring on a network by dividing it into segments.
o Bridges use tables to determine whether or not to forward data to other
segments of the network
• Routers
o Routers are devices that pass data packets between networks based on a
network protocol.
o They have the ability to take intelligent decisions like finding the best path for
delivery of data on the network.
Network Models
• Since the computer networks are created by different entities, there is a
requirement for Standards so that these heterogeneous networks can
communicate with one another.
• The two best-known standards are the OSI model and the TCP/IP model. The OSI
(Open Systems Interconnection) model defines a seven-layer network; the TCP/IP
model defines a five-layer network.
• Peer To Peer
o Group of user-oriented PCs
o Each system works as server & client
o Small Networks
(Small office
e.g., Internet browsing Centres)
• Client Server Model
o It is a computing model one computer provide services to many systems
o Server offers services to other system (PCs)
o Client requests services from Servers
Protocol Layering
• A protocol defines the rules that both the sender and receiver and all intermediate
devices need to follow to be able to communicate effectively.
• When communication is simple, we may need only one simple protocol; when the
communication is complex, we may need to divide the task between different
layers, in which case we need a protocol at each layer, or protocol layering.
• Scenarios:
o First Scenario: In the first scenario, communication is so simple that it can
occur in only one layer.
o Assume Maria and Ann are neighbours with a lot of common ideas.
Communication between Maria and Ann takes place in one layer, face to
face, in the same language, as shown in the above figure.
o Protocols to be followed:
• Maria and Ann know that they should greet each other when they meet.
• They know that they should confine their vocabulary to the level of their
friendship. Each party knows that she should refrain from speaking when
the other party is speaking.
• Each party knows that the conversation should be a dialog, not a monolog:
both should have the opportunity to talk about the issue.
• They should exchange some nice words when they leave
o Second Scenario: Ann and maria communicating via email
Application Away
Presentation Pizzas
Session Sandwiches
Transport Throw
Network Not
Datalink Do
Physical Please
Physical Layer
• The Physical Layer provides a standardized interface to physical transmission
media, including :
o Mechanical specification of electrical connectors and cables, for example
maximum cable length
o Electrical specification of transmission line
o Bit-by-bit or symbol-by-symbol delivery
• On the sender side, the physical layer receives the data from Data Link Layer and
encodes it into signals to be transmitted onto the medium.
• On the receiver side, the physical layer receives the signals from the transmission
medium decodes it back into data and sends it to the Data Link Layer.
• Interface
o The Physical Layer defines the characteristics of interfaces between the
devices & transmission medium.
• Representation of bits
o The physical layer is concerned with transmission of signals from one device
to another which involves converting data (1‘s & 0‘s) into signals and vice
versa.
o It is not concerned with the meaning or interpretation of bits.
• Data rate
o The physical layer defines the data transmission rate i.e., the number of bits
sent per second.
o It is the responsibility of the physical layer to maintain the defined data rate.
• Synchronization of bits
o To interpret correct and accurate data the sender and receiver have to
maintain the same bit rate and also have synchronized clocks.
• Line configuration
o The physical layer defines the nature of the connection i.e., a point-to-point
link, or a multi-point link.
• Physical Topology
o The physical layer defines the type of topology in which the device is
connected to the network.
o In a mesh topology it uses a multipoint connection and in other topologies it
uses a point-to-point connection to send data.
• Transmission mode
o The physical layer defines the direction of data transfer between the sender
and receiver.
o Two devices can transfer the data in simplex, half duplex or full duplex mode
• Main responsibility of the physical layer: Transmission of bits from one hop to the
next
Datalink Layer
• The Data Link layer adds reliability to the physical layer by providing error
detection and correction mechanisms.
• Framing
o On the sender side, the Data Link layer receives the data from Network Layer
and divides the stream of bits into fixed size manageable units called as
Frames and sends it to the physical layer.
o On the receiver side, the data link layer receives the stream of bits from the
physical layer and regroups them into frames and sends them to the
Network layer. This process is called Framing.
• Physical Addressing
o The Data link layer appends the physical address in the header of the frame
before sending it to physical layer.
o The physical address contains the address of the sender and receiver.
o In case the receiver happens to be on the same physical network as the
sender; the receiver is at only one hop from the sender and the receiver
address contains the receiver‘s physical address.
o In case the receiver is not directly connected to the sender, the physical
address is the address of the next node where the data is supposed to be
delivered.
• Flow control
o The data link layer makes sure that the sender sends the data at a speed at
which the receiver can receive it else if there is an overflow at the receiver
side the data will be lost.
o The data link layer imposes flow control mechanism over the sender and
receiver to avoid overwhelming of the receiver.
• Error control
o The data link layer imposes error control mechanism to identify lost or
damaged frames, duplicate frames and then retransmit them.
o Error control information is present in the trailer of a frame.
• Access Control
o The data link layer imposes access control mechanism to determine which
device has right to send data in a multipoint connection scenario.
• Main Responsibility
o The main responsibility of the data link layer is hop to hop transmission of
frames.
Network Layer
• The network layer makes sure that the data is delivered to the receiver despite
multiple intermediate devices.
• At the sending side it accepts data from the transport layer, divides it into
packets, adds addressing information in the header and passes it to the data link
layer.
• At the receiving end the network layer receives the frames sent by data link layer,
converts them back into packets, verifies the physical address (verifies if the
receiver address matches with its own address) and the send the packets to the
transport layer.
Transport Layer
• The transport layer takes care of process-to-process delivery of data and makes
sure that it is intact and in order.
• At the sending side, the transport layer receives data from the session layer,
divides it into units called segments and sends it to the network layer.
• At the receiving side, the transport layer receives packets from the network layer,
converts and arranges into proper sequence of segments and sends it to the
session layer.
• To ensure process to process delivery, the transport layer makes use of port
address to identify the data from the sending and receiving process.
• A Port Address is the name or label given to a process. It is a 16-bit address. Ex:
o TELNET uses port address 23,
o HTTP uses port address 80.
• The data can be transported in a connection oriented or connectionless manner.
• The Transport layer is responsible for segmentation and reassembly of the
message into segments which uses sequence numbers.
• This numbering enables the receiving transport layer to rearrange the segments in
proper order.
• Flow Control & Error control
o the transport layer also carries out flow control and error control functions
o but unlike data link layer these are end to end rather than node to node.
• Main Responsibility: The main responsibility of the transport layer is process to
process delivery of the entire message.
Session Layer
• The session layer establishes a session between the communicating devices called
dialog and synchronizes their interaction.
• It is the responsibility of the session layer to establish and synchronize the dialogs.
It is also called the network dialog controller.
• At the sender side, the session layer accepts data from the presentation layer and
adds checkpoints to it called syn bits and passes the data to the transport layer.
• At the receiver end, the session layer receives data from the transport layer
removes the checkpoints inserted previously and passes the data to the
presentation layer
Presentation Layer
• The communicating devices may be having different platforms.
• The presentation layer performs translation, encryption and compression of data.
• At the sending side, it receives the data from the application layer adds header
which contains information related to encryption and compression and sends it to
the session layer.
• At the receiving side, it receives data from the session layer decompresses and
decrypts the data as required and translates it back.
• Translation
o The sending and receiving devices may run on different platforms (hardware,
software and operating system).
o Hence a translation service may be required which is provided by the
Presentation layers
• Compression: Compression ensures faster data transfer.
• Encryption and Decryption
o It is the process of transforming the original message to change its meaning
before sending it.
o The reverse process called decryption has to be performed at the receiving
end to recover the original message from the encrypted message.
• Main responsibility: The main responsibility of the Presentation layer is
translation, compression and encryption.
Application Layer
• The application layer enables the user to communicate its data to the receiver by
providing certain services.
• For Ex: Email is sent using X400 service, X500 is a directory service used to provide
information and access to distributed objects
• FTAM (File transfer, access and management) provides access to files stored on
remote computers and mechanism for transfer and manage them locally.
• Main Responsibility: Provide access to network resources
Note: Here, the data from the receiver goes up till the Network Layer in the
intermediate nodes and checks if its physical address matches with destination
physical address. As it doesn’t match, the data goes to the next node.
Data Transfer in Intermediate Nodes:
TCP/IP Architecture
• It is also called as the TCP/IP protocol suite. It is a collection of protocols.
• It is a hierarchical model i.e., There are multiple layers and higher layer protocols
are supported by lower layer protocols.
• Originally had four layers:
o 4. Application Layer
o 3. Transport Layer
o 2. Internet / Network / IP Layer
o 1. Host to Network Layer
• The structure TCP/IP model is very similar to the structure of the OSI reference
model. The OSI model has seven layers where the TCP/IP model has four layers.
• The Application layer of TCP/IP model corresponds to the Session, Presentation &
Application Layer of OSI model. (A = SAP)
• The Transport layer of TCP/IP model corresponds to the Transport Layer of OSI
model.
• The Network layer of TCP/IP model corresponds to the Network Layer of OSI model
• The Host to network layer of TCP/IP model corresponds to the Physical and
Datalink Layer of OSI model.
• Host-to-Network Layer
o This layer is a combination of protocols at the physical and data link layers.
o It supports all standard protocols used at these layers.
o It is also called as network interface layer.
• Network Layer or IP Layer: IP is a combination of four protocols:
▪ ARP (Address Resolution Protocol)
• It is used to resolve the physical address of a device on a network, when
its logical address is known.
▪ RARP (Reverse Address Resolution Protocol)
• It is used by a device on the network to find its Internet address when
its physical address is known.
▪ ICMP (Internet Control Message Protocol)
• It is a signalling mechanism used to inform the sender about datagram
problems that occur during transit. It is used by intermediate devices.
▪ IGMP (Internet Group Message Protocol)
• It is a mechanism that allows to send the same message to a group of
recipients.
• Transport Layer
o Transport layer protocols are responsible for transmission of data running on
a process of one machine to the correct process running on another machine.
o The transport layer contains three protocols: TCP, UDP and SCTP
▪ TCP (Transmission Control Protocol):
• TCP is a reliable connection-oriented protocol. i.e., a connection is
established between the sender and receiver before the data can
be transmitted.
• It divides the data it receives from the upper layer into segments
and tags a sequence number to each segment which is used at
the receiving end for reordering of data.
▪ UDP (User Datagram Protocol)
• UDP is a simple protocol used for process-to-process transmission.
• It is an unreliable, connectionless protocol for applications that
do not require flow control or error control.
• It simply adds port address, checksum and length information to
the data it receives from the upper layer.
▪ SCTP (Stream Control Transmission Protocol)
• SCTP is a relatively new protocol added to the transport layer of
TCP/IP protocol suite.
• It combines the features of TCP and UDP.
• It is used in applications like voice over Internet and has a much
broader range of applications
• Application Layer
o The Application Layer in TCP/IP protocol is a combination of the Session,
Presentation & Application Layers of OSI model.
o It defines high level protocol like File Transfer (FTP), Electronic Mail (SMTP),
Virtual Terminal (TELNET), Domain Name Service (DNS), etc.
In OSI, the Transport layer guarantees In TCP/IP, the Transport layer does NOT
delivery of packets. guarantee the delivery of packets but still
TCP/IP is more reliable.
OSI has separate Presentation and TCP/IP does NOT have separate
Session layers. Presentation and Session layers.
OSI has a problem of fitting the TCP/IP does NOT fit any protocol.
protocols in the model.
Protocols are hidden in OSI and an be Replacing protocols is NOT easy in TCP/IP.
easily changed and technology changes.
Transmission media are actually located below the physical layer and are directly
controlled by the physical layer. We could say that transmission media belong to
layer zero.
Figure below shows the position of transmission media in relation to the physical
Layer
The air can also be used to convey the message in a smoke signal or semaphore.
For a written message, the transmission medium might be a mail carrier, a truck,
or an airplane. In data communications the definition of the information and the
transmission medium is more specific. The transmission medium is usually free
space, metallic cable, or fiber-optic cable.
The information is usually a signal that is the result of a conversion of data from
another form. The use of long-distance communication using electric signals
started with the invention of the telegraph by Morse in the 19th century.
Communication by telegraph was slow and dependent on a metallic medium.
Guided media, which are those that provide a conduit from one device to
another, include twisted-pair cable, coaxial cable, and fiber-optic cable. A signal
traveling along any of these media is directed and contained by the physical limits
of the medium. Twisted-pair and coaxial cable use metallic (copper) conductors
that accept and transport signals in the form of electric current. Optical fiber is a
cable that accepts and transports signals in the form of light.
One of the wires is used to carry signals to the receiver, and the other is used only
as a ground reference. The receiver uses the difference between the two. In
addition to the signal sent by the sender on one of the wires, interference (noise)
and crosstalk may affect both wires and create unwanted signals.
If the two wires are parallel, the effect of these unwanted signals is not the same
in both wires because they are at different locations relative to the noise or
crosstalk sources (e.g., one is closer and the other is farther).
Coaxial cable (or coax) carries signals of higher frequency ranges than those in
twisted pair cable, in part because the two media are constructed quite
differently. Instead of having two wires, coax has a central core conductor of solid
or stranded wire (usually copper) enclosed in an insulating sheath, which is, in
turn, encased in an outer conductor of metal foil, braid, or a combination of the
two. The outer metallic wrapping serves both as a shield against noise and as the
second conductor, which completes the circuit. This outer conductor is also
enclosed in an insulating sheath, and the whole cable is protected by a plastic
cover (see Figure 7.7).
Coaxial Cable Standards
Coaxial cables are categorized by their Radio Government (RG) ratings. Each RG
number denotes a unique set of physical specifications, including the wire gauge
of the inner conductor, the thickness and type of the inner insulator, the
construction of the shield, and the size and type of the outer casing. Each cable
defined by an RG rating is adapted for a specialized function, as shown in Table
7.2.
Application of Coaxial cable
➢ 1.Analog telephone network where a single cable could carry 10,000 voice
signals. Later it was used in Digital telephone networks where cable can
carry 600Mbps
➢ 2.Cable TV network: hybrid network use coaxial cable only at the network
boundaries, near the consumer. Cable TV use RG-59
➢ 3.Traditional Ethernet LANs.10-base-2 or “Thin Ethernet”, uses RG-58 coax
cable to transmit data at 10 Mbps with a range of 185m.10-base-5,or “Thick
Ethernet”, uses RG-11 to transmit 10 Mbps with rang of 500 m .
Fiber-Optic Cable
Is made of glass or plastic and transmit signals in the form of light.Light travels in
a straight line as long as it is moving through a single uniform substance. If a ray
of light traveling through one substance enters another substance of different
density, the ray change direction as shown:
I: angle of incidence: the angle the ray makes with line perpendicular to the
interface between the two substances
Critical angle: property of substance, its value differs from one substance to
another
Fiber construction Performance
Performance: Attenuation is flatter than in the case of UTP and coax cable. We
need fewer (actually 10 times less) repeaters when we use fiber optic cable
Cable TV network: hybrid network uses a combination of optical fiber and coax
cable. Optical provides the backbone while coaxial cable provides the
connation to the user.
2.Local area networks such as 100base-FX (fast Ethernet) and 1000base-XLANs.
3.Backbone networks because its wide bandwidth
Advantages of fiber-optical
➢ 1.Higher Bandwidth
➢ 2.Less signal attenuation
➢ 3.Immunity to electromagnetic interference (noise)
➢ 4.Resistance to corrosive materials. Glass is more resistance to corrosive
material
➢ 5.Light weight. Fiber cables are much lighter than copper cables
➢ 6.Greater immunity to tapping: copper cables create antenna effects that
can easily tapped
Disadvantages of fiber-optical