Professional Documents
Culture Documents
CN 3rd Year Unit 1notes
CN 3rd Year Unit 1notes
Goals of Computer Networks: The following are some important goals of computer networks:
Resource Sharing –
Many organizations have a substantial number of computers in operations, which are located
apart,for instance A group of office workers can share a common printer, fax, modem, scanner, etc.
High Reliability –
If there are alternate sources of supply, all files could be replicated on two or more machines. If one
of them is not available, due to hardware failure, the other copies could be used.
Inter-process Communication –
Network users, located geographically apart, may communicate in an interactive session via
network,for this,the network must provide almost error-free communications.
Flexible access –
Accessibility is the measure through which Files can be accessed from any computer in the network.
Distribution of processing functions
Centralized management
Allocation of network resources
Compatibility of dissimilar equipment and software
Good network performance
Scalability
Powerful Communication Medium saving money as well
Access to remote information
Person to person communication, etc.
Applications of Networks:
Computer networks support an enormous number of applications and services such as:
The Internet is the world's largest computer network. It is a global information infrastructure comprised
of millions of computers organized into hundreds of thousands of smaller, local networks. The term
"information superhighway" is sometimes used to describe the function that the Internet provides: an
international, high-speed telecommunications network that offers open access to the general public.
The Internet provides a variety of services, including electronic mail (e-mail), the World Wide Web
(WWW), Intranets, File Transfer Protocol (FTP), Telnet (for remote login to host computers), and
various file-location services.
INTERNET SERVICE PROVIDERS(ISP)
To gain access to the Internet a user typically subscribes to an Internet Service Provider (ISP). ISPs are
companies that have permanent connection to the Internet. Subscribers to ISPs can connect to the ISP's
server computer, and through that connection can gain access to the Internet. Some well-known
commercial ISPs include America Online, MSN, and Earthlink, although there are hundreds of such
services.
An alternative access to the Internet is provided via academic institutions (i.e. colleges or universities)
and government agencies. Most students and faculty in colleges have accounts on the school's computer
system, through which they can gain access to the Internet.
Classification of Computer Network on basis of Architecture
Computer networks are usually developed to fulfil needs of their clients and users. Network
architecture generally refers to design of computer network or communications network. It simply
describes allocation task between all of computers in network. It is simply way in which all network
devices and services are organized and managed to connect clients like laptops, tablets, servers, etc.
and also how tasks are allocated to computer. It also facilitates system-level functionality even
robustness, extensibility, and evolvability. It is basically defined and described as physical and logical
design of software, hardware, protocols, and media of data transmission. Classification of Network
based on use of computer nodes : Network architecture is classified into following categories
:
1. Peer-to-Peer Network : In the P2P (Peer-to-Peer) network, “peers” generally represent
computer system. These peers are connected to each other with help of Internet. Files might be
shared directly without requirement of central server among these systems on the network. It can
be said that each of computers on P2P network usually becomes file server even as client also. In
this architecture, system is generally decomposed into various computational nodes that contain the
same and equivalent capabilities, abilities, and responsibilities. In this network, tasks are allocated
at each and every device available on network. This network is very essential and important for
small environments, usually up to at least 10 computers. There is also no separate division as
clients and servers. Each and every computer in this network are treated same and equally and
might send even receive message directly. This P2P network is generally useful in various fields
such as business, education, military,
etc. Advantages :
Dedicated server or centralized is not very essential, so P2P network is less costly and is
very cheaper. It is affordable.
P2P is very simple and not complex. This is because all computers that are connected in
network communication in an efficient and well-mannered with each other.
It is very easy and simple to set up and manage as installation and setup is less painless
and computer manages itself. This is because of built-in support in modern operating systems.
Security is one of major issues in this type of network. This is because message that is
sent flows freely among connected computers.
If computer working with some of resources is down and sharing of resources might
become major problem.
Performance, security, and access can also become major problem and headache with an
increase in number of computers on this network.
2. Client/Server Network : CSN (Client/Server Network) is type of computer network in which
one of centralized and powerful computers (commonly called as server) is hub to which many of
personal computers that are less powerful or workstations (commonly known as clients) are
connected. It is type of system where clients are connected to server to just share or use resources.
These servers are generally considered as heart of system. This type of network is more stable and
scalable as compared to P2P network. In this architecture, system is generally decomposed into
client and server processor or processes. This architecture supports separation of functionality
commonly based on concept of
service.
Advantages :
A special Network Operating System (NOS) is provided by server to provide resources
to many users that request them.
It is also very easy and simple to set up and manage data updates. This is because data is
generally stored in centralized manner on server.
The server usually controls resources and data security.
This network also boosts speed of sharing resources.
If anyhow server goes down or crashes, entire will be affected by this.
It is very expensive as compared to P2P. This is due to need for server with greater
memory as well as need for many networking devices such as hubs, routers, switches, etc.
Cost of NOS being provided is very high.
1. Application Layer
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Data link Layer
7. Physical Layer
Below we have the complete representation of the OSI model, showcasing all the layers andhow they
communicate with each other.
In the table below, we have specified the protocols used and the data unit exchanged by eachlayer of
the OSI Model.
Feature of OSI Model
Big picture of communication over network is understandable through this OSI model.
We see how hardware and software work together.
We can understand new technologies as they are developed.
Troubleshooting is easier by separate networks.
Can be used to compare basic functional relationships on different networks.
Transport Layer
Transport Layer decides if data transmission should be on parallel path or single path.
Functions such as Multiplexing, Segmenting or Splitting on the data are done by thislayer
It receives messages from the Session layer above it, convert the message into smallerunits
and passes it on to the Network layer.
Transport layer can be very complex, depending upon the network requirements.
Transport layer breaks the message (data) into small units so that they are handled more
efficiently by the network layer.
Application Layer
Application Layer is the topmost layer.
Transferring of files disturbing the results to the user is also done in this layer. Mail services,
directory services, network resource etc are services provided by application layer.
This layer mainly holds application programs to act upon the received and to be sent data.
TCP/IP architecture
TCP/IP means Transmission Control Protocol and Internet Protocol. It is the network model used in
the current Internet architecture as well. Protocols are set of rules which govern every possible
communication over a network. These protocols describe the movement of data between the source
and destination or the internet. They also offer simple naming and addressing schemes.
The features that stood out during the research, which led to making the TCP/IP referencemodel
were:
Support for a flexible architecture. Adding more machines to a network was easy.
The network was robust, and connections remained intact untill the source anddestination
machines were functioning.
The overall idea was to allow one application on one computer to talk to(send data packets)another
application running on different computer.
Below we have discussed the 4 layers that form the TCP/IP reference model:
Layer 1: Host-to-network Layer
1. Lowest layer of the all.
2. Protocol is used to connect to the host, so that the packets can be sent over it.
3. Varies from host to host and network to network.
Demerits of TCP/IP
In this, the transport layer does not guarantee delivery of packets.
The model cannot be used in any other application.
Replacing protocol is not easy.
It has not clearly separated its services, interfaces and protocols.
Components of Data Communication
1. Message: It is the information to be delivered.
2. Sender: Sender is the person who is sending the message.
3. Receiver: Receiver is the person to whom the message is being sent to.
4. Medium: It is the medium through which the message is sent. For example: A Modem.
5. Protocol: These are some set of rules which govern data communication.
Data Flow
Transmission Modes in Computer Networks (Simplex, Half-Duplex and Full-Duplex)
Transmission mode means transferring of data between two devices. It is also known as
communication mode.
Buses and networks are designed to allow communication to occur between individualdevices
that are interconnected.
There are three types of transmission mode:-
1. Simplex Mode
2. Half-Duplex Mode
3. Full-Duplex Mode
Simplex Mode
In Simplex mode, the communication is unidirectional, as on a one-way street. Only oneof the
two devices on a link can transmit, the other can only receive.
The simplex mode can use the entire capacity of the channel to send data in one
direction.
Example: Keyboard and traditional monitors. The keyboard can only introduce input,the
monitor can only give the output.
Half-Duplex Mode
In half-duplex mode, each station can both transmit and receive, but not at the sametime.
When one device is sending, the other can only receive, and vice versa.
The half-duplex mode is used in cases where there is no need for communication in both
direction at the same time.
The entire capacity of the channel can be utilized for each direction.
Example: Willkie- talkie in which message is sent one at a time and messages are sent in
both the directions.
Full-Duplex Mode
In full-duplex mode, both stations can transmit and receive simultaneously.
In full_duplex mode, signals going in one direction share the capacity of the link withsignals
going in other direction, this sharing can occur in two ways:
1. Either the link must contain two physically separate transmission paths, one for
sending and other for receiving.
2. Or the capacity is divided between signals travelling in both directions.
Full-duplex mode is used when communication in both direction is required all the time.The
capacity of the channel, however must be divided between the two directions.
Example: Telephone Network in which there is communication between two personsby a
telephone line, through which both can talk and listen at the same time.
Computer network components are the major parts which are needed to install the software. Some
important network components are NIC, switch, cable, hub, router, and modem. Depending on the
type of network that we need to install, some network components can also be removed. For example,
the wireless network does not require a cable.
NIC
o NIC stands for network interface card.
o NIC is a hardware component used to connect a computer with another computer onto a network
o It can support a transfer rate of 10,100 to 1000 Mb/s.
o The MAC address or physical address is encoded on the network card chip which is assigned by
the IEEE to identify a network card uniquely. The MAC address is stored in the PROM
(Programmable read-only memory).
1. Wired NIC
2. Wireless NIC
Wired NIC: The Wired NIC is present inside the motherboard. Cables and connectors are used with
wired NIC to transfer data.
Wireless NIC: The wireless NIC contains the antenna to obtain the connection over the wireless
network. For example, laptop computer contains the wireless NIC.
Hub
A Hub is a hardware device that divides the network connection among multiple devices. When
computer requests for some information from a network, it first sends the request to the Hub through
cable. Hub will broadcast this request to the entire network. All the devices will check whether the
request belongs to them or not. If not, the request will be dropped.
The process used by the Hub consumes more bandwidth and limits the amount of communication.
Nowadays, the use of hub is obsolete, and it is replaced by more advanced computer network
components such as Switches, Routers.
Switch
A switch is a hardware device that connects multiple devices on a computer network. A Switch contains
more advanced features than Hub. The Switch contains the updated table that decides where the data is
transmitted or not. Switch delivers the message to the correct destination based on the physical address
present in the incoming message. A Switch does not broadcast the message to the entire network like the
Hub. It determines the device to whom the message is to be transmitted. Therefore, we can say that
switch provides a direct connection between the source and destination. It increases the speed of the
network.
Router
o A router is a hardware device which is used to connect a LAN with an internet connection. It is
used to receive, analyze and forward the incoming packets to another network.
o A router works in a Layer 3 (Network layer) of the OSI Reference model.
o A router forwards the packet based on the information available in the routing table.
o It determines the best path from the available paths for the transmission of the packet.
Advantages Of Router:
o Security: The information which is transmitted to the network will traverse the entire cable, but
the only specified device which has been addressed can read the data.
o Reliability: If the server has stopped functioning, the network goes down, but no other networks
are affected that are served by the router.
o Performance: Router enhances the overall performance of the network. Suppose there are 24
workstations in a network generates a same amount of traffic. This increases the traffic load on
the network. Router splits the single network into two networks of 12 workstations each, reduces
the traffic load by half.
Modem
o A modem is a hardware device that allows the computer to connect to the internet over the
existing telephone line.
o A modem is not integrated with the motherboard rather than it is installed on the PCI slot found
on the motherboard.
o It stands for Modulator/Demodulator. It converts the digital data into an analog signal over the
telephone lines.
Based on the differences in speed and transmission rate, a modem can be classified in the following
categories:
Network Protocols
Network Protocols are a set of rules governing exchange of information in an easy, reliable
and secure way.
There are various types of protocols that support a major and compassionate role in
communicating with different devices across the network. These are:
1. Transmission Control Protocol (TCP)
2. Internet Protocol (IP)
3. User Datagram Protocol (UDP)
4. Post office Protocol (POP)
5. Simple mail transport Protocol (SMTP)
6. File Transfer Protocol (FTP)
7. Hyper Text Transfer Protocol (HTTP)
8. Hyper Text Transfer Protocol Secure (HTTPS)
9. Telnet
10.Gopher
Figure 1: Every device is connected to another via dedicated channels. These channels are known as
links.
Suppose, the N number of devices are connected with each other in a mesh topology, the total
number of ports that are required by each device is N-1. In Figure 1, there are 5 devices connected
to each other, hence the total number of ports required by each device is 4. The total number of
ports required=N*(N-1).
Suppose, N number of devices are connected with each other in a mesh topology, then the total
number of dedicated links required to connect them is NC2 i.e. N(N-1)/2. In Figure 1, there are 5
devices connected to each other, hence the total number of links required is 5*4/2 = 10.
Advantages of this topology:
Communication is very fast between the nodes.
It is robust.
The fault is diagnosed easily. Data is reliable because data is transferred among the devices
through dedicated channels or links.
Provides security and privacy.
Problems with this topology:
Installation and configuration are difficult.
The cost of cables is high as bulk wiring is required, hence suitable for less number of devices.
The cost of maintenance is high.
Star Topology:
In star topology, all the devices are connected to a single hub through a cable. This hub is the central
node and all other nodes are connected to the central node. The hub can be passive in nature i.e., not an
intelligent hub such as broadcasting devices, at the same time the hub can be intelligent known as an
active hub. Active hubs have repeaters in them. Coaxial cables or RJ-45 cables are used to connect the
computers. In Star Topology, many popular Ethernet LAN protocols are used as CD(Collision
Detection), CSMA (Carrier Sense Multiple Access), etc.
Figure 2: A star topology having four systems connected to a single point of connection i.e. hub.
Advantages of this topology:
If N devices are connected to each other in a star topology, then the number of cables required
to connect them is N. So, it is easy to set up.
Each device requires only 1 port i.e. to connect to the hub, therefore the total number of ports
required is N.
It is Robust. If one link fails only that link will affect and not other than that.
Easy to fault identification and fault isolation.
Star topology is cost-effective as it uses inexpensive coaxial cable.
Problems with this topology:
If the concentrator (hub) on which the whole topology relies fails, the whole system will crash
down.
The cost of installation is high.
Performance is based on the single concentrator i.e. hub.
Bus Topology:
Bus topology is a network type in which every computer and network device is connected to a single
cable. It is bi-directional. It is a multi-point connection and a non-robust topology because if the
backbone fails the topology crashes. In Bus Topology, various MAC (Media Access Control)
protocols are followed by LAN ethernet connections like TDMA, Pure Aloha, CDMA, Slotted Aloha,
etc.
Figure 3: A bus topology with shared backbone cable. The nodes are connected to the channel via
drop lines.
Advantages of this topology:
If N devices are connected to each other in a bus topology, then the number of cables required
to connect them is 1, known as backbone cable, and N drop lines are required.
Coaxial or twisted pair cables are mainly used in bus-based networks that support up to 10
Mbps.
The cost of the cable is less compared to other topologies, but it is used to build small
networks.
Bus topology is familiar technology as installation and troubleshooting techniques are well
known.
Problems with this topology:
A bus topology is quite simpler, but still, it requires a lot of cabling.
If the common cable fails, then the whole system will crash down.
If the network traffic is heavy, it increases collisions in the network. To avoid this, various
protocols are used in the MAC layer known as Pure Aloha, Slotted Aloha, CSMA/CD, etc.
Adding new devices to the network would slow down networks.
Security is very low.
Ring Topology:
In this topology, it forms a ring connecting devices with exactly two neighboring devices.
A number of repeaters are used for Ring topology with a large number of nodes, because if someone
wants to send some data to the last node in the ring topology with 100 nodes, then the data will have to
pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are used in the
network.
The data flows in one direction, i.e.., it is unidirectional, but it can be made bidirectional by having 2
connections between each Network Node, it is called Dual Ring Topology. In-Ring Topology, the
Token Ring Passing protocol is used by the workstations to transmit the data.
Figure 4: A ring topology comprises 4 stations connected with each forming a ring.
The most common access method of ring topology is token passing.
Token passing: It is a network access method in which a token is passed from one node to
another node.
Token: It is a frame that circulates around the network.
The following operations take place in ring topology are :
1. One station is known as a monitor station which takes all the responsibility for performing the
operations.
2. To transmit the data, the station has to hold the token. After the transmission is done, the token
is to be released for other stations to use.
3. When no station is transmitting the data, then the token will circulate in the ring.
4. There are two types of token release techniques: Early token release releases the token just
after transmitting the data and Delayed token release releases the token after the acknowledgment
is received from the receiver.
Advantages of this topology:
The data transmission is high-speed.
The possibility of collision is minimum in this type of topology.
Cheap to install and expand.
It is less costly than a star topology.
Problems with this topology:
The failure of a single node in the network can cause the entire network to fail.
Troubleshooting is difficult in this topology.
The addition of stations in between or the removal of stations can disturb the whole topology.
Less secure.
Tree Topology :
This topology is the variation of the Star topology. This topology has a hierarchical flow of data. In
Tree Topology, protocols like DHCP and SAC (Standard Automatic Configuration ) are used.
Figure 5: In this, the various secondary hubs are connected to the central hub which contains the
repeater. This data flow from top to bottom i.e. from the central hub to the secondary and then to the
devices or from bottom to top i.e. devices to the secondary hub and then to the central hub. It is a
multi-point connection and a non-robust topology because if the backbone fails the topology crashes.
Advantages of this topology :
It allows more devices to be attached to a single central hub thus it decreases the distance that
is traveled by the signal to come to the devices.
It allows the network to get isolated and also prioritize from different computers.
We can add new devices to the existing network.
Error detection and error correction are very easy in a tree topology.
Problems with this topology :
If the central hub gets fails the entire system fails.
The cost is high because of the cabling.
If new devices are added, it becomes difficult to reconfigure.
Hybrid Topology :
This topological technology is the combination of all the various types of topologies we have studied
above. It is used when the nodes are free to take any form. It means these can be individuals such as
Ring or Star topology or can be a combination of various types of topologies seen above. Each
individual topology uses the protocol that has been discussed earlier.
Hybrid Topology
Figure 6: The above figure shows the structure of the Hybrid topology. As seen it contains a
combination of all different types of networks.
Advantages of this topology :
This topology is very flexible.
The size of the network can be easily expanded by adding new devices.
Problems with this topology :
It is challenging to design the architecture of the Hybrid Network.
Hubs used in this topology are very expensive.
The infrastructure cost is very high as a hybrid network requires a lot of cabling and network
devices.
Transmission media
In data communication terminology, a transmission medium is a physical path between the transmitter
and the receiver i.e. it is the channel through which data is sent from one place to another.
Transmission Media is broadly classified into the following types:
1. Guided Media: It is also referred to as Wired or Bounded transmission media. Signals being
transmitted are directed and confined in a narrow pathway by using physical links.
Features:
High Speed
Secure
Used for comparatively shorter distances
There are 3 major types of Guided Media:
(i) Twisted Pair Cable –
It consists of 2 separately insulated conductor wires wound about each other. Generally, several such
pairs are bundled together in a protective sheath. They are the most widely used Transmission Media.
Twisted Pair is of two types:
Unshielded Twisted Pair (UTP):
UTP consists of two insulated copper wires twisted around one another. This type of cable has the
ability to block interference and does not depend on a physical shield for this purpose. It is used for
telephonic applications.
Advantages:
⇢ Least expensive
⇢ Easy to install
⇢ High-speed capacity
Disadvantages:
⇢ Susceptible to external interference
⇢ Lower capacity and performance in comparison to STP
Short distance transmission due to attenuation
Applications:
Used in telephone connections and LAN networks
Shielded Twisted Pair (STP):
This type of cable consists of a special jacket (a copper braid covering or a foil shield) to block
external interference. It is used in fast-data-rate Ethernet and in voice and data channels of
telephone lines.
Advantages:
⇢ Better performance at a higher data rate in comparison to UTP
⇢ Eliminates crosstalk
⇢ Comparatively faster
Disadvantages:
⇢ Comparatively difficult to install and manufacture
⇢ More expensive
⇢ Bulky
Applications:
The shielded twisted pair type of cable is most frequently used in extremely cold climates, where the
additional layer of outer covering makes it perfect for withstanding such temperatures or for shielding
the interior components.
(ii) Coaxial Cable –
It has an outer plastic covering containing an insulation layer made of PVC or Teflon and 2 parallel
conductors each having a separate insulated protection cover. The coaxial cable transmits information
in two modes: Baseband mode(dedicated cable bandwidth) and Broadband mode(cable bandwidth is
split into separate ranges). Cable TVs and analog television networks widely use Coaxial cables.
Advantages:
High Bandwidth
Better noise Immunity
Easy to install and expand
Inexpensive
Disadvantages:
Single cable failure can disrupt the entire network
Applications:
Radio frequency signals are sent over coaxial wire. It can be used for cable television signal
distribution, digital audio (S/PDIF), computer network connections (like Ethernet), and feedlines that
connect radio transmitters and receivers to their antennas.
(iii) Optical Fiber Cable –
It uses the concept of refraction of light through a core made up of glass or plastic. The core is
surrounded by a less dense glass or plastic covering called the cladding. It is used for the transmission
of large volumes of data.
The cable can be unidirectional or bidirectional. The WDM (Wavelength Division Multiplexer)
supports two modes, namely unidirectional and bidirectional mode.
Advantages:
Increased capacity and bandwidth
Lightweight
Less signal attenuation
Immunity to electromagnetic interference
Resistance to corrosive materials
Disadvantages:
Difficult to install and maintain
High cost
Fragile
Applications:
Radio frequency signals are sent over coaxial wire. It can be used for cable television signal
distribution, digital audio (S/PDIF), computer network connections (like Ethernet), and feedlines that
connect radio transmitters and receivers to their antennas.
(iv) Stripline
Stripline is a transverse electromagnetic (TEM) transmission line medium invented by Robert M.
Barrett of the Air Force Cambridge Research Centre in the 1950s. Stripline is the earliest form of the
planar transmission line. It uses a conducting material to transmit high-frequency waves it is also
called a waveguide. This conducting material is sandwiched between two layers of the ground plane
which are usually shorted to provide EMI immunity.
(v) Microstripline
In this, the conducting material is separated from the ground plane by a layer of dielectric.
2. Unguided Media:
It is also referred to as Wireless or Unbounded transmission media. No physical medium is required
for the transmission of electromagnetic signals.
Features:
The signal is broadcasted through air
Less Secure
Used for larger distances
There are 3 types of Signals transmitted through unguided media:
(i) Radio waves –
These are easy to generate and can penetrate through buildings. The sending and receiving antennas
need not be aligned. Frequency Range:3KHz – 1GHz. AM and FM radios and cordless phones use
Radio waves for transmission.
Further Categorized as (i) Terrestrial and (ii) Satellite.
(ii) Microwaves –
It is a line of sight transmission i.e. the sending and receiving antennas need to be properly aligned
with each other. The distance covered by the signal is directly proportional to the height of the
antenna. Frequency Range:1GHz – 300GHz. These are majorly used for mobile phone communication
and television distribution.
(iii) Infrared –
Infrared waves are used for very short distance communication. They cannot penetrate through
obstacles. This prevents interference between systems. Frequency Range:300GHz – 400THz. It is used
in TV remotes, wireless mouse, keyboard, printer, etc.
Data or information can be stored in two ways, analog and digital. For a computer to use the data, it must
be in discrete digital form. Similar to data, signals can also be in analog and digital form. To transmit
data digitally, it needs to be first converted to digital form.
Digital-to-Digital Conversion
This section explains how to convert digital data into digital signals. It can be done in two ways, line
coding and block coding. For all communications, line coding is necessary whereas block coding is
optional.
Line Coding
The process for converting digital data into digital signal is said to be Line Coding. Digital data is found
in binary format. It is represented (stored) internally as series of 1s and 0s.
Digital signal is denoted by discreet signal, which represents digital data. There are three types of line
coding schemes available:
Uni-polar Encoding
Unipolar encoding schemes use single voltage level to represent data. In this case, to represent binary 1,
high voltage is transmitted and to represent 0, no voltage is transmitted. It is also called Unipolar-Non-
return-to-zero, because there is no rest condition i.e. it either represents 1 or 0.
Polar Encoding
Polar encoding scheme uses multiple voltage levels to represent binary values. Polar encodings is
available in four types:
Polar Non-Return to Zero (Polar NRZ)
It uses two different voltage levels to represent binary values. Generally, positive voltage
represents 1 and negative value represents 0. It is also NRZ because there is no rest condition.
NRZ scheme has two variants: NRZ-L and NRZ-I.
NRZ-L changes voltage level at when a different bit is encountered whereas NRZ-I changes
voltage when a 1 is encountered.
Return to Zero (RZ)
Problem with NRZ is that the receiver cannot conclude when a bit ended and when the next bit is
started, in case when sender and receiver’s clock are not synchronized.
RZ uses three voltage levels, positive voltage to represent 1, negative voltage to represent 0 and
zero voltage for none. Signals change during bits not between bits.
Manchester
This encoding scheme is a combination of RZ and NRZ-L. Bit time is divided into two halves. It
transits in the middle of the bit and changes phase when a different bit is encountered.
Differential Manchester
This encoding scheme is a combination of RZ and NRZ-I. It also transit at the middle of the bit
but changes phase only when 1 is encountered.
Bipolar Encoding
Bipolar encoding uses three voltage levels, positive, negative and zero. Zero voltage represents binary 0
and bit 1 is represented by altering positive and negative voltages.
Block Coding
To ensure accuracy of the received data frame redundant bits are used. For example, in even-parity, one
parity bit is added to make the count of 1s in the frame even. This way the original number of bits is
increased. It is called Block Coding.
Block coding is represented by slash notation, mB/nB.Means, m-bit block is substituted with n-bit block
where n > m. Block coding involves three steps:
Division,
Substitution
Combination.
After block coding is done, it is line coded for transmission.
Analog-to-Digital Conversion
Microphones create analog voice and camera creates analog videos, which are treated is analog data. To
transmit this analog data over digital signals, we need analog to digital conversion.
Analog data is a continuous stream of data in the wave form whereas digital data is discrete. To convert
analog wave into digital data, we use Pulse Code Modulation (PCM).
PCM is one of the most commonly used method to convert analog data into digital form. It involves
three steps:
Sampling
Quantization
Encoding.
Sampling
The analog signal is sampled every T interval. Most important factor in sampling is the rate at which
analog signal is sampled. According to Nyquist Theorem, the sampling rate must be at least two times of
the highest frequency of the signal.
Quantization
Sampling yields discrete form of continuous analog signal. Every discrete pattern shows the amplitude of
the analog signal at that instance. The quantization is done between the maximum amplitude value and
the minimum amplitude value. Quantization is approximation of the instantaneous analog value.
Encoding
The binary bits are organized in-to groups of fixed length. Both sender and receiver are connected in
parallel with the equal number of data lines. Both computers distinguish between high order and low
order data lines. The sender sends all the bits at once on all lines.Because the data lines are equal to the
number of bits in a group or data frame, a complete group of bits (data frame) is sent in one go.
Advantage of Parallel transmission is high speed and disadvantage is the cost of wires, as it is equal to
the number of bits sent in parallel.
Serial Transmission
In serial transmission, bits are sent one after another in a queue manner. Serial transmission requires only
one communication channel.
When binary data represents digit 1, the amplitude is held; otherwise it is set to 0. Both frequency
and phase remain same as in the original carrier signal.
Frequency Shift Keying
In this conversion technique, the frequency of the analog carrier signal is modified to reflect
binary data.
This technique uses two frequencies, f1 and f2. One of them, for example f1, is chosen to
represent binary digit 1 and the other one is used to represent binary digit 0. Both amplitude and
phase of the carrier wave are kept intact.
Phase Shift Keying
In this conversion scheme, the phase of the original carrier signal is altered to reflect the binary
data.
When a new binary symbol is encountered, the phase of the signal is altered. Amplitude and
frequency of the original carrier signal is kept intact.
Quadrature Phase Shift Keying
QPSK alters the phase to reflect two binary digits at once. This is done in two different phases.
The main stream of binary data is divided equally into two sub-streams. The serial data is
converted in to parallel in both sub-streams and then each stream is converted to digital signal
using NRZ technique. Later, both the digital signals are merged together.
Analog-to-Analog Conversion
Analog signals are modified to represent analog data. This conversion is also known as Analog
Modulation. Analog modulation is required when bandpass is used. Analog to analog conversion can be
done in three ways:
Amplitude Modulation
In this modulation, the amplitude of the carrier signal is modified to reflect the analog data.
The amplitude and phase of the carrier signal are not altered.
Phase Modulation
In the modulation technique, the phase of carrier signal is modulated in order to reflect the change
in voltage (amplitude) of analog data signal.
Phase modulation is practically similar to Frequency Modulation, but in Phase modulation
frequency of the carrier signal is not increased. Frequency of carrier is signal is changed (made
dense and sparse) to reflect voltage change in the amplitude of modulating signal.
Transmission Impairment
In communication system, analog signals travel through transmission media, which tends to
deteriorate the quality of analog signal. This imperfection causes signal impairment. This means that
received signal is not same as the signal that was send.
Causes of impairment –
Attenuation – It means loss of energy. The strength of signal decreases with increasing
distance which causes loss of energy in overcoming resistance of medium. This is also known
as attenuated signal. Amplifiers are used to amplify the attenuated signal which gives the
original signal back.
Attenuation is measured in decibels(dB). It measures the relative strengths of twosignals or
one signal at two different point.
Attenuation(dB) = 10log10(P2/P1)
P1 is power at sending end and P2 is power at receiving end.
Distortion – It means change in the shape of signal. This is generally seen in composite signals
with different frequencies. Each frequency component has its own propagation speed
travelling through a medium. Every component arrives at different time which
leads to delay distortion. Therefore, they have different phases at receiver end from what they
had at sender’s end.
Noise – The random or unwanted signal that mixes up with the original signal is called noise.
There are several types of noise such as induced noise, crosstalk noise, thermal noise and
impulse noise which may corrupt the signal.
Induced noise comes from sources such as motors and appliances. These devices act as sending
antenna and transmission medium act as receiving antenna. Thermal noise is movement of
electrons in wire which creates an extra signal. Crosstalk noise is when one wire affects the
other wire. Impulse noise is a signal with high energy that comes from lightning or power lines
Multiplexing
Multiplexing is used in the cases where the signals of lower bandwidth and the transmitting media is
having higher bandwidth. In this case, the possibility of sending a number of signals is more. In this
the signals are combined into one and are sent over a link which has greater bandwidth of media than
the communicating nodes.
Example
The following diagram conceptually represents multiplexing using WDM. It has 4 optical signals
having 4 different wavelengths. Each of the four senders generates data streams of a particular
wavelength. The optical combiner multiplexes the signals and transmits them over a single long-haul
fiber channel. At the receiving end, the splitter demultiplexes the signal into the original 4 data
streams.
Categories of WDM
Based upon the wavelength, WDM can be divided into two categories −
Course WDM (CWDM): CWDM generally operates with 8 channels where the spacing between
the channels is 20 nm (nanometers) apart. It consumes less energy than DWDM and is less expensive.
However, the capacity of the links, as well as the distance supported, is lesser.
Dense WDM (DWDM): In DWDM, the number of multiplexed channels much larger than
CWDM. It is either 40 at 100GHz spacing or 80 with 50GHz spacing. Due to this, they can transmit
the huge quantity of data through a single fiber link. DWDM is generally applied in core networks of
telecommunications and cable networks. It is also used in cloud data centers for their IaaS services.
Switching Techniques
Circuit Switching
Advantages:
In the case of Circuit Switching technique, the communication channel is dedicated.
It has fixed bandwidth.
Disadvantages:
Once the dedicated path is established, the only delay occurs in the speed of data
transmission.
It takes a long time to establish a connection approx 10 seconds during which no datacan be
transmitted.
It is more expensive than other switching techniques as a dedicated path is required foreach
connection.
It is inefficient to use because once the path is established and no data is transferred,then
the capacity of the path is wasted.
In this case, the connection is dedicated therefore no other data can be transferred evenif the
channel is free.
Message Switching
Message Switching is a switching technique in which a message is transferred as a complete
unit and routed through intermediate nodes at which it is stored and forwarded.
In Message Switching technique, there is no establishment of a dedicated path between the
sender and receiver.
The destination address is appended to the message. Message Switching provides a dynamic
routing as the message is routed through the intermediate nodes based on the information
available in the message.
Message switches are programmed in such a way so that they can provide the most efficient
routes.
Each and every node stores the entire message and then forward it to the next node. Thistype of
network is known as store and forward network.
Message switching treats each message as an independent entity.
Advantages:
Data channels are shared among the communicating devices that improve the efficiencyof
using available bandwidth.
Traffic congestion can be reduced because the message is temporarily stored in thenodes.
Message priority can be used to manage the network.
The size of the message which is sent over the network can be varied. Therefore, it
supports the data of unlimited size.
Disadvantages:
The message switches must be equipped with sufficient storage to enable them to storethe
messages until the message is forwarded.
The Long delay can occur due to the storing and forwarding facility provided by the
message switching technique.
Packet Switching
The packet switching is a switching technique in which the message is sent in one go,but it
is divided into smaller pieces, and they are sent individually.
The message splits into smaller pieces known as packets and packets are given a unique
number to identify their order at the receiving end.
Every packet contains some information in its headers such as source address,destination
address and sequence number.
Packets will travel across the network, taking the shortest path as possible.
All the packets are reassembled at the receiving end in correct order.
If any packet is missing or corrupted, then the message will be sent to resend the
message.
If the correct order of the packets is reached, then the acknowledgment message will besent.
Advantages:
Cost-effective: In packet switching technique, switching devices do not require massive
secondary storage to store the packets, so cost is minimized to some extent. Therefore, we can
say that the packet switching technique is a cost-effective technique.
Reliable: If any node is busy, then the packets can be rerouted. This ensures that the Packet
Switching technique provides reliable communication.
Efficient: Packet Switching is an efficient technique. It does not require any established path
prior to the transmission, and many users can use the same communication channel
simultaneously, hence makes use of available bandwidth very efficiently.
Disadvantages:
Packet Switching technique cannot be implemented in those applications that requirelow
delay and high-quality services.
The protocols used in a packet switching technique are very complex and requires high
implementation cost.
If the network is overloaded or corrupted, then it requires retransmission of lost packets.It can
also lead to the loss of critical information if errors are nor recovered.
ISDN
The Integrated Services of Digital Networking, in short ISDN is a telephone network based
infrastructure that allows the transmission of voice and data simultaneously at a high speed with
greater efficiency. This is a circuit switched telephone network system, which also provides access to
Packet switched networks. Several kinds of access interfaces are:
Narrowband ISDN
Broadband ISDN
Narrowband ISDN
The Narrowband Integrated Services Digital Network is called the N-ISDN.
This can be understood as a telecommunication that carries voice information in anarrow
band of frequencies.
This is actually an attempt to digitize the analog voice information. This uses 64kbpscircuit
switching.
The narrowband ISDN is implemented to carry voice data, which uses lesser bandwidth,on a
limited number of frequencies.
Broadband ISDN
The Broadband Integrated Services Digital Network is called the B-ISDN.
This integrates the digital networking services and provides digital transmission over
ordinary telephone wires, as well as over other media.
The broadband ISDN speed is around 2 MBPS to 1 GBPS and the transmission is relatedto
ATM, i.e., Asynchronous Transfer Mode.
The broadband ISDN communication is usually made using the fiber optic cables.
As the speed is greater than 1.544 Mbps, the communications based on this are called
Broadband Communications.