0% found this document useful (0 votes)
120 views56 pages

Computer Networks Overview

cn notes

Uploaded by

saipranith235
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
120 views56 pages

Computer Networks Overview

cn notes

Uploaded by

saipranith235
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

COMPUTER NETWORKS

(III-CSE, SEMESTER-1, R-22)


PREPARED BY-MAGANTI APPARAO
HEAD OF THE DEPARTMENT
ST. MARY’S ENGINEERING COLLEGE

UNIT – I
INTRODUCTION
 Network Hardware
 Network Software
 OSI
 TCP/IP Reference Models
 Example Networks - Arpanet
 Internet
PHYSICAL LAYER
 Guided Transmission Media
 Twisted Pairs
 Coaxial Cable
 Fiber Optics
 Wireless Transmission
INTRODUCTION
A network is a set of devices (often referred to as nodes)
connected by communication links. A node can be a
computer, printer, or any other device capable of sending
and/or receiving data generated by other nodes on the
network.
“Computer network’’ to mean a collection of autonomous
computers interconnected by a single technology. Two
computers are said to be interconnected if they are able to
exchange information.
The connection need not be via a copper wire; fiber
optics, microwaves, infrared, and communication
satellites can also be used.
Networks come in many sizes, shapes and forms, as
we will see later. They are usually connected together to
make larger networks with the Internet being the most
well-known example of a network of networks.
There is considerable confusion in the literature between
a computer network and a distributed system.
The key distinction is that in a distributed system, a
collection of independent computers appears to its users
as a single coherent system. Usually, it has a single model
or paradigm that it presents to the users. Often a layer of
software on top of the operating system, called
middleware, is responsible for implementing this model.
A well-known example of a distributed system is the
World Wide Web.
It runs on top of the Internet and presents a model in
which everything looks like a document (Web page).
USES OF COMPUTER NETWORKS
1. BUSINESS APPLICATIONS
To distribute information throughout the company
(resource sharing). sharing physical resources such as
printers, and tape backup systems, is sharing
information client-server model.
It is widely used and forms the basis of much network
usage communication medium among employees.
Email (electronic mail), which employees generally use
for a great deal of daily communication.
Telephone calls between employees may be carried by
the computer network instead of by the phone company.
This technology is called IP telephony or Voice over IP
(VoIP) when Internet technology is used.
Desktop sharing lets remote workers see and interact
with a graphical computer screen doing business
electronically, especially with customers and suppliers.
This new model is called e-commerce (electronic
commerce) and it has grown rapidly in recent years.
2. HOME APPLICATIONS
peer-to-peer communication
person-to-person communication
electronic commerce
entertainment. (game playing,)
[Link] USERS
Text messaging or texting
Smart phones
GPS (Global Positioning System)
m-commerce
NFC (Near Field Communication)
[Link] ISSUES
With the good comes the bad, as this new-found
freedom brings with it many unsolved social, political,
and ethical issues. Social networks, message boards,
content sharing sites.
CLSSIFICSTION OF COMPUTER NETWORKS
1. Based on Transmission Mode
2. Based on Type of Connection
3. Based on Topology
4. Types of Network based on size
1) BASED ON TRANSMISSION MODE
Communication between two devices can be simplex,
half-duplex, or full-duplex as shown in Figure.

Simplex
In simplex mode, the communication is unidirectional,
as on a one- way street. Only one of the two devices on
a link can transmit; the other can only receive (Figure a).
Keyboards and traditional monitors are examples of
simplex devices.
Half-Duplex
In half-duplex mode, each station can both transmit and
receive, but not at the same time. When one device is
sending, the other can only receive, and vice versa (Figure
b). Walkie-talkies and CB (citizens band) radios are both
half- duplex systems.
Full-Duplex
In full-duplex, both stations can transmit and receive
simultaneously (Figure c). One common example of full-
duplex communication is the telephone network. When
two people are communicating by a telephone line,
both can talk and listen at the same time. The full-duplex
mode is used when communication in both directions is
required all the time.
[Link] ON TYPE OF CONNECTION
There are two possible types of connections: point-to-
point and multipoint.
Point-to-Point A point-to-point connection provides a
dedicated link between two devices. The entire capacity
of the link is reserved for transmissionbetween those two
devices. Most point-to-point connections use an actual
length of wire or cable to connect the two ends, but
other options, such as microwave or satellite links, are
also possible
When you change television channels by infrared remote
control, you are establishing a point-to-point connection
between the remote control and the television's control
system.
Multipoint A multipoint (also called multi-drop)
connection is one in which more than two specific devices
share a single link
In a multipoint environment, the capacity of the channel
is shared, either spatially or temporally. If several devices
can use the link simultaneously, it is a spatially shared
connection. If users must take turns, it is a timeshared
connection.
[Link] ON TOPOLOGY
I) Physical Topology
The term physical topology refers to the way in which a
network is laid out physically.
Two or more devices connect to a link; two or more links
form a topology. The topology of a network is the
geometric representation of the relationship of all the
links and linking devices (usually called nodes) to one
another.
There are four basic topologies possible: mesh, star, bus,
and ring.

MESH TOPOLOGY
A mesh topology is the one where every node is
connected to every other node in the network. A mesh
topology can be a full mesh topology or a partially
connected mesh topology.
The number of connections in this network can be
calculated using the following formula (n is the
number of computers in the network): n(n-1)/2
In a partially connected mesh topology, at least two of the
computers in the network have connections to multiple
other computers in that network. It is an inexpensive way
to implement redundancy in a network. In the event that
one of the primary computers or connections in the
network fails, the rest of the network continues to operate
normally.
Advantages of a mesh topology
Can handle high amounts of traffic, because multiple
devices can transmit data simultaneously.
A failure of one device does not cause a break in the
network or transmission of data.
Adding additional devices does not disrupt data
transmission between other devices.
Disadvantages of a mesh topology
The cost to implement is higher than other network
topologies, making it a less desirable option.
Building and maintaining the topology is difficult and
time consuming.
STAR TOPOLOGY

A star network, star topology is one of the most


common network setups. In this configuration, every
node connects to a central network device, like a hub,
switch, or computer. The central network device acts as a
server and the peripheral devices act as clients.
Depending on the type of network card used in each
computer of the star topology, a coaxial cable or a RJ-45
network cable is used to connect computers together.
Advantages of star topology
Centralized management of the network, through the
use of the central computer, hub, or switch.
Easy to add another computer to the network.
If one computer on the network fails, the rest of the
network continues to function normally.
The star topology is used in local-area networks
(LANs), High-speed LANs often use a star topology
with a central hub.
Disadvantages of star topology
Can have a higher cost to implement, especially when
using a switch or router as the central network device.
The central network device determines the performance
and number of nodes the network can handle.
If the central computer, hub, or switch fails, the entire
network goes down and all computers are disconnected
from the network.
BUS TOPOLOGY
a line topology, a bus topology is a network setup in
which each computer and network device are connected
to a single cable.
Advantages of bus topology
It works well when you have a small network.
It's the easiest network topology for connecting
computers or peripherals in a linear fashion.
It requires less cable length than a star topology.
Disadvantages of bus topology
It can be difficult to identify the problems if the whole
network goes down.
It can be hard to troubleshoot individual device issues.
Bus topology is not great for large networks.
Terminators are required for both ends of the main cable.
Additional devices slow the network down.
If a main cable is damaged, the network fails or splits into
two.

RING TOPOLOGY
A ring topology is a network configuration in which
device connections create a circular data path. In a ring
network, packets of data travel from one device to the next
until they reach their destination. Most ring topologies
allow packets to travel only in one direction, called a
unidirectional ring network. Others permit data to move
in either direction, called bidirectional.
The major disadvantage of a ring topology is that if any
individual connection in the ring is broken, the entire
network is affected.
Ring topologies may be used in either local area
networks (LANs) or wide area networks (WANs).
Advantages of ring topology
All data flows in one direction, reducing the chance of
packet collisions.
A network server is not needed to control network
connectivity between each workstation.
Data can transfer between workstations at high speeds.
Additional workstations can be added without
impacting performance of the network.
Disadvantages of ring topology
All data being transferred over the network must
pass through each workstation on the network, which can
make it slower than a star topology.
The entire network will be impacted if one workstation
shuts down.
The hardware needed to connect each workstation to
the network is more expensive than Ethernet cards and
hubs/switches.
II) HYBRID TOPOLOGY
A network can be hybrid. For example, we can have a
main star topology with each branch connecting several
stations in a bus topology as shown in Figure
[Link] OF NETWORK BASED ON SIZE
The types of network are classified based upon the size,
the area it covers and its physical architecture. The three
primary network categories are LAN, WAN and MAN.
Each network differs in their characteristics such as
distance, transmission speed, cables and cost.
Basic types
LAN (Local Area Network)
Group of interconnected computers within a
small area. (room, building, campus)
Two or more pc's can from a LAN to share files, folders,
printers, applications and other devices.
Coaxial or CAT 5 cables are normally used for
connections. Due to short distances, errors and noise are
minimum.
Data transfer rate is 10 to 100 mbps. Example: A
computer lab in a school. MAN (Metropolitan Area
Network) Design to extend over a large area.
Connecting number of LAN's to form larger network,
so that resources can be shared.
Networks can be up to 5 to 50 km. Owned by
organization or individual. Data transfer rate is low
compare to LAN.
Example: Organization with different branches located in
the city.
WAN (Wide Area Network)
Are country and worldwide network. Contains multiple
LAN's and MAN's.
Distinguished in terms of geographical range. Uses
satellites and microwave relays.
Data transfer rate depends upon the ISP provider and
varies over the location. Best example is the internet.
Other types
WLAN (Wireless LAN)
A LAN that uses high frequency radio waves for
communication. Provides short range connectivity with
high speed data transmission.
PAN (Personal Area Network)
Network organized by the individual user for its personal
use.
SAN (Storage Area Network) Connects servers to
data storage devices via fiber-optic cables.
NETWORK HARDWARE
Network hardware is a set of physical or network devices that
are essential for interaction and communication between
hardware units operational on a computer network. These are
dedicated hardware components that connect to each other and
enable a network to function effectively and efficiently.
Network devices, also known as networking hardware,
are physical devices that allow hardware on a computer
network to communicate and interact with one another. For
example, Repeater, Hub, Bridge, Switch, Routers, Gateway,
and NIC, etc.
Network hardware plays a key role as industries grow as it
supports scalability. It integrates any number of components
depending on the enterprise’s needs. Network hardware helps
establish an effective mode of communication, thereby
improving the business standards. It also promotes
multiprocessing and enables sharing of resources, information,
and software with ease.
Network equipment is part of advancements of the Ethernet
network protocol and utilizes a twisted pair or fiber cable as a
connection medium. Routers, hubs, switches, and bridges are
some examples of network hardware.
MODEMS: A modem enables a computer to connect to the
internet via a telephone line. The modem at one end converts
the computer’s digital signals into analog signals and sends
them through a telephone line. At the other end, it converts the
analog signals to digital signals that are understandable for
another computer.
ROUTERS: A router connects two or more networks. One
common use of the router is to connect a home or office
network (LAN) to the internet (WAN). It generally has a
plugged-in internet cable along with cables that connect
computers on the LAN. Alternatively, a LAN connection can
also be wireless (Wi-Fi-enabled), making the network device
wireless. These are also referred to as wireless access points
(WAPs).
HUBS, BRIDGES, AND SWITCHES: Hubs, bridges, and
switches are connecting units that allow multiple devices to
connect to the router and enable data transfer to all devices on
a network.
HUBS: A hub broadcasts data to all devices on a network. As
a result, it consumes a lot of bandwidth as many computers
might not need to receive the broadcasted data. The hub could
be useful in linking a few gaming consoles in a local
multiplayer game via a wired or wireless LAN.
BRIDGES: A bridge connects two separate LAN networks. It
scans for the receiving device before sending a message. This
implies that it avoids unnecessary data transfers if the receiving
device is not there. Moreover, it also checks to see whether the
receiving device has already received the message. These
practices improve the overall performance of the network.
SWITCHES: A switch is more powerful than a hub or a
bridge but performs a similar role. It stores the MAC addresses
of network devices and transfers data packets only to those
devices that have requested Thus, when the demand is high, a
switch becomes more efficient as it reduces the amount of
latency.
NETWORK INTERFACE CARDS: A network interface
card (NIC) is a hardware unit installed on a computer, which
allows it to connect to a network. It is typically in the form of a
circuit board or chip. In most modern machines, NICs are built
into the motherboards, while in some computers, an extra
expansion card in the form of a small circuit board is added
externally.
NETWORK CABLES: Cables connect different devices on a
network. Today, most networks have cables over a wireless
connection as they are more secure, i.e., less prone to attacks,
and at the same time carry larger volumes of data per second.
FIREWALL: A firewall is a hardware or software device
between a computer and the rest of the network open to
attackers or hackers. Thus, a LAN can be protected from
hackers by placing a firewall between the LAN and the internet
connection. A firewall allows authorized connections and data-
like emails or web pages to pass through but blocks
unauthorized connections made to a computer or LAN.

Bluetooth PAN configuration.

Access To wired network Ethernet


point switch
Ports To rest of
network

Wireless and wired LANs. (a) 802.11. (b) Switched Ethernet.


Junction

box

Antenna

Head end

Internet

A metropolitan area network based on cable TV.

Subnet
Router Transmission line

WAN that connects three branch offices in Australia.


NETWORK SOFTWARE
Network software is an umbrella term used to describe a wide
range of software that streamlines the operations, design,
monitoring, and implementation of computer networks.
Network software is a fundamental element for any networking
system. It helps administrators and security personnel reduce
network complexities, and manage, monitor, and better control
network traffic.
Network software plays a crucial role in managing a network
infrastructure and simplifying IT operations by facilitating
communication, security, content, and data sharing.
The first computer networks were designed with the hardware
as the main concern and the software as an afterthought. This
strategy no longer works. Network software is now highly
structured.
 Protocol Hierarchies
 Design Issues for the Layers
 Connection-Oriented Versus Connectionless Service
 Service Primitives
 The Relationship of Services to Protocols
FUNCTIONS OF NETWORK SOFTWARE
User management allows administrators to add or remove
users from the network. This is particularly useful when hiring
or relieving
File management lets administrators decide the location of
data storage and control user access to that data.
Access enables users to enjoy uninterrupted access to network
resources.
Network security systems assist administrators in looking
after security and preventing data breaches.
KEY COMPONENTS OF NETWORK SOFTWARE
Network software is an advanced, robust, and secure alternative
to traditional networking, making the network easier to
administer in terms of management, modifications,
configuration, supply resources, and troubleshooting. The use
of network software makes it possible to administer from one
centralized user interface while completely eliminating the
need to acquire additional hardware.
1. APPLICATION LAYER
The first component is the application layer or the application
plane, which refers to the applications and services running on
the network. It is a program that conveys network information,
the status of the network, and the network requirements for
particular resource availability and application.
This is done through the control layer via application
programming interfaces (APIs). The application layer also
consists of the application logic and one or more API drivers.
2. CONTROL LAYER
The control layer lies at the center of the architecture and is one
of the most important components of the three layers. You
could call it the brain of the whole system.
Also called the controller or the control plane, this layer also
includes the network control software and the network
operating system within it. It is the entity in charge of receiving
requirements from the applications and translating the same to
the network components.
The control of the infrastructure layer or the data plane devices
is also done via the controller. In simple terms, the control layer
is the intermediary that facilitates communication between the
top and bottom layers through APIs interfaces.
3. INFRASTRUCTURE LAYER
The infrastructure layer, also called the data plane, consists of
the actual network devices (both physical and virtual) that
reside in this layer. They are primarily responsible for moving
or forwarding the data packets after receiving due instructions
from the control layer.
In simple terms, the data plane in the network architecture
components physically handles user traffic based on the
commands received by the controller.
There are numerous types of network software available, with
most of them being categorized under the communications and
security arena. The varieties of network software differ based
on their key features and costs.
The main role of network software is to eliminate the
dependence on hardware by streamlining communications
across multiple devices, locations, and systems.
REFERENCE MODELS
We will discuss two important network architectures: the OSI
reference model and the TCP/IP reference model. Although the
protocols associated with the OSI model are not used any more,
the model itself is actually quite general and still valid, and the
features discussed at each layer are still very important. The
TCP/IP model has the opposite properties the model itself is not
of much use but the protocols are widely used.

THE OSI REFERENCE MODEL


This model is based on a proposal developed by the
International Standards Organization (ISO) as a first step
toward international standardization of the protocols used in the
various layers (Day and Zimmermann, 1983). It was revised in
1995 (Day, 1995).
The model is called the ISO OSI (Open Systems
Interconnection) Reference Model because it deals with
connecting open system that is, systems that are open for
communication with other systems. We will just call it the OSI
model for short.
The OSI model has seven layers. The principles that were
applied to arrive at the seven layers can be briefly summarized
as follows:
A layer should be created where a different abstraction is
needed.
Each layer should perform a well-defined function.
The function of each layer should be chosen with an eye toward
defining internationally standardized protocols.
PHYSICAL LAYER
Deals with all aspects of physically moving data from
one computer to the next.
Converts data from the upper layers into 1s and 0s for
transmission over media
Defines how data is encoded onto the media to transmit
the data
Defined on this layer: Cable standards, wireless
standards, and fiber optic standards.
Copper wiring, fiber optic cable, radio frequencies,
anything that can be used to transmit data is defined on
the Physical layer of the OSI Model
Device example: Hub
Used to transmit data
DATA LINK LAYER
Is responsible for moving frames from node to node or
computer to computer
Can move frames from one adjacent computer to
another, cannot move frames across routers
Encapsulation = frame
Requires MAC address or physical address
Protocols defined include Ethernet Protocol and Point-to-
Point Protocol (PPP)
Device example: Switch
Two sublayers: Logical Link Control (LLC) and the
Media Access Control (MAC)
Logical Link Control (LLC)
–Data Link layer addressing, flow control, address
notification, error control
Media Access Control (MAC)
–Determines which computer has access to the
network media at any given time
–Determines where one frame ends and the next one
starts, called frame synchronization
NETWORK LAYER
Responsible for moving packets (data) from one end
of the network to the other, called end-to-end
communications
Requires logical addresses such as IP addresses
Device example: Router
–Routing is the ability of various network devices and
their related software to move data packets from source
to destination
TRANSPORT LAYER
Takes data from higher levels of OSI Model and breaks
it into segments that can be sent to lower-level layers for
data transmission
Conversely, reassembles data segments into data that
higher-level protocols and applications can use
Also puts segments in correct order (called sequencing)
so they can be reassembled in correct order at destination
Concerned with the reliability of the transport of sent data
May use a connection-oriented protocol such as TCP to
ensure destination received segments
May use a connectionless protocol such as UDP to
send segments without assurance of delivery
Uses port addressing
SESSION LAYER
Responsible for managing the dialog between networked
devices
Establishes, manages, and terminates connections
Provides duplex, half-duplex, or simplex
communications between devices. Provides procedures
for establishing check points, adjournment, termination,
and restart or recovery procedures.
PRESENTATION LAYER
Concerned with how data is presented to the network
Handles three primary tasks: Translation, Compression,
Encryption

APPLICATION LAYER
Contains all services or protocols needed by application
software or operating system to communicate on the
network
Examples
–Firefox web browser uses HTTP (Hyper-Text Transport
Protocol)
–E-mail program may use POP3 (Post Office Protocol
version 3) to read e-mails and SMTP (Simple Mail
Transport Protocol) to send e-mails
The interaction between layers in the OSI model
TCP/IP MODEL
TCP/IP stands for Model (Transmission Control
Protocol/Internet Protocol). A protocol suite is a large
number of related protocols that work together to allow
networked computers to communicate.
Whereas OSI reference model to the reference model used in
the grandparent of all wide area computer networks, the
ARPANET worldwide Internet.

Relationship of layers and addresses in TCP/IP


APPLICATION LAYER
Application layer protocols define the rules when
implementing specific network applications
Rely on the underlying layers to provide accurate and
efficient data delivery
Typical protocols:
FTP – File Transfer Protocol
For file transfer
Telnet – Remote terminal protocol
For remote login on any other computer on the network
SMTP – Simple Mail Transfer Protocol
For mail transfer
HTTP – Hypertext Transfer Protocol
For Web browsing
Encompasses same functions as these OSI
Model Layers Application, presentation and Session
TRANSPORT LAYER
TCP is a connection-oriented protocol
Does not mean it has a physical connection between
sender and receiver
TCP provides the function to allow a connection
virtually exists – also called virtual circuit
UDP provides the functions:
Dividing a chunk of data into segments
Reassembly segments into the original chunk
Provide further the functions such as reordering and data
resend
Offering a reliable byte-stream delivery service
Functions the same as the Transport layer in OSI
Synchronize source and destination computers to set
up the session between the respective computers
INTERNET LAYER
The network layer, also called the internet layer, deals
with packets and connects independent networks to
transport the packets across network boundaries. The
network layer protocols are the IP and the Internet
Control Message Protocol (ICMP), which is used for
error reporting.
HOST-TO-NETWORK LAYER
The Host-to-network layer is the lowest layer of the
TCP/IP reference model. It combines the link layer and
the physical layer of the ISO/OSI model. At this layer,
data is transferred between adjacent network nodes in
a WAN or between nodes on the same LAN.
EXAMPLE NETWORKS
The subject of computer networking covers many different
kinds of networks, large and small, well known and less well
known.
We will start with the Internet, probably the best known
network, and look at its history, evolution, and technology.
Then we will consider the mobile phone network. Technically,
it is quite different from the Internet, contrasting nicely with it.
Next we will introduce IEEE 802.11, the dominant standard for
wireless LANs. Finally, we will look at RFID and sensor
networks, technologies that extend the reach of the network to
include the physical world and everyday objects.

THE INTERNET
The Internet has revolutionized many aspects of our daily
lives. It has affected the way we do business as well as
the way we spend our leisure time. Count the ways
you've used the Internet recently.
Perhaps you've sent electronic mail (e-mail) to a
business associate, paid a utility bill, read a newspaper
from a distant city, or looked up a local movie schedule-
all by using the Internet.
Or maybe you researched a medical topic, booked a
hotel reservation, chatted with a fellow Trekkie, or
comparison-shopped for a car.
The Internet is a communication system that has
brought a wealth of information to our fingertips and
organized it for our use.
A BRIEF HISTORY
A network is a group of connected communicating
devices such as computers and printers. An internet
(note the lowercase letter i) is two or more networks that
can communicate with each other.
The most notable internet is called the Internet (uppercase
letter I), a collaboration of more than hundreds of
thousands of interconnected networks.
Private individuals as well as various organizations such
as government agencies, schools, research facilities,
corporations, and libraries in more than 100 countries use
the Internet. Millions of people are users. Yet this
extraordinary communication system only came into
being in 1969.
ARPANET
In the mid-1960s, mainframe computers in research
organizations were standalone devices. Computers from
different manufacturers were unable to communicate
with one another.
The Advanced Research Projects Agency (ARPA) in the
Department of Defense (DoD) was interested in finding a
way to connect computers so that the researchers they
funded could share their findings, thereby reducing costs
and eliminating duplication of effort.
In 1967, at an Association for Computing Machinery
(ACM) meeting, ARPA presented its ideas for
ARPANET, a small network of connected computers.
The idea was that each host computer (not necessarily
from the same manufacturer) would be attached to a
specialized computer, called an interface message
processor (IMP).
The IMPs, in tum, would be connected to one another.
Each IMP had to be able to communicate with other IMPs
as well as with its own attached host.
By 1969, ARPANET was a reality. Four nodes, at the
University of California at Los Angeles (UCLA), the
University of California at Santa Barbara (UCSB),
Stanford Research Institute (SRI), and the University of
Utah, were connected via the IMPs to form a network.
Software called the Network Control Protocol (NCP)
provided communication between the hosts.
In 1972, Vint Cerf and Bob Kahn, both of whom were
part of the core ARPANET group, collaborated on what
they called the Internetting Project.
Cerf and Kahn's landmark 1973 paper outlined the
protocols to achieve end- to-end delivery of packets. This
paper on Transmission Control Protocol (TCP) included
concepts such as encapsulation, the datagram, and the
functions of a gateway.
Shortly thereafter, authorities made a decision to split
TCP into two protocols: Transmission Control Protocol
(TCP) and Internetworking Protocol (lP).
IP would handle datagram routing while TCP would be
responsible for higher-level functions such as
segmentation, reassembly, and error detection. The
internetworking protocol became known as TCPIIP.
The Internet Today
The Internet has come a long way since the 1960s. The
Internet today is not a simple hierarchical structure. It is
made up of many wide- and local-area networks joined
by connecting devices and switching stations.
It is difficult to give an accurate representation of the
Internet because it is continually changing-new networks
are being added, existing networks are adding addresses,
and networks of defunct companies are being removed.
Today most end users who want Internet connection use
the services of Internet service providers (lSPs).
There are international service providers, national service
providers, regional service providers, and local service
providers. The Internet today is run by private companies,
not the government. Figure shows a conceptual (not
geographic) view of the Internet.
International Internet Service Providers:
At the top of the hierarchy are the international service
providers that connect nations together.
National Internet Service Providers:
The national Internet service providers are backbone
networks created and maintained by specialized
companies.
There are many national ISPs operating in North
America; some of the most well-known are Sprint Link,
PSINet, UUNet Technology, AGIS, and internet Mel.
To provide connectivity between the end users, these
backbone networks are connected by complex switching
stations (normally run by a third party) called network
access points (NAPs).
Some national ISP networks are also connected to one
another by private switching stations called peering
points. These normally operate at a high data rate (up to
600 Mbps).
Regional Internet Service Providers:
Regional internet service providers or regional ISPs are
smaller ISPs that are connected to one or more national
ISPs. They are at the third level of the hierarchy with a
smaller data rate.
Local Internet Service Providers:
Local Internet service providers provide direct service to
the end users. The local ISPs can be connected to regional
ISPs or directly to national ISPs.
Most end users are connected to the local ISPs. Note that
in this sense, a local ISP can be a company that just
provides Internet services, a corporation with a network
that supplies services to its own employees, or a nonprofit
organization, such as a college or a university, that runs
its own network. Each of these local ISPs can be
connected to a regional or national service provider.
PHYSICAL LAYER
A transmission medium can be broadly defined as
anything that can carry information from a source to a
destination.

Classes of transmission media

GUIDED MEDIA
Media are roughly grouped into guided media, such as copper
wire and fiber optics, and unguided media, such as terrestrial
wireless, satellite, and lasers through the air.
Guided media, which are those that provide a medium
from one device to another, include twisted-pair cable,
coaxial cable, and fiber-optic cable. Each one has its own
niche in terms of bandwidth, delay, cost, and ease of installation
and maintenance.

TWISTED-PAIR CABLE
A twisted pair consists of two conductors (normally
copper), each with its own plastic insulation, twisted
together. One of the wires is used to carry signals to the
receiver, and the other is used only as a ground reference.

Unshielded Versus Shielded Twisted-Pair Cable


The most common twisted-pair cable used in
communications is referred to as unshielded twisted-
pair (UTP).
STP cable has a metal foil or braided mesh covering
that encases each pair of insulated conductors.
Although metal casing improves the quality of cable by
preventing the penetration of noise or crosstalk, it is
bulkier and more expensive.

The most common UTP connector is RJ45 (RJ stands


for registered jack)
Applications
Twisted-pair cables are used in telephone lines to provide
voice and data channels.
Local-area networks, such as l0Base-T and l00Base-T,
also use twisted-pair cables.

COAXIAL CABLE
Coaxial cable (or coax) carries signals of higher
frequency ranges than those in twisted pair cable.
Coax has a central core conductor of solid or stranded
wire (usually copper) enclosed in an insulating sheath,
which is, in turn, encased in an outer conductor of metal
foil, braid, or a combination of the two.
The outer metallic wrapping serves both as a shield
against noise and as the second conductor, which
completes the circuit.
This outer conductor is also enclosed in an insulating
sheath, and the whole cable is protected by a plastic
cover.

The most common type of connector used today is the


Bayone Neill Concelman (BNe) connector.
Applications
Coaxial cable was widely used in analog telephone
networks, digital telephone networks
Cable TV networks also use coaxial cables.
Another common application of coaxial cable is in
traditional Ethernet LANs
FIBER-OPTIC CABLE
A fiber-optic cable is made of glass or plastic and
transmits signals in the form of light. Light travels in a
straight line as long as it is moving through a single
uniform substance.
If a ray of light traveling through one substance
suddenly enters another substance (of a different
density), the ray changes direction.
Bending of light ray

Optical fibers use reflection to guide light through a


channel. A glass or plastic core is surrounded by a
cladding of less dense glass or plastic.
PROPAGATION MODES

Multimode is so named because multiple beams from a light

source move through the core in different paths. How


these beams move within the cable depends on the
structure of the core, as shown in Figure.
In multimode step-index fiber, the density of the core
remains constant from the center to the edges. A beam of
light moves through this constant density ina straight line
until it reaches the interface of the core and the cladding.
The term step index refers to the suddenness of this
change, which contributes to the distortion of the signal
as it passes through the fiber.
A second type of fiber, called multimode graded-index
fiber, decreases this distortion of the signal through the
cable. The word index here refers to the index of
refraction.
Single-Mode: Single-mode uses step-index fiber and a
highly focused source of light that limits beams to a small
range of angles, all close to the horizontal.

FIBER CONSTRUCTION

The subscriber channel (SC) connector, the straight-


tip (ST) connector, MT-RJ (mechanical transfer
registered jack) is a connector
APPLICATIONS
Fiber-optic cable is often found in back bone networks
because its wide bandwidth is cost-effective.
Some cable TV companies use a combination of optical
fiber and coaxial cable, thus creating a hybrid network.
Local-area networks such as 100Base-FX
network (Fast Ethernet) and 1000Base-X also
use fiber-optic cable
Advantages and Disadvantages of Optical Fiber
Advantages Fiber-optic cable has several advantages
over metallic cable (twisted pair or coaxial).
Higher bandwidth.
Less signal attenuation. Fiber-optic transmission distance
is significantly greater than that of other guided media. A
signal can run for 50 km without requiring regeneration.
Light weight. Fiber-optic cables are much lighter than
copper cables.
Greater immunity to tapping.
Disadvantages
Installation and maintenance
Unidirectional light propagation. Propagation of light is
unidirectional. If we need bidirectional communication,
two fibers are needed.
Cost. The cable and the interfaces are relatively more
expensive than those of other guided media.
WIRELESS TRANSMISSION
Unguided media transport electromagnetic waves
without using a physical conductor. This type of
communication is often referred to as wireless
communication.
 Radio Waves
 Microwaves
 Infrared

Unguided signals can travel from the source to


destination in several ways: ground propagation, sky
propagation, and line-of-sight propagation, as shown in
Figure
RADIO WAVES
Electromagnetic waves ranging in frequencies between 3
kHz and 1 GHz are normally called radio waves. Radio
waves are Omni directional.
When an antenna transmits radio waves, they are
propagated in all directions. This means that the sending
and receiving antennas do not have to be aligned.
A sending antenna sends waves that can be received by
any receiving antenna. The Omni directional property has
a disadvantage, too.
The radio waves transmitted by one antenna are
susceptible to interference by another antenna that may
send signals using the same frequency or band.
Applications
The Omni directional characteristics of radio waves make
them useful for multicasting, in which there is one sender
but many receivers. AM and FM radio, television,
maritime radio, cordless phones, and paging are examples
of multicasting.
MICROWAVES
Electromagnetic waves having frequencies between 1 and
300 GHz are called microwaves.
Microwaves are unidirectional. The sending and
receiving antennas need to be aligned. The unidirectional
property has an obvious advantage.
A pair of antennas can be aligned without interfering with
another pair of aligned antennas.
Applications
Microwaves are used for unicast communication such
as cellular telephones, satellite networks, and wireless
LANs.
INFRARED
Infrared waves, with frequencies from 300 GHz to 400
THz (wavelengths from 1 mm to 770 nm), can be used
for short-range communication. Infrared waves, having
high frequencies, cannot penetrate walls.
This advantageous characteristic prevents interference
between one system and another; a short- range
communication system in one room cannot be affected by
another system in the next room.
When we use our infrared remote control, we do not
interfere with the use of the remote by our neighbors.
Infrared signals useless for long-range communication.
In addition, we cannot use infrared waves outside a
building because the sun's rays contain infrared waves
that can interfere with the communication.
Applications
Infrared signals can be used for short-range
communication in a closed area using line-of-sight
propagation.

You might also like