Overview of Computer Networks and Types
Overview of Computer Networks and Types
UNIT 1
Computer Network
• A computer network is a system in which multiple computers are connected to each other to share
information and resources.
• The physical connection between networked computing devices is established using either cable media or
wireless media.
• The best-known computer network is the Internet.
It is a group of interconnected Local Area Networks (LAN) within a limited geographical area like school
campus, university campus, military bases, or organizational campuses and corporate buildings etc. A
Campus Area Network is larger than Local Area Network but smaller than Metropolitan Area Network
(MAN) and Wide Area Network (WAN).
Campus Area Network is network of interconnected Local Area Networks where these LANs are connected
via Switches and routers and create a single network like CAN. Campus Area Network covers areas of
around 1 to 5 km range and it can be both wired or wireless connectivity.
• Disadvantage:
➢ The speed of the network decreases due to heavy usage.
➢ It is not easy to keep track of information on each computer.
➢ There is no central backup of files and folders.
➢ Network and data security are weak.
Client/Server network
• A client/server network is a system where one or more computers called clients to connect to a central
computer named as a server to share or use resources.
• The client requests a service from a server, which may include running an application,
querying a database, printing a document, performing a backup or recovery procedure. The
request made by the client is handled by a server.
• A client/server network is that in which the files and resources are centralized. This means
that the server can hold them and other computers (Client) can access them.
• Advantage:
➢ The server system holds the shared files.
➢ The server system can be scheduled to take the file backups automatically.
Network access is provided only to authorized users through user security at the
server.
➢ The server system is a kind of central repository for sharing a printer with clients.
➢ Internet access, e-mail routing, and such other networking tasks are quite easily
managed by the server.
➢ The software applications shared by the server are accessible to the clients.
• Disadvantage:
➢ The implementation of the network is quite expensive.
➢ An NOS (Network Operating System) is essential.
➢ If a server fails, the entire network crashes.
➢ There may be congestion if more than one client requests for a service at the same
Time.
Bus topology
Bus topology, alternatively known as line topology, is a type of network topology where all devices on a
network are connected to a single cable, called a bus or backbone. This cable serves as a shared
communication line, allowing all devices (computers, printers, etc.) to receive the same signal
simultaneously.
Bus topology is bi-directional, i.e., data is transmitted in both directions on the backbone cable to ensure it
reaches the recipient, regardless of its position on the bus. Depending on the type of network card, a twisted-
pair cable ( RJ-45 network cable) or a coaxial cable is utilized as a bus (backbone cable) to link network
devices, computers or nodes together.
Advantages of Bus topology
Less cabling: A single cable connects all nodes in a bus topology.
Easy to install: This topology is easy to install and requires minimal configuration.
Less Expensive: Bus topology is cheaper because it uses a common cable for data transmission.
Fast: This topology provides high-speed data transfer as there are no intermediary devices between
the nodes.
Upgradeable: A new node can be added or removed in this topology without affecting the other
nodes.
Small network: This is best suited for situations where only a few computers are required for
connection establishment.
Scalable: It can be easily scaled up by adding repeaters or hubs to extend the network's range.
Efficient: Bus topology is an efficient way of transmitting data, allowing multiple nodes to transmit
data simultaneously.
Reliable: Since all the nodes are connected to a single wire, it provides redundancy and ensures that
the network remains operational even if one node fails.
Disadvantages of Bus topology
Core failure: The entire network will fail if the central cable (bus or backbone) gets damaged or
faulty.
Low security: This is a notable security issue. All nodes in the network can hear what data is
transmitted to other nodes in the network.
Limited speed: The network's performance decreases as the number of devices connected increases,
as all devices share the same bandwidth.
Not suitable for large networks: Due to cable length limitations, bus topology is unsuitable for
large networks.
Star Topology
The star topology is a standard and popular network setup. it is also known as a star network in
terms. This topology is a network topology in which each piece of the network each attached to a central
node. This central node is called a switch or a hub. In this network configuration, every node connects to a
central network device like a switch, hub, or computer.
Ring Topology
In Ring Topology, all the nodes are connected to each-other in such a way that they make a closed loop.
Each workstation is connected to two other components on either side, and it communicates with these two
adjacent neighbors. Data travels around the network, in one direction.
Token contains a piece of information which along with data is sent by the source computer. This token then
passes to next node, which checks if the signal is intended to it. If yes, it receives it and passes the empty to
into the network, otherwise passes token along with the data to next node. This process continues until the
signal reaches its intended destination.
The nodes with token are the ones only allowed to send data. Other nodes have to wait for an empty token to
reach them. This network is usually found in offices, schools and small buildings.
Advantages of Ring Topology
1) This type of network topology is very organized. Each node gets to send the data when it receives an
empty token. This helps to reduces chances of collision. Also in ring topology all the traffic flows in only
one direction at very high speed.
2) Even when the load on the network increases, its performance is better than that of Bus topology.
3) There is no need for network server to control the connectivity between workstations.
4) Additional components do not affect the performance of network. 5) Each computer has equal access to
resources.
Disadvantages of Ring Topology
1) Each packet of data must pass through all the computers between source and destination. This makes it
slower than Star topology.
2) If one workstation or port goes down, the entire network gets affected.
3) Network is highly dependent on the wire which connects different components.
Tree Topology
Tree Topology integrates the characteristics of Star and Bus Topology. Earlier we saw how in Physical Star
network Topology, computers (nodes) are connected by each other through central hub. And we also saw in
Bus Topology, work station devices are connected by the common cable called Bus. After understanding
these two network configurations, we can understand tree topology better. In Tree Topology, the number of
Star networks is connected using Bus. This main cable seems like a main stem of a tree, and other star
networks as the branches. It is also called Expanded Star Topology.
Advantages of Tree Topology
1. It is an extension of Star and bus Topologies, so in networks where these topologies can't be implemented
individually for reasons related to scalability, tree topology is the best alternative.
2. Expansion of Network is possible and easy.
3. Here, we divide the whole network into segments (star networks), which can be easily managed and
maintained.
4. Error detection and correction is easy.
5. Each segment is provided with dedicated point-to-point wiring to the central hub.
6. If one segment is damaged, other segments are not affected
Disadvantages of Tree Topology
1. Because of its basic structure, tree topology, relies heavily on the main bus cable, if it breaks whole
network is crippled.
2. As more and more nodes and segments are added, the maintenance becomes difficult.
3. Scalability of the network depends on the type of cable used.
Mesh Topology
In a mesh network topology, each of the network node, computer and other devices, are interconnected with
one another. Every node not only sends its own signals but also relays data from other nodes. In fact a true
mesh topology is the one where every node is connected to every other node in the network. This type of
topology is very expensive as there are many redundant connections, thus it is not mostly used in computer
networks. It is commonly used in wireless networks. Flooding or routing technique is used in mesh
topology.
Advantages of Mesh topology
1) Data can be transmitted from different devices simultaneously. This topology can withstand high traffic.
2) Even if one of the components fails there is always an alternative present. So data transfer doesn’t get
affected.
3) Expansion and modification in topology can be done without disrupting other nodes.
Disadvantages of Mesh topology
1) There are high chances of redundancy in many of the network connections.
2) Overall cost of this network is way too high as compared to other network topologies.
3) Set-up and maintenance of this topology is very difficult. Even administration of the network is tough.
Hybrid Topology
Hybrid, as the name suggests, is mixture of two different things. Similarly in this type of topology we
integrate two or more different topologies to form a resultant topology which has good points(as well as
weaknesses) of all the constituent basic topologies rather than having characteristics of one specific
topology. This combination of topologies is done according to the requirements of the organization. For
example, if there exists a ring topology in one office department while a bus topology in another
department, connecting these two will result in Hybrid topology. Remember connecting two similar
topologies cannot be termed as Hybrid topology. Star-Ring and Star-Bus networks are most common
examples of hybrid network.
Advantages of Hybrid Network Topology
1) Reliable : Unlike other networks, fault detection and troubleshooting is easy in this type of topology. The
part in which fault is detected can be isolated from the rest of network and required corrective measures can
be taken, WITHOUT affecting the functioning of rest of the network.
2) Scalable: Its easy to increase the size of network by adding new components, without disturbing existing
architecture.
3) Flexible: Hybrid Network can be designed according to the requirements of the organization and by
optimizing the available resources. Special care can be given to nodes where traffic is high as well as where
chances of fault are high.
4) Effective: Hybrid topology is the combination of two or more topologies, so we can design it in such a
way that strengths of constituent topologies are maximized while there weaknesses are neutralized. For
example we saw Ring Topology has good data reliability (achieved by use of tokens) and Star topology has
high tolerance capability (as each node is not directly connected to other but through central device), so
these two can be used effectively in hybrid star-ring topology.
Disadvantages of Hybrid Topology
1) Complexity of Design: One of the biggest drawback of hybrid topology is its design. Its not easy to
design this type of architecture and its a tough job for designers. Configuration and installation process
needs to be very efficient.
2) Costly Hub: The hubs used to connect two distinct networks, are very expensive. These hubs are
different from usual hubs as they need to be intelligent enough to work with different architectures and
should be function even if a part of network is down.
3) Costly Infrastructure: As hybrid architectures are usually larger in scale, they require a lot of cables,
cooling systems, sophisticate network devices, etc.
Multiplexing
Multiplexing is a technique used to combine and send the multiple data streams over a single medium. The
process of combining the data streams is known as multiplexing and hardware used for multiplexing is
known as a multiplexer.
Multiplexing is achieved by using a device called Multiplexer (MUX) that combines n input lines to
generate a single output line. Multiplexing follows many-to-one, i.e., n input lines and one output line.
Demultiplexing is achieved by using a device called Demultiplexer (DEMUX) available at the receiving
end. DEMUX separates a signal into its component signals (one input and n outputs). Therefore, we can say
that demultiplexing follows the one-to-many approach.
o The 'n' input lines are transmitted through a multiplexer and multiplexer combines the signals to
form a composite signal.
o The composite signal is passed through a Demultiplexer and demultiplexer separates a signal to
component signals and transfers them to their respective destinations.
Advantages of Multiplexing:
o More than one signal can be sent over a single medium.
o The bandwidth of a medium can be utilized effectively.
Types of Multiplexing
o Wavelength Division Multiplexing is same as FDM except that the optical signals are transmitted
through the fibre optic cable.
o WDM is used on fibre optics to increase the capacity of a single fibre.
o It is used to utilize the high data rate capability of fibre optic cable.
o It is an analog multiplexing technique.
o Optical signals from different source are combined to form a wider band of light with the help of
multiplexer.
o At the receiving end, demultiplexer separates the signals to transmit them to their respective
destinations
Time Division Multiplexing
o It is a digital technique.
o In Frequency Division Multiplexing Technique, all signals operate at the same time with different
frequency, but in case of Time Division Multiplexing technique, all signals operate at the same
frequency with different time.
o In Time Division Multiplexing technique, the total time available in the channel is distributed
among different users. Therefore, each user is allocated with different time interval known as a Time
slot at which data is to be transmitted by the sender.
o A user takes control of the channel for a fixed amount of time.
o In Time Division Multiplexing technique, data is not transmitted simultaneously rather the data is
transmitted one-by-one.
o In TDM, the signal is transmitted in the form of frames. Frames contain a cycle of time slots in
which each frame contains one or more slots dedicated to each user.
o It can be used to multiplex both digital and analog signals but mainly used to multiplex digital
signals.
There are two types of TDM:
o Synchronous TDM
o Asynchronous TDM
Synchronous TDM
o A Synchronous TDM is a technique in which time slot is preassigned to every device.
o In Synchronous TDM, each device is given some time slot irrespective of the fact that the device
contains the data or not.
o If the device does not have any data, then the slot will remain empty.
o In Synchronous TDM, signals are sent in the form of frames. Time slots are organized in the form of
frames. If a device does not have data for a particular time slot, then the empty slot will be
transmitted.
o The most popular Synchronous TDM are T-1 multiplexing, ISDN multiplexing, and SONET
multiplexing.
o If there are n devices, then there are n slots.
Concept Of Synchronous TDM
In the above figure, the Synchronous TDM technique is implemented. Each device is allocated with some
time slot. The time slots are transmitted irrespective of whether the sender has data to send or not.
OSI Model:
OSI stands for Open System Interconnection is a reference model that describes how
information from a software application in one computer moves through a physical medium to
the software application in another computer.
OSI consists of seven layers, and each layer performs a particular network function.
OSI model was developed by the International Organization for Sta dardization (ISO) in
1984, and it is now considered as an architectural model for the inter-computer
communications.
OSI model divides the whole task into seven smaller and manageable tasks. Each layer is
assigned a particular task.
Each layer is self-contained, so that task assigned to each layer can be performed
independently.
Characteristics of OSI Model:
The OSI model is divided into two layers: upper layers and lower layers.
The upper layer of the OSI model mainly deals with the application related issues, and they
are implemented only in the software. The application layer is closest to the end user. Both the
end user and the application layer interact with the software applications. An upper layer
refers to the layer just above another layer.
The lower layer of the OSI model deals with the data transport issues. The data link layer and
the physical layer are implemented in hardware and software. The physical layer is the lowest
layer of the OSI model and is closest to the physical medium. The physical layer is mainly
responsible for placing the information on the physical medium.
7 Layers of OSI Model:
There are the seven OSI layers. Each layer has different functions. Lists of seven layers are given
below:
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
1) Physical layer:
The main functionality of the physical layer is to transmit the individual bits from one node to
another node.
It is the lowest layer of the OSI model.
It establishes, maintains a nd deactivates the physical connection.
It specifies the mechanical, electrical and procedural network interface specifications.
Functions of a Physical layer:
Line Configuration: It
defines the way how two or more devices can be connected
physically.
receiver t at is receiving.
h
o It identifies the address of the network layer protocol from the header.
Physical Addressing: The Data link layer adds a header to the frame that contains a
destination address. The
frame is transmitted to the destination address mentioned in the
header.
Flow Control: Flow control is the main functionality of the Data-link layer. It is the
technique through which the constant data rate is maintained on both the sides so that no
data
get corrupted. It ensures that the transmitting station such as a server with higher processing
speed does not exceed the receiving station, with lower processing speed.
Error Control: Error c
ontrol is achieved by adding a calculated value CRC (Cyclic
Redundancy Check) that is placed to the Data link layer's trailer which is added to the
message frame before it is sent to the physical layer. If any error seems to occur, then the
receiver sends the acknowledgment for the retransmission of the corrupted frames.
Access Control: When
two or more devices are connected to the same communication
channel, then the data link layer protocols are used to determine which device has control over
the link at a given time.
3) Network Layer:
It is a layer 3 that manages device addressing, tracks the location of devices on the network.
It determines the best path to move data from source to the destination based on the network
conditions, the priority of service and other factors.
The Data link layer is responsible for routing and forwarding the packets.
Routers are the layer 3 devices; they are specified in this layer and used to provide the routing
services within an internetwork.
The protocols used to route the network traffic are known as Network layer protocols.
Examples of protocols are IP and Ipv6.
Functions of Network Layer:
Internetworking: An internetworking is the main responsibility of the network layer. It
provides a logical connection between different devices.
Addressing: A Network layer adds the source and destination address to the header of
the frame. Addressing is used to identify the device on the internet.
Routing: Routing is the major component of the network layer, and it determines the
best optimal path out of the multiple paths from source to the destination.
Packetizing: A Network Layer receives the packets from the upper la er
y and converts them
into packets. This process is known as Packetizing. It is achieved by internet protocol (IP).
4) Transport Layer:
The Transport layer is a Layer 4 ensures that messages are transmitted in the order in which
they are sent and there is no duplication of data.
The main responsibility of the transport layer is to transfer the data completely.
It receives the data from the upper layer and converts them into smaller units known
as segments.
This layer can be termed as an end-to-end layer as it provides a point-to-point
connection between source and destination to deliver the data reliably.
The two protocols used in this layer are:
o Transmission Control Protocol:
o It is a standard protocol that allows the systems to communicate over the internet.
o It establishes and maintains a connection between hosts.
o When data is sent over the TCP connection, then the TCP protocol divides the data
into smaller units known as segments. Each segment travels over the internet using
multiple routes and they arrive in different orders at the destination. The
transmission control protocol reorders the packets in the correct order at the
receiving end.
o User Datagram Protocol:
o User Datagram Protocol is a transport layer protocol.
o It is an unreliable transport protocol as in this case receiver does not send any
acknowledgment when the packet is received, the sender does not wait for any
acknowledgment. Therefore, this makes a protocol unreliable.
Functions of Transport Layer:
Service-point addressing: Computers run several programs simultaneously due to this
reason, the transmission of data from source to the destination not only from one computer to
another computer but also from one process to another process. The transport layer adds the
header that contains the address known as a service-point address or port address. The
responsibility of the network layer is to transmit the data from one computer to another
computer and the responsibility of the transport layer is to transmit the message to the correct
process.
Segmentation and reassembly: When the transport layer receives the message from the
upper layer, it divides the message into multiple segments, and each segment is assigned with
a sequence number that uniquely identifies each segment. When the message has arrived at
the destination, then the transport layer reassembles the message based on their sequence
numbers.
Connection control: Transport layer provides two services Connection-oriented service and
connectionless service. A connectionless service treats each segment as an individual packet,
and they all travel in different routes to reach the destination. A connection-oriented service
makes a connection with the transport layer at the destination machine before delivering the
packets. In connection-oriented service, all the packets travel in the single route.
Flow control: The transport layer also responsible for flow control but it is performed end-to-
end rather than across a single link.
Error control: The tran sport layer is also responsible for Error control. Error control is
performed end-to-end rather than across the single link. The sender transport layer ensures
that message reach at the destination without any error.
5) Session Layer:
A Presentation layer is mainly concerned with the syntax and semantics of the
information exchanged between the two systems.
It acts as a data translator for a network.
This layer is a part of the operating system that converts the data from ne presentation format
o to another format.
The Presentation layer is also known as the syntax layer.
Functions of Presentation layer:
Translation: The processes in two systems exchange the information in the form of character
strings, numbers and so on. Different computers use different encoding methods,
the
presentation layer handles the interoperability between the different encoding methods. It
converts the data from sender-dependent format into a common format and changes the
common format into receiver-dependent format at the receiving end.
Encryption: Encryption is needed to maintain privacy. Encryption is a process of converting
the sender-transmitted information into another form and sends the resulting message over
the network.
Compression: Data co mpression is a process of compressing the data, i.e., it reduces the
number of bits to be transmitted. Data compression is very important in multimedia such as
text, audio, video.
7) Application Layer:
An application layer serves as a window for users and application processes to access
network service.
It handles issues such as network transparency, resource allocation, etc.
An application layer is not an application, but it performs the application layer functions.
This layer provides the network services to the end-users.
Functions of Application layer:
File transfer, access and management (FTAM): An application layer allows a user to
access the files in a rem ote computer, to retrieve the files from a computer and to manage the
files in a remote computer.
Mail services: An application layer provides the facility for email forwarding and storage.
Directory services: An application provides the distributed database sources and is used to
provide that global information about various objects.
TCP/IP Model:
1. The TCP/IP model was developed prior to the OSI model.
2. The TCP/IP model is not exactly similar to the OSI model.
3. The TCP/IP model consists of five layers: the application layer, transport layer, network layer,
data link layer and physical layer.
4. The first four layers provide physical standards, network interface, internetworking, and
transport functions that correspond to the first four layers of the OSI model and these four
layers are represented in TCP/IP model by a single layer called the appli ation layer.
5. TCP/IP is a hierarchical protocol made up of interactive modules, and each of them provides
specific functionality.
Here, hierarchical means that each upper-layer protocol is supported by two or more lower-level
protocols.
Internet Layer:
An internet layer is the second layer of the TCP/IP model.
An internet layer is also known as the network layer.
The main responsibility of the internet layer is to send the packets from any network and
they arrive at the destination irrespective of the route they take.
IP Protocol: IP protocol is used in this layer and it is the most significant part of the entire
TCP/IP suite.
IP Addressing: This protocol implements logical host addresses known as IP addresses. The IP
addresses are used by the internet and higher layers to identify the device and to provide
internetwork routing.
Host-to-host communication: It determines the path through which the data is to be
transmitted.
Data Encapsulation and Formatting: An IP protocol accepts the data from the transport layer
protocol. An IP protocol ensures that the data is sent and received securely; it encapsulates
the data into message known as IP datagram.
Fragmentation and Reassembly: The limit imposed on the size of the IP datagram by data
link layer protocol is known as Maximum Transmission unit (MTU). If the size of IP datagram
is greater than the MTU unit, then the IP protocol splits the datagram into smaller units so
that they can travel over the local network. Fragmentation can be done by the sender or
intermediate router. At the receiver side, all the fragments are reassembled to form an
original message.
Routing: When IP datagram is sent over the same local network such as LAN, MAN, WAN, it is
known as direct delivery. When source and destination are on the distant network, then the
IP datagram is sent indirectly. This can be accomplished by routing the IP datagram through
various devices such as routers.
ARP Protocol:
ICMP Protocol:
ICMP Test: ICMP Test is used to test whether the destination is reachable or not.
ICMP Reply: ICMP Reply is used to check whether the destination device is
responding or not.
The core responsibility of the ICMP protocol is to report the problems, not correct them. The
responsibility of the correction lies with the sender.
ICMP can send the messages only to the source, but not to the intermediate routers because
the IP datagram carries the addresses of the source and destination but not of the router
that it is passed to.
Transport Layer:
The transport layer is responsible for the reliability, flow control and correction of data which
is being sent over the network.
The two protocols used in the transport layer are User Datagram protocol and Transmission control
protocol.
Application Layer:
An application layer is the topmost layer in the TCP/IP model.
It is responsible for handling high-level protocols, issues of representation.
This layer allows the user to interact with the application.
When one application layer protocol wants to communicate with another application layer, it
forwards its data to the transport layer.
There is an ambiguity occurs in the application layer. Every application cannot be placed
inside the application layer except those who interact with the communication system.
For example: text editor cannot be considered in application layer while web browser
using HTTP protocol to interact with the network where HTTP protocol is an application
layer protocol.
Attenuation: Attenuation means the loss of energy, i.e., the strength of the signal decreases
with increasing the dista ce which causes the loss of energy.
n
Distortion: Distortion o curs when there is a change in the shape of the signal. This type of
c
distortion is examined from different signals having different frequencies. Each frequency
component has its own propagation speed, so they reach at a different time which leads to the
delay distortion.
Noise: When data is travelled over a transmission medium, some unwa nted signal is added to
it which creates the noise.
Classification of Transmission Media:
Category 4: It can su port upto 20Mbps. Therefore, it can be used for long-distance
p
communication.
Category 5: It can support upto 200Mbps.
Advantages of Unshielded Twisted Pair:
1. It is cheap.
2. Installation of the unshielded twisted pair is easy.
3. It can be used for high-speed LAN.
Disadvantage:
o This cable can only be used for shorter distances because of attenuation.
Shielded Twisted Pair:
A shielded twisted pair is a cable that contains the mesh surrounding the wire that allows the higher
transmission rate.
Characteristics of Shielded Twisted Pair:
The cost of the shielded twisted pair cable is not very high and not very low.
An installation of STP is easy.
It has higher capacity as compared to unshielded twisted pair cable.
It has a higher attenuation.
It is shielded that provides the higher data transmission rate.
Disadvantages:
It is more expensive as compared to UTP and coaxial cable.
It has a higher attenuation rate.
Coaxial Cable:
Coaxial cable is very commonly used transmission media, for example, TV wire is usually a
coaxial cable.
The name of the cable is coaxial as it contains two conductors parallel to each other.
It has a higher frequency as compared to Twisted pair cable.
The inner conductor of the coaxial cable is made up of copper, and the outer conductor is
made up of copper mesh. The middle core is made up of non-conductive cover that
separates the inner conductor from the outer conductor.
The middle core is responsible for the data transferring whereas the copper mesh prevents
from the EMI(Electromagnetic interference).
o The 'n' input lines are transmitted through a multiplexer and multiplexer combines the
signals to form a composite signal.
o The composite signal is passed through a Demultiplexer and demultiplexer separates a signal
to component signals and transfers them to their respective destinations.
Advantages of Multiplexing:
o More than one signal can be sent over a single medium.
o The bandwidth of a medium can be utilized effectively.
Multiplexing Techniques:
Multiplexing techniques can be classified as:
Advantages of FDM:
FDM is used for analog signals.
FDM process is very simple and easy modulation.
A Large number of signals can be sent through an FDM simultaneously.
It does not require any synchronization between sender and receiver.
Disadvantages of FDM:
FDM technique is used only when low-speed channels are required.
It suffers the problem of crosstalk.
A Large number of modulators are required.
It requires a high bandwidth channel.
Applications of FDM:
o FDM is commonly used in TV networks.
o It is used in FM and A
M broadcasting. Each FM radio station has diff rent frequencies, and
they are multiplexed to form a composite signal. The multiplexed signal is transmitted in the
air.
Wavelength Division Multiple x ing (WDM):
Wavelength Division Multiplexing is same as FDM except that the optical signals are
transmitted through the fibre optic cable.
WDM is used on fibre optics to increase the capacity of a single fibre.
It is used to utilize the high data rate capability of fibre optic cable.
It is an analog multiplexing technique.
Optical signals from different source are combined to form a wider band of light with the
help of multiplexer.
At the receiving end, demultiplexer separates the signals to transmit them to their respective
destinations.
Multiplexing and Demultiplexing can be achieved by using a prism.
Prism can perform a role of multiplexer by combining the various optical signals to form a
composite signal, and the composite signal is transmitted through a fibre optical
v a re erse operation, i.e., demultiplexing the signal.
cable. Prism also performs
In the above diagram, there are 4 devices, but only two devices are sending t he data, i.e., A and C.
Therefore, the data of A and C are only transmitted through the transmission line.
Frame of above diagram can be represented as:
The above figure shows that the data part contains the address to determine the source of the data.