Unit 1 CN
Unit 1 CN
Text Books:
1. “Data communications and networking” 5th edition, 2012, Behrouz A. Forouzan, TMH.
2. “Computer Networks”, 5th edition, 2010, Andrew S. Tanenbaum, Wetherall, Pearson.
Reference Books:
1. “Internetworking with TCP/IP – Principles, protocols, and architecture- Volume 1, Douglas
E. Comer, 5th edition, PHI
2. “Computer Networks”, 5E, Peterson, Davie, Elsevier.
3. “Introduction to Computer Networks and Cyber Security”, Chawan- Hwa Wu, Irwin, CRC
Publications.
4. “Computer Networks and Internets with Internet Applications”, Comer.
UNIT-1 COMPUTER NETWORKS(13A05601)
Network Criteria
A network must be able to meet a certain number of criteria. The most important of these
are performance, reliability, and security.
Performance
Performance can be measured in many ways, including transit time and response time.
Transit time is the amount of time required for a message to travel from one device to another.
Response time is the elapsed time between an inquiry and a response. The performance of a
network depends on a number of factors, including the number of users, the type of transmission
medium, the capabilities of the connected hardware, and the efficiency of the software.
Performance is often evaluated by two networking metrics: throughput and delay. We often need
more throughputs and less delay. However, these two criteria are often contradictory. If we try to
send more data to the network, we may increase throughput but we increase the delay because of
traffic congestion in the network.
Reliability
In addition to accuracy of delivery, network reliability is measured by the frequency of
failure, the time it takes a link to recover from a failure, and the network's robustness in a
catastrophe.
Security
Network security issues include protecting data from unauthorized access, protecting data
from damage and development, and implementing policies and procedures for recovery from
breaches and data losses.
Physical Structures
Before discussing networks, we need to define some network attributes.
Type of Connection
A network is two or more devices connected through links. A link is a communications
pathway that transfers data from one device to another. For visualization purposes, it is simplest
to imagine any link as a line drawn between two points. For communication to occur, two
devices must be connected in some way to the same link at the same time. There are two possible
types of connections: point-to-point and multipoint.
Point-to-Point
A point-to-point connection provides a dedicated link between two devices. The entire
capacity of the link is reserved for transmission between those two devices. Most point-to-point
connections use an actual length of wire or cable to connect the two ends, but other options, such
as microwave or satellite links, are also possible. When we change television channels by
infrared remote control, we are establishing a point-to-point connection between the remote
control and the television's control system.
Multipoint
A multipoint (also called multidrop) connection is one in which more than two specific
devices share a single link.
Networks Types:
LANs are restricted in size, which means that the worst-case transmission time is
bounded and known in advance. Knowing this bound makes it possible to use certain kinds of
designs that would not otherwise be possible. It also simplifies network management.
LANs may use a transmission technology consisting of a cable to which all the machines
are attached, like the telephone company party lines once used in rural areas. Traditional LANs
run at speeds of 10 Mbps to 100 Mbps, have low delay (microseconds or nanoseconds), and
make very few errors. Newer LANs operate at up to 10 Gbps Various topologies are possible for
broadcast LANs. Figure1 shows two of them. In a bus (i.e., a linear cable) network, at any instant
at most one machine is the master and is allowed to transmit. All other machines are required to
refrain from sending. An arbitration mechanism is needed to resolve conflicts when two or more
machines want to transmit simultaneously. The arbitration mechanism may be centralized or
distributed. IEEE 802.3,popularly called Ethernet, for example, is a bus-based broadcast network
with decentralized control, usually operating at 10 Mbps to 10 Gbps. Computers on an Ethernet
can transmit whenever they want to; if two or more packets collide, each computer just waits a
random time and tries again later.
A second type of broadcast system is the ring. In a ring, each bit propagates around on
its own, not waiting for the rest of the packet to which it belongs. Typically, each bit
circumnavigates the entire ring in the time it takes to transmit a few bits, often before the
complete packet has even been transmitted. As with all other broadcast systems, some rule is
needed for arbitrating simultaneous accesses to the ring. Various methods, such as having the
machines take turns, are in use. IEEE 802.5 (the IBM token ring), is a ring-based LAN operating
at 4 and 16 Mbps. FDDI is another example of a ring network.
Bus Topology
A bus topology is easy to install but is not flexible i.e., it is difficult to add a new node
to bus. In addition to this the bus stops functioning even if a portion of the bus breaks down.
It is also very difficult to isolate fault.
2. Ring Topology:
In ring topology, the computers are connected in the form of a ring. Each node has
exactly two adjacent neighbors. To send data to a distant node on a ring it passes through
many intermediate nodes to reach to its ultimate destination.
Ring Topology
A ring topology is as to install and reconfigure. In this topology, fault isolation is easy
because a signal that circulates all the time in a ring helps in identifying a faulty node.
The data transmission takes place in only one direction. When a node fails in ring, it breaks
down the whole ring. To overcome this drawback some ring topologies use dual rings.
The topology is not useful to connect large number of computers.
3. Star Topology:
In star topology all the nodes are connected to a central node called a hub. A node that
wants to send some six data to some other node on the network, send data to a hub which in
turn sends it the destination node. A hub plays a major role in such networks.
Star topology
Star topology is easy to install and reconfigure. If a link fails then it separates the node
connected to link from the network and the network continues to function. However, if the
hub goes down, the entire network collapses.
4. Tree Topology:
Tree topology is a hierarchy of various hubs. The entire nodes are connected to one hub
or the other. There is a central hub to which only a few nodes are connected directly.
The central hub, also called active hub, looks at the incoming bits and regenerates them
so that they can traverse over longer distances. The secondary hubs in tree topology may be
active hubs or passive hubs. The failure of a transmission line separates a node from the
network.
5. Mesh Topology:
A mesh topology is also called complete topology. In this topology, each node is
connected directly to every oilier node in the network. That is if there are n nodes then there
would be n(n — 1)/2 physical links in the network.
Mesh Topology
As there are dedicated links, the topology does not have congestion problems. Further it does not
need a special Media Access Control (MAC) protocol to prevent simultaneous access to the
transmission media since links are dedicated, not shared. The topology also provides data
security.
The network can continue to function even in the failure of one of the links. Fault identification
is also easy. The main disadvantage of mesh topology is the complexity of the network and the
cost associated with the cable length. The mesh topology is not useful for medium to large
networks.
6. Hybrid Topology:
Hybrid topology is formed by connecting two or more topologies together. For example,
hybrid topology can be created by using the bus, star and ring topologies,
PROTOCOL LAYERING
We defined the term protocol in Chapter 1. In data communication and networking,
aprotocol defines the rules that both the sender and receiver and all intermediate devices need to
follow to be able to communicate effectively. When communication is simple, we may need only
one simple protocol; when the communication is complex, we may need to divide the task
between different layers, in which case we need a protocol at each layer, or protocol layering.
Scenarios
Let us develop two simple scenarios to better understand the need for protocol layering.
First Scenario
In the first scenario, communication is so simple that it can occur in only one layer.
Assume Maria and Ann are neighbors with a lot of common ideas. Communication between
Maria and Ann takes place in one layer, face to face, in the same language, as shown in
Figure.
Even in this simple scenario, we can see that a set of rules needs to be followed. First,
Maria and Ann know that they should greet each other when they meet. Second, they know that
they should confine their vocabulary to the level of their friendship. Third, each party knows that
she should refrain from speaking when the other party is speaking. Fourth, each party knows that
the conversation should be a dialog, not a monolog: both should have the opportunity to talk
about the issue. Fifth, they should exchange some nice words when they leave. We can see that
the protocol used by Maria and Ann is different from the communication between a professor
and the students in a lecture hall. The communication in the second case is mostly monolog; the
professor talks most of the time unless a student has a question, a situation in which the protocol
dictates that she should raise her hand and wait for permission to speak. In this case, the
communication is normally very formal and limited to the subject being taught.
Second Scenario
In the second scenario, we assume that Ann is offered a higher-level position in her
company, but needs to move to another branch located in a city very far from Maria. The two
friends still want to continue their communication and exchange ideas because they have come
up with an innovative project to start a new business when they both retire. They decide to
continue their conversation using regular mail through the post office. However, they do not
want their ideas to be revealed by other people if the letters are intercepted. They agree on an
encryption/decryption technique. The sender of the letter encrypts it to make it unreadable by an
intruder; the receiver of the letter decrypts it to get the original letter. We discuss the
encryption/decryption methods in but for the moment we assume that Maria and Ann use one
technique that makes it hard to decrypt the letter if one does not have the key for doing so. Now
we can say that the communication between Maria and Ann takes place in three layers, as shown
in Figure. We assume that Ann and Maria each have three machines (or robots) that can perform
the task at each layer.
Principles of Protocol Layering
Let us discuss two principles of protocol layering.
First Principle
The first principle dictates that if we want bidirectional communication, we need to make
each layer so that it is able to perform two opposite tasks, one in each direction. For example, the
third layer task is to listen (in one direction) and talk (in the other direction). The second layer
needs to be able to encrypt and decrypt. The first layer needs to send and receive mail.
Second Principle
The second principle that we need to follow in protocol layering is that the two objects
under each layer at both sites should be identical. For example, the object under layer 3 at both
sites should be a plaintext letter. both sites should be a cipher text letter. The object under layer 1
at both sites should be a piece of mail.
Logical Connections
After following the above two principles, we can think about logical connection between
each layer as shown in below figure. This means that we have layer-to-layer communication.
Maria and Ann can think that there is a logical (imaginary) connection at each layer through
which they can send the object created from that layer. We will see that the concept of logical
connection will help us better understand the task of layering. We encounter in data
communication and networking.
TCP/IP PROTOCOL SUITE
Now that we know about the concept of protocol layering and the logical communication
between layers in our second scenario, we can introduce the TCP/IP (Transmission Control
Protocol/Internet Protocol). TCP/IP is a protocol suite (a set of protocols organized in different
layers) used in the Internet today. It is a hierarchical protocol made up of interactive modules,
each of which provides a specific functionality. The term hierarchical means that each upper
level protocol is supported by the services provided by one or more lower level protocols. The
original TCP/IP protocol suite was defined as four software layers built upon the hardware.
Today, however, TCP/IP is thought of as a five-layer model. Following figure shows both
configurations.
Layered Architecture
To show how the layers in the TCP/IP protocol suite are involved in communication
between two hosts, we assume that we want to use the suite in a small internet made up of three
LANs (links), each with a link-layer switch. We also assume that the links are connected by one
router, as shown in below Figure.
In other words, the domain of duty of the top three layers is the internet, and the domain of duty
of the two lower layers is the link. Another way of thinking of the logical connections is to think
about the data unit created from each layer. In the top three layers, the data unit (packets) should
not be changed by any router or link-layer switch. In the bottom two layers, the packet created by
the host is changed only by the routers, not by the link-layer switches. Below figure shows the
second principle discussed previously for protocol layering. We show the identical objects below
each layer related to each device.
Note that, although the logical connection at the network layer is between the two hosts, we can
only say that identical objects exist between two hops in this case because a router may fragment
the packet at the network layer and send more packets than received . Note that the link between
two hops does not change the object.
Internet Layer:
This layer, called the internet layer, is the linchpin that holds the whole architecture
together. Its job is to permit hosts to inject packets into any network and have they travel
independently to the destination (potentially on a different network). They may even arrive in
a different order than they were sent, in which case it is the job of higher layers to rearrange
them, if in-order delivery is desired. Note that ''internet'' is used here in a generic sense, even
though this layer is present in the Internet.
The internet layer defines an official packet format and protocol called IP (Internet Protocol).
The job of the internet layer is to deliver IP packets where they are supposed to go. Packet
routing is clearly the major issue here, as is avoiding congestion. For these reasons, it is
reasonable to say that the TCP/IP internet layer is similar in functionality to the OSI network
layer.
The Transport Layer:
The layer above the internet layer in the TCP/IP model is now usually called the transport
layer. It is designed to allow peer entities on the source and destination hosts to carry on a
conversation, just as in the OSI transport layer. Two end-to-end transport protocols have been
defined here. The first one, TCP (Transmission Control Protocol), is a reliable connection-
oriented protocol that allows a byte stream originating on one machine to be delivered without
error on any other machine in the internet. It fragments the incoming byte stream into discrete
messages and passes each one on to the internet layer. At the destination, the receiving TCP
process reassembles the received messages into the output stream. TCP also handles flow control
to make sure a fast sender cannot swamp a slow receiver with more messages than it can handle..
The second protocol in this layer, UDP (User Datagram Protocol), is an
unreliable,connectionless protocol for applications that do not want TCP's sequencing or flow
control and wish to provide their own. It is also widely used for one-shot, client-server-type
requestreply queries and applications in which prompt delivery is more important than accurate
delivery, such as transmitting speech or video. The relation of IP, TCP, and UDP is shown.
Application layer:
The TCP/IP model does not have session or presentation layers.On top of the transport
layer is the application layer. It contains all the higher-level protocols. The early ones included
virtual terminal (TELNET), file transfer (FTP), and electronic mail (SMTP), as shown in Fig.6.2.
The virtual terminal protocol allows a user on one machine to log onto a distant machine and
work there. The file transfer protocol provides a way to move data efficiently from one machine
to another. Electronic mail was originally just a kind of file transfer, but later a specialized
protocol (SMTP) was developed for it.
Many other protocols have been added to these over the years: the Domain Name System (DNS)
for mapping host names onto their network addresses, NNTP, the protocol for moving USENET
news articles around, and HTTP, the protocol for fetching pages on the World Wide Web, and
many others.
Comparison of the OSI and TCP/IP Reference Models:
The OSI and TCP/IP reference models have much in common. Both are based on the
concept of a stack of independent protocols. Also, the functionality of the layers is roughly
similar. For example, in both models the layers up through and including the transport layer are
there to provide an end-to-end, network-independent transport service to processes wishing to
communicate. These layers form the transport provider. Again in both models, the layers above
transport are application-oriented users of the transport service.
Despite these fundamental similarities, the two models also have many differences
Three concepts are central to the OSI model:
1.Services.
2. Interfaces.
3. Protocols.
Probably the biggest contribution of the OSI model is to make the distinction between these three
concepts explicit. Each layer performs some services for the layer above it. The service
definition tells what the layer does, not how entities above it access it or how the layer works. It
defines the layer's semantics.
A layer's interface tells the processes above it how to access it. It specifies what the parameters
are and what results to expect. It, too, says nothing about how the layer works inside. Finally, the
peer protocols used in a layer are the layer's own business. It can use any protocols it wants to, as
long as it gets the job done (i.e., provides the offered services). It can also change them at will
without affecting software in higher layers.
The TCP/IP model did not originally clearly distinguish between service, interface, and protocol,
although people have tried to retrofit it after the fact to make it more OSI-like. For example, the
only real services offered by the internet layer are SEND IP PACKET and RECEIVE IP
PACKET.
As a consequence, the protocols in the OSI model are better hidden than in the TCP/IP model
and can be replaced relatively easily as the technology changes. Being able to make such
changes is one of the main purposes of having layered protocols in the first place.
The OSI reference model was devised before the corresponding protocols were invented. This
ordering means that the model was not biased toward one particular set of protocols, a fact that
made it quite general. The downside of this ordering is that the designers did not have much
experience with the subject and did not have a good idea of which functionality to put in which
layer.
Another difference is in the area of connectionless versus connection-oriented communication.
The OSI model supports both connectionless and connection-oriented communication in the
network layer, but only connection-oriented communication in the transport layer, where it
counts (because the transport service is visible to the users). The TCP/IP model has only one
mode in the network layer (connectionless) but supports both modes in the transport layer, giving
the users a choice. This choice is especially important for
simple request-response protocols.
2. Bad Technology:
The second reason that OSI never caught on is that both the model and the protocols are
flawed. The choice of seven layers was more political than technical, and two of the layers
(session and presentation) are nearly empty, whereas two other ones (data link and network) are
overfull.
The OSI model, along with the associated service definitions and protocols, is extraordinarily
complex. When piled up, the printed standards occupy a significant fraction of a meter of paper.
They are also difficult to implement and inefficient in operation. In addition to being
incomprehensible, another problem with OSI is that some functions, such as addressing, flow
control, and error control, reappear again and again in each layer.
3. Bad Implementations:
Given the enormous complexity of the model and the protocols, it will come as no
surprise that the initial implementations were huge, unwieldy, and slow. Everyone who tried
them got burned. It did not take long for people to associate ''OSI'' with ''poor quality.'' Although
the products improved in the course of time, the image stuck.
4. Bad Politics:
On account of the initial implementation, many people, especially in academia, thought
of TCP/IP as part of UNIX, and UNIX in the 1980s in academia was not unlike parenthood (then
incorrectly called motherhood) and apple pie. OSI, on the other hand, was widely thought to be
the creature of the European telecommunication ministries, the European Community, and later
the U.S. Government. This belief was only partly true, but the very idea of a bunch of
government bureaucrats trying to shove a technically inferior standard down the throats of the
poor researchers and programmers down in the trenches actually developing computer networks
did not help much. Some people viewed this development in the same light as IBM announcing
in the 1960s that PL/I was the language of the future, or DoD correcting this later by announcing
that it was actually Ada.
INTERNET HISTORY
Now that we have given an overview of the Internet, let us give a brief history of the
internet. This brief history makes it clear how the Internet has evolved from a private network to
a global one in less than 40 years.
Early History
There were some communication networks, such as telegraph and telephone networks,
before 1960. These networks were suitable for constant-rate communication at that time, which
means that after a connection was made between two users, the encoded message (telegraphy) or
voice (telephony) could be exchanged.
ARPANET
In the mid-1960s, mainframe computers in research organizations were stand-alone
devices. Computers from different manufacturers were unable to communicate with one another.
The Advanced Research Projects Agency (ARPA) in the Department of Defense (DOD) was
interested in finding a way to connect computers so that the researchers they funded could share
their findings, thereby reducing costs and eliminating duplication of effort. In 1967, at an
Association for Computing Machinery (ACM) meeting, ARPA presented its ideas for the
Advanced Research Projects Agency Network (ARPANET), a small network of connected
computers. The idea was that each host computer (not necessarily from the same manufacturer)
would be attached to a specialized computer, called an interface message processor (IMP). The
IMPs, in turn, would be connected to each other. Each IMP had to be able to communicate with
other IMPs as well as with its own attached host.
Birth of the Internet
In 1972, Vint Cerf and Bob Kahn, both of whom were part of the core ARPANET group,
collaborated on what they called the Internet ting Project. TCPI/P Cerf and Kahn's landmark
1973 paper outlined the protocols to achieve end-to-end delivery of data. This was a new version
of NCP. This paper on transmission control protocol (TCP) included concepts such as
encapsulation, the datagram, and the functions of a gateway. Transmission Control Protocol
(TCP) and Internet Protocol (IP). IP would handle datagram routing while TCP would be
responsible for higher level functions such as segmentation, reassembly, and error detection. The
new combination became known as TCPIIP.
MILNET
In 1983, ARPANET split into two networks: Military Network (MILNET) for military
users and ARPANET for non military users.
CSNET
Another milestone in Internet history was the creation of CSNET in 1981. Computer
Science Network (CSNET) was a network sponsored by the National Science Foundation (NSF).
NSFNET
With the success of CSNET, the NSF in 1986 sponsored the National Science Foundation
Network (NSFNET), a backbone that connected five supercomputer centers located throughout
the United States.
ANSNET
In 1991, the U.S. government decided that NSFNET was not capable of supporting the
rapidly increasing Internet traffic. Three companies, IBM, Merit, and Verizon, filled the void by
forming a nonprofit organization called Advanced Network & Services (ANS) to build a new,
high-speed Internet backbone called Advanced Network Services Network (ANSNET).
Internet Today
Today, we witness a rapid growth both in the infrastructure and new applications. The
Internet today is a set of pier networks that provide services to the whole world. What has made
the internet so popular is the invention of new applications.
Draft Standard. A proposed standard is elevated to draft standard status after at least two
successful independent and interoperable implementations. Barring difficulties, a draft standard,
with modifications if specific problems are encountered, normally becomes an Internet standard.
Internet Standard. A draft standard reaches Internet standard status after demonstrations
of successful implementation.
Historic The historic RFCs are significant from a historical perspective. They either have been
superseded by later specifications or have never passed the necessary maturity levels to become
an Internet standard.
Experimental An RFC classified as experimental describes work related to an experimental
situation that does not affect the operation of the Internet. Such an RFC should not be
implemented in any functional Internet service.
Informational An RFC classified as informational contains general, historical, or tutorial
information related to the Internet. It is usually written by someone in a non-Internet
organization, such as a vendor.
Requirement Levels
RFCs are classified into five requirement levels: required, recommended, elective, limited use,
and not recommended.
Required An RFC is labeled required if it must be implemented by all Internets systems to
achieve minimum conformance. For example, IF and ICMP are required protocols.
Recommended An RFC labeled recommended is not required for minimum conformance; it is
recommended because of its usefulness. For example, FTP and TELNET are recommended
protocols.
Elective An RFC labeled elective is not required and not recommended. However, a system can
use it for its own benefit.
Limited Use An RFC labeled limited use should be used only in limited situations. Most of the
experimental RFCs fall under this category.
Not Recommended An RFC labeled not recommended is inappropriate for general use. Normally
a historic (deprecated) RFC may fall under this category.
INTERNET ADMINISTRATION
The Internet, with its roots primarily in the research domain, has evolved and gained a
broader user base with significant commercial activity. Various groups that coordinate Internet
issues have guided this growth and development. Appendix G gives the addresses, e-rnail
addresses, and telephone numbers for some of these groups. Shows the general organization of
Internet administration. E-rnail addresses and telephone numbers for some of these groups.
Below figure
shows the general organization of Internet administration.
Isoc
The Internet Society (ISOC) is an international, nonprofit organization formed in 1992 to
provide support for the Internet standards process. ISOC accomplishes this through maintaining
and supporting other Internet administrative bodies such as lAB, IETF,IRTF, and IANA (see the
following sections). ISOC also promotes research and other scholarly activities relating to the
Internet.
lAB
The Internet Architecture Board (lAB) is the technical advisor to the ISOC. The main
purposes of the lAB are to oversee the continuing development of the TCP/IP Protocol Suite and
to serve in a technical advisory capacity to research members of the Internet community. lAB
accomplishes this through its two primary components, the Internet Engineering Task Force
(IETF) and the Internet Research Task Force (IRTF). Another responsibility of the lAB is the
editorial management of the RFCs, described earlier. lAB is also the external liaison between the
Internet and other standards organizations and forums.
JETF
The Internet Engineering Task Force (IETF) is a forum of working groups managed by
the Internet Engineering Steering Group (IESG). IETF is responsible for identifying operational
problems and proposing solutions to these problems. IETF also develops and reviews
specifications intended as Internet standards. The working groups are collected into areas, and
each area concentrates on a specific topic. Currently nine areas have been defined. The areas
include applications, protocols, routing, network management next generation (lPng), and
security.
JRTF
The Internet Research Task Force (IRTF) is a forum of working groups managed by the
Internet Research Steering Group (IRSG). IRTF focuses on long-term research topics related to
Internet protocols, applications, architecture, and technology.
COMPARISION OF OSI AND TCP/IP REFERENCE MODEL
When we compare the two models, we find that two layers, session and presentation, are
missing from the TCP/IP protocol suite. These two layers were not added to the TCP/IP protocol
suite after the publication of the OSI model. The application layer in the suite is usually
considered to be the combination of three layers in the OSI model.
Two reasons were mentioned for this decision. First, TCP/IP has more than one
transport-layer protocol. Some of the functionalities of the session layer are available in some of
the transport-layer protocols. Second, the application layer is not only one piece of software.
Many Applications can be developed at this layer. If some of the functionalities mentioned in the
session and presentation layers are needed for a particular application, they can be included in
the development of that piece of software.
Lack of OSI Model's Success
The OSI model appeared after the TCP/IP protocol suite. Most experts were at first
excited and thought that the TCP/IP protocol would be fully replaced by the OSI model. This did
not happen for several reasons, but we describe only three, which are agreed upon by all experts
in the field. First, OSI was completed when TCP/IP was fully in place and a lot of time and
money had been spent on the suite; changing it would cost a lot. Second, some layers in the OSI
model were never fully defined. For example, although the services provided by the presentation
and the session layers were listed in the document, actual protocols for these two layers were not
fully defined, nor were they fully described, and the corresponding software was not fully
developed. Third, when OSI was implemented by an organization in a different application, it
did not show a high enough level of performance to entice the Internet authority to switch from
the TCP/IP protocol suite to the OSI model.
PHYSICAL LAYER
One of the major functions of the physical layer is to move data in the form of
electromagnetic signals across a transmission medium. Whether you are collecting numerical
statistics from another computer, sending animated pictures from a design workstation, or
causing a bell to ring at a distant control center, you are working with the transmission of data
across network connections. Generally, the data usable to a person or application are not in a
form that can be transmitted over a network. For example, a photograph must first be changed to
a form that transmission media can accept. Transmission media work by conducting energy
along a physical path. For transmission, data needs to be changed to signals.
COMPUTER NETWORK SECURITY
During initial days of internet, its use was limited to military and universities for research
and development purpose. Later when all networks merged together and formed internet, the
data used to travel through public transit network. Common people may send the data that can be
highly sensitive such as their bank credentials, username and passwords, personal documents,
online shopping details, or confidential documents.
All security threats are intentional i.e. they occur only if intentionally triggered. Security threats
can be divided into the following categories:
Interruption
Interruption is a security threat in which availability of resources is attacked. For
example, a user is unable to access its web-server or the web-server is hijacked.
Privacy-Breach
In this threat, the privacy of a user is compromised. Someone, who is not the authorized
person is accessing or intercepting data sent or received by the original authenticated user.
Integrity
This type of threat includes any alteration or modification in the original context of
communication. The attacker intercepts and receives the data sent by the sender and the attacker
then either modifies or generates false data and sends to the receiver. The receiver receives the
data assuming that it is being sent by the original Sender.
Authenticity
This threat occurs when an attacker or a security violator poses as a genuine person and
accesses the resources or communicates with other genuine users.
No technique in the present world can provide 100% security. But steps can be taken to secure
data while it travels in unsecured network or internet. The most widely used technique is
Cryptography.
Signals
When data is sent over physical medium, it needs to be first converted into
electromagnetic signals. Data itself can be analog such as human voice, or digital such as file on
the disk. Both analog and digital data can be represented in digital or analog signals.
Digital Signals
Digital signals are discrete in nature and represent sequence of voltage pulses. Digital
signals are used within the circuitry of a computer system.
Analog Signals
Analog signals are in continuous wave form in nature and represented by continuous
electromagnetic waves.
Transmission Impairment
When signals travel through the medium, they tend to deteriorate. This may have many
reasons as given:
Attenuation
For the receiver to interpret the data accurately, the signal must be sufficiently strong. When the
signal passes through the medium, it tends to get weaker. As it covers distance, it loses strength.
Dispersion
As signal travels through the media, it tends to spread and overlaps. The amount of
dispersion depends upon the frequency used.
Delay distortion
Signals are sent over media with pre-defined speed and frequency. If the signal speed and
frequency do not match, there are possibilities that signal reaches destination in arbitrary fashion.
In digital media, this is very critical that some bits reach earlier than the previously sent ones.
Noise
Random disturbance or fluctuation in analog or digital signal is said to be Noise in signal,
which may distort the actual information being carried. Noise can be characterized in one of the
following class:
Thermal Noise
Heat agitates the electronic conductors of a medium which may introduce noise in the
media. Up to a certain level, thermal noise is unavoidable.
Intermodulation
When multiple frequencies share a medium, their interference can cause noise in the
medium. Intermodulation noise occurs if two different frequencies are sharing a medium and one
of them has excessive strength or the component itself is not functioning properly, then the
resultant frequency may not be delivered as expected.
Crosstalk
This sort of noise happens when a foreign signal enters into the media. This is because
signal in one medium affects the signal of second medium.
Impulse
This noise is introduced because of irregular disturbances such as lightening, electricity,
short-circuit, or faulty components. Digital data is mostly affected by this sort of noise.
Channel Capacity
The speed of transmission of information is said to be the channel capacity. We count it
as data rate in digital world. It depends on numerous factors such as:
Bandwidth: The physical limitation of underlying media.
Error-rate: Incorrect reception of information because of noise.
Encoding: The number of levels used for signaling.
Multiplexing
Multiplexing is a technique to mix and send multiple data streams over a single medium.
This technique requires system hardware called multiplexer (MUX) for multiplexing the streams
and sending them on a medium, and de-multiplexer (DMUX) which takes information from the
medium and distributes to different destinations.
Switching
Switching is a mechanism by which data/information sent from source towards
destination which are not directly connected. Networks have interconnecting devices, which
receives data from directly connected sources, stores data, analyze it and then forwards to the
next interconnecting device closest to the destination.
Switching can be categorized as:
DIGITAL TRANSMISSION
Data or information can be stored in two ways, analog and digital. For a computer to use
the data, it must be in discrete digital form. Similar to data, signals can also be in analog and
digital form. To transmit data digitally, it needs to be first converted to digital form.
Digital-to-Digital Conversion
This section explains how to convert digital data into digital signals. It can be done in two
ways, line coding and block coding. For all communications, line coding is necessary whereas
block coding is optional.
Line Coding
The process for converting digital data into digital signal is said to be Line Coding.
Digital data is found in binary format. It is represented (stored) internally as series of 1s and 0s.
Digital signal is denoted by discreet signal, which represents digital data. There are three types of
line coding schemes available:
Unipolar Encoding
Unipolar encoding schemes use single voltage level to represent data. In this case, to
represent binary 1, high voltage is transmitted and to represent 0, no voltage is transmitted. It is
also called Unipolar-Non-return-to-zero, because there is no rest condition i.e. it either represents
1 or 0.
Polar Encoding
Polar encoding scheme uses multiple voltage levels to represent binary values. Polar
encodings is available in four types:
NRZ-L changes voltage level at when a different bit is encountered whereas NRZ-I changes
voltage when a 1 is encountered.
Return to Zero (RZ)
Problem with NRZ is that the receiver cannot conclude when a bit ended and when the next bit is
started, in case when sender and receiver’s clock are not synchronized.
RZ uses three voltage levels, positive voltage to represent 1, negative voltage to represent 0 and
zero voltage for none. Signals change during bits not between bits.
Manchester
This encoding scheme is a combination of RZ and NRZ-L. Bit time is divided into two halves. It
transits in the middle of the bit and changes phase when a different bit is encountered.
Differential Manchester
This encoding scheme is a combination of RZ and NRZ-I. It also transits at the middle of
the bit but changes phase only when 1 is encountered.
Bipolar Encoding
Bipolar encoding uses three voltage levels, positive, negative, and zero. Zero voltage
represents binary 0 and bit 1 is represented by altering positive and negative voltages.
Block Coding
To ensure accuracy of the received data frame, redundant bits are used. For example, in
even-parity, one parity bit is added to make the count of 1s in the frame even. This way the
original number of bits is increased. It is called Block Coding.
Block coding is represented by slash notation, mB/nB. Means, m-bit block is substituted with n-
bit block where n > m. Block coding involves three steps:
1. Division
2. Substitution
3. Combination.
Analog-to-Digital Conversion
Microphones create analog voice and camera creates analog videos, which are treated is analog
data. To transmit this analog data over digital signals, we need analog to digital conversion.
Analog data is a continuous stream of data in the wave form whereas digital data is discrete. To
convert analog wave into digital data, we use Pulse Code Modulation (PCM).
PCM is one of the most commonly used method to convert analog data into digital form. It
involves three steps:
Sampling
Quantization
Encoding.
Sampling
The analog signal is sampled every T interval. Most important factor in sampling is the
rate at which analog signal is sampled. According to Nyquist Theorem, the sampling rate must
be at least two times of the highest frequency of the signal.
Quantization:
Sampling yields discrete form of continuous analog signal. Every discrete pattern shows
the amplitude of the analog signal at that instance. The quantization is done between the
maximum amplitude value and the minimum amplitude value. Quantization is approximation of
the instantaneous analog value.
Enoding:
Transmission Modes
The transmission mode decides how data is transmitted between two computers. The
binary data in the form of 1s and 0s can be sent in two different modes: Parallel and Serial.
Parallel Transmission
The binary bits are organized into groups of fixed length. Both sender and receiver are connected
in parallel with the equal number of data lines. Both computers distinguish between high order
and low order data lines. The sender sends all the bits at once on all lines. Because the data lines
are equal to the number of bits in a group or data frame, a complete group of bits (data frame) is
sent in one go. Advantage of Parallel transmission is high speed and disadvantage is the cost of
wires, as it is equal to the number of bits sent in parallel.
Serial Transmission
In serial transmission, bits are sent one after another in a queue manner. Serial
transmission requires only one communication channel. Serial transmission can be either
asynchronous or synchronous.
ANALOG TRANSMISSION
To send the digital data over an analog media, it needs to be converted into analog signal.
There can be two cases according to data formatting.
Bandpass: The filters are used to filter and pass frequencies of interest. A bandpass is a band of
frequencies which can pass the filter.
Low-pass: Low-pass is a filter that passes low frequencies signals.
When digital data is converted into a bandpass analog signal, it is called digital-to-analog
conversion. When low-pass analog signal is converted into bandpass analog signal, it is called
analog-to-analog conversion.
Digital-to-Analog Conversion
When data from one computer is sent to another via some analog carrier, it is first
converted into analog signals. Analog signals are modified to reflect digital data.
An analog signal is characterized by its amplitude, frequency, and phase. There are three kinds of
digital-to-analog conversions:
When binary data represents digit 1, the amplitude is held; otherwise it is set to 0. Both
frequency and phase remain same as in the original carrier signal.
Frequency Shift Keying:In this conversion technique, the frequency of the analog carrier signal
is modified to reflect binary data
.
This technique uses two frequencies, f1 and f2. One of them, for example f1, is chosen to
represent binary digit 1 and the other one is used to represent binary digit 0. Both amplitude and
phase of the carrier wave are kept intact.
Phase Shift Keying
In this conversion scheme, the phase of the original carrier signal is altered to reflect the
binary data.
When a new binary symbol is encountered, the phase of the signal is altered. Amplitude
and frequency of the original carrier signal is kept intact.
Quadrature Phase Shift Keying
QPSK alters the phase to reflect two binary digits at once. This is done in two different
phases. The main stream of binary data is divided equally into two sub-streams. The serial data is
converted in to parallel in both sub-streams and then each stream is converted to digital signal
using NRZ technique. Later, both the digital signals are merged together.
Analog-to-Analog Conversion
Analog signals are modified to represent analog data. This conversion is also known as
Analog Modulation. Analog modulation is required when bandpass is used. Analog to analog
conversion can be done in three ways:
Amplitude Modulation :In this modulation, the amplitude of the carrier signal is modified to
reflect the analog data.
Amplitude modulation is implemented by means of a multiplier. The amplitude of modulating
signal (analog data) is multiplied by the amplitude of carrier frequency, which then reflects
analog data. The frequency and phase of carrier signal remain unchanged.
Frequency Modulation
In this modulation technique, the frequency of the carrier signal is modified to reflect the
change in the voltage levels of the modulating signal (analog data).
The amplitude and phase of the carrier signal are not altered.
Phase Modulation
In the modulation technique, the phase of carrier signal is modulated in order to reflect
the change in voltage (amplitude) of analog data signal.
TRANSMISSION MEDIA
Transmission media are actually located below the physical layer and are directly
controlled by the physical layer. We could say that transmission media belong to layer zero.
Below figure shows the position of transmission media in relation to the physical layer.
In telecommunications, transmission media can be divided into two broad categories:
guided and unguided. Guided media include twisted-pair cable, coaxial cable, and fiber-optic
cable. Unguided medium is free space.
GUIDED MEDIA
Guided media, which are those that provide a conduit from one device to another, include
twisted-pair cable, coaxial cable, and fiber-optic cable. A signal traveling along any of these
media is directed and contained by the physical limits of the medium. Twisted-pair and coaxial
cable use metallic (copper) conductors that accept and transport signals in the form of electric
current. Optical fiber is a cable that accepts and transports signals in the form of light.
Twisted-Pair Cable
A twisted pair consists of two conductors (normally copper), each with its own plastic
insulation, twisted together, as shown in following figure.
One of the wires is used to carry signals to the receiver, and the other is used only as a ground
reference. The receiver uses the difference between the two.In addition to the signal sent by the
sender on one of the wires, interference (noise) and crosstalk may affect both wires and create
unwanted signals. If the two wires are parallel, the effect of these unwanted signals is not the
same in both wires because they are at different locations relative to the noise or crosstalk
sources (e.g., one is closer and the other is farther). This results in a difference at the receiver. By
twisting the pairs, a balance is maintained. For example, suppose in one twist, one wire is closer
to the noise source and the other is farther; in the next twist, the reverse is true. Twisting makes it
probable that both wires are equally affected by external influences (noise or crosstalk). This
means that the receiver, which calculates the difference between the two, receives no unwanted
signals. The unwanted signals are mostly canceled out. From the above discussion, it is clear that
the number of twists per unit of length (e.g., inch) has some effect on the quality of the cable.
Unshielded Versus Shielded Twisted-Pair Cable
The most common twisted-pair cable used in communications is referred to as unshielded
twisted-pair (UTP). IBM has also produced a version of twisted-pair cable for its use, called
shielded twisted-pair (STP). STP cable has a metal foil or braided mesh covering that encases
each pair of insulated conductors. Although metal casing improves the quality of cable by
preventing the penetration of noise or crosstalk, it is bulkier and more expensive. Below figure
Categories
The Electronic Industries Association (EIA) has developed standards to classify unshielded
twisted-pair cable into seven categories. Categories are determined by cable quality, with 1 as the
lowest and 7 as the highest. Each EIA category is suitable for specific uses. Table below shows
these categories.
Connectors
The most common UTP connector is RJ45 (RJ stands for registered jack), as shown in
below figure. The RJ45 is a keyed connector, meaning the connector can be inserted in only one
way.
Performance
One way to measure the performance of twisted-pair cable is to compare attenuation
versus frequency and distance. A twisted-pair cable can pass a wide range of frequencies.
However, below figure shows that with increasing frequency, the attenuation, measured in
decibels per kilometer (dB/km), sharply increases with frequencies above 100 kHz. Note that
gauge is a measure of the thickness of the wire.
Applications
Twisted-pair cables are used in telephone lines to provide voice and data channels. The
local loop-the line that connects subscribers to the central telephone office commonly consists of
unshielded twisted-pair cables.
The DSL lines that are used by the telephone companies to provide high-data-rate connections
also use the high-bandwidth capability of unshielded twisted-pair cables.
Local-area networks, such as lOBase-T and lOOBase-T, also use twisted-pair cables.
Coaxial Cable
Coaxial cable (or coax) carries signals of higher frequency ranges than those in twisted
pair cable, in part because the two media are constructed quite differently. Instead of having two
wires, coax has a central core conductor of solid or stranded wire (usually copper) enclosed in an
insulating sheath, which is, in turn, encased in an outer conductor of metal foil, braid, or a
combination of the two. The outer metallic wrapping serves both as a shield against noise and as
the second conductor, which completes the circuit. This outer conductor is also enclosed in an
insulating sheath, and the whole cable is protected by a plastic cover.
The BNC connector is used to connect the end of the cable to a device, such as a TV set. The
BNC T connector is used in Ethernet networks (see Chapter 13) to branch out to a connection to
a computer or other device. The BNC terminator is used at the end of the cable to prevent the
reflection of the signal.
Performance
As we did with twisted-pair cable, we can measure the performance of a coaxial cable.
We notice in Figure 7.9 that the attenuation is much higher in coaxial cable than in twisted-pair
cable. In other words, although coaxial cable has a much higher bandwidth, the signal weakens
rapidly and requires the frequent use of repeaters.
Applications
Coaxial cable was widely used in analog telephone networks where a single coaxial
network could carry 10,000 voice signals. Later it was used in digital telephone networks where
a single coaxial cable could carry digital data up to 600 Mbps. However, coaxial cable in
telephone networks has largely been replaced today with fiber optic cable.
Cable TV networks also use coaxial cables. In the traditional cable TV network, the entire
network used coaxial cable. Later, however, cable TV providers replaced most of the media with
fiber-optic cable; hybrid networks use coaxial cable only at the network boundaries, near the
consumer premises. Cable TV uses RG-59 coaxial cable. Another common application of coaxial
cable is in traditional Ethernet LANs (see Because of its high bandwidth, and consequently high
data rate, coaxial cable was chosen for digital transmission in early Ethernet LANs. The lOBase-
2, or Thin Ethernet, uses RG-58 coaxial cable with BNC connectors to transmit data at 10 Mbps
with a range of 185 m. The lOBase5, or Thick Ethernet, uses RG-ll (thick coaxial cable) to
transmit 10 Mbps with a range of 5000 m. Thick Ethernet has specialized connectors.
Fiber-Optic Cable
A fiber-optic cable is made of glass or plastic and transmits signals in the form of light.
To understand optical fiber, we first need to explore several aspects of the nature of light. Light
travels in a straight line as long as it is moving through a single uniform substance. If a ray of
light traveling through one substance suddenly enters another substance (of a different density),
the ray changes direction. Below figure shows how a ray of light changes direction when going
from a denser to a less dense substance. As the figure shows, if the angle of incidence I (the
angle the ray makes with the line perpendicular to the interface between the two substances) is
less than the critical angle, the ray refracts and moves closer to the surface. If the angle of
incidence is equal to the critical angle, the light bends along the interface. If the angle is greater
than the critical angle, the ray reflects (makes a turn) and travels again in the denser
substance . Note that the critical angle is a property of the substance, and its value differs from
one substance to another. Optical fibers use reflection to guide light through a channel. A glass
or plastic core is surrounded by a cladding of less dense glass or plastic. The difference in
density of the two materials must be such that a beam of light moving through the core is
reflected off the cladding instead of being refracted into it. See below figure.
Propagation Modes
Current technology supports two modes (multimode and single mode) for propagating
light along optical channels, each requiring fiber with different physical characteristics.
Multimode can be implemented in two forms: step-index or graded-index .
Multimode
Multimode is so named because multiple beams from a light source move through the core in
different paths. How these beams move within the cable depends on the structure of the core.
In multimode step-index fiber, the density of the core remains constant from the center to the
edges. A beam of light moves through this constant density in a straight line until it reaches the
interface of the core and the cladding. A second type of fiber, called multimode graded-index
fiber, decreases this distortion of the signal through the cable. The word index here refers to the
index of refraction. As we saw above, the index of refraction is related to density. Single-Mode
Single-mode uses step-index fiber and a highly focused source of light that limits beams to a
small range of angles, all close to the horizontal. The single-mode fiber itself is manufactured
with a much smaller diameter than that of multimode fiber, and with substantially lowers density
(index of refraction). The decrease in density results in a critical angle that is close enough to 90°
to make the propagation of beams almost horizontal. In this case, propagation of different beams
is almost identical, and delays are negligible. All the beams arrive at the destination "together"
and can be recombined with little distortion to the signal.
Fiber Sizes
Optical fibers are defined by the ratio of the diameter of their core to the diameter of their
cladding, both expressed in micrometers. The common sizes are shown in below table. Note that
the last size listed is for single-mode only.
Cable Composition
Following figure shows the composition of a typical fiber-optic cable. The outer jacket is
made of either pvc or Teflon. Inside the jacket are Kevlar strands to strengthen the cable. Kevlar
is a strong material used in the fabrication of bulletproof vests. Below the Kevlar is another
plastic coating to cushion the fiber. The fiber is at the center of the cable, and it consists of
cladding and core.
Fiber-Optic Cable Connectors
There are three types of connectors for fiber-optic cables, as shown in below figure. The
subscriber channel (SC) connector is used for cable TV. It uses a push/pull locking system. The
straight-tip (ST) connector is used for connecting cable to networking devices. It uses a bayonet
locking system and is more reliable than sc. MT-RJ is a connector that is the same size as RJ45.
Performance
The plot of attenuation versus wavelength in Figure 7.16 shows a very interesting
phenomenon in fiber-optic cable. Attenuation is flatter than in the case of twisted-pair cable and
coaxial cable. The performance is such that we need fewer (actually one tenth as many) repeaters
when we use fiber-optic cable.
Applications
Fiber-optic cable is often found in backbone networks because its wide bandwidth is
cost-effective. Today, with wavelength-division multiplexing (WDM), we can transfer data at a
rate of 1600 Gbps. The SONET network that we discuss in Chapter 14 provides such a
backbone.
Some cable TV companies use a combination of optical fiber and coaxial cable, thus creating a
hybrid network. Optical fiber provides the backbone structure while coaxial cable provides the
connection to the user premises. This is a cost-effective configuration since the narrow
bandwidth requirement at the user end does not justify the use of optical fiber.
Local-area networks such as 100Base-FX network (Fast Ethernet) and 1000Base-X also use
fiber-optic cable.
Advantages and Disadvantages of Optical Fiber
Advantages
Fiber-optic cable has several advantages over metallic cable (twisted-pair or coaxial).
Higher bandwidth. Fiber-optic cable can support dramatically higher bandwidths (and hence
data rates) than either twisted-pair or coaxial cable. Currently, data rates and bandwidth
utilization over fiber-optic cable are limited not by the medium but by the signal generation and
reception technology available.
Less signal attenuation. Fiber-optic transmission distance is significantly greater than that of
other guided media. A signal can run for 50 km without requiring regeneration. We need
repeaters every 5 km for coaxial or twisted-pair cable.
Immunity to electromagnetic interference. Electromagnetic noise cannot affect fiber-optic
cables.
Resistance to corrosive materials. Glass is more resistant to corrosive materials than copper.
Light weight. Fiber-optic cables are much lighter than copper cables.
Greater immunity to tapping. Fiber-optic cables are more immune to tapping than copper
cables. Copper cables create antenna effects that can easily be tapped.
Disadvantages
There are some disadvantages in the use of optical fiber.
Installation and maintenance. Fiber-optic cable is a relatively new technology. Its installation
and maintenance require expertise that is not yet available everywhere. o Unidirectional light
propagation. Propagation of light is unidirectional. If we need bidirectional communication, two
fibers are needed.
Cost. The cable and the interfaces are relatively more expensive than those of other guided
media. If the demand for bandwidth is not high, often the use of optical fiber cannot be justified.
Radio Waves
Although there is no clear-cut demarcation between radio waves and microwaves,
electromagnetic waves ranging in frequencies between 3 kHz and 1 GHz are normally called
radio waves; waves ranging in frequencies between I and 300 GHz are called microwaves.
However, the behavior of the waves, rather than the frequencies, is a better criterion for
classification. Radio waves, for the most part, are omnidirectional. When an antenna transmits
radio waves, they are propagated in all directions. This means that the sending and receiving
antennas do not have to be aligned. A sending antenna sends waves that can be received by any
receiving antenna. The omnidirectional property has a disadvantage, too. The radio waves
transmitted by one antenna are susceptible to interference by another antenna that may send
signals using the same frequency or band. Radio waves, particularly those waves that propagate
in the sky mode, can travel long distances. This makes radio waves a good candidate for long-
distance broadcasting such as AM radio.
Omni directional Antenna
Radio waves use omni directional antennas that send out signals in all directions. Based
on the wavelength, strength, and the purpose of transmission, we can have several types of
antennas. Below Figure shows an omni directional antenna.
Applications
The omnidirectional characteristics of radio waves make them useful for multicasting, in
which there is one sender but many receivers. AM and FM radio, television, maritime radio,
cordless phones, and paging are examples of multicasting.
Radio waves are used for multicast communications, such as radio and television, and
paging systems.
Microwaves
Electromagnetic waves having frequencies between 1 and 300 GHz are called microwaves.
Microwaves are unidirectional. When an antenna transmits microwaves, they can be narrowly
focused. This means that the sending and receiving antennas need to be aligned. The
unidirectional property has an obvious advantage. A pair of antennas can be aligned without
interfering with another pair of aligned antennas.
The following describes some characteristics of microwave propagation:
Microwave propagation is line-of-sight. Since the towers with the mounted antennas need to
be in direct sight of each other, towers that are far apart need to be very tall. The curvature of the
earth as well as other blocking obstacles does not allow two short towers to communicate by
using microwaves. Repeaters are often needed for long distance communication.
Very high-frequency microwaves cannot penetrate walls. This characteristic can be a
disadvantage if receivers are inside buildings.
The microwave band is relatively wide, almost 299 GHz. Therefore wider subbands can be
assigned, and a high data rate is possible.
Use of certain portions of the band requires permission from authorities.
Unidirectional Antenna
Microwaves need unidirectional antennas that send out signals in one direction. Two
types of antennas are used for microwave communications: the parabolic dish and the horn .
A
parabolic dish antenna is based on the geometry of a parabola: Every line parallel to the line of
symmetry (line of sight) reflects off the curve at angles such that all the lines intersect in a
common point called the focus. The parabolic dish works as a funnel, catching a wide range of
waves and directing them to a common point. In this way, more of the signal is recovered than
would be possible with a single-point receiver.
Outgoing transmissions are broadcast through a horn aimed at the dish. The microwaves
hit the dish and are deflected outward in a reversal of the receipt path. A horn antenna looks like
a gigantic scoop. Outgoing transmissions are broadcast up a stem (resembling a handle) and
deflected outward in a series of narrow parallel beams by the curved head. Received
transmissions are collected by the scooped shape of the horn, in a manner similar to the parabolic
dish, and are deflected down into the stem.
Applications
Microwaves, due to their unidirectional properties, are very useful when unicast (one to- one)
communication is needed between the sender and the receiver. They are used in cellular phone,
satellite networks, and wireless LANs
Microwaves are used for unicast communication such as cellular telephones,
satellite networks, and wireless LANs.
Infrared
Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from 1 mm to 770
nrn), can be used for short-range communication. Infrared waves, having high frequencies,
cannot penetrate walls. This advantageous characteristic prevents interference between one
system and another; a short-range communication system in one room cannot be affected by
another system in the next room. When we use our infrared remote control, we do not interfere
with the use of the remote by our neighbors. However, this same characteristic makes infrared
signals useless for long-range communication. In addition, we cannot use infrared waves outside
a building because the sun's rays contain infrared waves that can interfere with the
communication.
Applications
The infrared band, almost 400 THz, has an excellent potential for data transmission. Such a wide
bandwidth can be used to transmit digital data with a very high data rate. The Infrared Data
Association elrDA), an association for sponsoring the use of infrared waves, has established
standards for using these signals for communication between devices such as keyboards, mice,
PCs, and printers. For example, some manufacturers provide a special port called the IrDA port
that allows a wireless keyboard to communicate with a PC. The standard originally defined a
data rate of 75 kbps for a distance up to 8 m. The recent standard defines a data rate of 4 Mbps.
Infrared signals defined by IrDA transmit through line of sight; the IrDA port on the keyboard
needs to point to the PC for transmission to occur. Infrared signals can be used for short-range
communication in a closed area using line-of-sight propagation.