Unit 1 BBA V
Unit 1 BBA V
The Internet: The biggest internet around. “You know it when you see it.”
If you try such a thing, you will fail, and an internet will just evolve:
An internet may start with a single, global ISP, then multiple ISPs will arise, then
some regional ISPs, etc. Then big content providers might build content delivery
networks, too.
Network Topology
Point-to-Point
Point-to-point networks contains exactly two hosts such as computer, switches or
routers, servers connected back to back using a single piece of cable. Often, the
receiving end of one host is connected to sending end of the other and vice-versa.
If the hosts are connected point-to-point logically, then may have multiple intermediate
devices. But the end hosts are unaware of underlying network and see each other as if
they are connected directly.
Bus Topology
In case of Bus topology, all devices share single communication line or cable.Bus
topology may have problem while multiple hosts sending data at the same time.
Therefore, Bus topology either uses CSMA/CD technology or recognizes one host as
Bus Master to solve the issue. It is one of the simple forms of networking where a
failure of a device does not affect the other devices. But failure of the shared
communication line can make all other devices stop functioning.
Both ends of the shared channel have line terminator. The data is sent in only one
direction and as soon as it reaches the extreme end, the terminator removes the data
from the line.
Star Topology
All hosts in Star topology are connected to a central device, known as hub device,
using a point-to-point connection. That is, there exists a point to point connection
between hosts and hub. The hub device can be any of the following:
Ring Topology
In ring topology, each host machine connects to exactly two other machines, creating a
circular network structure. When one host tries to communicate or send message to a
host which is not adjacent to it, the data travels through all intermediate hosts. To
connect one more host in the existing structure, the administrator may need only one
more extra cable.
Failure of any host results in failure of the whole ring.Thus, every connection in the ring
is a point of failure. There are methods which employ one more backup ring.
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts.This topology has
hosts in point-to-point connection with every other host or may also have hosts which
are in point-to-point connection to few hosts only.
Hosts in Mesh topology also work as relay for other hosts which do not have direct
point-to-point links. Mesh technology comes into two types:
Full Mesh: All hosts have a point-to-point connection to every other host in the network.
Thus for every new host n(n-1)/2 connections are required. It provides the most reliable
network structure among all network topologies.
Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts
connect to each other in some arbitrarily fashion. This topology exists where we need to
provide reliability to some hosts out of all.
Tree Topology
Also known as Hierarchical Topology, this is the most common form of network
topology in use presently.This topology imitates as extended Star topology and inherits
properties of bus topology.
This topology divides the network in to multiple levels/layers of network. Mainly in
LANs, a network is bifurcated into three types of network devices. The lowermost is
access-layer where computers are attached. The middle layer is known as distribution
layer, which works as mediator between upper layer and lower layer. The highest layer
is known as core layer, and is central point of the network, i.e. root of the tree from
which all nodes fork.
All neighboring hosts have point-to-point connection between them.Similar to the Bus
topology, if the root goes down, then the entire network suffers even.though it is not the
single point of failure. Every connection serves as point of failure, failing of which
divides the network into unreachable segment.
Daisy Chain
This topology connects all the hosts in a linear fashion. Similar to Ring topology, all
hosts are connected to two hosts only, except the end hosts.Means, if the end hosts in
daisy chain are connected then it represents Ring topology.
Each link in daisy chain topology represents single point of failure. Every link failure
splits the network into two segments.Every intermediate host works as relay for its
immediate hosts.
Hybrid Topology
A network structure whose design contains more than one topology is said to be hybrid
topology. Hybrid topology inherits merits and demerits of all the incorporating
topologies.
The above picture represents an arbitrarily hybrid topology. The combining topologies may
contain attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are connected
by means of Dual-Ring topology and networks connected to them are mostly Star topology
networks. Internet is the best example of largest Hybrid topology
o Peer-To-Peer network
o Client/Server network
Peer-To-Peer network
o Peer-To-Peer network is a network in which all the computers are linked together
with equal privilege and responsibilities for processing the data.
o Peer-To-Peer network is useful for small environments, usually up to 10 computers.
o Peer-To-Peer network has no dedicated server.
o Special permissions are assigned to each computer for sharing the resources, but
this can lead to a problem if the computer with the resource is down.
Communication speed
Network provides us to communicate over the network in a fast and efficient manner. For
example, we can do video conferencing, email messaging, etc. over the internet. Therefore,
the computer network is a great way to share our knowledge and ideas.
File sharing
File sharing is one of the major advantage of the computer network. Computer network
provides us to share the files with each other.
Security
Network allows the security by ensuring that the user has the right to access the certain
files and applications.
Scalability
Scalability means that we can add the new components on the network. Network must be
scalable so that we can extend the network by adding new devices. But, it decreases the
speed of the connection and data of the transmission speed also decreases, this increases
the chances of error occurring. This problem can be overcome by using the routing or
switching devices.
Wireless Personal Area Network: Wireless Personal Area Network is developed by simply
using wireless technologies such as WiFi, Bluetooth. It is a low range network.
Wired Personal Area Network: Wired Personal Area Network is created by using the USB.
o Security issue: A WAN network has more security issues as compared to LAN and
MAN network as all the technologies are combined together that creates the security
problem.
o Needs Firewall & antivirus software: The data is transferred on the internet
which can be changed or hacked by the hackers, so the firewall needs to be used.
Some people can inject the virus in our system so antivirus is needed to protect from
such a virus.
o High Setup cost: An installation cost of the WAN network is high as it involves the
purchasing of routers, switches.
o Troubleshooting problems: It covers a large area so fixing the problem is difficult.
Transmission services
Connection Oriented and Connectionless Services
Connection oriented and Connectionless services are the two data
transmission services provided by the network layer
protocols and transport layer protocols. The Connection
oriented services establish a connection prior to sending the packets
belonging to the same message from source to the destination. On the other
hand, the connectionless service considers each packet belonging to the
same message as a different & independent entity and route them with a
different path.
As all the data packets in a message follow the same path their order is
preserved as they reach the destination. After sending all data packets the
source sends a special packet to terminate the connection. To which
destination sends an acknowledgement confirming the termination of
connection and all the router delete the path entry from routing table.
As connection oriented service provide acknowledgement at each action it
provides reliability in the service. There are fewer chances of packet loss as
they travel a predefined path. The connection oriented services are preferred
over a long and steady conversation.
The connection oriented service works the same at both, the network layer
and transport layer i.e. first it establishes a connection, exchanges data and
terminates the connection. But, it’s behaviour slightly differs at both the layer.
Let’s see how?
Connectionless Service
Connectionless service is a method of data transmission between two
computers in a different network. Connectionless service is also termed
as datagram service. This service look-alike the postal system where each
letter carries its source & destination address and each one of them
is routed through a different path.
The source divides the message into small acceptable packets these packets
known as a datagram. These datagrams are individually pushed into the
network; each datagram may travel a different path. The network considers
each datagram or data packet as an independent entity i.e. no
relationship is considered between the packets belonging to the same
message.
Each datagram carries its source and destination address. The router uses
the destination address to route the datagram to its destination. The packets
received at the destination may be received out of order. Hence, the
datagrams are assembled to recreate the original message.
As the data packets belonging to the same message follow the different path it
may happen that they are received at the destination out of order. It can also
be the case that one of the packets is lost.
Key Takeaways
Connection oriented service is based on the telephone system.
Connection oriented service first establishes a connection between the
source and destination.
All packets belonging to the same message follows the same dedicated
established connection to reach the destination in connection oriented
service.
At the network layer connection oriented service focuses on coordination
between source, destination and all the routers between source and
destination.
At the transport layer connection, oriented service is only interested
in source and destination. The service here is end to end.
In connection oriented service we can implement flow control, error
control & congestion control.
Connectionless service is based on the postal services.
Connectionless service considers each packet of the same message as
a different and independent entity. Each data packet carries
its source and destination address.
In connectionless service, each packet of the same message may follow a
different route to get delivered to the destination.
In connectionless service, packets are routed based on the destination
address on the packet.
At the network layer, connectionless service signifies a different route for a
different packet belonging to the same message.
At the transport layer, connectionless service signifies the independency
between the packets of the same message.
In connectionless service, we cannot implement flow control, error
control, and congestion control.
Earlier the protocols at the network layer were designed for connectionless
service. But, the recent trends allow us to switch to connection oriented
services. In the content above we have discussed both the trends, dominant
one (connectionless service) and the new one (connection oriented service).
Analog and Digital Signal
What is Signal?
A signal is an electromagnetic or electrical current that is used for carrying
data from one system or network to another. The signal is a function that
conveys information about a phenomenon.
Analog and digital signals are different types which are mainly used to carry the
data from one apparatus to another. Analog signals are continuous wave signals
that change with time period whereas digital is a discrete signal in nature. The
main difference between analog and digital signals is, analog signals are
represented with the sine waves whereas digital signals are represented with square
waves.
Analog and Digital Signal
Analog signal is a continuous signal in which one time-varying quantity
represents another time-based variable. These kind of signals works with
physical values and natural phenomena such as earthquake, frequency,
volcano, speed of wind, weight, lighting, etc.
Analog Signal
Characteristics OF Analog Signal
Here, are essential characteristics of Analog Signal
Digital Signal
Similar to analog, digital signals carry the data although it is a bit different. These
signals are discrete or not continuous. A digital signal carries the data in the form
of binary because it signifies in the bits. These signals can be decomposed into sine
waves which are termed as harmonics. Every digital signal has amplitude,
frequency, & phase like the analog signal. This signal can be defined by bit
interval as well as bit rate.
Digita
l Signal
Digital signals are more resistant toward the noise; therefore, it barely faces
some distortion. These waves are simple in transmitting as well as more
dependable while contrasted to analog waves. Digital signals include a limited
variety of values which lies among 0-to-1.
The key difference between analog and digital signals in tabular form is shown
below.
Analog Signal Digital Signal
An analog signal signifies a continuous A digital signal signifies a discrete signal
signal that keeps changes with a time that carries binary data and has discrete
period. values.
Analog signals are continuous sine waves Digital signal is square waves.
Analog signals describe the behavior of Digital signals describe the behavior of
the wave with respect to amplitude, time the signal with respect to the rate of a bit
period, & phase of the signal. as well as bit interval.
The example of an analog signal is the The example of a digital signal is the data
human voice transmission in a computer.
There are several advantages using digital signal over an analog signal.
Digital signals are more secure, and they do not get damaged by noise.
These signals use low bandwidth
They allow the signals transmitted over a lengthy distance.
Digital signal has a higher rate transmission
By using these signals, we can translate the messages, audio, video into device
language.
Digital signals enable the transmission of multidirectional concurrently.
Analog Transmission
Bandpass:The filters are used to filter and pass frequencies of interest. A bandpass is
a band of frequencies which can pass the filter.
Low-pass: Low-pass is a filter that passes low frequencies signals.
When digital data is converted into a bandpass analog signal, it is called digital-to-
analog conversion. When low-pass analog signal is converted into bandpass analog
signal, it is called analog-to-analog conversion.
Digital-to-Analog Conversion
When data from one computer is sent to another via some analog carrier, it is first
converted into analog signals. Analog signals are modified to reflect digital data.
An analog signal is characterized by its amplitude, frequency, and phase. There are
three kinds of digital-to-analog conversions:
Amplitude Shift Keying
In this conversion technique, the amplitude of analog carrier signal is modified to
reflect binary data.
When binary data represents digit 1, the amplitude is held; otherwise it is set to
0. Both frequency and phase remain same as in the original carrier signal.
Frequency Shift Keying
In this conversion technique, the frequency of the analog carrier signal is
modified to reflect binary data.
This technique uses two frequencies, f1 and f2. One of them, for example f1, is
chosen to represent binary digit 1 and the other one is used to represent binary
digit 0. Both amplitude and phase of the carrier wave are kept intact.
Phase Shift Keying
In this conversion scheme, the phase of the original carrier signal is altered to
reflect the binary data.
When a new binary symbol is encountered, the phase of the signal is altered.
Amplitude and frequency of the original carrier signal is kept intact.
Quadrature Phase Shift Keying
QPSK alters the phase to reflect two binary digits at once. This is done in two
different phases. The main stream of binary data is divided equally into two sub-
streams. The serial data is converted in to parallel in both sub-streams and then
each stream is converted to digital signal using NRZ technique. Later, both the
digital signals are merged together.
Analog-to-Analog Conversion
Analog signals are modified to represent analog data. This conversion is also known as
Analog Modulation. Analog modulation is required when bandpass is used. Analog to
analog conversion can be done in three ways:
Amplitude Modulation
In this modulation, the amplitude of the carrier signal is modified to reflect the
analog data.
Amplitude modulation is implemented by means of a multiplier. The amplitude of
modulating signal (analog data) is multiplied by the amplitude of carrier
frequency, which then reflects analog data.
The frequency and phase of carrier signal remain unchanged.
Frequency Modulation
In this modulation technique, the frequency of the carrier signal is modified to
reflect the change in the voltage levels of the modulating signal (analog data).
The amplitude and phase of the carrier signal are not altered.
Phase Modulation
In the modulation technique, the phase of carrier signal is modulated in order to
reflect the change in voltage (amplitude) of analog data signal.
Phase modulation is practically similar to Frequency Modulation, but in Phase
modulation frequency of the carrier signal is not increased. Frequency of carrier
is signal is changed (made dense and sparse) to reflect voltage change in the
amplitude of modulating signal.
Data or information can be stored in two ways, analog and digital. For a computer to
use the data, it must be in discrete digital form.Similar to data, signals can also be in
analog and digital form. To transmit data digitally, it needs to be first converted to
digital form.
Digital-to-Digital Conversion
This section explains how to convert digital data into digital signals. It can be done in
two ways, line coding and block coding. For all communications, line coding is
necessary whereas block coding is optional.
Line Coding
The process for converting digital data into digital signal is said to be Line Coding.
Digital data is found in binary format.It is represented (stored) internally as series of 1s
and 0s.
Digital signal is denoted by discreet signal, which represents digital data.There are
three types of line coding schemes available:
Uni-polar Encoding
Unipolar encoding schemes use single voltage level to represent data. In this case, to
represent binary 1, high voltage is transmitted and to represent 0, no voltage is
transmitted. It is also called Unipolar-Non-return-to-zero, because there is no rest
condition i.e. it either represents 1 or 0.
Polar Encoding
Polar encoding scheme uses multiple voltage levels to represent binary values. Polar
encodings is available in four types:
Polar Non-Return to Zero (Polar NRZ)
It uses two different voltage levels to represent binary values. Generally, positive
voltage represents 1 and negative value represents 0. It is also NRZ because
there is no rest condition.
NRZ scheme has two variants: NRZ-L and NRZ-I.
Problem with NRZ is that the receiver cannot conclude when a bit ended and
when the next bit is started, in case when sender and receiver’s clock are not
synchronized.
RZ uses three voltage levels, positive voltage to represent 1, negative voltage to
represent 0 and zero voltage for none. Signals change during bits not between
bits.
Bipolar Encoding
Bipolar encoding uses three voltage levels, positive, negative and zero. Zero voltage
represents binary 0 and bit 1 is represented by altering positive and negative voltages.
Block Coding
To ensure accuracy of the received data frame redundant bits are used. For example,
in even-parity, one parity bit is added to make the count of 1s in the frame even. This
way the original number of bits is increased. It is called Block Coding.
Block coding is represented by slash notation, mB/nB.Means, m-bit block is substituted
with n-bit block where n > m. Block coding involves three steps:
Division,
Substitution
Combination.
After block coding is done, it is line coded for transmission.
Transmission Modes
The transmission mode decides how data is transmitted between two computers.The
binary data in the form of 1s and 0s can be sent in two different modes: Parallel and
Serial.
Parallel Transmission
The binary bits are organized in-to groups of fixed length. Both sender and receiver are
connected in parallel with the equal number of data lines. Both computers distinguish
between high order and low order data lines. The sender sends all the bits at once on
all lines.Because the data lines are equal to the number of bits in a group or data
frame, a complete group of bits (data frame) is sent in one go. Advantage of Parallel
transmission is high speed and disadvantage is the cost of wires, as it is equal to the
number of bits sent in parallel.
Serial Transmission
In serial transmission, bits are sent one after another in a queue manner. Serial
transmission requires only one communication channel.
The most common technique to change an analog signal to digital data is called pulse
code modulation (PCM). A PCM encoder has the following three processes:
1. Sampling
2. Quantization
3. Encoding
Low pass filter :
The low pass filter eliminates the high frequency components present in the input
analog signal to ensure that the input signal to sampler is free from the unwanted
frequency components.This is done to avoid aliasing of the message signal.
1. Sampling – The first step in PCM is sampling. Sampling is a process of measuring the
amplitude of a continuous-time signal at discrete instants, converting the continuous signal
into a discrete signal. There are three sampling methods:
(i) Ideal Sampling: In ideal Sampling also known as Instantaneous sampling
pulses from the analog signal are sampled. This is an ideal sampling method and
cannot be easily implemented.
2. Quantization –
Quantization, in mathematics and digital signal processing, is the process of mapping input
values from a large set (often a continuous set) to output values in a (countable) smaller set,
often with a finite number of elements. Rounding and truncation are typical examples of
quantization processes. Quantization is involved to some degree in nearly all digital signal
processing, as the process of representing a signal in digital form ordinarily involves
rounding. Quantization also forms the core of essentially all lossy compression algorithms.
The difference between an input value and its quantized value (such as round-off error) is referred to
as quantization error. A device or algorithmic function that performs quantization is called
a quantizer
3. Encoding –
The digitization of the analog signal is done by the encoder. After each sample is
quantized and the number of bits per sample is decided, each sample can be changed to
an n bit code. Encoding also minimizes the bandwidth used.
b. DELTA MODULATION :
Since PCM is a very complex technique, other techniques have been developed to
reduce the complexity of PCM. The simplest is delta Modulation. Delta Modulation finds
the change from the previous value.
Modulator – The modulator is used at the sender site to create a stream of bits from an
analog signal. The process records a small positive change called delta. If the delta is
positive, the process records a 1 else the process records a 0. The modulator builds a
second signal that resembles a staircase. The input signal is then compared with this
gradually made staircase signal.
The performance of a delta modulator can be improved significantly by making the step
size of the modulator assume a time-varying form. A larger step-size is needed where
the message has a steep slope of modulating signal and a smaller step-size is needed
where the message has a small slope. The size is adapted according to the level of the
input signal. This method is known as adaptive delta modulation (ADM).
Transmission Media
The transmission media is nothing but the physical media over which communication
takes place in computer networks.
Magnetic Media
One of the most convenient way to transfer data from one computer to another, even
before the birth of networking, was to save it on some storage media and transfer
physical from one station to another. Though it may seem old-fashion way in today’s
world of high speed internet, but when the size of data is huge, the magnetic media
comes into play.
For example, a bank has to handle and transfer huge data of its customer, which
stores a backup of it at some geographically far-away place for security reasons and to
keep it from uncertain calamities. If the bank needs to store its huge backup data then
its,transfer through internet is not feasible.The WAN links may not support such high
speed.Even if they do; the cost too high to afford.
In these cases, data backup is stored onto magnetic tapes or magnetic discs, and then
shifted physically at remote places.
Coaxial Cable
Coaxial cable has two wires of copper. The core wire lies in the center and it is made of
solid conductor.The core is enclosed in an insulating sheath.The second wire is
wrapped around over the sheath and that too in turn encased by insulator sheath.This
all is covered by plastic cover.
Because of its structure,the coax cable is capable of carrying high frequency signals
than that of twisted pair cable.The wrapped structure provides it a good shield against
noise and cross talk. Coaxial cables provide high bandwidth rates of up to 450 mbps.
There are three categories of coax cables namely, RG-59 (Cable TV), RG-58 (Thin
Ethernet), and RG-11 (Thick Ethernet). RG stands for Radio Government.
Cables are connected using BNC connector and BNC-T. BNC terminator is used to
terminate the wire at the far ends.
Power Lines
Power Line communication (PLC) is Layer-1 (Physical Layer) technology which uses
power cables to transmit data signals.In PLC, modulated data is sent over the cables.
The receiver on the other end de-modulates and interprets the data.
Because power lines are widely deployed, PLC can make all powered devices
controlled and monitored. PLC works in half-duplex.
There are two types of PLC:
Narrow band PLC
Broad band PLC
Narrow band PLC provides lower data rates up to 100s of kbps, as they work at lower
frequencies (3-5000 kHz).They can be spread over several kilometers.
Broadband PLC provides higher data rates up to 100s of Mbps and works at higher
frequencies (1.8 – 250 MHz).They cannot be as much extended as Narrowband PLC.
Fiber Optics
Fiber Optic works on the properties of light. When light ray hits at critical angle it tends
to refracts at 90 degree. This property has been used in fiber optic. The core of fiber
optic cable is made of high quality glass or plastic. From one end of it light is emitted, it
travels through it and at the other end light detector detects light stream and converts it
to electric data.
Fiber Optic provides the highest mode of speed. It comes in two modes, one is single
mode fiber and second is multimode fiber. Single mode fiber can carry a single ray of
light whereas multimode is capable of carrying multiple beams of light.
Fiber Optic also comes in unidirectional and bidirectional capabilities. To connect and
access fiber optic special type of connectors are used. These can be Subscriber
Channel (SC), Straight Tip (ST), or MT-RJ.
Computer Networks fall into three classes regarding the size, distance and the
structure namely: LAN (Local Area Network), MAN (Metropolitan Area Network), WAN
(Wide Area Network). Before we discussing about type of network we can discuss about
what is a network.
What is Network?
In the today world, Two devices are in network if a process in one device is able to
exchange information with a process in another device. Networks are known as a
medium of connections between nodes (set of devices) or computers. A network is
consist of group of computer systems, servers, networking devices are linked together
to share resources, including a printer or a file server. The connections is established by
using either cable media or wireless media.
Types of Networks
LAN (Local Area Network)
A Local Area Network is a privately owned computer network covering a small
Networks geographical area, like a home, office, or groups of buildings e.g. a school
Network. A LAN is used to connect the computers and other network devices so that the
devices can communicate with each other to share the resources. The resources to be
shared can be a hardware device like printer, software like an application program or
data. The size of LAN is usually small. The various devices in LAN are connected to
central devices called Hub or Switch using a cable.
Now-a-days LANs are being installed using wireless technologies. Such a system
makes use of access point or APs to transmit and receive data. One of the computers in
a network can become a server serving all the remaining computers called Clients.
For example, a library will have a wired or wireless LAN Network for users to
interconnect local networking devices e.g., printers and servers to connect to
the internet.
LAN offers high speed communication of data rates of 4 to 16 megabits per second
(Mbps). IEEE has projects investigating the standardization of 100 Gbit/s, and possibly
40 Gbit/s. LANs Network may have connections with other LANs Network via leased
lines, leased services.
Types of LAN
There are basically two types of Local Area Networks namely: ARCnet and Ethernet.
ARCNET (Attached Resource Computer NETwork)
ARCNET is one of the oldest, simplest, and least expensive types of Local-
Area Network protocol, similar in purpose to Ethernet or Token Ring. ARCNET was the
first widely available networking system for microcomputers and became popular in the
1980s for office automation tasks. ARCnet was introduced by Datapoint Corporation in
1977.
A special advantage of ARCNET is that it permits various types of transmission media -
twisted-pair wire, coaxial cable, and fiber optic cable - to be mixed on the same network.
The specification is ANSI 878.1. It can have up to 255 nodes per network.
A new specification, called ARCnet Plus, will support data rates of 20 Mbps
Ethernet is a family of computer networking technologies for local area networks
commercially introduced in 1980. Standardized in IEEE 802.3, Ethernet has largely
replaced competing wired local area network technologies. Ethernet uses a bus or star
topology Network and supports data transfer rates of 10 Mbps.
Ethernet Network uses the CSMA/CD access method to handle simultaneous demands.
It is one of the most widely implemented LAN standards. A newer version of Ethernet
Network, called 100Base-T (or Fast Ethernet), supports data transfer rates of 100 Mbps.
And the newest version, Gigabit Ethernet supports data rates of 1 gigabit (1,000
megabits) per second. Ethernet is a physical and data link layer technology for local
area networks (LANs). Ethernet Network was invented by engineer Robert Metcalfe.
MAN (Metropolitan Area Networks)
MAN stands for Metropolitan Area Networks is one of a number of types of networks. A
MAN is a relatively new class of network. MAN is larger than a local area network and
as its name implies, covers the area of a single city. MANs rarely extend beyond 100
KM and frequently comprise a combination of different hardware and transmission
media. It can be single network such as a cable TV network, or it is a means of
connecting a number of LANs into a larger network so that resources can be shared
LAN to LAN as well as device to device.
A MAN can be created as a single network such as Cable TV Network, covering the
entire city or a group of several Local Area Networks (LANs). It this way resource can
be shared from LAN to LAN and from computer to computer also. MANs are usually
owned by large organizations to interconnect its various branches across a city.
MAN is based on IEEE 802.6 standard known as DQDB (Distributed Queue Dual Bus).
DQDB uses two unidirectional cables (buses) and all the computers are connected to
these two buses. Each bus has a specialized device that initiates the transmission
activity. This device is called head end. Data that is to be sent to the computer on the
right hand side of the sender is transmitted on upper bus. Data that is to be sent to the
left hand side of the sender is transmitted on lower bus.
The two most important components of MANs are security and standardization. Security
is important because information is being shared between dissimilar systems.
Standardization is necessary to ensure reliable data communication.
A MAN usually interconnects a number of local area networks using a high-capacity
backbone technology, such as fiber-optical links, and provides up-link services to wide
area networks and the Internet.
The Metropolitan Area Networks (MAN) protocols are mostly at the data link level (layer
2 in the OSI model), which are defined by IEEE, ITU-T, etc.
WAN (Wide Area Networks)
A wide area network (WAN) is a telecommunication network. A wide area network is
simply a LAN of LANs or Network of Networks. WANs connect LANs that may be on
opposite sides of a building, across the country or around the world. WANS are
characterized by the slowest data communication rates and the largest distances.
WANs can be of two types: an enterprise WAN and Global WAN.
Computers connected to a Wide Area Networks are often connected through public
networks, such as the telephone system. They can also be connected through leased
lines or satellites. The largest WAN in existence is the Internet. Some segments of the
Internet, like VPN based extranets, are also WANs in themselves. Finally, many WANs
are corporate or research networks that utilize leased lines.
Numerous WANs have been constructed, including public packet networks, large
corporate networks, military networks, banking networks, stock brokerage networks,
and airline reservation networks.
Organizations supporting WANs using the Internet Protocol are known as Network
Service Providers (NSPs). These form the core of the Internet.
By connecting the NSP WANs together using links at Internet Packet Interchanges
(sometimes called "peering points") a global communication infrastructure is formed.
WANs (wide area networks) generally utilize different and much more expensive
networking equipment than do LANs (Local Area Networks). Key technologies often
found in WANs (wide area networks) include SONET, Frame Relay, and ATM.
Wireless Networks
• The fastest growing segment of the computer industry is the mobile computers such
as notebook computers and personal digital assistant (PDAs).
• The wireless networks are becoming increasingly important because the wired
connection is not possible in cars or aero planes.
• Wireless networks can have many applications. A very common example is the
portable office
• People traveling on road often want to make use of their portable electronic equipment
for telephone calls, e-mails, faxes, read remote files etc.
• Wireless networks can exist on trucks, buses, taxies, aero planes etc. They are used
where the telephone systems are destroyed in the event of disasters such as. fires,
floods and earthquakes etc.
• The wireless networks are important for military.
• Wireless networks and mobile computing are related but they are not identical
because portable computers are sometimes wired and some wireless computers are
not portable.
• But some applications are truly mobile wireless applications such as a portable office,
inventories being handled by PDAs, etc.
• Wireless LAN is another example of wireless network. Direct digital cellular service
CDPD (Cellular Digital Packet Data) is now becoming available:
• It is possible to have combinations of wired and wireless networking.
Wireless Networks
Computer networks that are not connected by cables are called wireless networks. They
generally use radio waves for communication between the network nodes. They allow
devices to be connected to the network while roaming around within the network
coverage.
Types of Wireless Networks
Wireless LANs − Connects two or more network devices using wireless distribution
techniques.
Wireless MANs − Connects two or more wireless LANs spreading over a metropolitan
area.
Wireless WANs − Connects large areas comprising LANs, MANs and personal
networks.
Advantages of Wireless Networks
It provides clutter-free desks due to the absence of wires and cables.
It increases the mobility of network devices connected to the system since the devices
need not be connected to each other.
Accessing network devices from any location within the network coverage or Wi-Fi
hotspot becomes convenient since laying out cables is not needed.
Installation and setup of wireless networks are easier.
New devices can be easily connected to the existing setup since they needn’t be wired
to the present equipment. Also, the number of equipment that can be added or removed
to the system can vary considerably since they are not limited by the cable capacity.
This makes wireless networks very scalable.
Wireless networks require very limited or no wires. Thus, it reduces the equipment and
setup costs.
Examples of wireless networks
Mobile phone networks
Wireless sensor networks
Satellite communication networks
Terrestrial microwave networks
Wireless Transmission
Radio waves of high frequencies are prone to be absorbed by rain and other obstacles.
They use Ionosphere of earth atmosphere. High frequency radio waves such as HF
and VHF bands are spread upwards. When they reach Ionosphere, they are refracted
back to the earth.
Microwave Transmission
Electromagnetic waves above 100 MHz tend to travel in a straight line and signals over
them can be sent by beaming those waves towards one particular station. Because
Microwaves travels in straight lines, both sender and receiver must be aligned to be
strictly in line-of-sight.
Microwaves can have wavelength ranging from 1 mm – 1 meter and frequency ranging
from 300 MHz to 300 GHz.
Microwave antennas concentrate the waves making a beam of it. As shown in picture
above, multiple antennas can be aligned to reach farther. Microwaves have higher
frequencies and do not penetrate wall like obstacles.
Microwave transmission depends highly upon the weather conditions and the
frequency it is using.
Infrared Transmission
Infrared wave lies in between visible light spectrum and microwaves. It has wavelength
of 700-nm to 1-mm and frequency ranges from 300-GHz to 430-THz.
Infrared wave is used for very short range communication purposes such as television
and it’s remote. Infrared travels in a straight line hence it is directional by nature.
Because of high frequency range, Infrared cannot cross wall-like obstacles.
Light Transmission
Highest most electromagnetic spectrum which can be used for data transmission is
light or optical signaling. This is achieved by means of LASER.
Because of frequency light uses, it tends to travel strictly in straight line.Hence the
sender and receiver must be in the line-of-sight. Because laser transmission is
unidirectional, at both ends of communication the laser and the photo-detector needs
to be installed. Laser beam is generally 1mm wide hence it is a work of precision to
align two far receptors each pointing to lasers source.