1st Unit CN 2024
1st Unit CN 2024
Unit-01
Syllabus: Introductory concepts: Goals and applications of
networks, categories of networks, organization of the
Internet, ISP, Network structure and architecture
(layering principles, services, protocols and standards).
The OSI reference model, TCP/IP protocol suite, Network
devices and components.
History of Network
ARPANET (Advanced Research Projects Agency Network) was the first
operational packet-switching network and the precursor to the global
Internet. It was developed by the United States Department of
Defense's Advanced Research Projects Agency (ARPA) in the late 1960s
to support research and communication among universities and
research centers. The first ARPANET connection was established in
October 1969 between UCLA (University of California, Los Angeles)
and the Stanford Research Institute, and the network grew to include
several more universities and research organizations over the next
several years. ARPANET was instrumental in the development of several
key technologies that underpin the Internet, including packet switching
and TCP/IP (Transmission Control Protocol/Internet Protocol), which
became the standard communication protocols for the Internet.
ARPANET officially ceased operations in 1990, but its legacy lives on as
the Internet continues to grow and evolve.
Health care: Computer networks enable the sharing of medical records, remote
consultation with specialists, and telemedicine.
Categories of Networks
[On the basis of geographic area, they cover. ]
Main categories:
1. LAN ( Local area network ) – range is around 2 miles.
2. MAN ( Metropolitan-area network ) – range around 10 miles.
3. WAN ( Wide area network ) – range can be world-wide.
1.Peer-to-peer
2.Client-server
Peer-to-peer
o Peer-To-Peer network is a network in which all the computers are linked together with
equal privilege and responsibilities for processing the data.
o Peer-To-Peer network is useful for small environments, usually up to 10 computers.
o Peer-To-Peer network has no dedicated server.
o Special permissions are assigned to each computer for sharing the resources, but this can
lead to a problem if the computer with the resource is down.
Client-Server
o Client/Server network is a network model designed for the end users called clients, to
access the resources such as songs, video, etc. from a central computer known as Server.
o The central controller is known as a server while all other computers in the network are
called clients.
o A server performs all the major operations such as security and network management.
o A server is responsible for managing all the resources such as files, directories, printer, etc.
o All the clients communicate with each other through a server. For example, if client1 wants
to send some data to client 2, then it first sends the request to the server for the
permission. The server sends the response to the client 1 to initiate its communication with
the client 2.
Protocols
A protocol is a set of rules that govern data communications. A protocol
defines what is communicated, how it is communicated, and when it is
communicated. The key elements of a protocol are:
1.Syntax
2.Semantic
3.Timing
Standards
Standards provide guidelines to manufacturers, vendors, government
agencies, and other service providers to ensure the kind of
interconnectivity necessary in today’s marketplace and in international
communications. Data communication standards fall into two
categories:
1.De facto ( meaning “ by fact” or “ by convention”)
2.De jure ( meaning “by law” or “ by regulation”)
Layering principle
Physical layer: This layer is concerned with transmitting raw data bits over a
physical medium, such as copper wires or fiber optic cables.
Presentation layer: This layer translates data from the application layer into a
format that can be understood by the receiving device. It is also responsible for
data compression and encryption.
Application layer: This layer provides interfaces for applications to access the
network services. It is responsible for providing services such as email, file
transfer, and remote login.
Note-- The OSI model provides a common language for describing and
understanding communication systems. It is not a protocol in itself, but it provides
a framework for developing protocols that can be used to implement the
functions of each layer.
Layers, Interfaces, and Protocols
Protocol— It is a set of rules governing the format and meaning of the packets
that are exchanged by the peer entities within a layer ( same layer on two
different machines). It means protocols are related to the packets sent between
peer entities on different machines.
The layers in the OSI model Offer two types of services to the layers
above them: connection-oriented and connectionless
Connection-Oriented service
It is modeled after the telephone system. To talk to someone, you pick up the
phone, key in the number, talk, and then hang up. Similarly, to use a
connection-oriented network service, the service user first establishes a
connection, uses the connection, and then releases the connection. The essential
aspect of a connection is that it acts like a tube: the sender pushes bits in at one
end, and the receiver takes them out at the other end.
Connectionless service
In contrast to connection-oriented service, connectionless service is modeled after
the postal system. Each message (letter) carries the full destination address, and
each one is routed through the intermediate nodes inside the system independent
of all the subsequent messages.
Note -- The TCP/IP model is the foundation of the internet and is used by a wide
range of devices, including computers, smartphones, and servers. It provides a
standardized way for devices to communicate with each other, making it possible
for applications and services to be developed that can be used across different
platforms and devices.
Question. What is the main difference between TCP/IP reference model and OSI reference
model?
While they share some similarities, there are also several differences between
them:
Layers: The TCP/IP model consists of four layers (Application, Transport, Internet,
and Link layer), while the OSI model consists of seven layers (Application,
Presentation, Session, Transport, Network, Data Link, and Physical).
Protocols: The TCP/IP model is based on the protocols developed for the Internet,
such as TCP, IP, UDP, and ICMP, while the OSI model is a more general framework
that does not specify any particular protocols.
Approach: The TCP/IP model is a practical model that was developed based on
existing protocols and practices, while the OSI model is a theoretical model that
was developed based on the principles of layered network architecture.
Scope: The TCP/IP model is widely used in practice and is the de facto standard for
the Internet, while the OSI model is primarily used as a reference model for
teaching and understanding networking concepts.
Flexibility: The TCP/IP model is more flexible and adaptable than the OSI model,
as it can be easily extended and modified to suit different applications and
network environments.
Note:
1. Passive hubs operate below physical layer.
2. Repeaters and active hubs operate only in the physical layer (L1).
3. Bridges and two-layer switches operate in the physical and data link layer (L2).
4. Routers and three-layer switches operate in L1, L2 and L3 layers.
5. A Gateway device operates in the all layers.
Repeater
The function of a repeater device in a LAN (Local Area Network) is to regenerate
signals to extend the range (length) of the network.
In a LAN, signals can weaken as they travel along the cables between devices. This
can cause data loss, errors, and a reduction in network performance. A repeater
device is used to overcome these limitations by receiving and regenerating the
original signals before re-transmitting them on to the next device in the network.
This process effectively extends the range of the network and ensures that all
devices can communicate with each other effectively.
Repeater devices are typically used in Ethernet LANs (IEEE 802.3) and can be used
to connect devices over long distances, such as in large buildings or across
campuses. However, it's worth noting that repeaters can introduce some latency
in the network, so they should be used wisely and only when necessary.
Note --In modern LANs, other technologies such as switches are often used
instead of repeaters to overcome the limitations of signal attenuation and
improve network performance.
Hub [Multiport Repeater]
1.Passive hub
2.Active hub
Passive hub – A passive hub is a type of networking hub that simply provides
a central point for multiple network devices to connect to one another. It does not
require a power source and does not actively regenerate signals. The primary
function of a passive hub is to allow network devices to communicate with each
other by providing a central connection point. When a device sends a message,
the hub sends it out to all other devices ( broadcasting ) connected to the hub,
allowing them to receive and process the message.
Active hub -- An active hub, also known as a powered hub, is a type of
networking hub that requires an external power source to operate. Unlike a
passive hub, an active hub actively regenerates signals, allowing it to extend the
distance of a network and support more devices.
Active hubs are typically used in larger network installations where multiple
devices need to be connected over a greater distance. They can also provide
additional features such as the ability to monitor network traffic and support for
different network protocols. However, like passive hubs, active hubs have
become less common in recent years due to the popularity of switches and
routers, which offer even greater control and functionality for network
connectivity.
Bridges
A bridge is a network device used to connect two different LANs. For example, a
bridge with two ports can connect an Ethernet LAN on one side and a token ring
LAN on the other. The bridge uses a forwarding table to filter and forward data
packets between the LANs. It operates in both the physical and the data link layer.
As a physical layer device, it regenerates the signal it receives. As a data link layer
device, the bridge can check the physical (MAC) addresses contained in the frame.
Note – You will get to learn more about bridges in the second unit.
Switches ( L2 and L3 switches)
A three-layer switch (L3 switch) is used at the network layer; it’s a kind of router.
Router
Forwarding: The router receives the packets from its input ports, checks its header, performs
some basic functions like checking checksum, and then looks up to the routing table to find the
appropriate output port to dump the packets onto, and forwards the packets onto that output
port.
Routing: Routing is the process by which the router ascertains what is the best path for the
packet to reach the destination, It maintains a routing table that is made using different
algorithms by the router only.
Gateway
Works as a Protocol Converter- It makes sure that the data packet from another
network is compatible with this network. So it converts their protocols into
supported protocols and other stuff of the data packets before it enters into the
network
Routing of data packets- It is responsible for routing data packets to different
networks because it knows about the routing path of different networks that are
in communication with its network.
……………………………………………………………
……………………….
The physical layer is responsible for movements of individual bits from one node
(hop) to the next.
2. Representation of bits – The physical layer data consists of a stream of bits
(sequence of 0s or 1s) with no interpretation. To be transmitted, bits must
be encoded into signals—electrical or optical. The physical layer defines the
type of encoding (how 0s and 1s are changed to digital signals).
3. Synchronization of bits—The sender and receiver not only must use the
same bit rate but also must be synchronized at the bit level. In other words,
the sender and the receiver clocks must be synchronized.
o The bus topology is designed in such a way that all the stations are connected through a
single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or directly connected
to the backbone cable.
o When a node wants to send a message over the network, it puts a message over the
network. All the stations available in the network will receive the message whether it has
been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard networks.
o The configuration of a bus topology is quite simpler as compared to other topologies.
o The backbone cable is considered as a "single lane" through which the message is
broadcast to all the stations.
o The most common access method of the bus topologies is CSMA (Carrier Sense Multiple
Access).
o Low-cost cable: In bus topology, nodes are directly connected to the cable without passing
through a hub. Therefore, the initial cost of installation is low.
o Moderate data speeds: Coaxial or twisted pair cables are mainly used in bus-based
networks that support up to 10 Mbps.
o Familiar technology: Bus topology is a familiar technology as the installation and
troubleshooting techniques are well known, and hardware components are easily
available.
o Limited failure: A failure in one node will not have any effect on other nodes.
o Extensive cabling: A bus topology is quite simpler, but still it requires a lot of cabling.
o Difficult troubleshooting: It requires specialized test equipment to determine the cable
faults. If any fault occurs in the cable, then it would disrupt the communication for all the
nodes.
o Signal interference: If two nodes send the messages simultaneously, then the signals of
both the nodes collide with each other.
o Reconfiguration difficult: Adding new devices to the network would slow down the
network.
o Attenuation: Attenuation is a loss of signal leads to communication issues. Repeaters are
used to regenerate the signal.
Ring Topology
o A token moves around the network, and it is passed from computer to computer until it
reaches the destination.
o The sender modifies the token by putting the address along with the data.
o The data is passed from one device to another device until the destination address
matches. Once the token received by the destination device, then it sends the
acknowledgment to the sender.
o In a ring topology, a token is used as a carrier.
o Network Management: Faulty devices can be removed from the network without bringing
the network down.
o Product availability: Many hardware and software tools for network operation and
monitoring are available.
o Cost: Twisted pair cabling is inexpensive and easily available. Therefore, the installation
cost is very low.
o Reliable: It is a more reliable network because the communication system is not dependent
on the single host computer.
o Star topology is an arrangement of the network in which every node is connected to the
central hub, switch or a central computer.
o The central computer is known as a server, and the peripheral devices attached to the
server are known as clients.
o Coaxial cable or RJ-45 cables are used to connect the computers.
o Hubs or Switches are mainly used as connection devices in a physical star topology.
o Star topology is the most popular topology in network implementation.
Dependence on Central Hub: The star topology depends heavily on the central hub or switch. If the
central hub or switch fails, the entire network can be disrupted. This means that the network may
be less resilient and reliable than other topologies such as the mesh topology.
Cost: Implementing a star topology can be more expensive than other topologies, particularly in
larger networks. Each device requires its own cable to connect to the central hub or switch, which
can increase the cost of cabling.
Limited scalability: The star topology may not be as scalable as other topologies. As the number of
devices in the network increases, the central hub or switch may become overloaded, which can
lead to network congestion and slow performance.
Single Point of Failure: Since all devices are connected to the central hub or switch, it becomes a
single point of failure. If the central hub or switch fails, all the devices connected to it lose
connectivity.
Limited Distance: The distance between the central hub or switch and the devices connected to it
is limited by the length of the cables used. This means that the star topology may not be suitable
for large geographic areas.
Overall, while the star topology is a popular choice for small to medium-sized networks, its
limitations should be considered when designing larger or more complex networks.
Tree topology
o Tree topology combines the characteristics of bus topology and star topology.
o A tree topology is a type of structure in which all the computers are connected with each
other in hierarchical fashion.
o The top-most node in tree topology is known as a root node, and all other nodes are the
descendants of the root node.
o There is only one path exists between two nodes for the data transmission. Thus, it forms a
parent-child hierarchy.
Advantages of Tree topology
o Support for broadband transmission: Tree topology is mainly used to provide broadband
transmission, i.e., signals are sent over long distances without being attenuated.
o Easily expandable: We can add the new device to the existing network. Therefore, we can
say that tree topology is easily expandable.
o Easily manageable: In tree topology, the whole network is divided into segments known as
star networks which can be easily managed and maintained.
o Error detection: Error detection and error correction are very easy in a tree topology.
o Limited failure: The breakdown in one station does not affect the entire network.
o Point-to-point wiring: It has point-to-point wiring for individual segments.
o Difficult troubleshooting: If any fault occurs in the node, then it becomes difficult to
troubleshoot the problem.
o High cost: Devices required for broadband transmission are very costly.
o Failure: A tree topology mainly relies on main bus cable and failure in main bus cable will
damage the overall network.
o Reconfiguration difficult: If new devices are added, then it becomes difficult to reconfigure.
Mesh topology
o Mesh technology is an arrangement of the network in which computers are interconnected
with each other through various redundant connections.
o There are multiple paths from one computer to another computer.
o It does not contain the switch, hub or any central computer which acts as a central point of
communication.
o The Internet is an example of the mesh topology.
o Mesh topology is mainly used for WAN implementations where communication failures are
a critical concern.
o Mesh topology is mainly used for wireless networks.
o Mesh topology can be formed by using the formula:
Number of cables = (n*(n-1))/2;
Reliable: The mesh topology networks are very reliable as if any link breakdown will not
affect the communication between connected computers.
Fast Communication: Communication is very fast between the nodes.
Easier Reconfiguration: Adding new devices would not disrupt the communication
between other devices.
Disadvantages of Mesh topology
o Cost: A mesh topology contains a large number of connected devices such as a router and
more transmission media than other topologies.
o Management: Mesh topology networks are very large and very difficult to maintain and
manage. If the network is not monitored carefully, then the communication link failure goes
undetected.
o Efficiency: In this topology, redundant connections are high that reduces the efficiency of
the network.
Hybrid Topology
o Reliable: If a fault occurs in any part of the network will not affect the functioning of the rest
of the network.
o Scalable: Size of the network can be easily expanded by adding new devices without
affecting the functionality of the existing network.
o Flexible: This topology is very flexible as it can be designed according to the requirements
of the organization.
o Effective: Hybrid topology is very effective as it can be designed in such a way that the
strength of the network is maximized and weakness of the network is minimized.
Disadvantages of Hybrid topology
o Complex design: The major drawback of the Hybrid topology is the design of the Hybrid
network. It is very difficult to design the architecture of the Hybrid network.
o Costly Hub: The Hubs used in the Hybrid topology are very expensive as these hubs are
different from usual Hubs used in other topologies.
o Costly infrastructure: The infrastructure cost is very high as a hybrid network requires a lot
of cabling, network devices, etc.
Types of connection (Line configuration)
There are two possible types of connections:
1. Point-to-point
2. Multipoint
Guided Media
It is defined as the physical medium through which the signals are transmitted. It
is also known as Bounded media.
Types of Guided media:
Twisted pair:
Twisted pair is a physical media made up of a pair of cables twisted with each
other. A twisted pair cable is cheap as compared to other transmission media.
Installation of the twisted pair cable is easy, and it is a lightweight cable. The
frequency range for twisted pair cable is from 0 to 3.5KHz.
A twisted pair consists of two insulated copper wires arranged in a regular spiral pattern.
1M
Taking a Look at the Upcoming Linux Mint 20.3 'Una' Before 2021 Ends
The degree of reduction in noise interference is determined by the number of turns per
foot. Increasing the number of turns per foot decreases noise interference.
Disadvantages
o It is more expensive as compared to UTP and coaxial cable.
o It has a higher attenuation rate.
Coaxial Cable
o Coaxial cable is very commonly used transmission media, for example, TV wire is usually a
coaxial cable.
o The name of the cable is coaxial as it contains two conductors parallel to each other.
o It has a higher frequency as compared to Twisted pair cable.
o The inner conductor of the coaxial cable is made up of copper, and the outer conductor is
made up of copper mesh. The middle core is made up of non-conductive cover that
separates the inner conductor from the outer conductor.
o The middle core is responsible for the data transferring whereas the copper mesh prevents
from the EMI(Electromagnetic interference).
Fiber Optic
o It uses electrical signals for communication.
o It holds the optical fibers coated in plastic that are used to send the data by pulses of light.
o The plastic coating protects the optical fibers from heat, cold, electromagnetic interference
from other types of wiring.
o It provides faster data transmission than copper wires.
UnGuided Transmission
o An unguided transmission transmits the electromagnetic waves without using any physical
medium. Therefore, it is also known as wireless transmission.
o In unguided media, air is the media through which the electromagnetic energy can flow
easily.
Radio waves
o Radio waves are the electromagnetic waves that are transmitted in all the directions of free
space.
o Radio waves are omnidirectional, i.e., the signals are propagated in all the directions.
o The range in frequencies of radio waves is from 3Khz to 1 GHz.
o In the case of radio waves, the sending and receiving antenna are not aligned, i.e., the wave
sent by the sending antenna can be received by any receiving antenna.
o An example of the radio wave is FM radio.
Applications of Radio waves:
o A Radio wave is useful for multicasting when there is one sender and many receivers.
o An FM radio, television, cordless phones are examples of a radio wave.
Microwaves
Characteristics of Microwave:
o Frequency range: The frequency range of terrestrial microwave is from 4-6 GHz to 21-23
GHz.
o Bandwidth: It supports the bandwidth from 1 to 10 Mbps.
o Short distance: It is inexpensive for short distance.
o Long distance: It is expensive as it requires a higher tower for a longer distance.
o Attenuation: Attenuation means loss of signal. It is affected by environmental conditions
and antenna size.
Advantages of Microwave:
o Microwave transmission is cheaper than using cables.
o It is free from land acquisition as it does not require any land for the installation of cables.
o Microwave transmission provides an easy communication in terrains as the installation of
cable in terrain is quite a difficult task.
o Communication over oceans can be achieved by using microwave transmission.
Infrared
o An infrared transmission is a wireless technology used for communication over short
ranges.
o The frequency of the infrared in the range from 300 GHz to 400 THz.
o It is used for short-range communication such as data transfer between two cell phones,
TV remote operation, data transfer between a computer and cell phone resides in the same
closed area.
Characteristics of Infrared:
o It supports high bandwidth, and hence the data rate will be very high.
o Infrared waves cannot penetrate the walls. Therefore, the infrared communication in one
room cannot be interrupted by the nearby rooms.
o An infrared communication provides better security with minimum interference.
o Infrared communication is unreliable outside the building because the sun rays will
interfere with the infrared waves.
Transmission Modes
o The way in which data is transmitted from one device to another device is known
as transmission mode.
o The transmission mode is also known as the communication mode.
o Each communication channel has a direction associated with it, and transmission
media provide the direction. Therefore, the transmission mode is also known as a
directional mode.
o The transmission mode is defined in the physical layer.
Simplex mode
Half-duplex modeFull-duplex mode
Send/Receive A device can only send the Both the devices can Both the devices can send
data but cannot receive it or send and receive the receive the data simultaneous
it can only receive the data data, but one at a time.
but cannot send it.
Network performance refers to the efficiency, reliability, and speed with which a
computer network can transmit data from one device to another. There are
several factors that can impact network performance, including :
1. Bandwidth
2. Throughput
3. Latency (delay)
For example, we can have a link with a bandwidth of 100 Mbps, but the device
connected to the end of the link may handle only 10 Mbps. Here, 100 Mbps is
bandwidth ( max speed) and 10 Mbps is throughput (actual speed).
3. Latency (delay) — How long it takes for an entire message to completely
arrive at the destination from the time first bit is sent out from the source.
It consists of mainly four components:
a. Transmission delay
b. Propagation delay
c. Queuing delay
d. Processing delay
a. Transmission delay ( Tt )—Time it takes to place the complete data packet on the
transmission medium.
b. Propagation delay (Tp )—Time it takes for a bit to travel from the source to the
destination.
Tp = Distance / propagation speed
c. Queuing delay –Time needed for each intermediate or end device to hold the
message before it can be processed.
d. Processing delay—How much time the node takes to process the message.
Transmission Impairment
It refers to any type of degradation or distortion of a signal as it travels through a
transmission medium from the sender to the receiver.
Causes of impairment
Db = 10 log10 P2/P1
Variables P2 and P1 are the powers of a signal at point 1 and 2, respectively.
Bit period (bit interval) – It is the duration of time required to transmit a single bit
over the communication channel.
Bit rate (data rate) – Bit rate is a measure of the number of bits that are
transmitted over a communication channel per unit of time, usually expressed in
bits per second (bps).
The relationship between bit rate and bit period is given by the following formula:
For example, if the bit period is 1 microsecond (1 µs), then the bit rate is:
Note :
One kilobit (kb) = 1,000 bits. [1000 bits]
One megabit (Mb) = 1,000,000 bits. [1000 kb]
One gigabit (Gb) = 1,000,000,000 bits. [1000 Mb]
Signal rate (baud rate/modulation rate/pulse rate)— The baud rate is the
number of signal elements transmitted in 1s. The unit is baud.
Question. Sketch the Unipolar NRZ encoding for the bit stream: 10110
Note – The name NRZ (non-return-to-zero) comes from the fact that the
signal does not return to zero between the transmission of two
consecutive bits.
Polar encoding— In polar scheme, the voltages are on the both sides of the
time axis. Examples of polar encoding are NRZ, RZ and biphase.
Polar RZ encoding—
Symbol “0” is represented by - A/2 for the half bit period and remaining half is for
the zero voltage .
Symbol “1” is represented by + A/2 for the half bit period and remaining half is for
the zero voltage.
Question. Sketch the polar RZ encoding for the bit stream: 01001
Note – The name RZ (return-to-zero) comes from the fact that the signal
returns to zero between the transmission of two consecutive bits.
Polar NRZ—We have two versions of polar NRZ:
1.Polar NRZ-L
2.Polar NRZ-I
Question. Sketch the polar NRZ-L and NRZ-I encodings for the bit
stream: 01001110
Manchester Encoding
Question. Sketch the Biphase Manchester and Differential Manchester
encoding for the bit stream: 0101110101
Manchester Encoding
Note: There are two types of conventions in Manchester encoding:
1. Dr. Thomas: In this Manchester encoding “0” is represented as
low-to-high voltage and 1 is represented as high-to-low voltage.
switching techniques are used to transfer data from one network node (router or gateway)
to another.
a. Virtual packet switching, also known as virtual circuit switching, involves establishing a
dedicated, logical connection between two nodes in a network before transmitting any
data. This connection is called a virtual circuit, and it is maintained throughout the duration
of the communication session. Each packet sent over the virtual circuit is labeled with a
connection identifier that is used by the network to route the packet to its destination. This
method provides a more predictable and reliable communication experience, as packets
are delivered in order and with a consistent delay.
The main function of multiplexing in the data link layer is to enable the transmission of
multiple data streams over a single communication channel. This is achieved through
various techniques such as time division multiplexing (TDM), frequency division
multiplexing (FDM), and code division multiplexing (CDM).
In TDM, each data stream is given a dedicated time slot for transmission, so that multiple
streams can be transmitted one after the other, in a round-robin fashion.
In FDM, the frequency band is divided into multiple sub-bands, and each data stream is
assigned to a specific sub-band.
In CDM, each data stream is assigned a unique code, and all the data streams are
transmitted simultaneously using the same frequency band.
Multiplexing in the data link layer also helps to reduce the overhead associated with
transmitting multiple data streams separately. By combining multiple data streams into a
single data stream, the overhead associated with data framing, error checking, and flow
control can be reduced, leading to more efficient use of the available bandwidth.
Overall, the function of multiplexing in the data link layer is to improve the efficiency of
data transmission by enabling multiple data streams to be transmitted over a single
communication channel, while minimizing the overhead associated with transmitting
multiple streams separately.
Shannon's formula
C = B log2(1 + S/N)
Max data rate = bandwidth * log2 (1 + (Signal power / Noise power))
Question.
Question. In a certain communication channel, the signal power is 100 W and noise power
is 10 W. In order to send information at the rate of 10 kbps, what is require bandwidth?
Solution:
We can use Shannon's formula to calculate the required bandwidth of the communication
channel:
C = B log2(1 + S/N)
where C is the channel capacity (bits per second), B is the bandwidth (hertz), S is
the signal power, and N is the noise power.
signal power is 100 W, noise power is 10 W and data rate of 10 kbps
Max data rate = bandwidth * log2 (1 + (Signal power / Noise power))
10 = bandwidth * log (1 + (100 / 10)) { log (1 + (100 / 10)) = 3.4594 approx.
equal to 4 is taken here}
10 = bandwidth * 4
bandwidth = 2.5 Kbps
Solution:
According to Shannon theorem which specifies the maximum data rate in a noisy
channel as B log2(1 + S/N).
To get the signal-to-noise ratio (SNR) from 20 dB, we can use the following formula:
The Nyquist rate determines the maximum data rate that can be achieved in a
noise-free channel, and it is given by: Maximum data rate = 2B log2 L
where B is the bandwidth of the channel and L is the number of levels that can be
transmitted. For a binary signal, L=2, so we have:
Substituting B=3 kHz, we get a maximum data rate of 6 kbps, which is the theoretical
maximum data rate assuming a noise-free channel.
Therefore, the maximum achievable data rate in a noisy channel with a 20 dB SNR is
limited to 6 kbps.
Solution
To calculate the transmission delay of a packet, we use the following
formula:
Transmission delay = packet length / bandwidth
Given that the length of the packet is 2 million bytes and the bandwidth
of the channel is 300 kbps, we can convert the units as follows:
2 million bytes = 2,000,000 * 8 bits = 16,000,000 bits
Substituting these values into the formula, we get:
Transmission delay = 16,000,000 bits / 300,000 bits/s
Transmission delay = 53.33 seconds