Networks Unit2
Networks Unit2
FDMA
Assigning different frequency band (range) to each
chennel. So, any two signals should not have same type of
frequency range.
Ex- FM Radio
TDMA
TDMA is a time based access. Here, we give certain time
frame to each channel.
Ex- Reality shows in tv channels
CDMA
Unique code has been assigned to each channel to
distinguish from each other.
Ex- Sim card(Mobile number)
IEEE 802.11a
It’s a wireless local network (WLAN), It is the first Wi-
Fi standard to use a multi-carrier modulation scheme (OFDM)
to support high data rates up to 54 Mbps at 5 GHz.
IEEE 802.11g
802.11g works in the 2.4 GHz band (like 802.11b) but
operates at a maximum raw data rate of 54 Mbps.
Using the CSMA/CA transmission scheme, the
maximum net throughput is achieved.
IEEE 802.11e
IEEE 802.11e is an approved amendment to the IEEE
802.11 standard that defines a set of quality of service (QoS)
Enhancements for wireless LAN applications through
modifications to the media access control (MAC) layer.
IEEE 802.11n
IEEE 802.11n builds on previous 802.11 standards by
adding multiple-input multiple-output (MIMO) and adding
channels to the PHY (physical layer), and frame aggregation
to the MAC layer.
MIMO:
It is a technology that uses multiple antennas to
coherently resolve more information than using a single
antenna. One way it provides this is through Spatial Division
Multiplexing (SDM).
IEEE 802.11ac
IEEE 802.11ac is a part of the Wi-Fi networking family,
providing high-throughput wireless local area networks
(WLANs) on the 5 GHz band.
The standard is labelled as Wi-Fi 5 by Wi-Fi Alliance.
IEEE 802.11ax
It is an IEEE draft amendment that defines modifications
to the 802.11physical layer (PHY) and the medium access
control (MAC) sublayer for high-efficiency operation
The technical term for an 802.11ax is High Efficiency
(HE).
IEEE 802.11ay
It’s enabling new wireless applications such
as: Millimeter-wave distribution networks, Data center inter-
rack connectivity, Mobile offloading, Augmented
reality/virtual reality, and 8K video streaming.
It supports MIMO technology, enabling multiple data
streams to be transmitted simultaneously, to increase
throughput and reliability.
IEEE 802.11ba
It’s a Wi-Fi standard that introduces a Wake-Up Radio
(WUR) to improve power efficiency.
Here are some key aspects of IEEE 802.11ba:
• Wake-up procedure
• Unique identification
IEEE 802.11be
IEEE 802.11be will deliver Extremely High Throughput
(EHT). It is known as Wi-Fi 7.
Quality of Service (QoS):
It is an important concept, particularly when working
with multimedia applications.
such as video conferencing, streaming services, and VoIP
(Voice over IP), require certain bandwidth, latency, jitter.
QoS methods helps for seamless and reliable
communication.
Quality of service (QoS) that work on a network to
control traffic and ensure the performance of critical
applications with limited network capacity.
It enables organizations to adjust their overall network
traffic by prioritizing specific high-performance
applications.
QoS Specification
• Delay
• Jitter
• Throughput
• Error Rate
Implementing QoS
• Planning
• Design
• Testing
• Deployment
• Monitoring and analyzing
3. Call Admission
• R-specification: defines the QoS requesting
• T-specification: defines the traffic of the channel.
4. Diff-Serv
Differentiated Service is a stateful solution. It provides
reduced state services i.e. maintaining state only for larger
granular flows rather than end-to-end flows.
BLUETOOTH:
Bluetooth is a wireless communication protocol designed
for short-range data transmission.
Bluetooth technology is based on Ad-hoc technology
also known as Ad-hoc piconets.
Bluetooth simply follows the principle of transmitting
and receiving data using radio waves.
Bluetooth employs a master-slave architecture, where
one device (the master) controls the connection and
communicates with one or more secondary devices(the slave).
When two devices start to share data, they form a
network called piconet which can further accommodate more
than five devices.
Architecture of Bluetooth
The architecture of Bluetooth defines two types of
networks:
Piconet:
Piconet is a type of Bluetooth network that contains one
primary node called the master node and six active secondary
nodes called slave nodes.
The communication between the primary and secondary
nodes can be one-to-one or one-to-many.
Possible communication is only between the master and
slave; Slave-slave communication is not possible.
Scatternet
It is formed by using various piconets. A slave that is
present in one piconet can act as master or we can say primary
in another piconet.
PROTOCOL STACK:
Protocol stacks is a collection of protocols that work
together to provide communication services. Each protocol in
the stack is responsible for a specific task.
A protocol stack or protocol suite is the architecture of a
protocol that follows the layered architecture design principle.
Layered Architecture:
The layered architecture pattern, often known as the “n-
tier” architecture design, is a common technique for reducing
complexity across numerous disciplines.
A simple example is the airline system:
An airplane system is a good analogy to use because
computer networking is a lot like air travel: In an airplane, a
passenger is being “shipped” from source to destination the
same way that in a computer network a message is being
shipped from one device to another.
Peer-to-Peer Protocol
Protocols in a protocol stack are said to be peer-to-peer
protocols.
This means that the protocol operates between two
entities that are peers, at each layer.
For example, a protocol entity in the nth layer can only
exchange data units with its peer entity at the same level.
NETWORK SECURITY:
The most basic example of Network Security is password
protection which the user of the network chooses.
The network security solutions protect various
vulnerabilities of the computer systems such as users,
location, data, devices, and applications.
Network security is the practice of protecting a computer
network from unauthorized access, misuse, or attacks. It
involves using tools, technologies, and policies to ensure that
data traveling over the network is safe and secure, keeping
sensitive information away from hackers and other threats.
Architecture of Zigbee:
Zigbee architecture is a combination of 6 layers.
1. Application Layer
2. Application Interface Layer
3. Security Layer
4. Network Layer
5. Medium Access Control Layer
6. Physical Layer
Features of Zigbee:
1. Stochastic addressing: A device is assigned a
random address and announced. Mechanism for address
conflict resolution. Parents node don’t need to maintain
assigned address table.
Zigbee Applications:
1. Medical Data Collection
2. Industrial Control Systems
3. Meter reading system
4. Light control system
5. Commercial
6. Home Networking
Advantages of Zigbee:
1. Designed for low power consumption.
2. Easy implementation
3. Adequate security features
4. Low cost
5. Mesh networking
6. Reliability
Disadvantages of Zigbee :
1. Limited range:
2. Limited data rate
3. Interoperability
4. Security