BCA Semester IV BCA - 408 Networking - I: Unit 1: Network Fundamentals and Data Transmission
BCA Semester IV BCA - 408 Networking - I: Unit 1: Network Fundamentals and Data Transmission
What is networking?
Network Elements
o In the computer world, the term network describes two or more connected
computers that can share resources such as data, a printer, an Internet connection,
applications, or a combination of these.
o In the following sections, we’ll discuss each type of network and describe the
situation that is most appropriate for its use.
o The following set ups which constitute a network in some way are called as network
elements.
o A Wide area network connects computers over a large geographic area, such as a
state,
o province or country.
o WANs often connect multiple smaller networks, such as local area networks (LANs)
or metro area networks (MANs).
o WANs generally utilize different and much more expensive networking equipment
than do LANs.
SL No LAN WAN
1. WANs cover less distances WANs cover greater distances.
2. LAN speeds are more. WAN speeds are slower.
3. LANs primarily use private network WANs can use public or private network
transports. transports
4. It is a group of computers in close The Internet is actually a specific type of
proximity WAN. The Internet is a collection of networks
that are interconnected and, therefore, is
technically an internetwork
5. A LAN is always centralised A WAN can be centralized or distributed. A
centralized WAN consists of a central
computer (at a central site) to which other
computers and dumb terminals connect. The
Internet, on the other hand, consists of many
interconnected computers in many locations.
Thus, it is a distributed WAN.
HOST
WORKSTATION,
SERVER
In the following sections, we’ll look at the five most common topologies:
o Bus
o Star
o Ring
o Mesh
o Backbone
BUS TOPOLOGY
o In a bus topology, all computers are attached to a single continuous cable that is
terminated at both ends, which is the simplest way to create a physical network.
o A single cable, the backbone functions as a shared communication medium that
attach devices with a connector.
o A device wanting to communicate with another device on the network sends a
broadcast message onto the wire that all other devices see, but only the intended
recipient actually accepts and processes the message.
o Bus networks work best with a limited number of devices.
o If more than a few dozen computers are added to a network bus, performance
problems will likely result.
o In addition, if the backbone cable fails, the entire network effectively becomes
unusable.
o Figure above shows an example of a bus network.
o You can think of a bus network as a small party. David is already there, along with
10 other people. David would like to tell Joe something. David yells out, “Joe! Will
you grab me a cup of coffee, please?” Everyone in the party can hear David, but
only Joe will respond.
Advantages:
o Is simple to install
o Is relatively inexpensive so more cheaper
o Is best suited for small networks
o Uses only one single cable so more cost effective than other topologies
o If one computer fails in the network, the other PC are still not affected and they
continue to work.
o Bus network is very simple and easy to set up.
o If there is an urgent need to set up a network and perhaps be used on a short term
basis then the Bus network is the best possibility.
Disadvantages:
o A single fault in the main cable can bring down the entire network
o As the cable length is limited, the number of PC to be connected is less.
o Not suited where the PC to be connected is large.
o If number of PC increases then speed becomes less due to shared bandwidth.
o The bus network is a bit challenging when you have to troubleshoot the problems.
o Terminators are required at both ends of the bus cable.
RING TOPOLOGY
o In a ring network, every device has exactly two neighbors for communication
purposes.
o Although its name suggests a circle kind of wire, Token Ring does not use a
physical ring.
o Data moves down a one-way path from one computer to another.
o All messages travel through a ring in the same direction (either "clockwise" or
"counterclockwise").
o Each machine or computer has a unique address that is used for identification
purposes.
o Ring topologies typically utilize a token passing scheme, used to control access to
the network.
o By utilizing this scheme, only one machine which is having the token can
transmit on the network at a time.
o The machines or computers connected to the ring act as signal boosters or
repeaters which strengthen the signals that traverse the network.
Advantages:
o It does not require a network server to manage the traffic.
o No collisions of frames.
o The ring topology is relatively easy to troubleshoot. A station will know when a cable
fault has occurred because it will stop receiving data from its upstream neighbor.
o The good news about laying out cable in a ring is that the cable design is simple.
Disadvantages:
o The primary disadvantage of ring topology is the failure of one machine will cause
the entire network to fail.
o Difficult to configure the PCs.
o A failure in any cable or device breaks the loop and can take down the entire
network.
o The changes made to network PCs may affect the performance of the entire
network.
STAR TOPOLOGY
Advantages:
o A failure in any star network cable will only take down one computer's network
access and not the entire LAN. (If the hub fails, however, the entire network also
fails.) Fortunately, hub failures are extremely rare.
o It is the easiest topology to install and troubleshoot.
o New stations can be added easily and quickly.
o A single cable failure won’t bring down the entire network.
o It is relatively easy to troubleshoot.
o It gives more performance
o It is more reliable because if one connection fails, it doesn't affect others.
o Easy to replace, install or remove hosts or other devices
o Due to its centralized nature, the topology offers simplicity of operation.
Disadvantages:
o Compared to the bus topology, a star network generally requires more cable.
o Total installation cost can be higher because of the larger number of cables.
o Performance and scalability depending upon central hub.
o Network size is limited by the number of connections that can be made to the hub
o Other nodes may see a performance drop if there is more traffic.
MESH TOPOLOGY
Advantages:
o No traffic problem as there are dedicated links.
o Robust as failure of one link does not affect the entire system.
o Security as data travels along a dedicated line.
o Points to point links make fault identification easy.
o Data can be transmitted from one PC to many PCs as they are connected together.
Disadvantages:
o A mesh topology can become quite complex as wiring and connections increase
exponentially.
o For every n stations, you will have n(n–1)/2 connections. For example, in a network
of 4 computers, you will have 4(4–1)/2 connections, or 6 connections.
o If your network grows to only 10 computers, you will have 45 connections to
manage!
o The payoff for all this work is a more fail-safe, or fault-tolerant, network, at least as
far as cabling is concerned.
o The mesh topology is expensive due to more number of cables.
o Some of the cables are unused or less for unnecessary expense.
o Setting up the network can take more time.
BACKBONE TOPOLOGY
o A backbone network allows several LANs to be connected togheter.
o In a backbone network, no station is directly connected to the backbone; the
stations are part of a LAN, and the backbone connects the LANs.
o A backbone can tie together diverse networks in the same building, in different
buildings in a campus environment, or over wide areas.
o Normally, the backbone's capacity is greater than the networks connected to it.
o A large corporation that has many locations may have a backbone network that ties
all of the locations together, for example, if a server needs to be accessed by
different departments of a company that is located at different geographical
locations.
o Network congestion is often taken into consideration while designing backbones.
o The topology of the bus backbone is BUS topology.
o The topology of the star backbone is STAR topology.
o With complex networks, we must have a way of intelligently identifying which part of
the network we are discussing.
o For this reason, we commonly break networks into backbones and segments.
COMMON NETWORK CONNECTIVITY DEVICES (NIC, HUB, SWITCH, ROUTER,
GATEWAY)
HUB:
Advantages:
Switch:
48-port Switch
o A Switch is a networking device which does not distribute signals without verifying
whether it really needs to propagate to a given port or ports.
o Like a hub, a switch connects multiple segments of a network together, with one
important difference.
o Whereas a hub sends out anything it receives on one port to all the others, a
switch recognizes frame boundaries and pays attention to the destination
MAC address of the incoming frame.
o If the destination is known to be on a different port than the port over which the
frame was received, the switch will forward the frame out over only the port on
which the destination exists.
o If the location of the destination is unknown, then the switch acts much like a hub in
that it floods the frame out every port, except for the port over which it was received.
o Unlike hubs, network switches are capable of inspecting data packets as they
are received, determining the source and destination device of each packet, and
forwarding them appropriately. Generally they look alike a hub only except they
have more intelligence.
o It decides it based on its internal configuration settings.
o Switches operate at layer two (Data Link Layer) of the OSI model.
o By delivering messages only to the connected device intended, a network switch
conserves network bandwidth and offers generally better performance than a
hub.
o The cost to number of ports ratio is best i.e. for a cheaper cost you get
switches with more number of ports.
Router:
o When data packets are transmitted over internet they move through many routers
(because they pass through many networks) in their journey from the source
machine to the destination machine.
o Routers work with IP packets, meaning that it works at the level of the IP protocol.
o Each router keeps information about its neighbors (other routers in the same or
other networks). This information includes the IP address and the cost, which is in
terms of time, delay and other network considerations. This information is kept in
a routing table, found in all routers.
o Based on the destination and source IP addresses of the packet, the router decides
which neighbor it will forward it to.
o It chooses the route with the least cost, and forwards the packet to the first router
on that route.
If you have a LAN and want to connect it to the Internet, then you need a router.
Gateways:
137.22.144.6
Netware
Gateway
TCP/IP 145.65.23.10
2
Let's take the example of a post office to understand the concept of Sender,Receiver and
Carrier.
Let us first describe, in order, the activities that take place at the sender site.
o Higher layer. The sender writes the letter, inserts the letter in an envelope, writes
the sender and receiver addresses, and drops the letter in a mailbox.
o Middle layer. The letter is picked up by a letter carrier and delivered to the post
office.
o Lower layer. The letter is sorted at the post office; a carrier transports the letter.
The Way/Carrier
o The letter is then on its way to the recipient.
o On the way to the recipient's local post office, the letter may actually go through a
central office.
o In addition, it may be transported by truck, train, airplane, boat, or a combination of
these.
Hierarchy
o According to our analysis, there are three different activities at the sender site
and another three activities at the receiver site.
o The task of transporting the letter between the sender and the receiver is done
by the carrier.
o Something that is not obvious immediately is that the tasks must be done in the
order given in the hierarchy.
o At the sender site, the letter must be written and dropped in the mailbox before
being picked up by the letter carrier and delivered to the post office.
o At the receiver site, the letter must be dropped in the recipient mailbox before
being picked up and read by the recipient.
VIRTUAL LANs
o Virtual Local Area Network (VLAN) is a local area network configured by software, not
by physical wiring.
o Figure below shows a switched LAN in an engineering firm in which 10 stations are
grouped into three LANs that are connected by a switch.
o In a switched LAN, changes in the work group mean physical changes in the network
configuration.
o Figure below shows the same switched LAN divided into VLANs.
o The whole idea of VLAN technology is to divide a LAN into logical, instead of physical,
segments.
o A LAN can be divided into several logical LANs called VLANs.
o Each VLAN is a work group in the organization. If a person moves from one group to
another, there is no need to change the physical configuration.
o The group membership in VLANs is defined by software, not hardware.
o Any station can be logically moved to another VLAN.
o All members belonging to a VLAN can receive broadcast messages sent to that particular
VLAN.
o This means if a station moves from VLAN 1 to VLAN 2, it receives broadcast messages
sent to VLAN 2, but no longer receives broadcast messages sent to VLAN 1.
o It is obvious that the problem in our previous example can easily be solved by using
VLANs.
o Moving engineers from one group to another through software is easier than changing the
configuration of the physical network.
o VLAN technology even allows the grouping of stations connected to different switches in a
VLAN.
The OSI model
6. Virtually all computer networks in use today are based on the Open Systems
Interconnection (OSI) standard.
o The core of this standard is the OSI Reference Model, a set of seven layers that
define the different stages that data must go through to travel from one device to
another over a network.
o Think of the seven layers as the assembly line in the car manufacturing company.
At each layer, certain things happen to the data that prepare it for the next layer.The
seven layers are:
o Application layer interacts with application programs and is the highest level
of OSI model.
o Provides a means for the user to access information on the network through an
application.
o Application layer functions typically include providing network services such
as identifying communication partners, determining resource availability, and
synchronizing communication.
o When determining resource availability, the application layer must decide
whether sufficient network resources for the requested communication
exist.
o Some examples of application layer implementations include Telnet, File
Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP).
1.
Layer 6: Presentation Layer
o Presentation Layer takes the data provided by the Application layer and converts it
into a standard format that the other layers can understand.
o It converts local host computer data representations into a standard network
format for transmission on the network.
o On the receiving side, it changes the network format into the appropriate host
computer's format so that data can be utilized independent of the host
computer.
o Manages the presentation of the information in an ordered and meaningful
manner.
o This layer's primary function is the syntax and semantics of the data
transmission.
o The presentation layer provides a variety of coding and conversion functions that
are applied to application layer data. ASCII and EBCDIC conversions,
cryptography, and the like are handled here.
o It is designed for data translation, encryption, decryption, and compression.
o These functions ensure that information sent from the application layer of one
system would be readable by the application layer of another system.
o Layer 5 i.e. Session Layer establishes, maintains and ends communication with
the receiving device.
o Coordinates session/connection activities between devices over the network.
o Communication sessions consist of service requests and responses that occur
between applications located in different network devices.
o These requests and responses are coordinated by protocols implemented at the
session layer.
o Some examples of session-layer implementations include Zone Information Protocol
(ZIP), the AppleTalk protocol; and Session Control Protocol (SCP).
Layer 4: Transport Layer
Breaks the message (from Sessions Layer) into smaller packets, assigns
sequence number and sends them.
In case IP, lost packets arriving out of order must be reordered.
o Provides for the reliable delivery of data frames with the necessary
synchronization, error control, and flow control across a physical network.
o This layer has the important task of creating and managing frames which are sent
out on the network.
o The largest packet size that can be sent defines the Maximum Transmission Unit
(MTU).
o The physical layer is responsible for movements of individual bits from one node
to the next node.
o Data travels from the application layer of the sender, down through the levels,
across the nodes of the network service, and up through the levels of the receiver.
o To keep track of the transmission, each layer "wraps" the preceding layer's data
and header with its own header.
o A small chunk of data will be transmitted with multiple layer headers attached to it.
o On the receiving end, each layer strips off the header that corresponds to its
respective level.
o The flow of information is from the top layer and down to the physical layer at
source node; and from the physical layer up to the application later at the
destination node as illustrated in the figure below.
o Each layer in the source system adds control information to data and each layer in
the destination system analyzes and removes the control information from that data.
TCP/IP PROTOCOL SUITE
o The TCP/IP protocol suite, also referred to as the Internet protocol suite, is the
set of communications protocols that implements the rules on which the Internet
and most commercial networks run.
o It is named after the two most important protocols in the suite: the Transmission
Control Protocol (TCP) and the Internet Protocol (IP).
o The TCP/IP protocol suite—like the OSI reference model—is defined as a set of
layers.
o Upper layers are logically closer to the user and rely on lower layer protocols to
translate data into forms that are transmitted physically over the network.
APPLICATION LAYER
Transport Layer
o The transport layer of the TCP/IP model is same like transport layer of the OSI
model.
o The transport layer is the third layer of the TCP/IP protocol counting from lower
layers.
o The transmission and reception of data is handled by the transport layer.
o This layer is also functions for detecting the errors in the transmitted data.
o The applications used are different on different computers. To identify the
applications along with the operating systems, the transport layer uses a
numbering system.
o These numbers assigned are associated with the application used and are called
port numbers.
INTERNET LAYER
o The Internet layer of the TCP/IP model maps to the network layer of the OSI
model.
o Consequently, the Internet layer is sometimes referred to as the network layer.
o The primary component of the Internet layer is the Internet Protocol (IP).
o This layer Packages data into IP datagrams, which contain source and
destination address information that is used to forward the datagrams between
hosts and across networks.
o Performs routing of IP datagram.
o The data packets are sent from the host machine in any random order across the
network.
o The IP protocol is responsible for receiving the data packets in an ordered fashion
at the receiver end.
o The lowest layer of the TCP/IP protocol stack is the Network Access Layer.
o The network access layer contains two sublayers, the media access control
(MAC) sublayer and the physical sublayer.
o The MAC sublayer aligns closely with the data link layer of the OSI model, and is
sometimes referred to by that name.
o The physical sublayer aligns with the physical layer of the OSI model.
o It specifies details of how data is physically sent through the network, including
how bits are handled by hardware devices that interface directly with a network
medium, such as coaxial cable, optical fiber, or twisted-pair copper wire.
o This layer uses protocol to send packets of information over the network.
o The main functions of network interface layer are routing and synchronizing
data over the network, checking the data format, converting signals (analog
to digital or vice versa), and error detection in the transmitted data.
DATA AND SIGNALS
o One of the major functions of the physical layer is to move data in the form of
electromagnetic signals across a transmission medium.
o Whether you are collecting numerical statistics from another computer, sending
animated pictures from a design workstation, or causing a bell to ring at a distant
control center, you are working with the transmission of data across network
connections.
o Generally, the data usable to a person or application are not in a form that can be
transmitted over a network.
o For example, a photograph must first be changed to a form that transmission media
can accept.
o To be transmitted, data must be transformed to electromagnetic signals.
BANDWIDTH
o One characteristic that measures network performance is bandwidth.
o The bandwidth is normally a difference between two numbers. For example, if a
composite signal contains frequencies between 1000 and 5000, its bandwidth is
5000 - 1000, or 4000.
o However, the term bandwidth can be used in two different contexts with two
different measuring values:
Bandwidth in hertz
Bandwidth in bits per second.
Bandwidth in Hertz
8. Bandwidth in hertz is the range of frequencies a channel can pass.
9. For example, we can say the bandwidth of a subscriber telephone line is 4-
40 kHz.
LATENCY (DELAY)
o The latency or delay defines how long it takes for an Entire Message to
Completely arrive at the destination from the time the first bit is sent out from
the source.
o We can say that latency is made of four components: propagation time,
transmission time, queuing time and processing delay.
o Latency =propagation time +transmission time +queuing time + processing
delay
Transmission Modes:
TYPES
o Guided
o Unguided.
Guided media include twisted-pair cable, coaxial cable, and fiber-optic cable.
Unguided medium is free space.
GUIDED MEDIA
o Guided media, which are those that provide a conduit from one device to another,
include twisted-pair cable, coaxial cable, or fiber-optic cable.
o A signal traveling along any of these media is directed and contained by the
physical limits of the medium.
o Twisted-pair and coaxial cable use metallic (copper) conductors that accept and
transport signals in the form of electric current.
o Optical fiber is a cable that accepts and transports signals in the form of light.
Twisted-Pair Cable
A twisted pair consists of two conductors (normally copper), each with its own plastic
insulation, twisted together, as shown in Figure given below:
o One of the wires is used to carry signals to the receiver, and the other is used only
as a ground reference.
o The receiver uses the difference between the two.
o In addition to the signal sent by the sender on one of the wires, interference
(noise) may affect both wires and create unwanted signals.
o If the two wires are parallel, the effect of these unwanted signals is not the same
in both wires because they are at different locations relative to the noise sources
(e,g., one is closer and the other is farther).
o This results in a difference at the receiver. By twisting the pairs, a balance is
maintained.
o For example, suppose in one twist, one wire is closer to the noise source and
the other is farther; in the next twist, the reverse is true.
o Twisting causes both wires to be equally affected by external noise.
o This means that the receiver, which calculates the difference between the two,
receives no unwanted signals.
o The unwanted signals are mostly canceled out.
Unshielded (UTP) Versus Shielded Twisted-Pair Cable (STP):
o The most common UTP connector is RJ 45 (RJ stands for registered jack), as
shown in Figure above.
o The RJ-45 is a keyed connector, meaning the connector can be inserted in only
one way.
o They are having the attenuation problem i.e. signal gets weak after traveling some
distance.
o So it requires repeater to enhance the signal strength.
o Their bandwidth is relatively less.
o They are still susceptible to interference and noise.
o Because there can be different kind signals wired to different outlets and all
outlets look the same, the user needs to be careful not to wire a device to an outlet
where a wrong type of signal is wired. If this happens then wrong Wring connection
can lead to situation that the system does not work correctly or even to equipment
damages.
o The application originally designed for some other type of cabling need usually
special adapters which cost money
o The current UTP systems have limited high frequency performance, so they do
not suit well for transmission of very high frequency signals like cable TV, TV
antenna and radio antenna signals.
o Limited data rates—the longer a signal has to travel over twisted-pair, the lower
the data rate. At 100 feet (30 meters), twisted-pair can carry 100Mbps, but at 3.5
miles (5.5 km), the data rate drops to 2Mbps or less.
Coaxial Cable
o Coaxial cable carries signals of higher frequency ranges than those in twisted pair
cable, in part because the two media are constructed quite differently.
o Instead of having two wires, coaxial has a central core conductor of solid or
stranded wire (usually copper) enclosed in an insulating sheath, which is, in turn,
encased in an outer conductor of metal foil, braid, or a combination of the two.
o The outer metallic wrapping serves both as a shield against noise and as the
second conductor, which completes the circuit.
o This outer conductor is also enclosed in an insulating sheath, and the whole cable
is protected by a plastic cover (see Figure given above).
o Coaxial cable is flexible. The cable is designed in such a way that it can bend
easily. This means it can travel along paths that take it around corners and up and
down walls or wire tubes.
o Another benefit is its durability. The outer layer protects the wiring inside from
weather and the elements.
o Greater bandwidth-Compared to twisted-pair, coax provides greater bandwidth.
Because it has greater bandwidth, it supports a mixed range of services. Voice,
data, and even video and multimedia can benefit from the enhanced capacity.
o Lower error rates-Because the inner conductor is in a shield, noise immunity is
improved, and coax has lower error rates and therefore better performance than
twisted-pair. The error rate is generally 10-9 (i.e., 1 in 1 billion) bps.
o Greater spacing between amplifiers/repeaters-Coax's cable shielding reduces
noise and crosstalk, which means amplifiers can be spaced farther apart than with
twisted-pair.
Applications
o Cable TV networks also use coaxial cables. In the traditional cable TV network, the
entire network used coaxial cable. Later, however, cable TV providers replaced
most of the media with fiber-optic cable; hybrid networks use coaxial cable only at
the network boundaries, near the consumer premises.
o Cable TV uses RG- 59 coaxial cable.
o Another common application of coaxial cable is in traditional Ethernet LANs.
Because of its high bandwidth, and consequently high data rate, coaxial cable was
chosen for digital transmission in early Ethernet LANs.
o Coaxial cable was widely used in analog telephone networks where a single
coaxial network could carry 10,000 voice signals.
o Later it was used in digital telephone networks where a single coaxial cable could
carry digital data up to 600 Mbps.
o However, coaxial cable in telephone networks has largely been replaced today with
fiber-optic cable.
Fiber-Optic Cable
Advantages:
o Data Security: Magnetic fields work in two ways. They don't just generate
noise in signal carrying conductors; they also let the information on the
conductor to be leaked out. Fluctuations in the induced magnetic field outside a
conductor carry the same information as the current passing through the
conductor. Shielding the wire, as in coaxial cables can reduce the problem, but
sometimes shielding can allow enough signal leaks to allow tapping, which is
exactly what we wouldn't want. There are no radiated magnetic fields around
optical fibers; that makes it impossible to tap the signal being transmitted
through a fiber. Since fiber optics does not radiate electromagnetic energy,
emissions cannot be intercepted. Thus, the fiber is the most secure medium
available for carrying sensitive data.
o Cables of optical fibers are smaller and lighter than conventional coaxial
cables, yet they can carry much more information, making them useful for
transmitting large amounts of data between computers and for carrying data-
intensive television pictures or many simultaneous phone conversations.
o Also, optical cables do not require electricity and therefore do not pose a
fire hazard because of sparks.
o Low Attenuation: Fiber optics experience very little data loss, even over long
distances, because light travels through the fiber without experiencing
attenuation or a loss of intensity over time.
o Ease of Installation: The small size, lightweight and flexibility of fiber optic
cables also make them easier to be used in temporary or portable installations.
o High Bandwidth over Long Distances: Fiber optics has a large capacity to
carry high speed signals over longer distances without repeaters than other
types of cables.
Disadvantages:
o Fiber-optic cable is often found in backbone networks because its high bandwidth
is cost-effective.
o Some cable TV companies use a combination of optical fiber and coaxial cable,
thus creating a hybrid network. Optical fiber provides the backbone structure while
coaxial cable provides the connection to the user premises. This is a cost-effective
configuration since the narrow bandwidth requirement at the user end does not
justify the use of optical fiber.
The section of the spectrum defined as radio waves and microwaves is divided into
eight ranges, called bands, each regulated by government authorities.
o These bands are rated from very low frequency (VLF) to extremely high frequency
(EHF).
o Table given below lists these bands, their ranges, propagation methods, and some
applications.
We can divide wireless transmission into three broad groups:
1. Radio waves,
2. Microwaves,
3. Infrared waves.
See Figure below.
RADIO WAVES
o Although there is no clear-cut demarcation between radio waves and microwaves,
yet we can say that radio waves ranging in frequencies between 3 kHz and 1
GHz are normally called radio waves;
o Radio waves ranging in frequencies between 1 and 300 GHz are called
microwaves.
o However, the behavior of the waves, rather than the frequencies, is a better criterion
for classification.
o Radio waves, for the most part, are Omni-directional.
o When an antenna transmits radio waves, they are propagated in all directions.
o A sending antenna sends waves that can be received by any receiving antenna.
o This means that the sending and receiving antennas do not have to be aligned.
o The Omni-directional property has a disadvantage, too. The radio waves
transmitted by one antenna are susceptible to interference by another antenna
that may send signals using the same frequency or band.
o Radio waves, particularly those waves that propagate in the sky mode, can travel
long distances.
o This makes radio waves a good candidate for long-distance broadcasting.
o Radio waves, particularly those of low and medium frequencies, can penetrate
walls.
o This characteristic is an advantage because, for example, an transistor or radio
can receive signals inside a building also.
o The radio wave band is relatively narrow, just under 1 GHz, compared to the
microwave band.
o Almost the entire band is regulated by authorities.
o Using any part of the band requires permission from the authorities.
OMNI-DIRECTIONAL ANTENNA
o Radio waves use Omni-directional antennas that send out signals in all directions.
o Figure given below shows an Omni-directional antenna.
Applications
Microwaves
o Electromagnetic waves having frequencies between 1 and 300 GHz are called
microwaves.
o Microwaves are unidirectional.
o This means that the sending and receiving antennas need to be aligned.
INFRARED
o Infrared waves, with frequencies from 300 GHz to 400 THz, can be used for very
short-range communication for example within our homes.
o We can compare it with a player who runs very fast but he can run only for
short distance such as 100 mtrs. But a player who runs slow can run for miles
or long distances.
o Infrared waves, having very high frequencies, cannot penetrate walls.
o This advantageous characteristic prevents interference between one system to
another; a short-range communication system in one room cannot be affected by
another system in the next room.
o When we use our infrared REMOTE CONTROL, we do not interfere with the
use of the remote by our neighbors.
o However, this same characteristic makes infrared signals useless for long-range
communication.
o In addition, we cannot use infrared waves outside a building because the sun's rays
contain infrared waves that can interfere with the communication.