Unit I
Unit I
Unit I
Unit-I
Data Communication Components
1. Message
2. Sender
3. Receiver
4. Transmission Medium
5. Set of rules (Protocol)
2. Sender :
To transfer message from source to destination, someone must be there who
will play role of a source. Sender plays part of a source in data communication
system. It is simple a device that sends data message. The device could be in
form of a computer, mobile, telephone, laptop, video camera, or a workstation,
etc.
3. Receiver :
It is destination where finally message sent by source has arrived. It is a device
that receives message. Same as sender, receiver can also be in form of a
computer, telephone mobile, workstation, etc.
4. Transmission Medium :
In entire process of data communication, there must be something which could
act as a bridge between sender and receiver, Transmission medium plays that
part. It is physical path by which data or message travels from sender to
receiver. Transmission medium could be guided (with wires) or unguided
(without wires), for example, twisted pair cable, fiber optic cable, radio waves,
microwaves, etc.
Data representation
Data is represented in various forms such as text, numbers, images, audio and
video.
Text: In data communication, it is represented as a bit pattern, a sequence of
bits (0s and 1s). Different sets of bit patterns, called code, have been designed
to represent text and symbols and the process of representing them is called
coding. Characters can be represented in Unicode by using the American
Standard Code for Information Interchange (ASCII).
Numbers: They are also represented by bit patterns. To simplify mathematical
operations the number is directly converted to a binary number.
Images: They are also represented by bit patterns. In its simplest form, an
image is composed of a matrix of pixels, where each pixel is a small dot.
Resolution determines the size of the pixel.
Audio: It refers to the recording or broadcasting of sound or music. Audio is by
nature different from text, numbers, images. It is not discrete, but continuous.
Video: It refers to the recording or broadcasting of a picture or a movie. It can
either be produced as a continuous entity, or can be a combination of images,
each a discrete entity, arranged to convey the idea of motion.
Flow of Network
Flow networks is a graph used to model the systems .Here, the traffic is called a
flow, which is transmitted across from the source node through the edges and
nodes to the sink node.
Nodes that are neither t or s are known as internal nodes. An example of a flow
network in given in Figure 1 where the numbers besides the edges represents the
capacity of the edge.
there is no edge entering the source s and there is not edge leaving the sink t
there is at lease one edge (entering or leaving) each node
all capacities of the edges are non-negative integers.
A Network Topology
Point-to-Point
Point-to-point networks contains exactly two hosts such as computer, switches or
routers, servers connected back to back using a single piece of cable. Often, the
receiving end of one host is connected to sending end of the other and vice-versa.
If the hosts are connected point-to-point logically, then may have multiple
intermediate devices. But the end hosts are unaware of underlying network and see
each other as if they are connected directly.
Bus Topology
In case of Bus topology, all devices share single communication line or cable.Bus
topology may have problem while multiple hosts sending data at the same time.
Therefore, Bus topology either uses CSMA/CD technology or recognizes one host
as Bus Master to solve the issue. It is one of the simple forms of networking where
a failure of a device does not affect the other devices. But failure of the shared
communication line can make all other devices stop functioning.
Both ends of the shared channel have line terminator. The data is sent in only one
direction and as soon as it reaches the extreme end, the terminator removes the data
from the line.
Star Topology
All hosts in Star topology are connected to a central device, known as hub device,
using a point-to-point connection. That is, there exists a point to point connection
between hosts and hub. The hub device can be any of the following:
Failure of any host results in failure of the whole ring. Thus, every connection in
the ring is a point of failure. There are methods which employ one more backup
ring.
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts. This topology
has hosts in point-to-point connection with every other host or may also have hosts
which are in point-to-point connection to few hosts only.
Hosts in Mesh topology also work as relay for other hosts which do not have direct
point-to-point links. Mesh technology comes into two types:
Full Mesh: All hosts have a point-to-point connection to every other host in
the network. Thus for every new host n(n-1)/2 connections are required. It
provides the most reliable network structure among all network topologies.
Partially Mesh: Not all hosts have point-to-point connection to every other
host. Hosts connect to each other in some arbitrarily fashion. This topology
exists where we need to provide reliability to some hosts out of all.
Tree Topology
Also known as Hierarchical Topology, this is the most common form of network
topology in use presently. This topology imitates as extended Star topology and
inherits properties of bus topology.
This topology divides the network in to multiple levels/layers of network. Mainly
in LANs, a network is bifurcated into three types of network devices. The
lowermost is access-layer where computers are attached. The middle layer is known
as distribution layer, which works as mediator between upper layer and lower layer.
The highest layer is known as core layer, and is central point of the network, i.e.
root of the tree from which all nodes fork.
All neighboring hosts have point-to-point connection between them. Similar to the
Bus topology, if the root goes down, then the entire network suffers even though it
is not the single point of failure. Every connection serves as point of failure, failing
of which divides the network into unreachable segment.
Daisy Chain
This topology connects all the hosts in a linear fashion. Similar to Ring topology,
all hosts are connected to two hosts only, except the end hosts. Means, if the end
hosts in daisy chain are connected then it represents Ring topology.
Each link in daisy chain topology represents single point of failure. Every link
failure splits the network into two segments. Every intermediate host works as relay
for its immediate hosts.
Hybrid Topology
A network structure whose design contains more than one topology is said to be
hybrid topology. Hybrid topology inherits merits and demerits of all the
incorporating topologies.
Layered Architecture
o The main aim of the layered architecture is to divide the design into small
pieces.
o Each lower layer adds its services to the higher layer to provide a full set of
services to manage communications and run the applications.
o It provides modularity and clear interfaces, i.e., provides interaction between
subsystems.
o It ensures the independence between layers by providing the services from
lower to higher layer without defining how the services are implemented.
Therefore, any modification in a layer will not affect the other layers.
o The number of layers, functions, contents of each layer will vary from network
to network. However, the purpose of each layer is to provide the service from
lower to a higher layer and hiding the details from the layers of how the
services are implemented.
o The basic elements of layered architecture are services, protocols, and
interfaces.
o Service: It is a set of actions that a layer provides to the higher layer.
o Protocol: It defines a set of rules that a layer uses to exchange the
information with peer entity. These rules mainly concern about both the
contents and order of the messages used.
o Interface: It is a way through which the message is transferred from
one layer to another layer.
o In a layer n architecture, layer n on one machine will have a communication
with the layer n on another machine and the rules used in a conversation are
known as a layer-n protocol.
The OSI Model is a logical and conceptual model that defines network
communication used by systems open to interconnection and communication with
other systems. The Open System Interconnection (OSI Model) also defines a
logical network and effectively describes computer packet transfer by using
various layers of protocols.
Physical Layer
The lowest layer of the OSI Model is concerned with electrically or optically
transmitting raw unstructured data bits across the network from the physical layer
of the sending device to the physical layer of the receiving device. It can include
specifications such as voltages, pin layout, cabling, and radio frequencies. At the
physical layer, one might find “physical” resources such as network hubs, cabling,
repeaters, network adapters or modems.
Data Link Layer
At the data link layer, directly connected nodes are used to perform node-to-node
data transfer where data is packaged into frames. The data link layer also corrects
errors that may have occurred at the physical layer.
The data link layer encompasses two sub-layers of its own. The first, media access
control (MAC), provides flow control and multiplexing for device transmissions
over a network. The second, the logical link control (LLC), provides flow and error
control over the physical medium as well as identifies line protocols.
Network Layer
The network layer is responsible for receiving frames from the data link layer, and
delivering them to their intended destinations among based on the addresses
contained inside the frame. The network layer finds the destination by using logical
addresses, such as IP (internet protocol). At this layer, routers are a crucial
component used to quite literally route information where it needs to go between
networks.
Transport Layer
The transport layer manages the delivery and error checking of data packets. It
regulates the size, sequencing, and ultimately the transfer of data between systems
and hosts. One of the most common examples of the transport layer is TCP or the
Transmission Control Protocol.
Session Layer
The session layer controls the conversations between different computers. A
session or connection between machines is set up, managed, and termined at layer
Session layer services also include authentication and reconnections.
Presentation Layer
The presentation layer formats or translates data for the application layer based on
the syntax or semantics that the application accepts. Because of this, it at times also
called the syntax layer. This layer can also handle the encryption and decryption
required by the application layer.
Application Layer
At this layer, both the end user and the application layer interact directly with the
software application. This layer sees network services provided to end-user
applications such as a web browser or Office 365. The application layer identifies
communication partners, resource availability, and synchronizes communication.
TCP/IP Model
The OSI Model we just looked at is just a reference/logical model. It was designed
to describe the functions of the communication system by dividing the
communication procedure into smaller and simpler components. But when we talk
about the TCP/IP model, it was designed and developed by Department of
Defense (DoD) in 1960s and is based on standard protocols. It stands for
Transmission Control Protocol/Internet Protocol. The TCP/IP model is a concise
version of the OSI model. It contains four layers, unlike seven layers in the OSI
model.
The layers are:
1. Process/Application Layer
2. Host-to-Host/Transport Layer
3. Internet Layer
4. Network Access/Link Layer
This layer corresponds to the combination of Data Link Layer and Physical Layer
of the OSI model. It looks out for hardware addressing and the protocols present in
this layer allows for the physical transmission of data.
We just talked about ARP being a protocol of Internet layer, but there is a conflict
about declaring it as a protocol of Internet Layer or Network access layer. It is
described as residing in layer 3, being encapsulated by layer 2 protocols.
2. Internet Layer –
This layer parallels the functions of OSI’s Network layer. It defines the protocols
which are responsible for logical transmission of data over the entire network. The
main protocols residing at this layer are :
1. IP – stands for Internet Protocol and it is responsible for delivering packets
from the source host to the destination host by looking at the IP addresses in the
packet headers. IP has 2 versions:
IPv4 and IPv6. IPv4 is the one that most of the websites are using currently. But
IPv6 is growing as the number of IPv4 addresses are limited in number when
compared to the number of users.
2. ICMP – stands for Internet Control Message Protocol. It is encapsulated within
IP datagrams and is responsible for providing hosts with information about
network problems.
3. ARP – stands for Address Resolution Protocol. Its job is to find the hardware
address of a host from a known IP address. ARP has several types: Reverse
ARP, Proxy ARP, Gratuitous ARP and Inverse ARP.
3. Host-to-Host Layer –
This layer is analogous to the transport layer of the OSI model. It is responsible for
end-to-end communication and error-free delivery of data. It shields the upper-
layer applications from the complexities of data. The two main protocols present in
this layer are :
1. Transmission Control Protocol (TCP) – It is known to provide reliable and
error-free communication between end systems. It performs sequencing and
segmentation of data. It also has acknowledgment feature and controls the flow
of the data through flow control mechanism. It is a very effective protocol but
has a lot of overhead due to such features. Increased overhead leads to
increased cost.
2. User Datagram Protocol (UDP) – On the other hand does not provide any
such features. It is the go-to protocol if your application does not require
reliable transport as it is very cost-effective. Unlike TCP, which is connection-
oriented protocol, UDP is connectionless.
4. Application Layer –
This layer performs the functions of top three layers of the OSI model:
Application, Presentation and Session Layer. It is responsible for node-to-node
communication and controls user-interface specifications. Some of the
protocols present in this layer are: HTTP, HTTPS, FTP, TFTP, Telnet, SSH,
SMTP, SNMP, NTP, DNS, DHCP, NFS, X Window, LPD.
Difference between OSI and TCP/IP Model
TCP/IP OSI
Transport layer in TCP/IP does not provide In OSI model, transport layer provides
assurance delivery of packets. assurance delivery of packets.
Transmission Media
A transmission medium is a physical path between the transmitter and the receiver
i.e. it is the channel through which data is sent from one place to another.
1. Guided Media:
It is also referred to as Wired or Bounded transmission media. Signals being
transmitted are directed and confined in a narrow pathway by using physical links.
Features:
High Speed
Secure
Used for comparatively shorter distances
Advantages:
⇢ Least expensive
⇢ Easy to install
⇢ High-speed capacity
⇢ Susceptible to external interference
⇢ Lower capacity and performance in comparison to STP
⇢ Short distance transmission due to attenuation
Shielded Twisted Pair (STP):
This type of cable consists of a special jacket (a copper braid covering or a foil
shield) to block external interference. It is used in fast-data-rate Ethernet and in
voice and data channels of telephone lines.
Advantages:
⇢ Better performance at a higher data rate in comparison to UTP
⇢ Eliminates crosstalk
⇢ Comparatively faster
⇢ Comparatively difficult to install and manufacture
⇢ More expensive
⇢ Bulky
(ii) Coaxial Cable –
It has an outer plastic covering containing an insulation layer made of PVC or
Teflon and 2 parallel conductors each having a separate insulated protection cover.
The coaxial cable transmits information in two modes: Baseband mode(dedicated
cable bandwidth) and Broadband mode(cable bandwidth is split into separate
ranges). Cable TVs and analog television networks widely use Coaxial cables.
Advantages:
High Bandwidth
Better noise Immunity
Easy to install and expand
Inexpensive
Disadvantages:
Single cable failure can disrupt the entire network
(iii) Optical Fiber Cable –
It uses the concept of reflection of light through a core made up of glass or plastic.
The core is surrounded by a less dense glass or plastic covering called the cladding.
It is used for the transmission of large volumes of data.
The cable can be unidirectional or bidirectional. The WDM (Wavelength Division
Multiplexer) supports two modes, namely unidirectional and bidirectional mode.
Advantages:
Increased capacity and bandwidth
Lightweight
Less signal attenuation
Immunity to electromagnetic interference
Resistance to corrosive materials
Disadvantages:
Difficult to install and maintain
High cost
Fragile
(iv) Stripline
Stripline is a transverse electromagnetic (TEM) transmission line medium invented
by Robert M. Barrett of the Air Force Cambridge Research Centre in the 1950s.
Stripline is the earliest form of the planar transmission line. It uses a conducting
material to transmit high-frequency waves it is also called a waveguide. This
conducting material is sandwiched between two layers of the ground plane which
are usually shorted to provide EMI immunity.
(v) Microstripline
In this, the conducting material is separated from the ground plane by a layer of
dielectric.
2. Unguided Media:
It is also referred to as Wireless or Unbounded transmission media. No physical
medium is required for the transmission of electromagnetic signals.
Features:
The signal is broadcasted through air
Less Secure
Used for larger distances
There are 3 types of Signals transmitted through unguided media:
(i) Radio waves –
These are easy to generate and can penetrate through buildings. The
sending and receiving antennas need not be aligned. Frequency
Range:3KHz – 1GHz. AM and FM radios and cordless phones use Radio
waves for transmission.
(ii) Microwaves –
It is a line of sight transmission i.e. the sending and receiving antennas
need to be properly aligned with each other. The distance covered by the
signal is directly proportional to the height of the antenna. Frequency
Range:1GHz – 300GHz. These are majorly used for mobile phone
communication and television distribution.
(iii) Infrared –
Infrared waves are used for very short distance communication. They cannot
penetrate through obstacles. This prevents interference between systems.
Frequency Range:300GHz – 400THz. It is used in TV remotes, wireless mouse,
keyboard, printer, etc.
Line Configuration
Point-to-Point Connection :
Multipoint Connection :
1. It is also called Multidrop configuration. In this connection, two or more
devices share a single link.
2. More than two devices share the link that is the capacity of the channel is
shared now. With shared capacity, there can be two possibilities in a
Multipoint Line configuration:
Spatial Sharing: If several devices can share the link simultaneously, it’s called
Spatially shared line configuration.
Temporal (Time) Sharing: If users must take turns using the link, then it’s
called Temporally shared or Time Shared Line configuration.
Multiplexing
It is the sharing of a medium or bandwidth. It is the process in which multiple
signals coming from multiple sources are combined and transmitted over a single
communication/physical line.
Types of Multiplexing
There are three types of Multiplexing :
1. Frequency Division Multiplexing (FDM)
2. Time-Division Multiplexing (TDM)
3. Wavelength Division Multiplexing (WDM)
Synchronous TDM :
Synchronous TDM is a type of Time Division Multiplexing where the input
frame already has a slot in the output frame. Time slots are grouped into frames.
One frame consists of one cycle of time slots.
Synchronous TDM is not efficient because if the input frame has no data to send,
a slot remains empty in the output frame.
In synchronous TDM, we need to mention the synchronous bit at the beginning of
each frame.
Statistical TDM :
Statistical TDM is a type of Time Division Multiplexing where the output frame
collects data from the input frame till it is full, not leaving an empty slot like in
Synchronous TDM.
In statistical TDM, we need to include the address of each particular data in the
slot that is being sent to the output frame.
Statistical TDM is a more efficient type of time-division multiplexing as the
channel capacity is fully utilized and improves the bandwidth efficiency.
Asynchronous Transmission is
Synchronous Transmission is costly. economical.
xDSL
The fundamental work leading to Digital Subscriber Line (DSL) technology was
done in the early 1980s by AT&T's Bell Labs. Later, after the AT&T divestiture,
the work was assumed and brought to a practical level about 1989 by Bellcore, at
the time the research facility owned by the RBOCs. (See the Glossary for an
explanation of the acronyms used in this article.) At present the main focus of
xDSL development and marketing, other than within the microchip, equipment and
telephone companies themselves, is the ADSL Forum (ADSLF), a group to which
virtually everyone in the business belongs.
Without going into technical detail, xDSL encodes a stream of digital data so as to
maximize the use of the available bandwidth and continuously monitors the
transmission, even "cleaning it up" by detecting and correcting errors. This
continuous encoding, sampling and adjusting of the data stream requires modern
VLSI high-speed chip technology. Such features as equalization and echo
cancellation are required to identify and correct errors that occur during
transmission.
Later we explore these schemes, but suffice it to say that DMT appears to be
preferred at this time, with its preliminary acceptance by key standards bodies and
its adoption by most RBOCs in their early rollouts of xDSL technology. DMT also
has the advantage of chopping the available spectrum up into multiple channels
and, when electromagnetic noise or other impediments to the free flow of digital
bits are detected, changing channels "on the fly" to go around the trouble.
Encoding enables the available spectrum, expressed in kilohertz or megahertz, to
be used more efficiently. Basically these schemes permit multiple bits of
information to be transmitted by each hertz (Hz) of bandwidth.
RADSL is a variation of ADSL in which the equipment can sense how high a bit
rate the line can handle and adjust the speed downward accordingly. This "safe
speed" can either be determined by testing the line during installation and locking
it in at a set speed, or it can continuously adjust itself during operation.
HDSL has been used for several years in commercial applications, and typically
transmits 1.5 megabits per second (Mbps) each way. Since it requires two wire
pairs, it is not considered applicable to the residential market.
SDSL is a symmetrical form of xDSL, but at roughly half the speed of HDSL and
using one wire pair instead of two.
VDSL is a high-speed version of xDSL, but only for short distances, perhaps a
mile or less. For very short distances, speeds as high as 50 Mbps can be attained. A
basic law of physics states that the shorter the distance the higher the speed that
can be attained.
Speed
Perhaps the biggest advantage of xDSL is its speed-typically from one to two
orders of magnitude faster than dial-up modems. The apparent difference is fairly
minor for the transmission of text, but for graphics is dramatic.
Always On
One primary advantage of xDSL technology is that it is always on for the
customer-24 hours per day. There is no need to dial it up each time the user wants
to log into the Internet or access the company network. Surprisingly, this is also an
advantage for the phone company, since the xDSL signals passing through its
central office bypass the switches used to connect phone calls, thus relieving
congestion in the plain old telephone service (POTS) network, commonly known
as the public switched telephone network, or PSTN. With dial-up modems,
congestion is becoming a major problem for local phone companies, since typical
Internet users stay connected for long periods of time.
Applications of xDSL
Deployment
After many years of promise, deployment of xDSL by all the large US telephone
operating companies is proceeding at a brisk pace in early 1998. Many smaller
companies also have plans to deploy the technology and many competitive local
exchange carriers (CLECs) hope to beat the incumbent local exchange carriers
(ILECs) to the punch. Some have strategies aimed particularly at business
customers. A later article will detail the varied deployment strategies by company.
The Competition
The telephone companies don't have the field to themselves in providing Internet
service. One competitor is here now, cable modems, while the other, wireless
systems, is just over the horizon.
Cable Modems
An estimated 70% of US homes are cable TV subscribers. (This compares to 95%-
plus who have a telephone.) In those cable-based Internet systems that have been
announced to date, one or more cable TV channels are devoted to these data
services.
Upstream communication can be a problem since coax works much better as a one-
way system. The cable TV system uses coaxial cable into the home, with a mixture
of coax and optical fiber in the outside plant. A given length of coax has
considerably more capacity than the copper twisted pairs of the phone system.
However, this capacity is shared among many users as it loops around a
neighborhood, so available bandwidth can decrease dramatically as more users
come online. Security can also be more of a concern than with the "home runs" of
copper twisted pair loops. Whether there will be a clear winner in this battle is very
much up in the air, but many natural advantages lie with the phone companies and
xDSL.
Wireless Systems
Serious attention is being given to Internet and other data streams coming into the
residence on selective channels of low-earth-orbiting satellite systems, at which
point the signals can be moved onto twisted-pair or coaxial lines, or even be moved
throughout the building on wireless signals. Such systems may have particular
applicability in rural areas where cable TV is not available and where the customer
may be so remote from his central telephone office that xDSL cannot be deployed.
Conclusions
Ethernet is a set of technologies and protocols that are used primarily in LANs. It
was first standardized in 1980s by IEEE 802.3 standard. IEEE 802.3 defines the
physical layer and the medium access control (MAC) sub-layer of the data link layer
for wired Ethernet networks. Ethernet is classified into two categories: classic
Ethernet and switched Ethernet.
Classic Ethernet is the original form of Ethernet that provides data rates between 3
to 10 Mbps. The varieties are commonly referred as 10BASE-X. Here, 10 is the
maximum throughput, i.e. 10 Mbps, BASE denoted use of baseband transmission,
and X is the type of medium used. Most varieties of classic Ethernet have become
obsolete in present communication scenario.
A switched Ethernet uses switches to connect to the stations in the LAN. It replaces
the repeaters used in classic Ethernet and allows full bandwidth utilization.
IEEE 802.3 Popular Versions
There are a number of versions of IEEE 802.3 protocol. The most popular ones are
-
IEEE 802.3: This was the original standard given for 10BASE-5. It used a
thick single coaxial cable into which a connection can be tapped by drilling
into the cable to the core. Here, 10 is the maximum throughput, i.e. 10 Mbps,
BASE denoted use of baseband transmission, and 5 refers to the maximum
segment length of 500m.
IEEE 802.3a: This gave the standard for thin coax (10BASE-2), which is a
thinner variety where the segments of coaxial cables are connected by BNC
connectors. The 2 refers to the maximum segment length of about 200m
(185m to be precise).
IEEE 802.3i: This gave the standard for twisted pair (10BASE-T) that uses
unshielded twisted pair (UTP) copper wires as physical layer medium. The
further variations were given by IEEE 802.3u for 100BASE-TX, 100BASE-
T4 and 100BASE-FX.
IEEE 802.3i: This gave the standard for Ethernet over Fiber (10BASE-F)
that uses fiber optic cables as medium of transmission.
Wireless LAN stands for Wireless Local Area Network. It is also called LAWN
(Local Area Wireless Network). WLAN is one in which a mobile user can connect
to a Local Area Network (LAN) through a wireless connection.
The IEEE 802.11 group of standards defines the technologies for wireless LANs.
For path sharing, 802.11 standard uses the Ethernet protocol and CSMA/CA (carrier
sense multiple access with collision avoidance). It also uses an encryption method
i.e. wired equivalent privacy algorithm.
Wireless LANs provide high speed data communication in small areas such as
building or an office. WLANs allow users to move around in a confined area while
they are still connected to the network.
In some instance wireless LAN technology is used to save costs and avoid laying
cable, while in other cases, it is the only option for providing high-speed internet
access to the public. Whatever the reason, wireless solutions are popping up
everywhere.
Examples of WLANs that are available today are NCR's waveLAN and Motorola's
ALTAIR.
Advantages of WLANs
o Flexibility: Within radio coverage, nodes can communicate without further
restriction. Radio waves can penetrate walls, senders and receivers can be
placed anywhere (also non-visible, e.g., within devices, in walls etc.).
o Planning: Only wireless ad-hoc networks allow for communication without
previous planning, any wired network needs wiring plans.
o Design: Wireless networks allow for the design of independent, small devices
which can for example be put into a pocket. Cables not only restrict users but
also designers of small notepads, PDAs, etc.
o Robustness: Wireless networks can handle disasters, e.g., earthquakes, flood
etc. whereas, networks requiring a wired infrastructure will usually break
down completely in disasters.
o Cost: The cost of installing and maintaining a wireless LAN is on average
lower than the cost of installing and maintaining a traditional wired LAN, for
two reasons. First, after providing wireless access to the wireless network via
an access point for the first user, adding additional users to a network will not
increase the cost. And second, wireless LAN eliminates the direct costs of
cabling and the labor associated with installing and repairing it.
o Ease of Use: Wireless LAN is easy to use and the users need very little new
information to take advantage of WLANs.
Disadvantages of WLANs
o Quality of Services: Quality of wireless LAN is typically lower than wired
networks. The main reason for this is the lower bandwidth due to limitations
is radio transmission, higher error rates due to interference and higher
delay/delay variation due to extensive error correction and detection
mechanisms.
o Proprietary Solutions: Due to slow standardization procedures, many
companies have come up with proprietary solutions offering standardization
functionality plus many enhanced features. Most components today adhere to
the basic standards IEEE 802.11a or 802.11b.
o Restrictions: Several govt. and non-govt. institutions world-wide regulate the
operation and restrict frequencies to minimize interference.
o Global operation: Wireless LAN products are sold in all countries so,
national and international frequency regulations have to be considered.
o Low Power: Devices communicating via a wireless LAN are typically power
consuming, also wireless devices running on battery power. Whereas the LAN
design should take this into account and implement special power saving
modes and power management functions.
o License free operation: LAN operators don't want to apply for a special
license to be able to use the product. The equipment must operate in a license
free band, such as the 2.4 GHz ISM band.
o Robust transmission technology: If wireless LAN uses radio transmission,
many other electrical devices can interfere with them (such as vacuum cleaner,
train engines, hair dryers, etc.).Wireless LAN transceivers cannot be adjusted
for perfect transmission is a standard office or production environment.
Fundamentals of WLANs
1. HiperLAN
o HiperLAN stands for High performance LAN. While all of the previous
technologies have been designed specifically for an adhoc environment,
HiperLAN is derived from traditional LAN environments and can support
multimedia data and asynchronous data effectively at high rates (23.5 Mbps).
o A LAN extension via access points can be implemented using standard
features of the HiperLAN/1 specification. However, HiperLAN does not
necessarily require any type of access point infrastructure for its operation.
o HiperLAN was started in 1992, and standards were published in 1995. It
employs the 5.15GHz and 17.1 GHz frequency bands and has a data rate of
23.5 Mbps with coverage of 50m and mobility< 10 m/s.
o It supports a packet-oriented structure, which can be used for networks with
or without a central control (BS-MS and ad-hoc). It supports 25 audio
connections at 32kbps with a maximum latency of 10 ms, one video
connection of 2 Mbps with 100 ms latency, and a data rate of 13.4 Mbps.
o HiperLAN/1 is specifically designed to support adhoc computing for
multimedia systems, where there is no requirement to deploy a centralized
infrastructure. It effectively supports MPEG or other state of the art real time
digital audio and video standards.
o The HiperLAN/1 MAC is compatible with the standard MAC service
interface, enabling support for existing applications to remain unchanged.
o HiperLAN 2 has been specifically developed to have a wired infrastructure,
providing short-range wireless access to wired networks such as IP and ATM.
The two main differences between HiperLAN types 1 and 2 are as follows:
o Type 1 has a distributed MAC with QoS provisions, whereas type 2 has a
centralized schedule MAC.
o Type 1 is based on Gaussian minimum shift keying (GMSK), whereas type 2
is based on OFDM.
o HiperLAN/2 automatically performs handoff to the nearest access point. The
access point is basically a radio BS that covers an area of about 30 to 150
meters, depending on the environment. MANETs can also be created easily.
This connection oriented approach makes support for QoS easy, which in turn
depends on how the HiperLAN/2 network incorporates with the fixed network using
Ethernet, ATM, or IP.
The HiperLAN/2 architecture shown in the figure allows for interoperation with
virtually any type of fixed network, making the technology both network and
application independent.
HiperLAN/2 networks can be deployed at "hot spot" areas such as airports and
hotels, as an easy way of offering remote access and internet services.
2. Home RF Technology
o A typical home needs a network inside the house for access to a public
network telephone and internet, entertainment networks (cable television,
digital audio and video with the IEEE 1394), transfer and sharing of data and
resources (printer, internet connection), and home control and automation.
o The device should be able to self-configure and maintain connectivity with
the network. The devices need to be plug and play enabled so that they are
available to all other clients on the network as soon as they are switched on,
which requires automatic device discovery and identification in the system.
o Home networking technology should also be able to accommodate any and all
lookup services, such as Jini. Home RF products allow you to simultaneously
share a single internet connection with all of your computers - without the
hassle of new wires, cables or jacks.
o Home RF visualizes a home network as shown in the figure:
Advantages of Home RF
o In Home RF all devices can share the same connection, for voice or data at
the same time.
o Home RF provides the foundation for a broad range of interoperable consumer
devices for wireless digital communication between PCs and consumer
electronic devices anywhere in and around the home.
o The working group includes Compaq computer corp. Ericson enterprise
network, IBM Intel corp., Motorola corp. and other.
o A specification for wireless communication in the home called the shared
wireless access protocol (SWAP) has been developed.
IEEE 802.11 is a set of standards for the wireless area network (WLAN), which was
implemented in 1997 and was used in the industrial, scientific, and medical (ISM)
band. IEEE 802.11 was quickly implemented throughout a wide region, but under
its standards the network occasionally receives interference from devices such as
cordless phones and microwave ovens. The aim of IEEE 802.11 is to provide
wireless network connection for fixed, portable, and moving stations within ten to
hundreds of meters with one medium access control (MAC) and several physical
layer specifications. This was later called 802.11a. The major protocols include
IEEE 802.11n; their most significant differences lie in the specification of the PHY
layer.
4. Bluetooth
Architecture of Bluetooth
o Bluetooth devices can interact with other Bluetooth devices in several ways
in the figure. In the simplest scheme, one of the devices acts as the master and
(up to) seven other slaves.
o A network with a master and one or more slaves associated with it is known
as a piconet. A single channel (and bandwidth) is shared among all devices in
the piconet.
o Each of the active slaves has an assigned 3-bit active member address. many
other slaves can remain synchronized to the master though remaining inactive
slaves, referred to as parked nodes.
o The master regulates channel access for all active nodes and parked nodes. Of
two piconets are close to each other, they have overlapping coverage areas.
o This scenario, in which nodes of two piconets intermingle, is called a
scatternet. Slaves in one piconet can participate in another piconet as either a
master or slave through time division multiplexing.
o In a scatternet, the two (or more) piconets are not synchronized in either time
or frequency. Each of the piconets operates in its own frequency hopping
channel, and any devices in multiple piconets participate at the appropriate
time via time division multiplexing.
o The Bluetooth baseband technology supports two link types. Synchronous
connection oriented (SCO) types, used primarily for voice, and asynchronous
connectionless (ACL) type, essentially for packet data.