Unit 2 CN 4TH Sem
Unit 2 CN 4TH Sem
Unit 2 CN 4TH Sem
Transmission Media – principles, issues and examples; Wired Media – Coaxial, UTP, STP,
Fiber Optic Cables; Wireless Media – HF, VHF, UHF, Microwave, Ku Band; Network
topologies; Data Link Layer – design issues, example protocols (Ethernet, WLAN, Bluetooth);
Switching Techniques;
o Bandwidth: All the factors are remaining constant, the greater the bandwidth
of a medium, the higher the data transmission rate of a signal.
o Transmission impairment: When the received signal is not identical to the
transmitted one due to the transmission impairment. The quality of the signals
will get destroyed due to transmission impairment.
o Interference: An interference is defined as the process of disrupting a signal
when it travels over a communication medium on the addition of some
unwanted signal.
Wired communication media are also known as Guided media and are a
type of Transmission media. This type of communication is the most stable
which is why it is considered better than wireless. These connections are
less prone to other outer interferences. In wired communication media,
wire is used to transfer data from source to destination. Wired
communication media is not better for public use but can be used for
professional purposes as it more relies on wires and ports which is not the
case with wireless networks, data can be accessed from anywhere. Also,
the connection speed of wired media is more as compared to wireless. The
whole setup of wired media is also expensive as the larger the distances
more no. of cables and ports would be required and fiber optic cables are
usually expensive.
The diagram given below shows the transmission media its types and its
subtypes.
As the name suggests these are two twisted pairs of cables or wires made
up of insulated copper. These are twisted together in such a way that they
run parallelly one wire is used for the transmission of data and the other
wire is used for ground. Usually, these wires or cables are 1mm in
diameter. The twisted-pair cable is made up of 2 copper wires (insulated)
arranged in a spiral pattern. Noise interference is more often the problem
in these cables but it can be handled by increasing the number of turns per
foot of twisted pair cable.
Working of twisted-pair cables: The twisted-pair cable has an outer
jacket that keeps the wires together, a shield for the protection of the
cable, color-coded plastic insulation to uniquely identify each conductor,
and twisting of wires to cancel the electromagnetic waves that create noise
interferences during the transmission of data. When current flows through
the cable then a small circular magnetic field is created around the wire.
For the connection between two devices connectors are needed at both
ends like RJ45 for computer connection.
Co-axial cable
Fiber-optic cables
Also known as optic fiber cables are highly efficient and advanced data
transmission cables that allow the transfer of data in a very large volume.
Fiber optic cables allow data transmission with the help of electrical
signals. These are thin pipes made up of glass or plastic known as optic
fibers and data or information flows via light in these cables. With higher
bandwidth and high-quality performance optic fiber cables are best suited
for long-distance data transfer and communication.
Types of Fibre-Optic Cables;
Single-mode Fibres: It is capable of one-way transmission with a
rate of almost 50 times more than multimode fibers. Used in small-
scale companies and in local area networks also.
Multimode Fibres: It has higher bandwidth and cable of two-way
transmission capable of higher data transmission. Used in local
area networks, corporate sectors, and private networks also.
Working of fiber-optic cable: Fiber optic cables carry information via
light so at the transmitting side the light source is first encoded with data
or information and then the data starts flowing in the core of the fiber optic
cable in a completely bouncing manner with a complete internal reflection
then there is cladding that helps the light to remain inside the cable after
reaching the receiver side the data is then decoded like the original. So
basically fiber optic is a form of transmission media for the transfer of data
via light with higher bandwidth and a higher rate of transmission.
It consists of five major parts named core, Cladding, Coating,
Strengthening, and Outer jacket.
Here, the Core is a thin part of the glass of the optic fiber cable and
cladding is the insulation around the core coating is the protective layer for
the optical fiber the strengthening part allows protection to the core and at
last outer jacket for the whole optic fiber tube.
Application
Some applications of Fibre-optic cables.
One of the most popular and important uses of Fibre -optic cables is
the INTERNET.
Television broadcasting These cables are very much suitable for
transmitting signals for high-definition televisions because of their
greater bandwidth and speed.
In surgical operations in medicine, these cables are used in various
fields of medicine and research purposes as their cost is low as
compared to other cables.
It is used in industries and in defense services also these cables are
of great use.
Merits
Long durability: These have long durability of almost 100 years.
Low cost: Due to the cheaper cost these cables are in high demand
usually of more use.
Greater bandwidth and speed: Higher speed and great bandwidth
help in faster and even smoother data transmission.
Light signals: In the same fiber cable light signals of one fiber and
the other do not interfere with each other which is not the case with
other cables.
Demerits
Delicacy: Fibre-optic cables are more delicate as compared with
copper wires. If bent too much these cables can be damaged easily.
Installation Cost: The installation process is cost-effective as it
requires machines and a specialist team for the setup of the fiber
cables.
Low power: Since data flows via light in these cables power supply
is limited, and for high-power emitters cost would be more.
Fiber optic
Properties Twisted Pair Co-axial Cable
cable
Attenuatio
More More Very Less
n
Microwaves
Mesh Topology
Star Topology
In Star Topology, all the devices are connected to a single hub through a cable.
This hub is the central node and all other nodes are connected to the central
node. The hub can be passive in nature i.e., not an intelligent hub such as
broadcasting devices, at the same time the hub can be intelligent known as an
active hub. Active hubs have repeaters in them. Coaxial cables or RJ-45 cables
are used to connect the computers. In Star Topology, many popular Ethernet
LAN protocols are used as CD(Collision Detection), CSMA (Carrier Sense
Multiple Access), etc.
Star Topology
Bus Topology
Bus Topology is a network type in which every computer and network device is
connected to a single cable. It is bi-directional. It is a multi-point connection
and a non-robust topology because if the backbone fails the topology crashes.
In Bus Topology, various MAC (Media Access Control) protocols are followed by
LAN ethernet connections like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.
Bus Topology
Figure 3: A bus topology with shared backbone cable. The nodes are
connected to the channel via drop lines.
Advantages of Bus Topology
If N devices are connected to each other in a bus topology, then the
number of cables required to connect them is 1, known as backbone
cable, and N drop lines are required.
Coaxial or twisted pair cables are mainly used in bus-based networks
that support up to 10 Mbps.
The cost of the cable is less compared to other topologies, but it is
used to build small networks.
Bus topology is familiar technology as installation and troubleshooting
techniques are well known.
CSMA is the most common method for this type of topology.
Drawbacks of Bus Topology
A bus topology is quite simpler, but still, it requires a lot of cabling.
If the common cable fails, then the whole system will crash down.
If the network traffic is heavy, it increases collisions in the network. To
avoid this, various protocols are used in the MAC layer known as Pure
Aloha, Slotted Aloha, CSMA/CD, etc.
Adding new devices to the network would slow down networks.
Security is very low.
A common example of bus topology is the Ethernet LAN, where all devices are
connected to a single coaxial cable or twisted pair cable. This topology is also
used in cable television networks. For more, refer to the Advantages and
Disadvantages of Bus Topology.
Ring Topology
Tree Topology
Figure 5: In this, the various secondary hubs are connected to the central hub
which contains the repeater. This data flow from top to bottom i.e. from the
central hub to the secondary and then to the devices or from bottom to top i.e.
devices to the secondary hub and then to the central hub. It is a multi-point
connection and a non-robust topology because if the backbone fails the
topology crashes.
Advantages of Tree Topology
It allows more devices to be attached to a single central hub thus it
decreases the distance that is traveled by the signal to come to the
devices.
It allows the network to get isolated and also prioritize from different
computers.
We can add new devices to the existing network.
Error detection and error correction are very easy in a tree
topology.
Drawbacks of Tree Topology
If the central hub gets fails the entire system fails.
The cost is high because of the cabling.
If new devices are added, it becomes difficult to reconfigure.
A common example of a tree topology is the hierarchy in a large organization.
At the top of the tree is the CEO, who is connected to the different departments
or divisions (child nodes) of the company. Each department has its own
hierarchy, with managers overseeing different teams (grandchild nodes). The
team members (leaf nodes) are at the bottom of the hierarchy, connected to
their respective managers and departments.
For more, refer to the Advantages and Disadvantages of Tree Topology.
Hybrid Topology
Hybrid Topology
Figure 6: The above figure shows the structure of the Hybrid topology. As seen
it contains a combination of all different types of networks.
Advantages of Hybrid Topology
This topology is very flexible.
The size of the network can be easily expanded by adding new
devices.
Drawbacks of Hybrid Topology
It is challenging to design the architecture of the Hybrid Network.
Hubs used in this topology are very expensive.
The infrastructure cost is very high as a hybrid network requires a lot
of cabling and network devices.
A common example of a hybrid topology is a university campus network. The
network may have a backbone of a star topology, with each building connected
to the backbone through a switch or router. Within each building, there may be
a bus or ring topology connecting the different rooms and offices. The wireless
access points also create a mesh topology for wireless devices. This hybrid
topology allows for efficient communication between different buildings while
providing flexibility and redundancy within each building.
Data Link Layer
The data link layer is the second layer from the bottom in the OSI (Open
System Interconnection) network architecture model. It is responsible for the
node-to-node delivery of data. Its major role is to ensure error-free
transmission of information. DLL is also responsible for encoding, decode and
organizing the outgoing and incoming data. This is considered the most
complex layer of the OSI model as it hides all the underlying complexities of
the hardware from the other above layers.
The data link layer receives the information in the form of packets from the
Network layer, it divides packets into frames and sends those frames bit-by-bit
to the underlying physical layer.
Functions of the Data-link Layer
There are various benefits of data link layer s let’s look into it.
Framing
The packet received from the Network layer is known as a frame in the Data
link layer. At the sender’s side, DLL receives packets from the Network layer
and divides them into small frames, then, sends each frame bit-by-bit to
the physical layer. It also attaches some special bits (for error control and
addressing) at the header and end of the frame. At the receiver’s end, DLL
takes bits from the Physical layer organizes them into the frame, and sends
them to the Network layer.
Addressing
The data link layer encapsulates the source and destination’s MAC address/
physical address in the header of each frame to ensure node-to-node delivery.
MAC address is the unique hardware address that is assigned to the device
while manufacturing.
Error Control
Data can get corrupted due to various reasons like noise, attenuation, etc. So,
it is the responsibility of the data link layer, to detect the error in the
transmitted data and correct it using error
detection and correction techniques respectively. DLL adds error detection
bits into the frame’s header, so that receiver can check received data is
correct or not. It adds reliability to phyiscal layer by adding mechansims to
detect and retransmit damaged or lost frames.
Flow Control
If the receiver’s receiving speed is lower than the sender’s sending speed,
then this can lead to an overflow in the receiver’s buffer and some frames
may get lost. So, it’s the responsibility of DLL to synchronize the sender’s and
receiver’s speeds and establish flow control between them.
Access Control
When multiple devices share the same communication channel there is a high
probability of collision, so it’s the responsibility of DLL to check which device
has control over the channel and CSMA/CD and CSMA/CA can be used to avoid
collisions and loss of frames in the channel.
2. Frame synchronization –
The source machine sends data in the form of blocks called frames to the
destination machine. The starting and ending of each frame should be
identified so that the frame can be recognized by the destination machine.
3. Flow control –
Flow control is done to prevent the flow of data frame at the receiver end. The
source machine must not send data frames at a rate faster than the capacity
of destination machine to accept them.
4. Error control –
Error control is done to prevent duplication of frames. The errors introduced
during transmission from source to destination machines must be detected
and corrected at the destination machine.
Ethernet – Ethernet is most popular wired networking technology. It is widely used for
connecting computers in a Personal Area Network (PAN), Home Area Network (HAN),
Local Area Network (LAN), Wide Area Network (WAN) and Metropolitan Area Network
(MAN). It is based on IEEE 802.3 standard. Within an IOT system, Ethernet can be used
to connect stationary or fixed IOT devices. Like, it can be used to connect sensor
networks in an industry, appliance control circuits in a home automation system or
IOT devices in an office automation system.
The data transfer rate in Ethernet can be up to 10 Giga Bits per Second (Gbit/s) for
cat-6 cables. The data speed over Ethernet depends on the cable type and can be
limited by the network administrator. There may be fiber optic, co-axial or twisted pair
cables used for Ethernet networking. The Ethernet has very low latency which makes
it suitable for mission critical IOT applications where devices may be co-located or
located in a long range.
Bluetooth :
Bluetooth is a PAN (Personal Area Network) or it is a short-range wireless
communication network for exchanging data between the connected devices
through that network. It is very cheaper in price and effective in a
performance point of view for short-range distance. It is a 2.4GHz network
that works well for personal wireless network communication. It provides a
data transfer rate of 3 Mbps in a range of 50m to 150m. Nowadays Bluetooth
is almost present in all smartphones and it is highly used in wearable devices
connected with the mobile applications.
WLAN :
The data link layer within 802.11 consists of two sublayers: Logical Link
Control (LLC) and Media Access Control (MAC). 802.11 uses the same 802.2
LLC and 48-bit addressing as other 802 LANs, allowing for very simple
bridging from wireless to IEEE wired networks, but the MAC is unique to
WLANs.
What is Switching?
In computer networking, Switching is the process of transferring data packets
from one device to another in a network, or from one network to another, using
specific devices called switches. A computer user experiences switching all
the time for example, accessing the Internet from your computer device,
whenever a user requests a webpage to open, the request is processed through
switching of data packets only.
Switching takes place at the Data Link layer of the OSI Model. This means that
after the generation of data packets in the Physical Layer, switching is the
immediate next process in data communication.
Process of Switching
The switching process involves the following steps:
Frame Reception: The switch receives a data frame or packet from a
computer connected to its ports.
MAC Address Extraction: The switch reads the header of the data
frame and collects the destination MAC Address from it.
MAC Address Table Lookup: Once the switch has retrieved the MAC
Address, it performs a lookup in its Switching table to find a port that
leads to the MAC Address of the data frame.
Forwarding Decision and Switching Table Update: If the switch
matches the destination MAC Address of the frame to the MAC address
in its switching table, it forwards the data frame to the respective port.
However, if the destination MAC Address does not exist in its
forwarding table, it follows the flooding process, in which it sends the
data frame to all its ports except the one it came from and records all
the MAC Addresses to which the frame was delivered. This way, the
switch finds the new MAC Address and updates its forwarding table.
Frame Transition: Once the destination port is found, the switch
sends the data frame to that port and forwards it to its target
computer/network.
Types of Switching
There are three types of switching methods:
Message Switching
Circuit Switching
Packet Switching
Datagram Packet Switching
Virtual Circuit Packet Switching
Let us now discuss them individually:
Message Switching: This is an older switching technique that has become
obsolete. In message switching technique, the entire data block/message is
forwarded across the entire network thus, making it highly inefficient.
Circuit Switching: In this type of switching, a connection is established
between the source and destination beforehand. This connection receives the
complete bandwidth of the network until the data is transferred completely.
This approach is better than message switching as it does not involve sending
data to the entire network, instead of its destination only.
Packet Switching: This technique requires the data to be broken down into
smaller components, data frames, or packets. These data frames are then
transferred to their destinations according to the available resources in the
network at a particular time.
This switching type is used in modern computers and even the Internet. Here,
each data frame contains additional information about the destination and
other information required for proper transfer through network components.
Datagram Packet Switching: In Datagram Packet switching, each data
frame is taken as an individual entity and thus, they are processed separately.
Here, no connection is established before data transmission occurs. Although
this approach provides flexibility in data transfer, it may cause a loss of data
frames or late delivery of the data frames.
Virtual-Circuit Packet Switching: In Virtual-Circuit Packet switching, a
logical connection between the source and destination is made before
transmitting any data. These logical connections are called virtual circuits. Each
data frame follows these logical paths and provides a reliable way of
transmitting data with less chance of data loss.