Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
77 views

unit 1 and 2 data network

Uploaded by

fdrchrismlast
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views

unit 1 and 2 data network

Uploaded by

fdrchrismlast
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 73

UNIT-1

Introduction to Computer Communications and Networking


Technologies
Computer communications and networking technologies form the
backbone of modern information exchange, enabling devices to share
data, access resources, and interact with each other. This field
encompasses a wide range of concepts, protocols, and systems
designed to enable seamless communication across networks, ranging
from local networks to the global internet.
Here’s an introduction to the key components of computer
communications and networking:
1. What is Computer Communication?
Computer communication refers to the exchange of data and
information between devices, such as computers, smartphones, and
servers, over various transmission media like wired or wireless
networks. The purpose is to facilitate the transfer of data in a way
that ensures accuracy, speed, and reliability.
2. What is Networking?
Networking is the practice of interconnecting multiple computing
devices, enabling them to communicate and share resources.
Networks can vary in scale from small local area networks (LANs) to
vast global networks like the Internet.
3. Key Components of Networking
Networking technologies rely on several key components:
 Devices: These include computers, servers, routers, switches, and
other network hardware.
 Media: Data can be transmitted through physical media (cables,
fiber optics) or wireless media (Wi-Fi, cellular networks).
 Protocols: These are standardized rules and conventions for data
exchange. Key protocols include the Transmission Control
Protocol (TCP), Internet Protocol (IP), Hypertext Transfer
Protocol (HTTP), and more.
 Topology: This refers to the physical or logical arrangement of
devices in a network, such as star, bus, ring, or mesh topologies.
4. Types of Networks
 Local Area Network (LAN): A network that covers a small
geographical area like a home, office, or campus. LANs often use
Ethernet or Wi-Fi for communication.
 Wide Area Network (WAN): A larger network that covers a
broader geographical area, often spanning cities, countries, or
even continents. The Internet is a prime example of a WAN.
 Metropolitan Area Network (MAN): A network that spans a
larger area than a LAN but smaller than a WAN, typically
covering a city or large campus.
 Personal Area Network (PAN): A network for personal devices
within a very limited range, such as Bluetooth connections.
5. Network Devices
Key devices used in computer networking include:
 Router: Directs data packets between different networks,
especially across the internet.
 Switch: Connects devices within a single network and manages
data flow between them.
 Hub: A basic device that connects multiple computers in a
network, though it is largely replaced by switches due to
inefficiency.
 Modem: A device that modulates and demodulates signals for
data transmission over telephone lines or broadband connections.
6. Data Transmission and Communication Models
 Analog vs. Digital: Analog communication uses continuous
signals, while digital communication uses discrete signals
(binary).
 Transmission Modes: Communication can occur in different
modes:
o Simplex: Data flows in one direction (e.g., a keyboard

sending data to a computer).


o Half-Duplex: Data flows in both directions, but not

simultaneously (e.g., walkie-talkies).


o Full-Duplex: Data flows in both directions simultaneously

(e.g., telephones).
7. Network Protocols
Protocols are crucial in defining how data is formatted, transmitted,
and received. Some important networking protocols include:
 TCP/IP: The foundational suite of protocols for the internet,
where TCP ensures reliable delivery, and IP handles addressing
and routing.
 HTTP/HTTPS: Protocols for transferring hypertext documents,
with HTTPS being a secure version.
 FTP: File Transfer Protocol for transferring files over a network.
 SMTP/POP3/IMAP: Protocols used for sending, receiving, and
storing email.
8. The OSI Model
The Open Systems Interconnection (OSI) model is a conceptual
framework used to understand network interactions in seven layers:
1. Physical Layer: Deals with the physical transmission of data.
2. Data Link Layer: Ensures error-free data transfer between
devices.
3. Network Layer: Handles routing and addressing (e.g., IP).
4. Transport Layer: Ensures reliable data delivery (e.g., TCP).
5. Session Layer: Manages sessions or connections.
6. Presentation Layer: Translates data into a usable format (e.g.,
encryption, compression).
7. Application Layer: Provides services and interfaces for end-users
(e.g., email, web browsing).
9. Networking Technologies and Innovations
 Wi-Fi: Wireless local area networking technology that allows
devices to connect to the internet or each other without cables.
 5G and Cellular Networks: The fifth generation of cellular
technology, providing faster speeds, lower latency, and more
efficient communication for mobile devices.
 Cloud Computing: The delivery of computing resources (like
servers, storage, and software) over the internet, allowing users
to access data and services remotely.
 Internet of Things (IoT): The network of everyday devices (from
thermostats to vehicles) that are connected to the internet to
exchange data and enable smart services.
 Software-Defined Networking (SDN): A new approach to
networking that uses software to control and manage network
resources, offering more flexibility and scalability.
10. Security in Networking
As networks become more integrated into daily life, security is a
major concern. Key technologies and practices include:
 Firewalls: Network security systems that monitor and control
incoming and outgoing traffic.
 Encryption: Protecting data by converting it into unreadable
formats, ensuring privacy during transmission.
 VPN (Virtual Private Network): A method for creating a secure,
encrypted connection over a less secure network like the internet.
Uses of Computer Networks
Computer networks have a wide range of applications across various
industries and personal use cases. Here are some of the primary uses
of computer networks:
1. Resource Sharing:
o File Sharing: Networks allow multiple users to access and

share files across devices and locations. This can include text
files, images, videos, and software.
o Printer and Peripheral Sharing: Multiple devices can share

access to a single printer, scanner, or other peripherals,


making it easier to manage resources.
o Centralized Data Storage: Networks can provide shared

access to centralized databases or file servers, allowing for


efficient data management and backup.
2. Communication:
o Email: Computer networks enable instant communication

through email, allowing messages and attachments to be sent


globally over the internet.
o Instant Messaging (IM): Real-time communication through

services like WhatsApp, Telegram, or Skype relies on


computer networks.
o Voice and Video Calling: Using Voice over IP (VoIP) and

video conferencing services like Zoom or Google Meet,


networks enable clear communication between users
anywhere in the world.
o Social Media: Platforms like Facebook, Twitter, and

Instagram are built on complex computer networks that


connect billions of users globally.
3. Remote Access:
o Virtual Private Networks (VPNs): Users can securely

connect to private networks from remote locations, allowing


them to access internal resources like files, applications, and
databases, as though they were physically present in the
office.
o Remote Desktop: Using remote desktop applications,

employees can access and control their office computers


from a different location over a network.
4. Internet Access:
o World Wide Web (WWW): The internet, which is a global

network of networks, allows users to browse websites, access


cloud services, and obtain information.
o Streaming Media: Platforms like YouTube, Netflix, and

Spotify rely on networks to deliver video, music, and other


media content to users.
5. E-Commerce and Online Transactions:
o Shopping: Networks enable e-commerce platforms like

Amazon, eBay, and Alibaba, where users can buy and sell
products and services.
o Banking and Online Payments: Secure networks enable

online banking and payment gateways like PayPal, Venmo,


or credit card transactions.
6. Collaboration:
o File Sharing and Collaboration Tools: Platforms like Google

Drive, Microsoft OneDrive, and Dropbox allow users to


store, share, and collaboratively edit documents in real-time
over a network.
o Project Management Tools: Tools like Slack, Asana, and

Trello allow teams to manage projects and communicate


effectively over the internet.
7. Distributed Computing and Cloud Services:
o Cloud Computing: Cloud service providers (e.g., AWS,

Microsoft Azure, Google Cloud) host applications,


databases, and services on remote servers, allowing users to
access resources over the network without maintaining
physical infrastructure.
oDistributed Systems: In large-scale computing systems,
computer networks connect multiple servers to handle
computations that would be too complex for a single
machine.
8. Entertainment:
o Online Gaming: Multiplayer games rely on high-speed

networks to allow users to play in real-time with others


across the globe.
o Cloud Gaming: Services like Google Stadia and Xbox Cloud

Gaming allow users to play games hosted on remote servers,


reducing the need for powerful hardware on the user’s end.
9. Educational Applications:
o E-learning Platforms: Networks provide access to online

courses, educational content, and video lectures through


platforms like Coursera, Khan Academy, and edX.
o Virtual Classrooms: Educators and students can engage in

live video lessons or participate in discussions over the


network.
10. Security and Surveillance:
 Network Security: Security protocols and firewalls ensure that
computer networks are safe from external threats, including
hackers and malware.
 Surveillance Systems: Security cameras, IoT devices, and sensors
can be integrated into a network for real-time monitoring and
data collection.
Network Devices, Nodes, and Hosts
Understanding the basic components of a computer network is key to
understanding how it operates. These components are often classified
into network devices, nodes, and hosts.
1. Network Devices

Network devices are hardware components used to establish,


maintain, and optimize communication within a network. These
devices perform different roles based on their functionality. Key
network devices include:
 Router:
o A router is a device that forwards data packets between

different networks. It is responsible for determining the


optimal path for data to travel across networks, such as
from a local area network (LAN) to the internet (WAN).
o Routers can also handle network address translation (NAT),

which allows multiple devices in a local network to share a


single public IP address.
 Switch:
o A switch operates at the Data Link layer and connects

devices within the same network (usually a LAN). It receives


data packets and forwards them to the correct device based
on MAC (Media Access Control) addresses.
o Unlike hubs, switches are more efficient because they send

data only to the device that needs it, not all devices on the
network.
 Hub:
o A hub is a simple network device that connects multiple

computers in a LAN. It broadcasts data to all connected


devices, which can cause network congestion and
inefficiency. Hubs are less commonly used today in favor of
switches.
 Modem:
o A modem (modulator-demodulator) converts digital data

from a computer into analog signals that can be transmitted


over telephone lines, cable systems, or fiber optics. It also
converts incoming analog signals back into digital data for
the computer.
o Commonly used in broadband connections such as DSL or
cable internet.
 Access Point (AP):
o An access point provides wireless connectivity to devices in a

network. It allows Wi-Fi-enabled devices like smartphones,


laptops, and tablets to connect to a wired network wirelessly.
 Firewall:
o A firewall is a security device that monitors and controls

incoming and outgoing network traffic. It can be hardware


or software-based and is essential for preventing
unauthorized access to a network.
 Gateway:
o A gateway is a device that connects different types of

networks (e.g., connecting a LAN to the internet). It operates


at various layers of the OSI model, often combining the
functionality of a router, firewall, and other network
management services.
2. Network Nodes

A node is any active device in a network that can send, receive, or


forward data. Every network device (router, switch, computer,
printer, etc.) is considered a node. Nodes play an essential role in
forwarding data, and they can be devices that actively communicate
or simply serve as intermediaries.
 Types of Nodes:
o End Nodes: These are devices that are endpoints in a

network, such as a computer, printer, or smartphone. They


generate or receive the actual data.
o Intermediate Nodes: Devices that assist in the transmission

of data, such as routers, switches, or gateways.


3. Network Hosts

A host is any device that is connected to a network and can either send
or receive data over the network. Hosts typically refer to end devices
that are used directly by users.
 Examples of Hosts:
o Personal Computers (PCs), laptops, and desktops.

o Servers: These are powerful hosts that provide services such

as hosting websites, databases, or email.


o Smartphones and tablets: Portable devices that act as hosts

in wireless networks (Wi-Fi or cellular).


o IoT Devices: Devices like smart thermostats, cameras, and

sensors are hosts that can send and receive data in an IoT
network.
In a typical network, hosts are assigned unique identifiers such as IP
addresses (in IP-based networks) or MAC addresses (in Ethernet
networks) to distinguish them from one another.
Types of Computer Networks and Their Topologies
Computer networks can be categorized based on their geographical
span, purpose, and the technology used. In addition to their
classification, networks are also designed with specific topologies that
define the structure or layout of the network.
1. Types of Computer Networks

 Definition: A PAN is a small network, typically within a range of


a few meters, that is used to connect personal devices like
smartphones, tablets, laptops, and peripherals.
 Use Cases: Bluetooth-enabled devices (e.g., wireless headsets,
smartphones connected to speakers), connecting a laptop to a
printer, or linking wearables to a smartphone.
 Range: Up to 10 meters (approx. 33 feet).

 Definition: A LAN is a network that covers a small geographical


area, such as a home, office, or campus. It connects computers
and other devices to share resources like files, printers, and
internet access.
 Use Cases: Home networks, small office networks, school campus
networks.
 Range: Typically up to 100 meters (around 328 feet).
 Technology: LANs typically use Ethernet (wired) or Wi-Fi
(wireless) for communication.

 Definition: A MAN is a network that spans a larger geographical


area than a LAN but smaller than a WAN, often covering a city
or a large campus. It can interconnect several LANs within a
specific area.
 Use Cases: A network connecting various branches of an
organization within a city, cable TV networks, or city-wide Wi-Fi
networks.
 Range: Typically 10 to 50 kilometers (around 6 to 31 miles).

 Definition: A WAN is a network that covers a large geographical


area, often spanning cities, countries, or even continents. The
internet is the largest example of a WAN.
 Use Cases: Corporate networks connecting offices in different
cities or countries, the internet providing global communication.
 Range: Global or between large geographical locations.
 Technology: WANs use public or private transmission lines like
fiber optics, satellite, or leased lines.
 Definition: A GAN is an overarching network that connects
multiple WANs and MANs across large geographical areas,
providing global access to users.
 Use Cases: A network that enables communication on a global
scale, such as the global internet infrastructure.
 Range: Global.

 Definition: A SAN is a specialized network that provides high-


speed data transfer between storage devices and servers, enabling
centralized data storage and management.
 Use Cases: Data centers, cloud storage, enterprise-level systems
requiring high availability and quick access to data.
 Range: Typically used in data centers, with a focus on high-speed
data transfer.

 Definition: A VPN is not a physical network but a secure,


encrypted connection over a less secure network, typically the
internet. It allows users to connect remotely to a private network
and access resources as if they were physically connected to it.
 Use Cases: Secure access to corporate resources from remote
locations, protecting privacy when using public Wi-Fi.
 Range: Remote access to a local network through the internet.
2. Network Topologies
A network topology refers to the arrangement of various elements
(nodes, devices, connections) in a computer network. Topologies
describe how different devices and systems are connected and how
data flows within the network. There are several types of topologies,
each with its own advantages and use cases.
 Definition: In a bus topology, all devices are connected to a single
central cable, called the "bus," which carries data back and forth
between devices. Data sent by a device travels in both directions
along the bus.
 Advantages:
o Simple and easy to install.

o Requires less cable compared to other topologies.

 Disadvantages:
o Performance degrades as more devices are added.

o If the central bus cable fails, the entire network is down.

 Use Cases: Small networks or legacy systems.

 Definition: In a star topology, all devices are connected to a


central device, typically a switch or a hub. Data flows from a
device to the central device, which then forwards it to the
intended destination.
 Advantages:
o Easy to add or remove devices without affecting the rest of

the network.
o Centralized management makes it easier to isolate and

troubleshoot issues.
 Disadvantages:
o If the central device fails, the entire network is disrupted.

o More cable required than bus topology.

 Use Cases: Common in home and office networks.

 Definition: In a ring topology, each device is connected to two


other devices, forming a circular pathway for data. Data travels
in one direction (unidirectional) or both directions (bidirectional)
around the ring until it reaches the intended device.
 Advantages:
o Data transfer is relatively fast as it travels in a continuous

loop.
o No collisions if data flows in one direction.

 Disadvantages:
o A failure in one device or connection can disrupt the entire

network.
o Troubleshooting and network expansion can be challenging.

 Use Cases: Used in legacy systems, such as Token Ring networks,


and specific high-performance networks.

 Definition: In a mesh topology, every device is connected to every


other device in the network, either directly or through multiple
paths. There are two types: full mesh (all devices are
interconnected) and partial mesh (some devices are
interconnected).
 Advantages:
o Provides redundancy and reliability, as multiple paths exist

for data to travel.


o No single point of failure.

 Disadvantages:
o Complex to install and maintain, requiring a large amount

of cabling.
o High cost due to the number of connections.

 Use Cases: Used in critical systems, like military or financial


networks, and for backbone networks of large enterprises.
 Definition: A tree topology combines characteristics of bus and
star topologies. It consists of groups of star-configured networks
connected to a central bus-like backbone.
 Advantages:
o Scalable and easy to expand.

o Centralized control over groups of devices.

 Disadvantages:
o If the backbone fails, communication between devices across

groups can be disrupted.


o Requires more cable than star or bus topologies.

 Use Cases: Suitable for large organizations or campuses where


networks need to be expanded in a structured way.

 Definition: A hybrid topology is a combination of two or more


different topologies in a single network. For example, combining
a star topology with a mesh topology.
 Advantages:
o Flexible and can be customized to meet specific needs.

o Combines the strengths of different topologies.

 Disadvantages:
o More complex to design and implement.

o Requires more management and maintenance.

 Use Cases: Large networks with varied requirements, such as


enterprise or university networks.

Network Software: Network Design Issues and Protocols


In computer networking, network software plays a crucial role in
enabling communication between devices and managing network
resources. This software includes both network operating systems and
network protocols, which together ensure the proper functioning,
management, and security of the network.
In addition to software, network design is a critical consideration in
ensuring that a network meets the needs of an organization or
individual. Effective network design requires addressing various
challenges, such as scalability, performance, and security. Below is an
overview of network software, design issues, and network protocols.
1. Network Software
Network software provides the essential tools to operate, manage, and
secure a network. It is broadly categorized into system software,
protocol software, and management software.

This includes the operating systems that run on individual devices


(e.g., computers, servers, routers) in the network. These operating
systems are responsible for managing hardware resources and
enabling communication between devices. Popular network operating
systems include:
 Windows Server
 Linux (Ubuntu, RedHat, CentOS)
 Cisco IOS (used in routers and switches)
These operating systems provide network connectivity features like
TCP/IP stack implementation, file sharing, remote access, and device
management.

Protocol software implements the rules (protocols) governing


communication within a network. These protocols ensure devices can
communicate effectively, irrespective of their underlying hardware or
operating systems. Some key protocols include:
 Transmission Control Protocol (TCP): Provides reliable, ordered
data transmission between devices.
 Internet Protocol (IP): Defines addressing and routing rules for
data packets across networks.
 Dynamic Host Configuration Protocol (DHCP): Automatically
assigns IP addresses to devices on the network.
 Domain Name System (DNS): Resolves human-readable domain
names (e.g., www.example.com) into machine-readable IP
addresses.
 Simple Network Management Protocol (SNMP): Used for
monitoring and managing network devices such as routers,
switches, and servers.

This software allows administrators to configure, monitor, and


manage network resources. It helps in maintaining network
performance, troubleshooting, and ensuring security. Popular
network management tools include:
 SolarWinds Network Performance Monitor
 Wireshark (for packet analysis)
 Nagios (for network monitoring)
 PRTG Network Monitor
2. Network Design Issues
Designing a network involves addressing several issues to ensure the
network is efficient, scalable, secure, and cost-effective. Key network
design issues include:

 Definition: Scalability refers to a network's ability to grow or


adapt to increased demand, such as adding more devices or
handling more traffic.
 Challenges:
o Ensuring that the network can handle an increasing number

of users and devices without significant performance


degradation.
o Designing the network topology and infrastructure to

accommodate future growth.

 Definition: Network performance refers to the speed and


reliability of data transfer across the network.
 Challenges:
o Bandwidth: Ensuring sufficient bandwidth to support data-

heavy applications like video streaming or cloud computing.


o Latency: Minimizing delays in data transmission, which is

especially important for real-time applications like VoIP


(Voice over IP) and online gaming.
o Throughput: Maximizing the amount of data successfully

transmitted over the network.

 Definition: Security involves protecting the network from


unauthorized access, data breaches, and other cyber threats.
 Challenges:
o Implementing encryption to protect data privacy.

o Configuring firewalls, intrusion detection/prevention

systems (IDS/IPS), and other security measures.


o Managing user access and authentication to prevent

unauthorized access.

 Definition: Reliability refers to the network’s ability to function


continuously without interruptions, and redundancy ensures that
there are backup systems in place if part of the network fails.
 Challenges:
o Designing fault-tolerant systems that can handle device or

link failures.
o Ensuring there are backup paths and systems to minimize

downtime (e.g., using redundant power supplies or multi-


path routing).

 Definition: The overall cost of designing, building, and


maintaining the network.
 Challenges:
o Choosing cost-effective hardware and software solutions

while still meeting performance and security requirements.


o Balancing between high-end equipment and budget

constraints.

 Definition: Manageability refers to how easily network resources


can be monitored, configured, and maintained.
 Challenges:
o Ensuring that network management tools are in place for

proactive monitoring and troubleshooting.


o Configuring devices in a way that reduces complexity and

makes them easier to manage.


3. Network Protocols
Network protocols define the rules and standards for communication
between devices in a network. They enable data transmission, error
correction, encryption, and ensure compatibility between devices
running different operating systems and hardware.
 Function: Provides reliable, connection-oriented communication
between devices.
 Key Features:
o Error detection and correction: Ensures data is delivered

accurately.
o Flow control: Manages the rate of data transmission to avoid

congestion.
o Connection establishment and teardown: Ensures that

devices establish a reliable connection before transmitting


data and properly close the connection afterward.

 Function: Handles addressing and routing of data packets across


different networks.
 Key Features:
o IP Addressing: Every device on the network is assigned a

unique IP address.
o Routing: Determines the best path for data to travel across

networks.

 Function: A connectionless protocol used for applications


requiring low-latency communication (such as video streaming or
online gaming).
 Key Features:
o Faster but less reliable than TCP: It doesn’t guarantee

delivery or order of packets.


o Used for time-sensitive applications: Ideal when speed is

more important than reliability.


 Function: Used for sending and relaying email messages between
email servers.
 Key Features:
o Email transmission: Defines how email messages are sent

and forwarded between clients and servers.

 Function: The protocol used for transferring web pages on the


internet.
 Key Features:
o HTTP: Used for non-secure communication.

o HTTPS: A secure version of HTTP that uses encryption to

protect data.

 Function: Used for transferring files between a client and server


on a network.
 Key Features:
o Support for both binary and text files.

o Two modes: Active and passive.

 Function: Resolves domain names (like www.example.com) into


IP addresses that computers can understand.
 Key Features:
o Decentralized system: DNS servers are distributed globally

to ensure availability.
 Function: Automatically assigns IP addresses to devices when
they join the network.
 Key Features:
o IP address management: Reduces the need for manual

configuration.
o Lease-based allocation: IP addresses are temporarily

assigned to devices.

 Function: Provides encrypted communication between clients


and servers (commonly used in HTTPS).
 Key Features:
o Data encryption: Ensures privacy by encrypting

communication.
o Authentication: Verifies the identity of the server (and

sometimes the client).


Connection-Oriented and Connectionless Services
In computer networking, connection-oriented and connectionless
services are two primary types of communication services used to
transfer data between devices. The key difference lies in how the
communication process is managed and the reliability of the data
delivery.
1. Connection-Oriented Service
:

A connection-oriented service establishes a dedicated connection


between the sender and the receiver before any data transmission
takes place. This means that a logical or virtual connection is created
between the two devices (or network nodes), ensuring that the entire
communication process follows a predefined path. Communication
only happens after the connection is established and ends once the
data transfer is complete.

 Connection Setup: Before data is exchanged, a connection must


be established between the sender and receiver. This involves a
handshake process to ensure both devices are ready to
communicate.
 Reliability: Connection-oriented services ensure reliable data
transmission. They use mechanisms to check for errors,
retransmit lost data, and guarantee that the data arrives in the
correct order.
 Flow Control: Mechanisms to control the rate of data flow to
prevent congestion and ensure that devices do not become
overwhelmed by incoming data.
 Error Control: Detects errors in data transmission, and lost or
corrupted data packets are retransmitted.
 Ordered Data Delivery: Data is delivered in the same order in
which it was sent, preventing out-of-sequence delivery.
 Connection Teardown: After the communication is complete, the
connection is terminated.

 Transmission Control Protocol (TCP): A prime example of a


connection-oriented protocol, TCP ensures reliable and ordered
delivery of data by establishing a connection between the sender
and receiver.
 Signaling System 7 (SS7): Used in telecommunications for call
setup and management.
 Reliable Communication: Guarantees that data will reach the
recipient in the correct order and without loss (except in cases of
network failure).
 Flow and Error Control: Built-in mechanisms to ensure data is
delivered correctly and without congestion.

 Overhead: The connection setup and teardown add extra time


and resources.
 Latency: Connection establishment and error correction
mechanisms introduce delays.

 Web Browsing (HTTP/HTTPS)


 File Transfer (FTP)
 Email Transmission (SMTP)
 Voice Calls (e.g., PSTN calls, VoIP)
 Remote Access (VPN)

2. Connectionless Service

A connectionless service does not establish a dedicated end-to-end


connection before sending data. Instead, each data packet is sent
independently, and there is no guarantee of delivery or order. Each
packet is routed individually, and the network does not maintain any
state information about the communication.
 No Connection Setup: Communication occurs without first
establishing a connection. Data packets are sent directly to the
destination without any prior handshake.
 Unreliable Communication: There is no guarantee that the data
will reach its destination, or that it will be delivered in the correct
order.
 No Error Recovery: Errors are not automatically detected or
corrected by the protocol, meaning that if a packet is lost or
corrupted, no retransmission occurs unless the application layer
handles it.
 No Flow Control: Since there is no ongoing connection, flow
control mechanisms are not in place. The sender might
overwhelm the receiver if data is sent too quickly.
 Independent Packets: Each data packet is treated independently,
and it may follow different paths to reach the destination.

 User Datagram Protocol (UDP): The most common


connectionless protocol, UDP sends data packets (datagrams)
without establishing a connection. It does not provide reliability
or flow control.
 Internet Protocol (IP): IP, used for routing packets across
networks, operates in a connectionless manner. It is responsible
for addressing and forwarding data packets but does not
guarantee their delivery or ordering.
 Simple Network Management Protocol (SNMP): Used for
network monitoring, SNMP sends queries to devices without
ensuring reliability.
 Low Overhead: No connection setup or teardown, which means
faster data transmission and less resource consumption.
 Reduced Latency: As there is no waiting for connection
establishment, data can be transmitted almost immediately.

 Unreliable: No guarantees of delivery, and data may be lost,


corrupted, or arrive out of order.
 No Flow Control or Error Detection: There is no automatic
handling of congestion or errors, which could lead to data loss or
the need for additional application-level protocols for error
handling.

 Streaming Media: Video or audio streaming where a slight loss in


data (like a frame drop or packet loss) might not significantly
impact the overall experience.
 VoIP: Voice-over-IP applications where real-time
communication is prioritized over perfect data delivery.
 Online Gaming: Where real-time interaction is more important
than ensuring every single packet arrives intact.
 DNS Requests: Since DNS queries are relatively small, losing
some packets or having some requests time out can be tolerated.
 Broadcasting: Broadcasting a message to multiple recipients
without establishing a connection with each one.

3. Comparison Between Connection-Oriented and Connectionless


Services
Feature Connection-Oriented Connectionless

Required before data


Connection No connection setup; data is
transfer (e.g., TCP
Setup sent independently.
handshake).

Reliable; guarantees
Unreliable; no guarantee of
Reliability delivery, error checking,
delivery or order.
and reordering.

Flow Built-in flow control to No flow control; may result


Control prevent congestion. in network congestion.

No automatic error
Error Provides error detection
correction; requires higher
Control and correction.
layers for retries.

Higher latency due to


Lower latency, as no
Latency connection establishment
connection setup is needed.
and teardown.

Data No guarantee of order; data


Ordered delivery of data.
Delivery may arrive out of sequence.

Higher due to connection


Lower due to lack of
Overhead setup, maintenance, and
connection establishment.
teardown.

Examples TCP, ATM, SS7 UDP, IP, SNMP


Network Applications and Application Protocols
Network applications are software programs that use the internet or
other networks to provide services, facilitate communication, or allow
access to shared resources. These applications rely on various
application protocols to enable communication between different
systems. Below, we discuss network applications and their associated
protocols:
1. Web Browsing (HTTP/HTTPS)
 Network Application: Web browsers (e.g., Google Chrome,
Mozilla Firefox, Microsoft Edge) allow users to access web pages
over the internet.
 Application Protocols:
o HTTP (Hypertext Transfer Protocol): The protocol used for

transferring web pages. It is based on a client-server model,


where the browser (client) sends requests to a web server,
which responds with the requested content.
o HTTPS (Hypertext Transfer Protocol Secure): A more

secure version of HTTP, it uses encryption (TLS/SSL) to


ensure privacy and data integrity during communication.
2. Email (SMTP, POP3, IMAP)
 Network Application: Email clients (e.g., Microsoft Outlook,
Gmail) are used to send and receive messages.
 Application Protocols:
o SMTP (Simple Mail Transfer Protocol): Used to send emails

from the client to the email server or between servers.


o POP3 (Post Office Protocol, version 3): Used to retrieve

emails from a server. It downloads the messages to the client


and removes them from the server.
o IMAP (Internet Message Access Protocol): Similar to POP3
but allows users to access and manage their emails directly
on the server without downloading them.

3. File Transfer (FTP, SFTP, FTPS)


 Network Application: File transfer programs (e.g., FileZilla,
WinSCP) enable the transfer of files between computers over a
network.
 Application Protocols:
o FTP (File Transfer Protocol): A standard network protocol

used for transferring files from one host to another. It


operates on the client-server model and typically uses port
21.
o SFTP (Secure File Transfer Protocol): A more secure

version of FTP that uses SSH (Secure Shell) for encrypted


file transfers.
o FTPS (FTP Secure): A variant of FTP that uses SSL/TLS to

encrypt the connection, providing security during file


transfers.
4. Remote Access and Management (SSH, Telnet)
 Network Application: Remote access tools (e.g., PuTTY,
OpenSSH) allow users to connect to and manage remote servers
or devices.
 Application Protocols:
o SSH (Secure Shell): A secure protocol used for remote login

and command execution on remote systems. It encrypts the


session to prevent unauthorized access.
o Telnet: An older, insecure protocol for remote access, which

sends data in plain text and is therefore vulnerable to


eavesdropping. It has been largely replaced by SSH for
security reasons.
5. Voice over IP (VoIP)
 Network Application: VoIP applications (e.g., Skype, Zoom,
WhatsApp) allow users to make voice or video calls over the
internet.
 Application Protocols:
o SIP (Session Initiation Protocol): Used for establishing,

maintaining, and terminating communication sessions in


VoIP applications.
o RTP (Real-time Transport Protocol): Transports the actual

voice or video data during the communication session.


o RTCP (RTP Control Protocol): Works alongside RTP to

monitor the quality of service and provide feedback on


packet delivery.
6. Instant Messaging (XMPP, IRC, WhatsApp)
 Network Application: Messaging apps (e.g., WhatsApp,
Telegram, Slack) allow users to send real-time text messages.
 Application Protocols:
o XMPP (Extensible Messaging and Presence Protocol): A

protocol for instant messaging, presence information, and


multi-party chat. It is used by apps like Google Chat.
o IRC (Internet Relay Chat): A long-standing protocol for

text-based communication, especially for group chats or


forums.
7. File Sharing (BitTorrent, HTTP)
 Network Application: Peer-to-peer (P2P) file-sharing
applications (e.g., BitTorrent) allow users to download and
upload files across a decentralized network.
 Application Protocols:
o BitTorrent: A protocol that enables efficient distribution of

files across a P2P network. Files are split into small chunks
and shared among peers.
o HTTP (in case of centralized servers): Some file-sharing
applications use HTTP to download content from central
servers (e.g., downloading software via web browsers).
8. DNS (Domain Name System)
 Network Application: DNS is a fundamental service that converts
human-readable domain names (e.g., www.example.com) into IP
addresses.
 Application Protocols:
o DNS (Domain Name System) Protocol: DNS requests are

made over UDP (User Datagram Protocol) typically on port


53, but can also use TCP for larger query responses. DNS
resolves domain names into IP addresses to enable routing
on the internet.
9. Streaming Services (RTSP, HLS, MPEG-DASH)
 Network Application: Streaming platforms (e.g., Netflix, Spotify)
deliver media content like video or audio to users.
 Application Protocols:
o RTSP (Real-Time Streaming Protocol): Used for controlling

media servers in a streaming session, typically used for video


surveillance or media streaming.
o HLS (HTTP Live Streaming): A streaming protocol

developed by Apple, which breaks the media into small


segments for adaptive streaming.
o MPEG-DASH (Dynamic Adaptive Streaming over HTTP):

A similar protocol to HLS but an open standard used for


adaptive streaming.
OSI (Open Systems Interconnection) Reference Model
The OSI Reference Model is a conceptual framework used to
understand and describe how different networking protocols interact
in a network system. Developed by the International Organization for
Standardization (ISO), it divides the complex process of
communication into seven distinct layers, with each layer responsible
for a specific aspect of the network communication.
The purpose of the OSI model is to provide a universal standard for
networking and to ensure interoperability between different systems
and devices. While it is a theoretical model, it serves as the foundation
for understanding networking processes.
Here’s a detailed look at the seven layers of the OSI model:
1. Application Layer (Layer 7)
 Function: The topmost layer of the OSI model, the Application
layer, directly interacts with end-users. It provides the interface
and services that allow applications to communicate over the
network.
 Role: It facilitates communication between software applications
and lower layers of the OSI model. It also enables features like
email, file transfer, web browsing, and remote access.
 Protocols:
o HTTP (Hypertext Transfer Protocol)

o FTP (File Transfer Protocol)

o SMTP (Simple Mail Transfer Protocol)

o DNS (Domain Name System)

o POP3 (Post Office Protocol)

o IMAP (Internet Message Access Protocol)

2. Presentation Layer (Layer 6)


 Function: The Presentation layer is responsible for translating,
encrypting, and compressing data. It ensures that data is in a
readable and usable format for the application layer.
 Role: It handles the syntax and semantics of the data exchanged
between the Application and Transport layers. This layer deals
with data representation (e.g., ASCII, JPEG, GIF), compression,
and encryption.
 Protocols:
o SSL/TLS (Secure Sockets Layer/Transport Layer Security)

o JPEG, GIF (Image formats)

o ASCII, EBCDIC (Character encoding standards)

3. Session Layer (Layer 5)


 Function: The Session layer manages the sessions or connections
between applications. It controls the dialog between two devices,
such as managing who can send data and when.
 Role: It establishes, maintains, and terminates communication
sessions between two devices. It is also responsible for
synchronizing data transfer and handling session checkpoints
and recovery.
 Protocols:
o NetBIOS (Network Basic Input/Output System)

o RPC (Remote Procedure Call)

o PPTP (Point-to-Point Tunneling Protocol)

4. Transport Layer (Layer 4)


 Function: The Transport layer ensures reliable data transfer
between two systems and provides error correction and flow
control. It is responsible for breaking data into segments and
ensuring the integrity of the transmitted data.
 Role: It provides end-to-end communication, error recovery, and
flow control. It is responsible for ensuring that data is delivered
in the correct order and without errors.
 Protocols:
o TCP (Transmission Control Protocol)

o UDP (User Datagram Protocol)

5. Network Layer (Layer 3)


 Function: The Network layer is responsible for routing data from
the source to the destination across multiple networks. It handles
logical addressing, packet forwarding, and routing.
 Role: It determines the best path for data to travel and ensures
that packets are properly addressed and routed between devices
on different networks. It is also responsible for fragmentation
and reassembly of data packets.
 Protocols:
o IP (Internet Protocol)

o ICMP (Internet Control Message Protocol)

o ARP (Address Resolution Protocol)

o Routing protocols (e.g., OSPF, RIP)

6. Data Link Layer (Layer 2)


 Function: The Data Link layer ensures reliable data transfer
across a physical link by organizing data into frames. It also
handles error detection and correction within the data frames.
 Role: It provides physical addressing (MAC addresses) and
manages the transmission of frames between devices on the same
local network. It handles flow control and error correction.
 Protocols:
o Ethernet

o Wi-Fi (IEEE 802.11)

o PPP (Point-to-Point Protocol)

o ARP (Address Resolution Protocol)

7. Physical Layer (Layer 1)


 Function: The Physical layer defines the hardware elements
required for transmission, such as cables, switches, and the
electrical signals used to transmit data over a medium.
 Role: It deals with the physical aspects of sending and receiving
data. This includes defining the characteristics of the
transmission medium (e.g., electrical signals, light pulses) and the
physical devices that send and receive data (e.g., cables, network
interface cards).
 Protocols:
o Ethernet (cabling standards)

o USB (Universal Serial Bus)

o Fiber optics

o Bluetooth (wireless standard)

OSI Model in Action


To better understand the OSI model in practice, consider a simple
scenario where a user sends an email:
1. Application Layer: The email client (e.g., Outlook) creates the
message and initiates communication using a protocol like
SMTP.
2. Presentation Layer: The message may be encoded or compressed
to ensure compatibility and security during transmission (e.g.,
encrypted using SSL/TLS).
3. Session Layer: The session between the sender’s email client and
the mail server is established, ensuring reliable and orderly data
transmission.
4. Transport Layer: The email is divided into smaller chunks
(segments) and delivered reliably using TCP to ensure no data is
lost or corrupted during transmission.
5. Network Layer: The email is sent as packets over the network,
and the best path is determined using IP addressing to reach the
recipient’s mail server.
6. Data Link Layer: The packets are converted into frames for
transmission over the local network, with MAC addresses used
for delivery to the next hop (e.g., router or switch).
7. Physical Layer: The email data is transmitted as electrical or
light signals over physical media, such as cables or wireless
signals.
Key Takeaways:
 The OSI model is a conceptual framework designed to help
understand how different networking protocols interact with
each other.
 The seven layers of the OSI model, from the Physical Layer
(Layer 1) to the Application Layer (Layer 7), each handle specific
tasks involved in network communication.
 While the OSI model is often used as a reference for educational
and troubleshooting purposes, it is not directly used in actual
network implementations. The TCP/IP model is more commonly
used in real-world networking.
Computer Communications
Computer communications refers to the exchange of data and
information between different computer systems or devices over a
communication medium (like cables, wireless networks, etc.). It
enables computers to connect and communicate with each other,
share resources, and perform tasks collectively. These
communications occur using a combination of hardware, software,
and communication protocols, which allow different devices to
exchange information in a standardized way.
Key Concepts in Computer Communications
1. Communication Channels:
o The physical medium used to transmit data between devices.

This could be wired (cables, fiber optics) or wireless (radio


waves, microwaves, infrared).
o Examples:

 Twisted Pair Cable (used for telephone lines and some

local area networks).


 Fiber Optic Cable (provides high-speed data

transmission over long distances).


 Wi-Fi (wireless communication using radio waves).

 Bluetooth (short-range wireless communication).

2. Data Transmission:
o The process of transferring data over a communication
channel. Data can be transmitted in different forms:
 Analog Transmission: Continuous signals to represent

data (e.g., traditional telephone lines).


 Digital Transmission: Discrete signals (e.g., computer

networks, where data is transmitted in binary format).


o Transmission Modes:

 Simplex: Data flows in only one direction (e.g.,

keyboard to computer).
 Half-Duplex: Data can flow in both directions but not at

the same time (e.g., walkie-talkies).


 Full-Duplex: Data flows in both directions

simultaneously (e.g., telephones).


3. Data Encoding:
o Before transmission, data is encoded into signals suitable for

transmission through a channel.


o Encoding Techniques:

 NRZ (Non-Return-to-Zero): Data is represented by a

specific voltage level for a fixed period.


 Manchester Encoding: A method where a transition in

the signal represents a binary 1 or 0.


4. Protocols:
o Communication protocols are rules and conventions for data

exchange that ensure proper transmission and reception of


data.
o Examples:

 TCP/IP (Transmission Control Protocol/Internet

Protocol) for internet communication.


 HTTP/HTTPS for web communication.

 FTP (File Transfer Protocol) for transferring files.

 SMTP (Simple Mail Transfer Protocol) for email

communication.
5. Error Detection and Correction:
o Data can become corrupted during transmission due to
noise, interference, or other issues. Error detection
techniques ensure data integrity.
o Methods:

 Parity Bits: A single bit added to a byte for error

detection.
 Checksums: A value calculated from a data set and sent

along with the data to check for errors.


 CRC (Cyclic Redundancy Check): A more complex

error detection method.


6. Data Compression:
o The process of reducing the size of data to save bandwidth

and storage space. Compression is especially important in


data transmission over limited bandwidth networks.
o Techniques:

 Lossless Compression: No data is lost (e.g., ZIP files,

PNG images).
 Lossy Compression: Some data is lost to reduce size

further (e.g., JPEG images, MP3 audio).


Types of Computer Communication
1. Point-to-Point Communication:
o Involves direct communication between two devices. This

could be a direct connection through a cable or via a wireless


connection.
o Example: A USB connection between a computer and a

printer.
2. Broadcast Communication:
o A single sender transmits data to multiple receivers

simultaneously.
o Common in networks like television broadcasting and

wireless communication.
o Example: Broadcasting a TV signal or sending a message to

all users in a local network.


3. Multicast Communication:
o Involves sending data from one sender to multiple, but not

all, receivers.
o Often used for group communication where the sender

doesn't need to broadcast to every device.


o Example: Online video streaming where only certain users

(subscribers) receive the stream.


Components of a Computer Communication System
1. Message:
o The actual data or information that is being transmitted

between systems.
2. Sender:
o The device or computer that sends the message.

3. Receiver:
o The device or computer that receives the message.

4. Medium:
o The physical or logical pathway used to transmit the

message (e.g., cables, wireless network).


5. Protocol:
o The set of rules that define how data is exchanged between

devices. It specifies how the message is formatted,


transmitted, and error-handled.
Network Topologies in Computer Communications
Network topologies define how devices are connected in a network
and how data flows between them. The topology can affect
performance, scalability, and reliability.
1. Bus Topology:
o A single central cable (the bus) carries data to all devices on

the network. It is inexpensive but prone to network collisions


and disruptions if the main cable fails.
2. Ring Topology:
o Devices are connected in a closed loop, and data travels in
one direction around the ring. It ensures orderly data
transmission but can be disrupted if any device fails.
3. Star Topology:
o Devices are connected to a central hub or switch. The central

node controls communication, making it easy to manage but


creating a potential point of failure.
4. Mesh Topology:
o Every device is connected to every other device. This ensures

redundancy and reliability but is costly and complex to


implement.
5. Hybrid Topology:
o A combination of two or more different topologies. For

example, a large network might use star topology at the


lower level and a bus topology at the higher level.
Computer Networks
Computer communications often occur within the context of
computer networks, which are systems that link multiple devices and
enable them to share resources, such as files, printers, and internet
access. Networks can be classified by their size and coverage:
1. LAN (Local Area Network):
o A network that covers a small geographic area, such as an

office, home, or school. LANs typically use Ethernet or Wi-


Fi for communication.
2. WAN (Wide Area Network):
o A large network that spans across cities, countries, or even

continents. The internet is the largest example of a WAN.


3. MAN (Metropolitan Area Network):
o A network that covers a larger area than a LAN but smaller

than a WAN, often used in cities or large campuses.


4. PAN (Personal Area Network):
o A small-scale network used for personal devices, such as
connecting a smartphone to a computer via Bluetooth.
Challenges in Computer Communications
1. Bandwidth Limitations:
o The amount of data that can be transmitted in a given time

is constrained by the bandwidth of the communication


medium.
2. Latency:
o The delay between sending and receiving data. High latency

can affect real-time applications like video calls or online


gaming.
3. Security:
o Ensuring that data is transmitted securely and is protected

from unauthorized access, alteration, or theft. Security


protocols like encryption (e.g., SSL/TLS) and firewalls are
essential.
4. Congestion:
o When too much data is transmitted over a network at once,

causing delays and packet loss. Traffic management


techniques like Quality of Service (QoS) can help.
5. Interference and Noise:
o External factors that can disrupt the transmission of data.

This includes electromagnetic interference or signal


degradation over long distances.
UNIT-2

Analog and Digital Communications


are two fundamental methods used for transmitting data or
information over various communication channels. Here's a
breakdown of both:
1. Analog Communications
Analog communication refers to the transmission of information in a
continuous wave form. In this system, the information (like sound,
video, etc.) is represented by continuous signals that vary in
amplitude, frequency, or phase.
Key Features:

 Signal Type: Continuous (varying over time).


 Examples: Traditional AM/FM radio, television broadcasting
(analog), landline telephone systems.
 Modulation: Analog signals are transmitted by varying parameters
such as:
o Amplitude Modulation (AM): Varying the amplitude of the

carrier wave.
o Frequency Modulation (FM): Varying the frequency of the

carrier wave.
o Phase Modulation (PM): Varying the phase of the carrier

wave.

Advantages of Analog Communication:

 Simple to implement.
 Less complex and can be efficient for small-scale, low-frequency
applications.
 Often requires less bandwidth in certain types of systems (e.g., AM
radio).

Disadvantages:

 Noise Sensitivity: Analog signals are susceptible to degradation


from noise and interference.
 Limited Data: It is difficult to encode large amounts of data or
information efficiently.
 Signal Degradation: Analog signals tend to degrade over long
distances, requiring repeaters or amplifiers.
2. Digital Communications
Digital communication involves transmitting information in the form
of discrete signals, typically represented by binary digits (0s and 1s).
This method encodes data as sequences of binary code, which are
transmitted over communication channels.
Key Features:

 Signal Type: Discrete (representing data as a series of bits).


 Examples: Internet, digital television, mobile communications, and
digital telephony.
 Modulation: Digital signals are transmitted using modulation
schemes like:
o Amplitude Shift Keying (ASK): Modulating the amplitude of

the carrier wave.


o Frequency Shift Keying (FSK): Modulating the frequency of the

carrier wave.
o Phase Shift Keying (PSK): Modulating the phase of the carrier

wave.
o Quadrature Amplitude Modulation (QAM): A combination of

amplitude and phase modulation to transmit more bits per


symbol.
Advantages of Digital Communication:

 Noise Immunity: Digital signals are more resistant to noise and


degradation than analog signals.
 Compression: Digital data can be compressed, allowing more
information to be transmitted in the same bandwidth.
 Error Detection and Correction: Digital systems can include error
detection and correction techniques (like checksums or parity bits),
improving reliability.
 Security: Digital signals are easier to encrypt, providing greater
security for communications.

Disadvantages:

 Complexity: Digital communication systems are more complex to


implement and may require sophisticated processing (such as
encoding and decoding).
 Bandwidth: Digital signals may require more bandwidth than
analog signals for the same quality, especially in high-resolution or
high-data-rate applications.
Comparison Between Analog and Digital Communications:

Feature Analog Communications Digital Communications

Continuous (analog
Signal Type Discrete (binary signals)
signals)

Noise Poor (susceptible to Better (can be error-


Resistance noise) corrected)

More complex (encoding,


Complexity Simple to implement
decoding, etc.)
Feature Analog Communications Digital Communications

Bandwidth Typically lower (requires Typically higher (can be


Efficiency more space) compressed)

Maintains high quality over


Quality Prone to degradation
long distances

Easier to secure through


Security Less secure
encryption

AM/FM radio, analog TV, Mobile phones, internet,


Examples
landlines digital TV

Hybrid Systems
In modern communications, hybrid systems often combine both
analog and digital technologies. For example, audio in
telecommunication might be encoded digitally, but transmitted over
analog radio waves. Similarly, traditional television broadcasts have
transitioned to digital formats, combining the advantages of both.
1. Concept of Data
 Data refers to the raw facts or information that needs to be
transmitted from a source to a destination. This could include text,
audio, video, sensor data, etc.
 In digital communication, data is typically represented in binary
form (0s and 1s), which is then encoded into signals for
transmission.
 In analog communication, data is represented as continuous
waveforms that vary in amplitude, frequency, or phase.
2. Concept of Signal
A signal is a time-varying representation of data that carries
information from a transmitter to a receiver.
 Analog Signal: In analog communication, the signal is continuous
and can take on any value within a given range. It represents the
data as variations in amplitude, frequency, or phase over time.
Examples include voice signals or analog video signals.
 Digital Signal: In digital communication, the signal represents
data in discrete form, often as binary values (1s and 0s). The
signal switches between discrete levels (such as voltage levels) to
represent different bits. A common example is a signal sent over
the internet or from a computer.
Key Terms:

 Amplitude: The strength or intensity of a signal.


 Frequency: The number of oscillations or cycles per second.
 Phase: The timing of the wave's oscillations.
3. Concept of Channel
A channel is the medium through which the signal travels from the
transmitter to the receiver. It can be:
 Physical: such as wires (coaxial cables, fiber-optic cables), air (radio
waves), or satellite links.
 Wireless: such as through the atmosphere, typically used in mobile
phone communication, radio, and Wi-Fi.
 Guided: such as through a cable or optical fiber.
The channel introduces factors that can degrade the signal, including
noise, attenuation, and distortion, which impact the overall quality of
communication.
4. Concept of Bit-rate (or Data Rate)
Bit-rate, also known as data rate, refers to the amount of data
transmitted per unit of time, usually measured in bits per second
(bps). It indicates how fast data is being transmitted through the
communication system.
 Bit-rate is determined by factors such as:
o The modulation technique: how the data is encoded onto the

signal.
o The bandwidth: the range of frequencies available for

transmission.
o The signal-to-noise ratio (SNR): the ratio of the signal strength

to the noise level.

Units of Bit-rate:

 bps (bits per second): The basic unit.


 kbps (kilobits per second): 1,000 bps.
 Mbps (megabits per second): 1,000,000 bps.
 Gbps (gigabits per second): 1,000,000,000 bps.
5. Maximum Data Rate of a Channel (Shannon-Hartley Theorem)
The maximum data rate (also called the channel capacity) is the
highest rate at which data can be transmitted through a given channel
without error, considering the channel's bandwidth and noise.
The Shannon-Hartley theorem provides a mathematical formula to
calculate the maximum data rate:
C = B log2(1+N/S)
Where:
 CCC = Maximum data rate (channel capacity) in bits per second
(bps).
 BBB = Bandwidth of the channel in Hertz (Hz).
 SSS = Signal power.
 NNN = Noise power (often represented as noise power spectral
density).

Key Insights from the Shannon-Hartley Theorem:

 The data rate increases with bandwidth (B): The wider the
bandwidth, the more data can be transmitted.
 The signal-to-noise ratio (SNR) affects the maximum data rate.
Higher SNR allows for higher data rates since less noise interferes
with the signal.
 The theorem shows that infinite data rates are impossible with
finite bandwidth or when noise levels are significant.
6. Example
Suppose a communication channel has a bandwidth of 1 MHz
(1,000,000 Hz) and a signal-to-noise ratio (SNR) of 30 dB (which
corresponds to a ratio of 1000).
Using the Shannon-Hartley theorem:

This means the maximum theoretical data rate for this channel is
about 9.97 Mbps.
Summary of Key Concepts:

Concept Analog Communication Digital Communication

Continuous (e.g., sound,


Data Discrete (0s and 1s)
video)
Concept Analog Communication Digital Communication

Continuous, varying in
Discrete, representing bits via
Signal amplitude, frequency,
voltage levels
phase

Physical medium (radio, Can be physical or wireless


Channel
cable) (fiber, satellite, etc.)

Bit-rate Lower data rates for Higher data rates, more efficient
(Data Rate) analog systems for high-bandwidth applications

Calculated using the Shannon-


Maximum Limited by bandwidth
Hartley theorem; depends on
Data Rate and noise in the channel
SNR and bandwidth

Representing Data as Analog Signals


In analog communication, data is represented as continuous signals.
These signals can vary in certain ways (such as in amplitude,
frequency, or phase) to represent the information being transmitted.
1. Representation of Data Using Analog Signals

 Analog Signals are continuous in time and can take any value
within a given range. These signals are usually represented as
sine waves or a combination of sine waves.
 Data is represented by modulating an analog carrier wave (a
continuous signal) in one of the following ways:
o Amplitude Modulation (AM): The amplitude of the carrier

wave is varied in proportion to the data signal. For example,


in AM radio broadcasting, the audio signal modulates the
amplitude of the radio wave.
 Example: If a speech signal is being transmitted, its

amplitude will vary the carrier wave according to the


loudness or softness of the sound.
o Frequency Modulation (FM): The frequency of the carrier
wave is varied according to the data signal. FM radio
broadcasting is an example, where audio signals modulate
the frequency of the radio carrier.
 Example: As a voice signal changes in pitch, the frequency

of the carrier wave is adjusted accordingly.


o Phase Modulation (PM): The phase of the carrier wave is
shifted according to the data signal.
 Example: Digital data can be encoded in phase shifts in a

carrier wave, a technique used in Phase Shift Keying (PSK)


in digital systems.

Advantages and Disadvantages of Analog Representation:

 Advantages:
o Simple to implement and requires less processing power.

o Continuous representation allows for smooth, natural signal

transmission.
 Disadvantages:
o Noise Sensitivity: Analog signals degrade over distance due to

noise, making it harder to preserve signal quality.


o Bandwidth Inefficiency: Analog signals can require large

bandwidths, especially for high-quality transmissions.


Representing Data as Digital Signals
In digital communication, data is represented as discrete values,
typically as sequences of binary digits (0s and 1s). These binary values
are encoded into signals that are transmitted over the communication
medium.
1. Representation of Data Using Digital Signals

 Digital Signals are non-continuous and are made up of discrete


values. The transmission medium typically carries binary data,
where each bit (0 or 1) is represented as a distinct signal level.
 Data can be represented using different modulation techniques:
o Amplitude Shift Keying (ASK): The amplitude of the carrier

signal is varied to represent binary data. A high amplitude


might represent a "1," and a low amplitude might represent
a "0."
o Frequency Shift Keying (FSK): The frequency of the carrier

signal is varied to represent binary data. For example, one


frequency may represent a "1," and a different frequency
may represent a "0."
o Phase Shift Keying (PSK): The phase of the carrier signal is

changed to represent binary data. For example, a 0 might be


represented by one phase, and a 1 by another.
o Quadrature Amplitude Modulation (QAM): This combines

both amplitude and phase modulation, allowing more bits to


be represented in a single signal. It is used in higher data
rate digital communication systems, such as cable modems
or DSL.
Advantages and Disadvantages of Digital Representation:

 Advantages:
o Noise Immunity: Digital signals are less affected by noise

compared to analog signals. Errors can be detected and


corrected using error-correcting codes (e.g., parity checks).
o Error Detection & Correction: Digital systems can use various

algorithms to detect and correct errors during transmission.


o Bandwidth Efficiency: Digital signals can be compressed and
modulated to fit more data into the available bandwidth,
allowing for higher data rates.
 Disadvantages:
o Complexity: Digital communication systems are more complex

to implement and require sophisticated encoding and


decoding techniques.
o Bandwidth Requirements: Digital signals can require more

bandwidth in certain applications due to higher modulation


schemes or higher bit rates.
Data Rate and Bandwidth
1. Data Rate

 Data rate (also known as bit rate) refers to the amount of data that
can be transmitted over a communication channel in a given
period of time. It is typically measured in bits per second (bps), but
it can also be in kilobits per second (kbps), megabits per second
(Mbps), or gigabits per second (Gbps).

2. Bandwidth

 Bandwidth refers to the range of frequencies that a


communication channel can carry. It is measured in Hertz (Hz)
and determines the capacity of the channel to transmit data.
o The higher the bandwidth, the more data the channel can

transmit at once, which allows for higher data rates.


o The lower the bandwidth, the slower the data transmission,

as fewer frequencies are available for transmitting data.


Relationship Between Data Rate and Bandwidth:
The data rate of a channel is closely related to its bandwidth. A higher
bandwidth allows for a higher data rate, as more data can be
transmitted simultaneously across a wider range of frequencies.
Shannon-Hartley Theorem

The Shannon-Hartley theorem provides the theoretical upper limit for


the data rate (channel capacity) based on the available bandwidth and
the signal-to-noise ratio (SNR) of the channel:

Where:
 CCC = Maximum data rate (in bps)
 BBB = Bandwidth (in Hz)
 SSS = Signal power
 NNN = Noise power
 SN\frac{S}{N}NS = Signal-to-noise ratio (SNR)

Example:

 If a channel has a bandwidth of 1 MHz (1,000,000 Hz) and a signal-


to-noise ratio of 30 dB (which is roughly equivalent to an SNR of
1000), the maximum data rate is calculated as:

This means the theoretical maximum data rate is about 9.97 Mbps for
the given channel.
Asynchronous and Synchronous Transmission
1. Asynchronous Transmission

Asynchronous transmission is a method of transmitting data in which


each character or byte is sent independently, with start and stop
signals marking the beginning and end of each data unit. The receiver
knows when to start and stop reading based on these special markers.
Key Characteristics:
 Start and Stop Bits: Each data unit (usually a character or byte) is
sent with a start bit (indicating the start of the transmission) and
one or more stop bits (indicating the end).
 Variable Timing: Data bits are sent at irregular intervals, with each
unit being transmitted separately. The timing between characters
may vary.
 Simple Protocol: Does not require the sender and receiver to be
synchronized continuously, making it simpler to implement.
Example:
 RS-232 serial communication (used in computer ports).
 Used for short, low-speed communication, such as keyboard inputs
or low-volume data transmission.
Advantages:
 Simplicity: It is easy to implement and does not require a clock
signal.
 Flexibility: Data can be sent at irregular intervals, making it ideal
for low-speed or sporadic data transfer.
Disadvantages:
 Lower Efficiency: The need for start and stop bits reduces
efficiency, as more bits are used for framing each character.
 Slower Speeds: Asynchronous communication is less efficient for
high-speed data transfer compared to synchronous methods.

2. Synchronous Transmission

Synchronous transmission involves transmitting data in a continuous


stream, with the sender and receiver operating in sync (i.e., both use a
shared clock signal). Data is transmitted in large blocks (e.g., frames)
instead of individual characters, and the timing is maintained
throughout the communication.
Key Characteristics:
 No Start/Stop Bits: Unlike asynchronous transmission, no extra bits
are needed for framing. The receiver knows exactly when to read
the data bits because the timing is synchronized.
 Continuous Data Flow: Data is sent in continuous blocks or frames,
often accompanied by a clock signal to maintain synchronization.
 Higher Speed: This method is more efficient and faster than
asynchronous transmission because it minimizes the overhead
caused by start and stop bits.
Example:
 Ethernet and USB use synchronous transmission.
 Used for higher-speed data transfers, such as in networking, file
transfers, and video streaming.
Advantages:
 Higher Efficiency: No start/stop bits and continuous transmission
result in faster and more efficient data transfer.
 High Data Rates: Synchronous transmission supports high-speed
communications, such as in real-time video or large file transfers.
Disadvantages:
 More Complex: Synchronous systems require the sender and
receiver to be synchronized, often using an external clock signal.
 More Overhead: Requires more complex hardware and protocols
to handle the synchronization.
Data Encoding Techniques
Data encoding refers to the method of converting data into signals for
transmission over a medium. Different encoding schemes are used to
represent binary data (0s and 1s) as signals.
1. Non-Return to Zero (NRZ) Encoding

In NRZ encoding, a 1 is represented by one level (usually a positive


voltage), and a 0 is represented by a different level (usually 0 or
negative voltage). The voltage level is maintained throughout the bit
interval.
 NRZ-L: Logic level encoding, where a "1" is represented by a high
voltage and a "0" by a low voltage.
 NRZ-I: Inverted logic, where the signal is inverted when a "1" is
transmitted, and it stays the same when a "0" is transmitted.
Advantages:
 Simple and easy to implement.
 Requires less bandwidth than some other encoding schemes.
Disadvantages:
 Synchronization Problems: Long sequences of 0s or 1s can cause
timing issues since the signal doesn't change over time.
 DC Components: Signals may have a DC component, making it
difficult to transmit over long distances.
2. Manchester Encoding

Manchester encoding combines clock and data information into a


single signal. Each bit is represented by two voltage levels: one for the
first half of the bit period and one for the second half.
 "0" is represented by a transition from high to low in the middle of
the bit interval.
 "1" is represented by a transition from low to high in the middle of
the bit interval.
Advantages:
 No DC Component: This encoding ensures that the signal has no DC
component, making it better suited for transmission over long
distances.
 Clock Recovery: The transitions in the signal provide clocking
information, aiding in synchronization.
Disadvantages:
 Lower Efficiency: The signal requires more bandwidth since each
bit is transmitted in two signal changes.

3. Differential Manchester Encoding

Differential Manchester encoding is similar to Manchester encoding


but with the following modification:
 A "1" is represented by the absence of a transition at the start of
the bit period.
 A "0" is represented by the presence of a transition at the start of
the bit period.
This encoding is often used in systems where differential encoding
(changes in signal rather than absolute values) is beneficial.
Advantages:
 Robustness: It is more resistant to signal polarity errors because
the data is represented by the transition, not the signal level.
Disadvantages:
 Lower Efficiency: Like Manchester encoding, differential
Manchester requires more bandwidth.
Modulation Techniques
Modulation is the process of varying a carrier signal to encode data.
There are several modulation techniques for both analog and digital
communication systems.
1. Analog Modulation Techniques

 Amplitude Modulation (AM): In AM, the amplitude of a carrier


signal is varied in accordance with the data signal. AM is
commonly used for radio broadcasting.
 Frequency Modulation (FM): In FM, the frequency of the carrier
signal is varied according to the data signal. FM is used for high-
fidelity radio broadcasts, such as music and speech.
 Phase Modulation (PM): In PM, the phase of the carrier signal is
altered in accordance with the data signal. PM is used in some
communication systems and often combined with FM for better
performance.
2. Digital Modulation Techniques

 Amplitude Shift Keying (ASK): In ASK, the amplitude of the


carrier wave is varied to represent binary data. A "1" might be
represented by a high amplitude, and a "0" by no amplitude.
 Frequency Shift Keying (FSK): In FSK, the frequency of the
carrier signal is shifted between two or more values to represent
binary data. It is often used in data communication over noisy
channels (e.g., radio communication).
 Phase Shift Keying (PSK): In PSK, the phase of the carrier signal
is shifted to represent binary data. For example:
o Binary PSK (BPSK): Two phase shifts represent "0" and "1."

o Quadrature PSK (QPSK): Four different phase shifts can

represent two bits of data per symbol.


 Quadrature Amplitude Modulation (QAM): QAM is a
combination of both amplitude and phase modulation, used to
transmit multiple bits per symbol. It is widely used in broadband
systems like cable modems, digital TV, and Wi-Fi.
Advantages of Digital Modulation:
 Efficiency: Digital modulation techniques often allow higher data
rates and more robust error correction.
 Noise Resistance: Digital modulation is more resistant to noise and
interference than analog modulation.
Summary Table:

Asynchronous
Category Synchronous Transmission
Transmission

Transmission Character by character, Continuous stream with


Method with start/stop bits synchronized clocks

Lower, due to start/stop Higher, no extra bits


Efficiency
bits overhead needed

RS-232 serial ports, Ethernet, USB, video


Examples
keyboard inputs streaming
Category Data Encoding Technique Modulation Techniques

Example Manchester, NRZ,


ASK, FSK, PSK, QAM
Encoding Differential Manchester

Simple, Clock recovery


Advantages Efficient, Noise-resistant
(Manchester)

Lower bandwidth Complex, Requires more


Disadvantages
efficiency (Manchester) bandwidth (QAM)

Digital Carrier Systems


Digital carrier systems are communication systems designed to
transmit digital signals (i.e., discrete data represented by 0s and 1s)
over various transmission media. These systems are essential for
efficient communication over long distances and are characterized by
their ability to carry digital data, often with the help of modulated
carrier signals.
Digital carrier systems have several advantages, including high-speed
transmission, noise immunity, and the ability to use sophisticated
encoding and error correction techniques. They are used in
technologies such as telephone systems, data networks (e.g., the
internet), cable TV, and wireless communication.
Key Types of Digital Carrier Systems:

1. Digital Subscriber Line (DSL):


o DSL technology is used to provide high-speed internet over

traditional copper telephone lines. It uses a digital carrier


signal to transmit data at much higher speeds than regular
analog telephone systems.
o Example: Asymmetric Digital Subscriber Line (ADSL) provides

different download and upload speeds, optimizing for home


internet use.
2. Integrated Services Digital Network (ISDN):
o ISDN is a set of communication standards for transmitting

voice, data, and video over digital telephone lines. It allows


multiple channels to be transmitted over a single connection.
o ISDN is commonly used for voice and video conferencing or

transmitting data across a dedicated circuit-switched network.


3. Fiber Optic Systems:
o Fiber optics use light signals to transmit data over long

distances at very high speeds. These are digital


communication systems that allow for extremely high
bandwidth, offering very high data rates.
o Example: Dense Wavelength Division Multiplexing (DWDM)

technology in fiber optics allows multiple digital signals to be


transmitted simultaneously on different light wavelengths.
4. Satellite Systems:
o Satellites are used for long-range digital communication by

transmitting signals to and from satellites in space. Digital


signals are modulated onto radio waves to be sent to the
satellite, which then relays the signal to the ground station.

Advantages of Digital Carrier Systems:

 Higher Efficiency: Digital signals can be compressed and


multiplexed to increase data transmission rates.
 Error Detection and Correction: Digital systems can use error
correction techniques, making the communication more reliable.
 Security: Digital data can be encrypted, making digital systems
more secure compared to analog systems.
Guided and Wireless Transmission Media
Transmission media refer to the physical or logical pathways used for
transmitting signals from the sender to the receiver. The transmission
medium can be broadly classified into guided and wireless categories.
1. Guided Transmission Media

Guided transmission media refers to communication channels that use


physical mediums to guide and contain the signals as they travel.
These are often called wired media, as they rely on cables or fibers to
carry the signals.
Key Types of Guided Transmission Media:
 Twisted Pair Cables:
o Description: Consists of two insulated copper wires twisted

together. It is the most common transmission medium for


telephone and data networks.
o Types:

 Unshielded Twisted Pair (UTP): No shielding, commonly

used in Ethernet.
 Shielded Twisted Pair (STP): Has a metal shield around

the wires to reduce electromagnetic interference.


o Advantages: Low cost, flexible, easy to install.

o Disadvantages: Susceptible to noise and signal degradation

over long distances.


 Coaxial Cable:
o Description: A type of electrical cable that has a central

conductor, insulating layer, metallic shield, and outer


insulating layer. It is widely used for cable TV and broadband
internet.
o Advantages: Higher bandwidth than twisted pair cables, less

prone to interference.
o Disadvantages: Bulkier, more expensive, and harder to install
compared to twisted pair cables.
 Fiber Optic Cable:
o Description: Uses light to transmit data in the form of optical

signals. Fiber optics use a central core made of glass or plastic


fibers that transmit data as pulses of light.
o Advantages: Extremely high bandwidth, long-distance

capability, immunity to electromagnetic interference, security


(difficult to tap).
o Disadvantages: Expensive, difficult to install, and more fragile

compared to copper cables.


Fiber Optic Cables are the most advanced form of guided
transmission media, especially for high-speed internet and long-
distance communication, as they can support data rates that are far
superior to copper cables.
2. Wireless Transmission Media

Wireless transmission media refer to communication channels that do


not rely on physical conductors to guide the signal but instead use
electromagnetic waves to carry data through the air. Wireless
transmission is used in mobile communication, radio, television, and
satellite communication.
Key Types of Wireless Transmission Media:
 Radio Waves:
o Description: Electromagnetic waves with frequencies between

30 Hz and 300 GHz. They are used for broadcasting, cellular


communications, and Wi-Fi.
o Applications: AM/FM radio, TV broadcasts, Bluetooth, and

cellular communication.
o Advantages: Wide coverage, can penetrate through various

obstacles.
o Disadvantages: Limited bandwidth, susceptible to interference
and noise.
 Microwaves:
o Description: Electromagnetic waves with frequencies between

1 GHz and 300 GHz. They require line-of-sight between the


transmitter and receiver for efficient communication.
o Applications: Long-distance communication, satellite

communication, point-to-point communication links.


o Advantages: Higher frequency, higher data rates than radio

waves, used in high-capacity systems.


o Disadvantages: Requires line-of-sight, affected by weather

conditions, especially rain.


 Infrared (IR):
o Description: Electromagnetic radiation with wavelengths just

longer than visible light, often used for short-range


communication.
o Applications: Remote controls, wireless data transmission

over short distances (e.g., infrared sensors).


o Advantages: Low cost, secure transmission due to limited

range.
o Disadvantages: Limited range and affected by physical

obstacles (e.g., walls).


 Satellite Communication:
o Description: Involves communication signals transmitted to

and from satellites in Earth's orbit. These systems use


microwaves and radio waves for data transmission.
o Applications: Long-distance communications, weather

forecasting, GPS, television broadcasting, internet services in


remote areas.
o Advantages: Global coverage, especially in remote or rural

areas.
o Disadvantages: High cost, latency (delay), affected by weather
conditions like heavy rain.
 Wi-Fi (Wireless Fidelity):
o Description: A technology that allows devices to communicate

over short distances using radio waves (typically in the 2.4


GHz or 5 GHz band).
o Applications: Local area networks (LANs), internet access in

homes, offices, and public hotspots.


o Advantages: Convenient, high-speed internet access, flexible

installation.
o Disadvantages: Limited range, susceptible to interference

from other electronic devices.


 Bluetooth:
o Description: A short-range wireless communication

technology used for connecting devices like smartphones,


laptops, and headphones.
o Applications: Personal area networks (PANs), device

connectivity.
o Advantages: Low power consumption, easy pairing.

o Disadvantages: Limited range (typically up to 100 meters), low

data transfer rates.


Comparison: Guided vs. Wireless Transmission Media

Guided Transmission Wireless Transmission


Characteristic
Media Media

Uses air, atmosphere, or


Physical Uses cables (twisted pair,
space (radio waves,
Medium coaxial, fiber optics)
microwaves)

Examples Twisted pair, coaxial cable, Radio waves, microwaves,


Guided Transmission Wireless Transmission
Characteristic
Media Media

fiber optic infrared, satellite

High (especially with fiber Varies (generally lower than


Data Rate
optics) guided media)

Can cover long distances


Limited by distance and
Range (satellites) or short ranges
cable quality
(Wi-Fi, Bluetooth)

Prone to electromagnetic Prone to environmental


Interference interference (especially interference (e.g., weather,
copper cables) physical obstacles)

Installation Higher for fiber optics and Higher for satellite, requires
Cost coaxial line-of-sight for microwaves

Fixed, not suitable for Mobile, allows


Mobility
mobile devices communication on the go

Communication Satellites
Communication satellites are spacecraft designed to relay and amplify
radio, television, internet, and telephone signals across vast distances.
They play a crucial role in global communication systems, especially
for remote areas where terrestrial infrastructure is limited or
unavailable.
Basic Components of a Communication Satellite

1. Transponder: This is the core component of a communication


satellite, consisting of a receiver, amplifier, and transmitter. The
transponder receives signals from the earth, amplifies them, and
then retransmits them back to the ground. It operates in specific
frequency bands, such as C-band, Ku-band, or Ka-band.
2. Antennas: Satellites are equipped with large antennas that can
send and receive signals to and from ground stations. These
antennas may have different shapes and sizes, depending on the
satellite's function and the type of signal it transmits.
3. Solar Panels: These panels provide the satellite with power, as
they convert solar energy into electricity to keep the satellite's
systems functioning.
4. Power Supply: Satellites are equipped with onboard power
systems, primarily solar panels, but also with rechargeable
batteries that store energy for use during periods of darkness
when the satellite is in the Earth's shadow.
Types of Communication Satellites

1. Geostationary Earth Orbit (GEO) Satellites:


o These satellites are positioned approximately 35,786 km

above the Earth’s equator.


o Advantages: They remain fixed in one position relative to the

Earth, providing stable, continuous coverage over a large area.


o Examples: Used for television broadcasting, internet services,

weather monitoring.
o Disadvantages: High latency due to the long distance,

especially for real-time communications like voice calls.


2. Low Earth Orbit (LEO) Satellites:
o Positioned between 160 km and 2,000 km above the Earth.

o Advantages: Low latency (signal travel time), smaller size, and

less expensive.
Examples: Used for communication, Earth observation, and
o

GPS services (e.g., Starlink, Globalstar).


o Disadvantages: Limited coverage area, requiring a

constellation of satellites to ensure continuous global


coverage.
3. Medium Earth Orbit (MEO) Satellites:
o Positioned between 2,000 km and 35,786 km above Earth.

o Advantages: MEO satellites offer lower latency than GEO

satellites but have a larger coverage area than LEO satellites.


o Examples: Used primarily for GPS systems (e.g., Galileo,

GLONASS).
o Disadvantages: Compromised balance between coverage area

and latency.

Functions of Communication Satellites

 Telecommunications: Satellites provide backbone infrastructure


for telephone, internet, and broadcasting services, especially in
remote or rural areas where traditional communication
infrastructure is not feasible.
 Broadcasting: Satellite TV and radio services depend on GEO
satellites to deliver broadcast signals to millions of users
worldwide.
 Data Relay: Satellites relay data for global positioning systems
(GPS), weather monitoring, and military applications.

Advantages of Communication Satellites

 Global Coverage: They can cover large geographical areas,


including remote and inaccessible regions.
 High Bandwidth: Satellites can carry large volumes of data over
long distances.
 Reliability: With advancements in satellite technology,
communication satellites are increasingly reliable, providing
uninterrupted services in many parts of the world.

Disadvantages of Communication Satellites

 Cost: Launching, maintaining, and replacing satellites is expensive.


 Latency: GEO satellites, in particular, experience higher signal
travel time (latency) due to their distance from Earth.
 Weather Interference: Weather conditions, such as rain or snow,
can sometimes disrupt satellite communication signals, especially
in high-frequency bands.
Switching in Communication Systems
Switching is the process of directing data (voice, video, or digital
information) from one point to another in a network. It is essential in
telecommunications to enable multiple users to share the same
transmission medium without interference.
There are three primary types of switching used in communication
networks:
1. Circuit Switching

 Definition: In circuit-switched networks, a dedicated


communication path or circuit is established between the sender
and receiver for the duration of the communication session.
 Example: Traditional telephone networks (e.g., landline calls) use
circuit-switching.
 Process:
1. The sender and receiver establish a dedicated communication
path.
2. The entire communication session is carried on this dedicated
path.
3. After the session ends, the path is released for use by other
users.
Advantages:
 Reliable and consistent performance, with guaranteed bandwidth
during the session.
 Suitable for voice calls, where continuous, uninterrupted
communication is essential.
Disadvantages:
 Inefficient for data transmission, especially with idle periods (e.g.,
long pauses in conversation or long data transfers).
 The dedicated path is unavailable for others, leading to
underutilization of resources.

2. Packet Switching

 Definition: In packet-switched networks, data is broken down into


smaller units called packets. These packets are sent independently
across the network, potentially through different paths, and
reassembled at the destination.
 Example: The internet uses packet-switching.
 Process:
1. The data is divided into small packets.
2. Each packet contains addressing information and can take any
route to the destination.
3. At the destination, the packets are reassembled in the correct
order.
Advantages:
 Efficient use of network resources: Multiple communications can
share the same network paths.
 Flexible and scalable, making it ideal for data-heavy applications
like the internet.
Disadvantages:
 Packets may arrive out of order, leading to delays.
 Higher complexity in routing and reassembly.

3. Message Switching

 Definition: In message-switched networks, the entire message is


sent as a single unit. The message is stored at intermediate nodes
until the next node is ready to receive it.
 Example: Early email systems used message switching.
 Process:
1. The sender sends a complete message.
2. The message is temporarily stored at intermediate nodes and
forwarded when the next node is available.
Advantages:
 Efficient for sending large messages, as the entire message can be
sent in one go.
 Does not require the sender and receiver to be connected at the
same time.
Disadvantages:
 Higher delay due to storage and forwarding processes.
 Less efficient for real-time communication.
Multiplexing in Communication Systems
Multiplexing is the technique of combining multiple signals into one
transmission medium. It allows multiple data streams to share a
common channel, optimizing the use of resources and increasing
system efficiency.
Types of Multiplexing

1. Frequency Division Multiplexing (FDM)


o Definition: FDM divides the available bandwidth of the

communication channel into several narrower frequency


bands, each carrying a separate signal.
o Example: FM radio broadcasting, where each station is

assigned a specific frequency.


o How it Works:

1. Multiple signals are transmitted simultaneously on


different frequencies.
2. Each signal is modulated onto its designated frequency
band.
3. The receiver demodulates the signal based on the
frequency assigned.
Advantages:
o Suitable for analog signals like voice and video.
o Continuous transmission without delay.
Disadvantages:
o Requires careful management of frequency bands.
o Limited by the available bandwidth.

2. Time Division Multiplexing (TDM)


o Definition: TDM divides the time available on a channel into

time slots, assigning each signal to a different time slot. Each


signal is transmitted sequentially, with each having access to
the channel for a fixed time period.
o Example: Digital telephony systems (e.g., in mobile networks).

o How it Works:
1. Signals are divided into discrete time intervals.
2. Each signal transmits in its assigned time slot.
3. The receiver collects and reassembles the data.
Advantages:
o More efficient than FDM for digital signals.
o No need for separate frequency bands for each signal.
Disadvantages:
o Requires synchronization between sender and receiver.
o If one signal is not ready, the time slot is wasted.

3. Code Division Multiplexing (CDM)


o Definition: CDM allows multiple signals to occupy the same

frequency band simultaneously by encoding them with unique


codes. Each signal is transmitted using a different code, and
the receiver can decode the signal by using the corresponding
code.
o Example: Used in cellular networks like CDMA (Code Division

Multiple Access).
o How it Works:

1. Each signal is assigned a unique code.


2. Multiple signals share the same frequency band but are
distinguishable by their unique codes.
3. The receiver uses the codes to separate the signals.
Advantages:
o Efficient use of available bandwidth.
o Increased capacity for users on the same frequency.
Disadvantages:
o Complex encoding and decoding processes.

You might also like