Documente Academic
Documente Profesional
Documente Cultură
Meaning of Communication
Communication is the exchange and flow of information and ideas from one person to another.
The exchange of thoughts, messages, or information, as by speech, signals, writing, or behavior.
The art and technique of using words effectively to impart information or ideas.
Data Communication
The difference of these two streams are mainly due to historical reasons. Telecommunication is increasingly relying on digital computer
technology. While Data Communication is relying more than ever on telecommunication networks. The two streams are rapidly
merging/converging.
The data transmitted from one place to another in form electromagnetic or light waves through communication medium. The electromagnetic
or light waves representing data are called signals. Data communication signals can be in analog or digital form.
Historically, the telephone network has been analog. The voice is an analog sound.
1. Analog Data Transmission
The transfer of data from one place to another in the form of analog signals or in the form of continuous waves is called analog
data transmission. The analog signal consists of a continuous electrical wave. The light waves, sound waves or radio waves are examples of
analog signals. The transmission through telephone line, microwave system or satellite is the example of analog data transmission. An
analog signal is shown in figure below.
Computers are digital. Computer networks communicate by exchanging digital signals. The number of networked computers has
increased dramatically in recent years, many of them connecting with other networks to make up what we call the Internet.
Many of these digital computer networks communicate with one another over telephone lines. Sometimes these lines are analog;
sometimes they are digital.
Because a mix of analog and digital technology can make it difficult to understand how data is transmitted, we will divide all data
communications into three large categories based on transmission speed:
Bandwidth
The information-carrying capacity of a communication channel. Analog bandwidth (Hertz) is the range of signal
frequencies that can be transmitted by a communication channel or network. Hertz, abbreviated Hz, refers to the number
of cycles that a particular wave completes in a single second.
A cycle is the distance from one peak of an analog wave to the next
Digital bandwidth (bits per second) is the rate at which bits can be transmitted. Digital signals are represented
by numbers. The numbers are encoded with a binary numbering systema system that uses only two digits, one and
zero.
binary
A number system that uses only two digits: 0 and 1.
bit
Binary digit. A binary digit has a value of 0 or 1, and is often represented by the presence (1) or absence (0) of
a voltage on a transmission medium. The bit is the basic unit of data communications and the smallest unit of
information a computer can process.
Binary numbering makes it easy to transmit a digital signal. A digital signal is a series of zeros and ones, ONs
and OFFs, high voltages and low voltages. It can be nothing else.
Regardless of signal type or bandwidth, the original signal has to be translated or encoded for transmission.
Encoded
Converted into a group of ones and zeros that is the binary representation of the numerical value; used to describe a
numerical value.
Timeliness
Message -
The message is the information or data that is to be transferred from one location to another. It may consist of
text, numbers, pictures, sounds, videos or any combination of these.
Sender -
A device used in a communication system to send or transmit messages to another device is called Sender, or
Transmitter or Source. A sender may be a computer, workstation, telephone handset, video camera and mobile phone.
Medium -
Medium is a path or channel through which message is transmitted (or sent) from one location to another in a
communication system. The twisted wire, fiber optic, microwave, satellite system etc. are used as medium.
Receiver -
A device used in a communication system to receive messages from another device (sender) is called Receiver or Sink.
A receiver may be a computer, workstation, telephone handset, mobile phone, television set, printer, fax machine, and so
on.
Protocol -
A set of rules that guides (or governs) data communication is called protocol. It represents an agreement between the
communicating devices. Without a proper protocol, the devices may be connected but they cannot communicate
with
each other. For example, a person whose mother language is English cannot communicate with a person who can speak
only French.
Note: Today, all type of computers and mobile devices serve as senders and receivers in communication system.
Packets
In data communication, data is broken into small group or data segment before being transmitted from one computer to another.
These small groups or data segments are called packets. The packet includes the following information:
Payload Header -
It is the part of the packet that contains the actual data being sent.
It contains the information about the type of data in the payload, the source and destination of data and a sequence
number so that data from multiple packets can be re-assembled at the receiving computer in a proper order.
Data Communication & Computer Science field were merged and fasten 3 Major Development
Very Large Scale Integration of Electronic components becomes available the size was reduce, and the price as well.
Evolution of New Software becomes available
Competition among providers
Today we are in need of better, secure and the most important of all is fast-based communication.
Simplex mode
Half-Duplex mode
Full-Duplex mode
1. Simplex Mode
In Simplex mode, the communication can take place in only one direction. In this mode, a terminal can only send data and cannot
receive it or it can only receive data but cannot send it. It means that in this mode communication is uni-directional. Today, this mode of data
communication is not popular, because most of the modem communications require two-way exchange of data. However, this mode of
communication is used in business field at certain point-of-sale terminals in which sales data is entered without a corresponding reply. The
other examples of simplex communication modes are Radio and T.V transmissions.
In computer system, the keyboard, monitor and printer are examples of simplex devices. The keyboard can only be used to enter
data into computer, while monitor and printer can only accept (display/print) output.
2. Half-Duplex Mode
In Half-duplex mode, the communication can take place in both directions, but only in one direction at a time. In this mode, data is
sent and received alternatively. It is like a one-lane bridge where two-way traffic must give way in order to cross the other.
In half-duplex mode, at a time only one end transmits data while other end receives. In addition, it is possible to perform error
detection and request the sender to re-transmit information. The Internet browsing is an example of half duplex. When we issue a request to
download a web document, then that document is downloaded and displayed before we issue another request.
3. Full-Duplex Mode
In Full-duplex mode, the communication can take place in both directions simultaneously, i.e. at the same time on the same
channel. It is the fastest directional mode of communication. Example of this mode is conversation of the persons through telephone. This
type of communication is similar to automobile traffic on a two-lane road. The telephone communication system is an example of Full-duplex
communication mode.
Communication Channel
A path through which information are transmitted from one place to another is called communication channel. It is also referred to
as communication medium or link. In network communication, the communication media are wires, cables arid other means through which
information travels from its source to its destination. The examples of communication media are twisted-pair cable, coaxial cable, fiber-optic
cable and wireless links. In communication channel, data is transmitted in the form of signals (analog signal). The data transmission is
measured in bandwidth. The bandwidth will be higher if more signals can be transmitted. Actually, the bandwidth measures the amount of
information that can be transmitted through the media within the given period of time. For analog signals bandwidth is represented in hertz
(Hz). It means number of signals transmitted per second. For digital signals, it is represented in bits per second (bps). Different transmission
media have different bandwidth. The higher the bandwidth of the transmission media, the more information can be transmitted.
Transmission media are divided into:
Physical Transmission Media
Wireless Transmission Media
The wires are twisted together to reduce the noise. The noise is created due to high-voltage equipment or due to light energy of
sun. The noise creates disturbance in the signal when it is received. It means that noise creates problem in communication.
The telephone cable wiring at wire is often called the telephone wire. 10 Mbps (Mega bits per second) to 100 home uses twistedpair wire, so this type, the data transmission speed of twisted pair is Mbps or up to 1Gbps (Giga bits per second).
Outer Jacket
Twisted Pair
w/ color-coded plastic insulation
Coaxial cable can be used for telephone lines for voice and data transmission with very high frequency. The bandwidth of coaxial
cable is 80 times greater than twisted pair media, Coaxial cable is also widely used in local area network (LAN). It is more expensive than
twisted-pair wire. The main advantages of coaxial cable are:
It creates less noise and protects the cable from interference of external electromagnetic waves. Therefore coaxial cable has low
transmission error rates.
These cables can transmit data over longer distances than that of twisted pair.
The data transmission speed of coax is from 10 Mbps to 200 Mbps. Now-a-days, this transmission medium is not used in computer
network because other transmission media such as fiber-optic cables have higher transmission speed.
Fiber-Optic Cable
In twisted-pair cable and coaxial cable, data is transmitted in the form of electric frequencies. So copper wire has to be protected
from water and electromagnetic waves. In fiber optic cable, these types of problems are not occurred. A fiber optic cable is made of glass or
plastic and transmits signals in the form of light. A fiber optic cable consists of tubes of glass (or thin glass fibers) through which data is
transmitted as pulses of light. A typical optical fiber consists of a very narrow strand or fiber of glass called the core (It is as thin as a human
hair). The core is surrounded by a concentric layer of glass called Cladding. The diameter of a core is 62.5 microns. (1 micron l0-6 meters).
The diameter of cladding is about 125 microns. Optic-fiber cable uses reflection phenomena to guide light through a channel. The data
transmission in fiber optic cable is shown below.
However, the fiber-optic cable is becoming more popular. Now-a-days, telephone and television companies are replacing their
existing telephone and coaxial cables with fiber-optic cables.
Advantages
The major advantages of fiber-optical media are:
The data transmission speed is very high because fiber-optic cable uses light to transmit data. The data transmission speed is up
to billions bits per second.
It is not affected by electromagnetic waves.
It is more reliable and has lower data transmission errors.
Disadvantages
The disadvantages of fiber optic cable are:
It is more costly.
It is difficult to install and modify.
Cellular Radio
Cellular radio is a form of broadcast radio that is used for mobile communications such as cellular telephones and
wireless modems. A cellular telephone is a telephone device that uses high frequency radio waves to transmit voice and digital
messages. Some mobile users connect their laptop computer or other mobile device to a cellular telephone to access the Web,
send and receive e-mail etc. while away from a standard telephone line.
Microwaves
Microwaves are radio waves that provide a high speed transmission. In Microwaves transmission, data is transmitted
from one station to another. Microwave station contains an antenna, transceiver (transmitter & receiver) and other equipments that
are required for microwave communication. Microwave uses the line-of-sight transmission, which means that in microwave
transmission system the data signals travel in a straight path and cannot bend. Microwave stations or antennas are usually
installed on the high towers or buildings. Thus microwave stations need to be placed within 20 to 30 miles of each other. Each
microwave station receives signals from the previous stations. In this way, data is transmitted from one place to another.
The data transmission speed of microwave transmission is up to 150 Mbps. Microwave transmission is used in environments
where installing physical transmission media is impossible and where line-of-sight transmission is available. It is used in wide-open
areas. Today, it is used by telephone companies, cable television providers, universities etc.
Communication Satellite
A communication satellite is a space station that receives microwave signals from earth microwave station (earth based
station). The earth based stations often are microwave stations. Other devices, such as PDAs and OPS receivers, also functions
as earth based stations. Transmitting a signal from ground or earth station to a satellite station in space is called up-linking and the
reverse is called the down- linking.
Now-a-days, television & radio broadcast, global positioning systems and Internet also use the communication satellites. The
communication satellite is launched about 22300 miles (or more) above the earth into space. The communication satellite consists
of solar powered, transceiver that receives and sends signals. The signals are transmitted from one earth station to the satellite.
The satellite receives and amplifies the signals and sends them to another earth station. This entire process takes only a few
seconds. To communicate information from one country to another country more than one satellites are required. The data
transmission speed of communication satellite is very high such as up to 1 Gbps.
Communication Devices
An electronic device that can send and receive data on the network is called the communication device. The communication
devices are used on both ends of the connections. Most of the communication devices have the ability to convert the digital signal of
computer into analog signal so that the signals can be transmitted on the communication line to another end. The reverse is also true. The
most important communication devices are described below.
Modem
Modem stands for Modulator and Demodulator. The modem (dialup modem) is an electronic device that can convert the
digital signals into analog signals and analog signals into digital signals. It is used on both ends of the computers for data
communication between, computers through telephone line. We knew that data is communicated through telephone line in the
form of analog signals. So data in the form of digital signal from one computer must be converted into analog signals before to
transmit it to another computer through telephone line. Similarly, to receive the data from another computer through telephone line
in the form of analog signals must be converted to digital before to store into the computer. The modem can be external or internal.
The external modem is a separate device that is attached to the computer through RS-232 serial port. It can be easily moved from,
one computer to another. It has also many functions but it is very costly.
An internal modem is an expansion card that is installed into the expansion slot on the computers motherboard. Most of
the computers at home and offices use the internal modem because it is less expensive than external modem. The Fax machine
also uses the internal card; it is because internal modem is also known as Fax Card.
Digital Modem
The modem that is used to send and to receive data to and from a digital telephone line is called digital modem. The
examples of digital modems are ISDN and DSL. These modems send and receive the digital signals to and from the digital line.
This modem does not convert the digital signals into analog because digital lines already use the digital signals. Therefore, in this
case he definition of modem confuses the users, however manufacturers still use the term modem for devices used in digital line
for data communication.
Network Interface Card
It is also referred to as LAN adapter or simply LAN card. It is used in Local Area Network to establish the communication
between the devices (computers, printers and other devices) attached on the network. Usually, the personal computers use the
network interface card (NIC) in Local Area Network (LAN). The Ethernet card is the most common type of network interface card.
The data transmission speed of Ethernet card is from 10 Mbps to 1,000 Mbps. Some of the network interface cards also, have the
combined features of Ethernet card and dialup modem card.
Bridge
It is an electronic device that connects two similar networks and controls the data flow between them.
A bridge looks at the information in each packet header and forwards data (that is traveling) from one LRN to another.
Router
An electronic device that connects multiple computers together and transmits data to its correct destination using the
available path on the network is called router. It stores the routing information of each node or computer on the network and to use
these information to transfer data between nodes. Like a bridge, a router looks at each packets header to determine where the
packet should go and then determines a route for, the packet to take and thus reach its destination; some routers also have built-in
antivirus protection. Similarly, some routers also support wireless communications.
Gateway
A gate is an electronic device that can perform logical function. A gateway is a device or system (collection of hardware
and software resources) that connects two networks and translates information from one to the other so that data can be
transmitted between two dissimilar networks.
Packets from different networks have different kinds of information in their headers, and information can be of different
formats. The gateway can take a packet from one type. of network, read the header, and then encapsulates the entire packet into a
new one, adding a header that is understood by the second network.
Repeater
A device, which is used to join same type of networks to extend the length of the communication medium, is called
repeater. It also amplifies the signals received from one network and sends the amplified signals to another network.
IF SENDER PRODUCES DATA AT 100 Mbps BUT THE RECEIVER CAN ONLY PROCESS DATA AT 1 Mbps,
>> TRANSMISSION WILL OVERLOAD THE RECEIVER AND SOME DATA WILL BE LOST.
The function of a protocol to find the most efficient path or route between the sender and the receiver before
sending the data is called Data Routing.
Flow Control
The function of a protocol to control the rate of data transmission from the sender to the receiver is called Flow
Control. It regulates/BALANCES the process of sending data between fast sender and slow receiver.
Error Control
The function of a protocol to detect and recover errors for successful data communication between the sender
and the receiver is called Error Control. Successful data communication means that data is transmitted without
any error.
When information is sent over the Internet, it is generally broken up into smaller
pieces or "packets".
TCP is the means/PARAAN for creating the packets,
putting them back together in the correct order at the end,
and checking to make sure that no packets got lost in transmission.
If necessary, TCP will request that a packet be resent.
Internet Protocol (IP) is the method used to route information to the proper address.
- Every computer on the Internet has to have its own unique address known as
the IP address.
- Every packet sent will contain an IP address showing where it is supposed to
go.
- A packet may go through a number of computer routers before arriving at its
final destination,
- and IP controls the process of getting everything to the designated computer.
Computer Network
A network consists of two or more computers that are linked in order to share resources (such as printers and CD-ROMs), exchange files, or
allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or
infrared light beams.
Networks are collections of computers, software, and hardware that are all connected to help their users work together. A network connects
computers by means of cabling systems, specialized software, and devices that manage data traffic. A network enables users to share files
and resources, such as printers, as well as send messages electronically (e-mail) to each other.
Computer networks fall into two main types: client/server networks and peer-to-peer networks. A client/server network uses one or more
dedicated machines (the server) to share the files, printers, and applications. A peer-to-peer network allows any user to share files with any
other user and doesnt require a central, dedicated server.
The most common networks are Local Area Networks or LANs for short. A LAN connects computers within a single geographical location,
such as one office building, office suite, or home. By contrast, Wide Area Networks (WANs) span different cities or even countries, using
phone lines or satellite links.
Networks are often categorized in other ways, too. You can refer to a network by what sort of circuit boards the computers use to link to each
other Ethernet and Token-Ring are the most popular choices. You can also refer to a network by how it packages data for transmission
across the cable, with terms such as TCP/IP (Transmission Control Protocol/Internet Protocol) and IPX/SPX (Internet Package
Exchange/Sequenced Package Exchange).
Connectivity and Communication: Networks connect computers and the users of those computers.
Individuals within a building or work group can be connected into local area networks (LANs); LANs in distant locations can be
interconnected into larger wide area networks (WANs). Once connected, it is possible for network users to communicate with each
other using technologies such as electronic mail. This makes the transmission of business (or non-business) information easier,
more efficient and less expensive than it would be without the network.
Data Sharing: One of the most important uses of networking is to allow the sharing of data. Before networking was
common, an accounting employee who wanted to prepare a report for her manager would have to produce it on his PC, put it on a
floppy disk, and then walk it over to the manager, who would transfer the data to her PC's hard disk. (This sort of shoe-based
network was sometimes sarcastically called a sneakernet.)
True networking allows thousands of employees to share data much more easily and quickly than this. More so, it makes possible
applications that rely on the ability of many people to access and share the same data, such as databases, group software
development, and much more. Intranets and extranets can be used to distribute corporate information between sites and to
business partners.
Hardware Sharing: Networks facilitate the sharing of hardware devices. For example, instead of giving each of 10
employees in a department an expensive color printer, only one printer can be placed on the network for everyone to share.
Internet Access: The Internet is itself an enormous network, so whenever you access the Internet, you are using a
network. The significance of the Internet on modern society is hard to exaggerate, especially for those of us in technical fields.
Internet Access Sharing: Small computer networks allow multiple users to share a single Internet
connection. Special hardware devices allow the bandwidth of the connection to be easily allocated to various individuals as they
need it, and permit an organization to purchase one high-speed connection instead of many slower ones.
Data Security and Management: In a business environment, a network allows the administrators to much
better manage the company's critical data. Instead of having this data spread over dozens or even hundreds of small computers in
a haphazard fashion as their users create it, data can be centralized on shared servers. This makes it easy for everyone to find the
data, makes it possible for the administrators to ensure that the data is regularly backed up, and also allows for the implementation
of security measures to control who can read or change various pieces of critical information.
Performance Enhancement and Balancing: Under some circumstances, a network can be used
to enhance the overall performance of some applications by distributing the computation tasks to various computers on the
network.
Entertainment: Networks facilitate many types of games and entertainment. The Internet itself offers many sources of
entertainment, of course. In addition, many multi-player games exist that operate over a local area network. Many home networks
are set up for this reason, and gaming across wide area networks (including the Internet) has also become quite popular. Of
course, if you are running a business and have easily-amused employees, you might insist that this is really a disadvantage of
networking and not an advantage!
Key Concept: At a high level, networks are advantageous because they allow computers and people to be connected together, so
they can share resources. Some of the specific benefits of networking include communication, data sharing, Internet access, data security
and management, application performance enhancement, and entertainment.
Well, if that list isn't enough to convince you that networking is worthwhile, then I have no idea what it is you do with your computers! At
any rate, it's quite possible that only some of the above items will match your particular circumstances, but at least one will definitely apply to
almost every situation, assuming you own or manage more than one computer.
The work you do right after your LAN is up and running and configured can save you huge amounts of time in the coming months.
Mapping your network for easier management and troubleshooting.
Setting up appropriate security measures to protect against accidental and intentional harm.
Tuning up your LAN so that you get the best possible speed from it.
Creating company standards for adding hardware and software, so you dont have nagging compatibility problems later.
Putting backup systems in place so that you have copies of data and programs if your hardware fails.
Installing some monitoring and diagnostic software so that you can check on your networks health and get an early warning of
impending problems.
Figuring out how you plan to handle troubleshooting educating your LAN administrator, setting up a support contract with a
software vendor, and so on.
Network Standards
The standards are the precise documents containing technical and physical specifications about the network being designed.
Normally those standards are taken into consideration and are worldwide acceptable.
The primary reason for standards is to ensure that hardware and software produced by
different vendors can work together. Without networking standards, it would be difficultif not
impossibleto develop networks that easily share information.
By following the network standards, the networks can be reliable and efficient. Normally, two types of standards are followed. These are:
De Facto standard
De Jure standard
1. De Facto Standard
De facto means by tradition or by facts. These standards were developed without any formal plan and came to existence
because of historical developments. These standards have not been approved by on organized networks governing body. These standards
are often established by manufacturer that defines the functionality of a new technology or product.
2. De Jure Standard
De jure means according to law or regulation. These standards have been properly approved by the networks governing body.
There are several international organizations that are involved in establishing communication standards and protocols. Few of these
governing bodies are:
i) CCITT
CCITT stands for Consultative Committee on International Telegraph and Telephone. CCITT is United Nations agency. It is
responsible for defining standards. for telephone, telegraph and data communication. The most important standard defined by
CCITT is known as X25, which is used in Wide Area Network. The X25 standard is mostly used by the telephone companies of the
world.
The X25 standard is also used to connect local area networks to form a large wide-area network. A network of networks in which
individual local area networks are joined together is called wide area network.
ii) IEEE
IEEE stands for Institute of Electrical and Electronics Engineers. IEEE is another largest organization of the world that defines the
communication protocols. There are four main communication protocols, which are used in local area networks. IEEE has
published three of these four protocols. These are:
Ethernet also known as IEEE 802.3
Token Bus also known as IEEE 802.4
Token Ring also known as IEEE 802.5
iii) ISO (International Standard Organization)
ISO is the most popular international organization and is responsible for publishing standards in various fields. It also publishes the
communication standards.
Network Architectures
Network architecture means design of computers, devices and media in a network. The computer network can be designed using
different ways. The most popular network architectures are described below.
Client/Server Network
In Client/Server network, the clients are the nodes, or computers on the network and a Server is a central computer that controls
the network. A server, sometimes called the host computer controls the, hardware and software on the network and provides a centralized
storage area for programs and data in Client/Server arrangement, processing is usually done by the Server, and only the results are sent to
the client. The clients request to the Server to access, to store or to process data. This type of arrangement requires special software for
both individual nodes and the Server. Client/Server network may be LAN or WAN.
In a client/server environment, each computer still holds (or can still hold) its (or some)
resources and files. Other computers can also access the resources stored in a computer, as in
a peer-to-peer scenario. One of the particularities of a client/server network is that the files
and resources are centralized. This means that a computer, the server, can hold them and other
computers can access them.
A server Is a computer that is dedicated to providing some kind of service to users across a
network.
-File server
-email server
-web server
For example, in a Client/Server network, a database is stored on the Server and the Client computers access the database. The
Server portion of the DBMS (Database Management system) is stored on the Server that allows the Clients to add information in database or
extract information from database. Similarly, the client portion of DBMS is stored on each Client computer through which request is sent to
the Server to access the database. The Server processes the data and sends the result to the Client computer. Using the Client software, the
user sends a request to the Server. The Server software searches the database and sends the result back to the Client computer.
File-Server Network
In File-Server computer network, a powerful computer having disk with large storage capacity and processing power is installed as
central computer. This central computer is known as File-Server, Network Server, Application Server or simply a Server. A File-Server stores
and manages files. The data files and software are stored on the Server. The individual computers on a network, called nodes, access the
data files and software on the Server. It means that, the File-Server is used to store files and to forward them to nodes that request for them.
Peer-to-Peer Network
Peer-to-Peer (P2P) network is also known as workgroup. In this arrangement all nodes on the network have equal status or
relationships to all others. Each computer stores files on its own storage devices or resources as and when required.
Peer-to-Peer network is used in small offices or schools, where primary purpose of the network is to share storage and printers. A Peer-toPeer network can also include a Server. In this case, a Peer-to-Peer local area network is similar to a File Server network.
a peer-to-peer (P2P) network is created when two or more PCs are connected and share
resources without going through a separate server computer.
Types of Network
Networks are of four types. These are:
Local Area Network (LAN)
Wide Area Network (WAN)
Metropolitan Area Network (MAN)
Virtual Private Network (VPN)
Local Area Network (LAN)
A Local Area Network (LAN) is a network system in which computers interconnected in a limited geographical area, such as
network of computers college computer laboratory or network of computers in office building etc. LANs designed to allow resources (such as
printers and application programs, secondary storage etc.) to be shared between personal computers or workstations. The size LAN is
limited to a few kilometers (typically it is 1 km).
In networked environment, a powerful computer called the Server or computer is used that controls all the computers connected to
the network. The so and important data (database) is stored on the central server and they can be shared between users when needed. The
devices other than server within the network are called nodes. A node may be a personal computer, printer, storage device, monitor etc.
The computers used in LAN also require network interface cards. A network interface card enables the computer to send and to receive
information over a cable network. In a LAN, the nodes are connected via cables. A LAN may use the star topology, ring topology or bus
topology. In general, a LAN uses only one type of transmission medium. The data transmission rate through LAN is very fast. Today, the data
transmission rate over LAN is up to 100 mega bits per second (Mbps)
LAN is created in a single office, building or campus. In case of a single building, the LAN consists of few nodes and uses a single
topology. The LAN may be expanded into multiple buildings or rooms. In this case, different small networks (or LANs) are connected together
through a central backbone. The single building LAN and Multiple building LAN are shown below.
Advantages of LAN
LAN has many advantages, but the main advantages are:
The resources can be shared among different users. For example, many users on the network can use a single printer. Similarly,
storage media and software located in central server can be shared between all users on the networks.
LAN is not very expensive and the small businesses, firms and educational institutes can afford and easily design the LAN.
Users can share messages and communicate with each other through e-mails and chatting.
All the data is stored and updated on the central server through nodes. So it becomes very easy to take backup of database at
regular interval.
Multiple users can access the Internet using a single Internet connection. The Internet connection is established at central sewer.
In this way, all the users can access the Internet.
Data security can be implemented very easily, because users are granted data access rights. The authorized users can connect to
the server and can access specific portion of the data.
Disadvantages of LAN
Although, LAN has many advantages, but it also has some disadvantages. The main disadvantages are:
If central server is infected by virus, then the important data stored on server may be corrupted and the entire network may also be
held.
All nodes depends on the central computer (or Hub), if any component of the server fails, then entire network will stop working.
A trained and competent network manager is required to run the LAN, so handsome salaries have to be paid to him. Therefore, it
becomes very expensive to run the LAN.
Mostly in a LAN, one or two printers are shared among several users. In this way, lengthy print queues are created, so the users
have to wait for a long period of time to take print on the printer.
Most of the advantages of WAN are similar to LAN. But additional advantage of WAN is that information or messages may be shared and
communicated all over the world. Similarly, disadvantages of WAN are also similar to LAN.
Metropolitan Area Network (MAN)
A Metropolitan Area Network (MAN) is a network system that covers area of a single city. Usually, MAN connects more than one
LANS in a city or town and covers a smaller geographical area than a WAN. For example, a company may design a MAN by connecting all
the LANs in all its office throughout the city. The cable television, telephone companies or local corporations use MAN.
Virtual Private Network is used by mobile company users who frequently travel around or want to access their office Computers
while sitting at home. The connection to the company network serviced by some Internet Service Provider (ISP) and is always a secure
connection just like a private line connection.
Network Topologies
In networking, the term topology is the way of connecting computers or nodes on a network. There are many ways in which
computers are connected together in a computer network. Therefore network topology is defined as: the schemes of joining a number of
computers in the form of a network are called Network Topologies.
We know that two or more devices are connected to a link for data communication. Similarly, two or more links form a topology.
The topology of a network is the geometric representation of the relationship of all the links and the nodes (communication devices) to one
another.
There are three commonly used network topologies. These are:
Star topology
Ring topology
Bus topology
1. Star Topology
In a star network, each node (computer or other device) is directly connected to the central computer or Hub that provides connection points
for nodes on the network. The star topology is the most common topology in use today. In star network, information or data is communicated
from one computer to another through Hub. This form of network configuration looks like a star as shown in figure below.
Advantages
The main advantages of star topology are:
It is easy to install and to maintain.
You can easily add and remove nodes to and from the network without affecting the network.
If any node fails, other nodes are not affected.
Disadvantages
The main disadvantages of star topology are:
This type of network depends upon the central Hub. If Hub fails the entire network is failed.
Each computer is directly connected to the Hub through a cable, so it becomes more costly.
2. Ring Topology
In ring network, each node is connected to two adjacent nodes in the form a closed ring or loop. In ring topology, the last node
connects to the first node to complete the ring. In ring topology, each node has a dedicated point-to-point connection only with the two
devices on either side of it.
In this network, data is communicated in one direction from node to node around the entire ring. When a computer in ring network
sends message to another computer on the network, the message travels to each node or computer until it reaches its destination. The ring
network configuration is shown in figure below.
Advantages
The main advantages of ring topology are:
It is less expensive than star topology.
Nodes can be easily added or removed.
Disadvantages
The main disadvantages of ring topology are:
It is more difficult to install and maintain.
If a node fails, it affects the entire network.
3. Bus Topology
In bus network, all nodes are connected to a common communication medium or central cable. The central physical cable that
connects the nodes is called Bus. The data is communicated between nodes in both directions through bus. A bus topology uses the
multipoint connection. The central single cable (or bus) acts as backbone to link all the devices to the network.
In bus network, when a computer sends a message to another computer it also attaches the address of the destination computer.
In bus topology, a special device called a terminator is attached at the cables start and end points. A terminator stops the network signals.
In LAN, bus topology is mostly used. In this topology, each computer is assigned a unique address. The bus network configuration is given in
figure image.
Advantages
The main advantages of bus topology are:
It is less expensive and easy to install and maintain.
When nodes are added and removed to and from the network, the network is not affected.
If one node fails other nodes are not affected.
Disadvantages
The main disadvantages of bus topology are:
It supports only a small number of nodes.
Entire network fails if there is any problem in the central cable.
In this topology, every node has a dedicated point-to-point connection to every other node on the network. A fully connected mesh
network has n(n-1)/2 channels to link 'n' devices. Therefore, every device on the network must have 'n-1' input/output (I/O) ports.
In mesh network, each node is directly connected to all nodes on the network. This type of network involves the concept of routes.
In this type of network, each node may send message to destination through multiple paths. It means that each node of mesh network has
several possible paths to send (or to receive) message, but in Bus, Star, Ring and Tree topologies each node has only one path.
Advantages
Mesh topology has the following advantages:
It has multiple links, so if one route is blocked then other routes can be used for data communication.
Each connection can have its own data load, so the traffic problem is eliminated.
It ensures the data privacy or security, because every message travels along a dedicated link.
Troubleshooting of this topology is easy as compared to other networks.
Its performance is not affected with heavy load of data transmission.
Disadvantages
Mesh topology has the following disadvantages:
It becomes very expensive because a large number of cabling and 110 ports are required.
It is difficult to install.
Tree Topology
In tree network, the nodes are connected to each other in such a way that forms a tree like structure. Typically to form a tree
network, multiple star topologies are combined together. This type of network has combined features of bus and star topology.
On tree topology the hubs of each star topology are connected to the central hub that controls the entire network. However, some
nodes can be directly connected to the central hub. The tree topology configuration is shown in figure below.
The central Hub in the tree network is an active hub. It contains a repeater (a hardware device), which re-generates the received
bit patterns. The secondary hubs usually are passive hubs. The passive hub controls the nodes directly connected to it and exchange data to
other devices connected to the other secondary hubs (or same hub) through the central hub. The secondary hub may also be active hub if
another secondary hub is directly connected to it. The cable TV network is an example of tree topology, where main cable is divided into,
branches and each branch is further divided into smaller branches and so on. The hub is used when a branch is created.
Advantages
The tree topology has the same advantages as star topology but it has some additional advantages. These are.
Disadvantages
The tree topology also has the same disadvantages as star topology built has some additional disadvantages such as:
It because more expansive because more hubs are required to install the network.
Hybrid Topology
Hybrid network is the combination of different topologies such as star, Ring, Mesh, Bus etc. For example, if a department uses a
Bus network, second department uses the ring network, third department uses the Mesh network and fourth department uses the star
network. All the networks of different types (of four departments) can be connected together through a central hub (in the form of star
network) as shown in the figure below.
The ADSL (Asymmetric Digital Subscriber Line) is another digital connection. It is faster than DSL. ADSL is much easier
to install and provides much faster data transfer rate. Its data transmission speed is from 128 Kbps up to 10 Mbps. This connection
is ideal for Internet access.
4) Cable Television Line
The Cable Television (CATV) line is not a standard telephone line. It is a dedicated line used to access the Internet. Its
data transmission speed is 128 Kbps to 3 Mbps.
A cable modem is used with the CATV. it provides a high speed Internet connections through the cable television
network. A cable modem sends and receives digital data over the cable television network.
To access the Internet using the CATV network, the CATV Company installs a splitter inside your house. From the
splitter, one part of the cable runs to your television and other part connects to the cable modem. A cable modem usually is an
external device, in which one end of a cable connects to a CATV wall outlet while the other end plugs into a port (such as on an
Ethernet card) in the system unit.
5) T-Carrier Lines
It is very fast digital line that can carry multiple signals over a single communication line whereas a standard dialup
telephone line carries only one signal. T-carrier lines use multiplexing so that multiple signals share the line. T-carrier lines provide
very fast data transfer rates. The T-carrier lines are very expensive and large companies can afford these lines. The most popular
T-carrier lines are:
TI Line
T3 Line
i) T1 Line
The most popular T-carrier line is the Ti line (dedicated line). Its data transmission speed is 1.5 Mbps. Businesses often use Ti lines
to connect to the Internet. Many ISPs use Ti, lines to connect to the Internet backbone. Another type of TI line is the fractional TI line. It is
slower than TI line but it is less expensive. The home and business users use this line to connect to the Internet and share a connection to
the Ti line with other users.
ii) T3 Line
Another most popular and faster T-carrier line is T3 line. Its data transmission speed is 44 Mbps. It is more expensive than Ti line.
The main users of T3 line are telephone companies and ISPs. The Internet backbone itself also uses T3 lines.
6) Asynchronous Transfer Mode (ATM)
It is very, fast data transmission connection line that can carry data, voice, video, multimedia etc. Telephone networks, Internet and
other network use ATM. In near future, ATM will become the Internet standard for data transmission instead of T3 lines. Its data transmission
speed is from 155 Mbps to 600 Mbps.
Communication Devices
Network Interface Cards (NICs)
NIC provides the link between your computer and your network.
provide the physical connection between the network and the
workstation
most are internal, with the card fitting into an expansion slot inside the
computer
some build on the motherboard
affect the speed and performance of a network
three common network interface connections: Ethernet cards,
LocalTalk connectors, Token Ring cards
Hubs/Concentrators
A hub is a device whose primary function is to send and receive signals along
the network between the nodes connected to it.
connect multiple devices to the network
commonly found in star and star-wired ring topology networks
entire network shuts down if there is a problem on a hub
serve as a central meeting place for cables from computers, servers
and peripherals
usually configured with 4, 8, 12, or 24 RJ-45 ports
Repeaters
A repeater is a device that regenerates and amplifies signals to create longdistance networks.
simply receive, amplify and rebroadcast the signals
some repeaters provide basic error-checking
can be separate devices or they can be incorporated into a
concentrator
inexpensive, used to overcome distance limitations
Bridges
A bridge is a device that links two homogenous packet-broadcast local
networks. It accepts all packets from each network addressed to devices on the
other, buffers them, and retransmits them to the other network.
connect two or more networks using the same address method or
protocol
can provide some addressing information
monitor and manage the traffic to maintain optimum performance on
both sides of the network
often used when LANs reach their capacity of nodes
Switches
A switch is a high-speed multi-port bridge. Today, switches are replacing multiport repeaters or concentrators in a UTP environment.
an intelligent hub that maintains a bridging table, keeping track of
which hardware addresses are located on which network segment
more efficient than with any other type of hub
ability to dedicate bandwidth to each port on the switch
Routers
Routers are similar to bridges in that they link two or more physically separate
network segments. The network segments linked by a router, however, remain
logically separate and can function as independent networks.
translate information from one network to another; similar to a superintelligent bridge
maintain a map of the network, select the best route for data
access to more network level knowledge than is available to bridges
information on source addresses, destination addresses, path
distances, and in some cases,
segment bandwidth and segment status are contained in the router's
routing table
translates local addresses (eg. "spot") into network addresses (eg.
131.44.99.12)
can translate messages with different addressing methods
can act as firewalls (many ISP's block traffic at the router level)
direct signal traffic efficiently
route messages between any two protocols
can route messages between linear bus, star, and token ring
topologies
can route messages across fiber optic, coaxial, and twisted-pair
cabling
Ethernet
Token Ring
Local Talk
ANSI standard
use fiber optics for speeds of up to 100 Mbps
use primarily to interconnect two or more LANs, often over long distances
also employ Token Ring passing process to transmit data; but use a dual counter-rotating ring topology, meaning there are two
rings of cable with two tokens circulating in opposite directions
use a token passing process to circulate packets around the ring
Coaxial Cable
Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between the center conductor and a braided
metal shield (See fig. 3). The metal shield helps to block any outside interference from fluorescent lights, motors, and other computers.
Cable Type
Unshielded Twisted Pair
Thin Coaxial
Thick Coaxial
Fiber Optic
Unshielded Twisted Pair
Unshielded Twisted Pair
Maximum length
100 meters
185 meters
500 meters
2000 meters
100 meters
220 meters
Wireless LANs
Not all networks are connected with cabling; some networks are wireless. Wireless LANs use high frequency radio signals, infrared light
beams, or lasers to communicate between the workstations and the file server or hubs. Each workstation and file server on a wireless
network has some sort of transceiver/antenna to send and receive the data. Information is relayed between transceivers as if they were
physically connected. For longer distance, wireless communications can also take place through cellular telephone technology, microwave
transmission, or by satellite.
Wireless networks are great for allowing laptop computers or remote computers to connect to the LAN. Wireless networks are also beneficial
in older buildings where it may be difficult or impossible to install cables.
The two most common types of infrared communications used in schools are line-of-sight and scattered broadcast. Line-of-sight
communication means that there must be an unblocked direct line between the workstation and the transceiver. If a person walks within the
line-of-sight while there is a transmission, the information would need to be sent again. This kind of obstruction can slow down the wireless
network.
Scattered infrared communication is a broadcast of infrared transmissions sent out in multiple directions that bounces off walls and ceilings
until it eventually hits the receiver. Networking communications with laser are virtually the same as line-of-sight infrared networks.
What is a Topology?
The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should not be
confused with logical topology which is the method used to pass information between workstations.
Linear Bus
A linear bus topology consists of a main run of cable with a terminator at each end (See fig. 1). All nodes (file server, workstations, and
peripherals) are connected to the linear cable. Ethernet and LocalTalk networks use a linear bus topology.
Star
A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub or
concentrator (See fig. 2).
Data on a star network passes through the hub or concentrator before continuing to its destination. The hub or concentrator manages and
controls all functions of the network. It also acts as a repeater for the data flow. This configuration is common with twisted pair cable;
however, it can also be used with coaxial cable or fiber optic cable.
Star-Wired Ring
A star-wired ring topology may appear (externally) to be the same as a star topology. Internally, the MAU (multi-station access unit) of a starwired ring contains wiring that allows information to pass from one device to another in a circle or ring (See fig. 3). The Token Ring protocol
uses a star-wired ring topology.
Tree
A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to
a linear bus backbone cable (See fig. 4). Tree topologies allow for the expansion of an existing network, and enable schools to configure a
network to meet their needs.
5-4-3 Rule
A consideration in setting up a tree topology using Ethernet protocol is the 5-4-3 rule. One aspect of the Ethernet protocol requires that a
signal sent out on the network cable reach every part of the network within a specified length of time. Each concentrator or repeater that a
signal goes through adds a small amount of time. This leads to the rule that between any two nodes on the network there can only be a
maximum of 5 segments, connected through 4 repeaters/concentrators. In addition, only 3 of the segments may be populated (trunk)
segments if they are made of coaxial cable. A populated segment is one which has one or more nodes attached to it . In Figure 4, the 5-4-3
rule is adhered to. The furthest two nodes on the network have 4 segments and 3 repeaters/concentrators between them.
This rule does not apply to other network protocols or Ethernet networks where all fiber optic cabling or a combination of a fiber backbone
with UTP cabling is used. If there is a combination of fiber optic backbone and UTP cabling, the rule is simply translated to 7-6-5 rule.
Common Cable
Common Protocol
Linear Bus
Twisted Pair
Coaxial
Fiber
Ethernet
LocalTalk
Star
Twisted Pair
Fiber
Ethernet
LocalTalk
Star-Wired Ring
Twisted Pair
Token Ring
Tree
Twisted Pair
Coaxial
Fiber
Ethernet
Introduction
When computers were first linked together into networks, moving information between different types of computers was a very difficult task.
In the early 1980s, the International Standards Organization (ISO) recognized the need for a standard network model. This would help
vendors to create interpretable network devices. The Open Systems Interconnection (OSI) reference model, released in 1984, addressed
this need.
The OSI model describes how information makes its way from application programs through a network medium to another application
program in another computer. It divides this one big problem into seven smaller problems.
Each of these seven problems is reasonably self-contained and therefore more easily solved without excessive reliance on external
information. Each problem is addressed by one of the seven layers of the OSI model. The seven layers of the OSI model are:
All
modular engineering
accelerated evolution
interoperable technology
standard interfaces
As the information to be sent descends through the layers of a system it looks less and less like human language and more and more like
the 1s and 0s that a computer understands.
Example
Let's look at an example of OSI-type communication. Assume that System A has information to send to System B. System A's application
program communicates with System A's layer seven (Application Layer). Layer seven communicates with layer six which communicates with
layer five and so on until System A's layer one is reached. The information traverses the physical medium and is received by System B's
layer one.
It then ascends through System B's layers in reverse order until it finally reaches System B's application program. Each of System A's layers
has certain tasks it must perform. Each layer communicates directly with its adjacent layers. However, its primary concern in carrying out its
tasks is to communicate with its peer layer in System B.
Layer Functions
Application
(Layer 7)
This layer supports application and end-user processes. Communication partners are identified,
quality of service is identified, user authentication and privacy are considered, and any constraints
on data syntax are identified. Everything at this layer is application-specific. This layer provides
application services for file transfers, e-mail, and other network software services. Telnet and FTP
are applications that exist entirely in the application level. Tiered application architectures are part of
this layer.
Presentation
(Layer 6)
This layer provides independence from differences in data representation (e.g., encryption) by
translating from application to network format, and vice versa. The presentation layer works to
transform data into the form that the application layer can accept. This layer formats and encrypts
data to be sent across a network, providing freedom from compatibility problems. It is sometimes
Session
(Layer 5)
This layer establishes, manages and terminates connections between applications. The session
layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the
applications at each end. It deals with session and connection coordination.
Transport
(Layer 4)
This layer provides transparent transfer of data between end systems, or hosts, and is responsible
for end-to-end error recovery and flow control. It ensures complete data transfer.
Network
(Layer 3)
This layer provides switching and routing technologies, creating logical paths, known as virtual
circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer,
as well as addressing, internetworking, error handling, congestion control and packet sequencing.
Data Link
(Layer 2)
At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol
knowledge and management and handles errors in the physical layer, flow control and frame
synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC)
layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the
network gains access to the data and permission to transmit it. The LLC layer controls frame
synchronization, flow control and error checking.
Physical
(Layer 1)
This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at
the electrical and mechanical level. It provides the hardware means of sending and receiving data
on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM
are protocols with physical layer components.
DSL internet
Cable internet
Both cable Internet and DSL are last mile technologies, by which we mean that they bridge the last mile between
the subscriber and the service provider. Cable Internet uses the cable network while DSL makes use of the existing
telephone network. Cable Internet connectivity offers higher speeds than DSL connection. Theoretically, cable
connection offers higher bandwidths than DSL. But a cable connection is shared between a number of subscribers
due to which its performance drops when many users connect to it. This is also why the speed of cable connection
drops during times of peak traffic.
Although cable internet is capable of a higher connection speed, the actual speed difference between DSL and
cable may be small. Most ISPs have imposed bandwidth / speed caps for residential users, which limit the
maximum connection speed depending on service plans. For cable internet users, the number of people sharing
the same cable line at the same time also affects the connection speed.
EIA/TIA Standard
UTP Cable
RJ 45 Connectors
Crimping Tool
Patch Cable Tester
Cable Stripper/Wire Stripper
Cable/Wire Cutter
Procedure:
1.
2.
3.
4.
5.
6.
7.
8.
9.