Syllabus
Syllabus
Textbooks:
   1. Computer-Networks- Andrew S. Tanenbaum and David J. Wetherall, Pearson
      Education, 5th Edition.
   2. Computer Networking A Top-Down Approach -James F. Kurose and Keith W.
      RossPearson Education 7th Edition.
Reference Books:
   1. Behrouz A Forouzan, Data and Communications and Networking, 5th Edition,
      McGraw Hill, Indian Edition
   2. Larry L Peterson and Brusce S Davie, Computer Networks, 5th Edition, ELSEVIER
Computer Networks (21CS52)                              Module 1: Introduction, Physical Layer
Network Hardware
      There are two types of transmission technology that are in widespread use: broadcast
       links and point-to-point links.
      Point-to-point links connect individual pairs of machines.
      To go from the source to the destination packets, may have to first visit one or more
       intermediate machines.
      Point-to-point transmission with exactly one sender and exactly one receiver is called
       unicasting.
      In contrast, on a broadcast network, the communication channel is shared by all the
       machines on the network; packets sent by any machine are received by all the others.
      Upon receiving a packet, a machine checks the address field. If the packet is intended
       for the receiving machine, that machine processes the packet; otherwise, it is just
       ignored.
      Broadcast systems usually allow the possibility of addressing a packet to all
       destinations by using a special code in the address field.
      When a packet with this code is transmitted, it is received and processed by every
       machine on the network.
      Some broadcast systems also support transmission to a subset of the machines, which
       known as multicasting.
An alternative criterion for classifying networks is by scale.
                                                1
Computer Networks (21CS52)                          Module 1: Introduction, Physical Layer
   A short-range wireless network uses Bluetooth to connect these components without
     wires.
   Bluetooth networks use the master-slave paradigm. The system unit (the PC) is
     normally the master, talking to the mouse, keyboard, etc., as slaves.
   The master tells the slaves what addresses to use, when they can broadcast, how long
     they can transmit, what frequencies they can use, and so on.
      Bluetooth can be used to connect a headset to a mobile phone without cords and it can
       allow a digital music player to connect to the car merely being brought within range.
      PANs can also be built with other technologies that communicate over short ranges,
       such as RFID on smartcards and library books.
                                             2
Computer Networks (21CS52)                             Module 1: Introduction, Physical Layer
      The topology of many wired LANs is built from point-to-point links. IEEE 802.3,
       called Ethernet, is the standard for wired LAN.
      Each computer connects to a box called a switch with a point-to-point link. A switch
       has multiple ports, each of which can connect to one computer.
      The job of the switch is to relay packets between computers, using the address in each
       packet.
      To build larger LANs, switches can be plugged into each other using their ports. It is
       also possible to divide one large physical LAN into two smaller logical LANs.
      A Virtual local area network (VLAN) is a virtualized connection that connects
       multiple devices and network nodes from different LANs into one logical network.
      For example, the engineering and finance departments of a company might have
       computers on the same physical LAN. In this design each port is tagged with a
       ‘‘color,’’ say green for engineering and red for finance.
      Both wireless and wired broadcast networks can be divided into static and dynamic
       designs, depending on how the channel is allocated.
      A typical static allocation would be to divide time into discrete intervals and use a
       round-robin algorithm, allowing each machine to broadcast only when its time slot
       comes up.
      Dynamic allocation methods for a common channel are either centralized or
       decentralized. In the centralized channel allocation method, there is a single entity, the
       base station determines who goes next.
      In the decentralized channel allocation method, there is no central entity; each
       machine must decide for itself whether to transmit.
      A home network is more likely to have different properties than other networks. First,
       the networked devices have to be very easy to install.
      Second, the network and devices have to be foolproof in operation. Third, low price
       is essential for success.
      Fourth, it must be possible to start out with one or two devices and expand the reach
       of the network gradually. Fifth, security and reliability will be very important.
                                               3
Computer Networks (21CS52)                           Module 1: Introduction, Physical Layer
   At first, these were locally designed, ad hoc systems. Later business-oriented
     companies, got contracts from local governments to wire up entire cities.
   The next step was television programming and even entire channels designed for
     cable only. But from their inception until the late 1990s, they were intended for
     television reception only.
   When the Internet began attracting a mass audience, the cable TV network operators
     began to realize that with some changes to the system, they could provide two-way
     Internet service in unused parts of the spectrum.
   At that point, the cable TV system began to morph from simply a way to distribute
     television to a metropolitan area network.
                                            4
Computer Networks (21CS52)                           Module 1: Introduction, Physical Layer
   Transmission lines move bits between machines. Switching elements are specialized
     computers that connect two or more transmission lines.
   Most commonly used switching computer is a router.
   Differences between LAN and WAN:
         1. Usually in a WAN, the hosts and subnet are owned and operated by different
            people.
         2. WANs will in fact be internetworks, or composite networks, the routers will
            usually connect different kinds of networking technology.
         3. In LAN individual computers are connected to the subnet, in case of WAN
            entire LANs are connected to the subnet.
   A company might connect its offices to the Internet This allows connections to be
     made between the offices as virtual links, called a VPN (Virtual Private Network).
   A VPN has the usual advantage of virtualization, which is that it provides flexible
     reuse of a resource (Internet connectivity).
   A VPN also has the usual disadvantage of virtualization, which is a lack of control
     over the underlying resources.
   The subnet may be run by a different company, the subnet operator is known as a
     network service provider and the offices are its customers.
   Such a subnet operator is called an ISP (Internet Service Provider) and the subnet is
     an ISP network.
      There may be many paths in the network that connect two routers. How each router
       makes the decision as to where to send a packet next is called the forwarding
       algorithm.
      How the network makes the decision as to which path to use is called the routing
       algorithm.
      Other kinds of WANs make heavy use of wireless technologies. In satellite systems,
       each computer on the ground has an antenna through which it can send data to and
       receive data from to a satellite in orbit.
      The cellular telephone network is another example of a WAN that uses wireless
       technology.
Internetwork
      Many networks exist in the world, often with different hardware and software. People
       connected to one network often want to communicate with people attached to a
       different one.
                                            5
Computer Networks (21CS52)                           Module 1: Introduction, Physical Layer
   The fulfillment of this desire requires that different, and frequently incompatible,
     networks be connected.
   A collection of interconnected networks is called an internetwork or internet. The
     Internet uses ISP networks to connect enterprise networks, home networks, and many
     other networks.
   Subnet refers to the collection of routers and communication lines owned by the
     network operator in a wide area network.
   A network is formed by the combination of a subnet and its hosts. A network is a
     collection of computers interconnected by a single technology.
   An internet is formed when distinct networks are interconnected. Connecting a LAN
     and a WAN or connecting two LANs is the usual way to form an internetwork.
   Two or more different networks can be connected with a gateway. Gateway provides
     the necessary translation, both in terms of hardware and software.
Network Software
Protocol Hierarchies
      To reduce the design complexity, most networks are organized as a stack of layers or
       levels, each one built upon the one below it.
      The purpose of each layer is to offer certain services to the higher layers while
       shielding those layers from the details of how the offered services are actually
       implemented.
      When layer n on one machine carries on a conversation with layer n on another
       machine, the rules and conventions used in this conversation are collectively known
       as the layer n protocol.
      A protocol is an agreement between the communicating parties on how
       communication is to proceed.
      The entities comprising the corresponding layers on different machines are called
       peers.
      The peers may be software processes, hardware devices, or even human beings.
      Each layer passes data and control information to the layer immediately below it, until
       the lowest layer is reached.
                                              6
Computer Networks (21CS52)                            Module 1: Introduction, Physical Layer
      Below layer 1 is the physical medium through which actual communication occurs.
       Between each pair of adjacent layers is an interface.
      The interface defines which primitive operations and services the lower layer makes
       available to the upper one.
      In addition to minimizing the amount of information that must be passed between
       layers, clear-cut interfaces also make it simpler to replace one layer with a completely
       different protocol or implementation.
      A set of layers and protocols is called a network architecture. A list of the protocols
       used by a certain system, one protocol per layer, is called a protocol stack.
      A message, M, is produced by an application process running in layer 5 and given to
       layer 4 for transmission.
      Layer 4 puts a header in front of the message to identify the message and passes the
       result to layer 3.
      The header includes control information, such as addresses, to allow layer 4 on the
       destination machine to deliver the message.
      Layer 3 decides which of the outgoing lines to use and passes the packets to layer 2.
       Layer 2 adds to each piece not only a header but also a trailer, and gives the resulting
       unit to layer 1 for physical transmission.
      At the receiving machine the message moves upward, from layer to layer, with
       headers being stripped off as it progresses.
                                              7
Computer Networks (21CS52)                           Module 1: Introduction, Physical Layer
   One mechanism for finding errors in received information uses codes for error
     detection. Information that is incorrectly received can then be retransmitted until it is
     received correctly. More powerful codes allow for error correction.
   Both of these mechanisms work by adding redundant information.
   Another reliability issue is finding a working path through a network. Often there are
     multiple paths between a source and destination, and in a large network, there may be
     some links or routers that are broken.
   In that case, the network should automatically make a decision to route the packets
     called routing.
   Every layer needs a mechanism for identifying the senders and receivers that are
     involved in a particular message. This mechanism is called addressing or naming.
   Not all communication channels preserve the order of messages sent on them, leading
     to solutions that number messages.
   Solution to differences in the maximum size of a message that the networks can
     transmit leads to mechanisms for disassembling, transmitting, and then
     reassembling messages.
   Designs that continue to work well when the network gets large are said to be
     scalable.
   A third design issue is resource allocation. Many designs share network bandwidth
     dynamically called statistical multiplexing.
   An allocation problem that occurs is how to keep a fast sender from swamping a slow
     receiver with data. Feedback from the receiver to the sender is often used called as
     flow control.
   Sometimes the network is oversubscribed because too many computers want to send
     too much traffic. This overloading of the network is called congestion.
   To carry live video, the timeliness of delivery matters a great deal. Applications wants
     real-time delivery at the same time they want high throughput.
   Quality of service is the name given to mechanisms that reconcile these competing
     demands.
   The last major design issue is to secure the network by defending it against different
     kinds of threats.
   One of the threats is that of eavesdropping on communications. Mechanisms that
     provide confidentiality defend against this threat.
   Mechanisms for authentication prevent someone from impersonating someone else.
     Other mechanisms for integrity prevent modification to messages.
                                             8
Computer Networks (21CS52)                            Module 1: Introduction, Physical Layer
   The alternative, in which the onward transmission of a message at a node starts before
     it is completely received by the node, is called cut-through switching.
   A reliable service is implemented by having the receiver acknowledge the receipt of
     each message, so the sender is sure that it arrived.
   Reliable connection-oriented service has two minor variations: message sequences
     and byte streams.
   For some applications, the transit delays introduced by acknowledgements are
     unacceptable. One such application is digitized voice traffic for voice over IP.
   Not all applications require connections. The spammer probably does not want to go
     to the trouble of setting up and later tearing down a connection to just send one item.
   Unreliable connectionless service is often called datagram service. The
     acknowledged datagram service can be provided for the convenience of not having
     to establish a connection to send one message, but reliability is essential.
   Still another service is the request-reply service. In this service the sender transmits a
     single datagram containing a request; the reply contains the answer.
Service Primitives
      A service is formally specified by a set of primitives (operations) available to user
       processes to access the service.
      If the protocol stack is located in the operating system, the primitives are normally
       system calls. These calls cause a trap to kernel mode, which then turns control of the
       machine over to the operating system to send the necessary packets.
      The set of primitives available depends on the nature of the service being provided.
                                               9
Computer Networks (21CS52)                             Module 1: Introduction, Physical Layer
      The next step is for the server to execute RECEIVE to prepare to accept the first
       request. The RECEIVE call blocks the server.
      Then the client executes SEND to transmit its request (3) followed by the execution of
       RECEIVE to get the reply.
      The arrival of the request packet at the server machine unblocks the server so it can
       handle the request.
      After it has done the work, the server uses SEND to return the answer to the client (4).
       The arrival of this packet unblocks the client.
      If the client has additional requests, it can make them now. When the client is done, it
       executes DISCONNECT to terminate the connection (5).
      When the server gets the packet, it also issues a DISCONNECT of its own,
       acknowledging the client and releasing the connection (6)
                                              10
Computer Networks (21CS52)                          Module 1: Introduction, Physical Layer
   Entities use protocols to implement their service definitions.
Reference Models
The OSI Reference Model
This model is based on a proposal developed by the International Standards Organization
(ISO) as a first step toward international standardization of the protocols used in the various
layers in 1983. It was revised in 1995. The model is called the ISO OSI (Open Systems
Interconnection) Reference Model because it deals with connecting systems that are open for
communication with other systems.
The OSI model has seven layers. The principles that were applied to arrive at the seven layers
can be briefly summarized as follows:
   1. A layer should be created where a different abstraction is needed.
   2. Each layer should perform a well-defined function.
   3. The function of each layer should be chosen with defining internationally
      standardized protocols.
   4. The layer boundaries should be chosen to minimize the information flow across the
      interfaces.
   5. The number of layers should be large enough that distinct functions need not be
      thrown together in the same layer and small enough that the architecture does not
      become unwieldy.
                                              11
Computer Networks (21CS52)                              Module 1: Introduction, Physical Layer
                                               12
Computer Networks (21CS52)                            Module 1: Introduction, Physical Layer
The Session Layer
      The session layer allows users on different machines to establish sessions between
       them.
      Sessions offer various services, including dialog control (keeping track of whose turn
       it is to transmit), token management (preventing two parties from attempting the same
       critical operation simultaneously), and synchronization.
                                             13
Computer Networks (21CS52)                            Module 1: Introduction, Physical Layer
                                              14
Computer Networks (21CS52)                             Module 1: Introduction, Physical Layer
       OSI model makes the distinction between these three concepts explicit. Each layer
        performs some services for the layer above it.
       A layer’s interface tells the processes above it how to access it. It specifies what the
        parameters are and what results to expect.
       Peer protocols used in a layer depends on the layers services. Each layer can use any
        protocols it wants to get the job done.
       The TCP/IP model did not originally clearly distinguish between services, interfaces,
        and protocols.
       The protocols in the OSI model are better hidden than in the TCP/IP model and can be
        replaced relatively easily as the technology changes.
       The OSI reference model was devised before the corresponding protocols were
        invented. This ordering meant that the model was not biased toward one particular set
        of protocols.
       With TCP/IP the reverse was true: the protocols came first, and the model was really
        just a description of the existing protocols.
       There was no problem with the protocols fitting the model. The only trouble was that
        the model did not fit any other protocol stacks.
       An obvious difference between the two models is the number of layers: the OSI
        model has seven layers and the TCP/IP model has four.
       The OSI model supports both connectionless and connection-oriented communication
        in the network layer, but only connection-oriented communication in the transport
        layer.
       The TCP/IP model supports only one mode in the network layer (connectionless) but
        both in the transport layer, giving the users a choice.
Bad Timing
       The competing TCP/IP protocols were already in widespread use by research
        universities by the time the OSI protocols appeared.
       While the billion-dollar wave of investment had not yet hit, the academic market was
        large enough that many vendors had begun cautiously offering TCP/IP products.
                                              15
Computer Networks (21CS52)                            Module 1: Introduction, Physical Layer
   When OSI came around, they did not want to support a second protocol stack until
     they were forced to, so there were no initial offerings.
   With every company waiting for every other company to go first, no company went
     first and OSI never happened.
Bad Technology
      The second reason that OSI never caught on is that both the model and the protocols
       are flawed.
      The choice of seven layers was more political than technical, and two of the layers
       (session and presentation) are nearly empty, whereas two other ones (data link and
       network) are overfull.
      The OSI model, along with its associated service definitions and protocols, is
       extraordinarily complex.
      They are also difficult to implement and inefficient in operation. Some functions, such
       as addressing, flow control, and error control, reappear again and again in each layer.
Bad Implementations
      Given the enormous complexity of the model and the protocols, the initial
       implementations were huge, unwieldy, and slow.
      In contrast, one of the first implementations of TCP/IP was part of Berkeley UNIX
       and was quite good and free.
      People began using it quickly, which led to a large user community, which led to
       improvements, which led to an even larger community.
Bad Politics
      On account of the initial implementation, many people, especially in academia,
       thought of TCP/IP as part of UNIX, and UNIX in the 1980s was widely used in
       academia.
      OSI, on the other hand, was widely thought to be from the European
       telecommunication ministries, the European Community, and later the U.S.
       Government.
                                              16
Computer Networks (21CS52)                            Module 1: Introduction, Physical Layer
Guided Transmission Media
      The purpose of the physical layer is to transport bits from one machine to another.
      Various physical media can be used for the actual transmission.
      Media are roughly grouped into guided media, such as copper wire and fiber optics,
       and unguided media.
Magnetic Media
      One of the most common ways to transport data from one computer to another is to
       write them onto magnetic tape or removable media (e.g., recordable DVDs),
       physically transport the tape or disks to the destination machine, and read them back
       in again.
      It is often more cost effective, especially for applications in which high bandwidth or
       cost per bit transported is the key factor.
Twisted pair
      One of the oldest and still most common transmission media is twisted pair. A twisted
       pair consists of two insulated copper wires, typically about 1 mm thick.
      The wires are twisted together in a helical form, just like a DNA molecule. Twisting is
       done because two parallel wires constitute a fine antenna.
      When the wires are twisted, the waves from different twists cancel out, so the wire
       radiates less effectively.
      A signal is usually carried as the difference in voltage between the two wires in the
       pair. This provides better immunity to external noise because the noise tends to affect
       both wires the same, leaving the differential unchanged.
      The most common application of the twisted pair is the telephone system. Twisted
       pairs can be used for transmitting either analog or digital information.
      The bandwidth depends on the thickness of the wire and the distance travelled, but
       several megabits/sec can be achieved for a few kilometers in many cases.
      Twisted-pair cabling comes in several varieties:
      A category 5 twisted pair consists of two insulated wires gently twisted together. Four
       such pairs are typically grouped in a plastic sheath to protect the wires and keep them
       together.
      Different LAN standards may use the twisted pairs differently. For example, 100-
       Mbps Ethernet uses two (out of the four) pairs, one pair for each direction.
      To reach higher speeds, 1-Gbps Ethernet uses all four pairs in both directions
       simultaneously.
      Category 5 replaced earlier Category 3 cables with a similar cable that uses the same
       connector, but has more twists per meter.
                                             17
Computer Networks (21CS52)                           Module 1: Introduction, Physical Layer
   More twists result in less crosstalk and a better-quality signal over longer distances.
   New wiring is more likely to be Category 6 or even Category 7. These categories
     have more stringent specifications to handle signals with greater bandwidths.
   Some cables in Category 6 and above are rated for signals of 500 MHz.
   Category 6 wiring types are referred to as UTP (Unshielded Twisted Pair) as they
     consist simply of wires and insulators.
   In contrast to these, Category 7 cables have shielding on the individual twisted pairs,
     as well as around the entire cable. Shielding reduces the susceptibility to external
     interference and crosstalk.
Coaxial cable
      Coaxial cable has better shielding and greater bandwidth than unshielded twisted
       pairs, so it can span longer distances at higher speeds.
      Two kinds of coaxial cable are widely used. One kind, 50-ohm cable, is commonly
       used when it is intended for digital transmission from the start.
      The other kind, 75-ohm cable, is commonly used for analog transmission and cable
       television.
      A coaxial cable consists of a stiff copper wire as the core, surrounded by an insulating
       material.
      The insulator is encased by a cylindrical conductor, often as a closely woven braided
       mesh. The outer conductor is covered in a protective plastic sheath.
      The construction and shielding of the coaxial cable give it a good combination of high
       bandwidth and excellent noise immunity.
Power Lines
      Power lines have been used by electricity companies for low-rate communication
       such as remote metering for many years, as well in the home to control devices.
      In recent years there has been renewed interest in high-rate communication over these
       lines, both inside the home as a LAN and outside the home for broadband Internet
       access.
                                              18
Computer Networks (21CS52)                           Module 1: Introduction, Physical Layer
   The difficulty with using household electrical wiring for a network is that it was
     designed to distribute power signals.
   Electrical signals are sent at 50–60 Hz and the wiring attenuates the much higher
     frequency (MHz) signals needed for high-rate data communication.
   Transient currents when appliances switch on and off create electrical noise over a
     wide range of frequencies.
   And without the careful twisting of twisted pairs, electrical wiring acts as a fine
     antenna, picking up external signals and radiating signals of its own.
   Despite these difficulties, it is practical to send at least 100 Mbps over typical
     household electrical wiring by using communication schemes that resist impaired
     frequencies and bursts of errors.
Fiber Optics
      Fiber optics are used for long-haul transmission in network backbones, highspeed
       LANs and high-speed Internet access such as FttH (Fiber to the Home).
      An optical transmission system has three key components: the light source, the
       transmission medium, and the detector.
      A pulse of light indicates a 1 bit and the absence of light indicates a 0 bit. The
       transmission medium is an ultra-thin fiber of glass. The detector generates an
       electrical pulse when light falls on it.
      By attaching a light source to one end of an optical fiber and a detector to the other,
       we have a unidirectional data transmission system that accepts an electrical signal,
       converts and transmits it by light pulses, and then reconverts the output to an
       electrical signal at the receiving end.
      When a light ray passes from one medium to another—for example, from fused silica
       to air—the ray is refracted (bent) at the silica/air boundary.
       Three examples of a light ray from inside a silica fiber impinging on the air/silica
                                 boundary at different angles.
      For angles of incidence above a certain critical value, the light is refracted back into
       the silica; none of it escapes into the air.
      Thus, a light ray incident at or above the critical angle is trapped inside the fiber and
       can propagate for many kilometers with virtually no loss.
                                               19
Computer Networks (21CS52)                          Module 1: Introduction, Physical Layer
   Since any light ray incident on the boundary above the critical angle will be reflected
     internally, many different rays will be bouncing around at different angles called a
     multimode fiber.
   However, if the fiber’s diameter is reduced to a few wavelengths of light the fiber acts
     like a wave guide and the light can propagate only in a straight line, without
     bouncing, yielding a single-mode fiber.
      For the kind of glass used in fibers, the attenuation is shown in above figure in units
       of decibels per linear kilometer of fiber.
      The figure shows the near-infrared part of the spectrum, which is what is used in
       practice. Visible light has slightly shorter wavelengths, from 0.4 to 0.7 microns.
      Light pulses sent down a fiber spread out in length as they propagate. This spreading
       is called chromatic dispersion.
      One way to keep these spread-out pulses from overlapping is to increase the distance
       between them, but this can be done only by reducing the signaling rate.
      Fortunately, it has been discovered that making the pulses in a special shape related to
       the reciprocal of the hyperbolic cosine causes nearly all the dispersion effects cancel
       out, so it is possible to send pulses for thousands of kilometers without appreciable
       shape distortion. These pulses are called solitons.
Fiber Cables
      Fiber optic cables are similar to coax, except without the braid. At the center is the
       glass core through which the light propagates.
      In multimode fibers, the core is typically 50 microns in diameter, about the thickness
       of a human hair. In single-mode fibers, the core is 8 to 10 microns.
(a) Side view of a single fiber. (b) End view of a sheath with three fibers
                                                20
Computer Networks (21CS52)                          Module 1: Introduction, Physical Layer
   The core is surrounded by a glass cladding with a lower index of refraction than the
     core, to keep all the light in the core.
   Next comes a thin plastic jacket to protect the cladding. Fibers are typically grouped
     in bundles, protected by an outer sheath. Terrestrial fiber sheaths are normally laid in
     the ground within a meter of the surface.
   Fibers can be connected in three different ways:
     1. They can terminate in connectors and be plugged into fiber sockets.
     2. They can be spliced mechanically.
     3. Two pieces of fiber can be fused (melted) to form a solid connection.
   Two kinds of light sources are typically used to do the signaling. These are LEDs
     (Light Emitting Diodes) and semiconductor lasers.
Wireless Transmission
The Electromagnetic spectrum
      When electrons move, they create electromagnetic waves that can propagate through
       space. The number of oscillations per second of a wave is called its frequency, f, and
       is measured in Hz (Hertz).
      The distance between two consecutive maxima (or minima) is called the wavelength,
       λ (lambda).
      In a vacuum, all electromagnetic waves travel at the same speed. The fundamental
       relation between f, λ, and c (in a vacuum) is λf = c
                                              21
Computer Networks (21CS52)                            Module 1: Introduction, Physical Layer
      Most transmissions use a relatively narrow frequency band (i.e., Δf/f << 1). They
       concentrate their signals in this narrow band to use the spectrum efficiently and obtain
       reasonable data rates by transmitting with enough power.
      However, in some cases, a wider band is used, with three variations.
      In frequency hopping spread spectrum, the transmitter hops from frequency to
       frequency hundreds of times per second.
      It makes transmissions hard to detect and impossible to jam. It also offers good
       resistance to multipath fading and narrowband interference because the receiver will
       not be stuck on an impaired frequency for long enough to shut down communication.
      A second form of spread spectrum, direct sequence spread spectrum, uses a code
       sequence to spread the data signal over a wider frequency band.
      It is widely used commercially as a spectrally efficient way to let multiple signals
       share the same frequency band.
      These signals can be given different codes, a method called CDMA (Code Division
       Multiple Access).
      Even without different codes, direct sequence spread spectrum, like frequency
       hopping spread spectrum, can tolerate narrowband interference and multipath fading
       because only a fraction of the desired signal is lost.
                                             22
Computer Networks (21CS52)                           Module 1: Introduction, Physical Layer
   A third method of communication with a wider band is UWB (UltraWideBand)
     communication.
   UWB sends a series of rapid pulses, varying their positions to communicate
     information.
   The rapid transitions lead to a signal that is spread thinly over a very wide frequency
     band. UWB is defined as signals that have a bandwidth of at least 500 MHz or at least
     20% of the center frequency of their frequency band.
   UWB has the potential to communicate at high rates. Because it is spread across a
     wide band of frequencies, it can tolerate a substantial amount of relatively strong
     interference from other narrowband signals.
Radio Transmission
      Radio frequency (RF) waves are easy to generate, can travel long distances, and can
       penetrate buildings easily, so they are widely used for communication.
      Radio waves also are omnidirectional that is, they travel in all directions from the
       source, so the transmitter and receiver do not have to be aligned physically.
      The properties of radio waves are frequency dependent.
      At low frequencies, radio waves pass through obstacles well, but the power falls off
       sharply with distance from the source at least as fast as 1/r2 in air as the signal energy
       is spread more thinly over a larger surface. This attenuation is called path loss.
      At high frequencies, radio waves tend to travel in straight lines and bounce off
       obstacles.
      Path loss still reduces power, though the received signal can depend strongly on
       reflections as well.
      High-frequency radio waves are also absorbed by rain and other obstacles to a larger
       extent than are low-frequency ones.
      In the VLF, LF, and MF bands, radio waves follow the ground. These waves can be
       detected for perhaps 1000 km at the lower frequencies, less at the higher ones.
      Radio waves in these bands pass through buildings easily, which is why portable
       radios work indoors.
      The main problem with using these bands for data communication is their low
       bandwidth.
In the VLF, LF, and MF bands, radio waves follow the curvature of the earth
      In the HF and VHF bands, the ground waves tend to be absorbed by the earth.
      However, the waves that reach the ionosphere, a layer of charged particles circling the
       earth at a height of 100 to 500 km, are refracted by it and sent back to earth.
                                              23
Computer Networks (21CS52)                             Module 1: Introduction, Physical Layer
Microwave Transmission
      Above 100 MHz, the waves travel in nearly straight lines and can therefore be
       narrowly focused.
      Concentrating all the energy into a small beam by means of a parabolic antenna gives
       a much higher signal-to-noise ratio, but the transmitting and receiving antennas must
       be accurately aligned with each other.
      Microwaves travel in a straight line, so if the towers are too far apart, repeaters are
       needed periodically. For 100-meter-high towers, repeaters can be 80 km apart.
      Unlike radio waves at lower frequencies, microwaves do not pass through buildings
       well.
      Some waves may be refracted off low-lying atmospheric layers and may take slightly
       longer to arrive than the direct waves.
      The delayed waves may arrive out of phase with the direct wave and thus cancel the
       signal. This effect is called multipath fading.
      Microwave communication is so widely used for long-distance telephone
       communication, mobile phones, television distribution, and other purposes, so that a
       severe shortage of spectrum has developed.
      It has several key advantages over fiber. The main one is that there is no need to lay
       down cables. Microwave is also relatively inexpensive.
                                              24
Computer Networks (21CS52)                        Module 1: Introduction, Physical Layer
   The location of these bands varies from country to country.
ISM and U-NII bands used in the United States by wireless devices
      The unlicensed bands have been a huge success over the past decade. The ability to
       use the spectrum freely has unleashed a huge amount of innovation in wireless LANs
       and PANs.
Infrared Transmission
      Unguided infrared waves are widely used for short-range communication. The remote
       controls used for televisions, VCRs, and stereos all use infrared communication.
      They are relatively directional, cheap, and easy to build but have a major drawback:
       they do not pass through solid objects.
      Thus, infrared system in one room of a building will not interfere with a similar
       system in adjacent rooms or buildings.
      Furthermore, security of infrared systems against eavesdropping is better than that of
       radio systems precisely for this reason.
      Therefore, no government license is needed to operate an infrared system, in contrast
       to radio systems, which must be licensed outside the ISM bands.
      Infrared communication has a limited use on the desktop, for example, to connect
       notebook computers and printers with the IrDA (Infrared Data Association) standard.
Light Transmission
      Optical signaling using lasers is inherently unidirectional, so each end needs its own
       laser and its own photodetector.
      This scheme offers very high bandwidth at very low cost and is relatively secure
       because it is difficult to tap a narrow laser beam.
      It is also relatively easy to install and, unlike microwave transmission, does not
       require an FCC license.
      It is difficult to focus laser beam 1 mm wide at a target. Wind and temperature
       changes can distort the beam and laser beams also cannot penetrate rain or thick fog.
      Unguided optical links need to be engineered with a sufficient margin of error.
      Communicating with visible light is inherently safe and creates a low-speed network
       in the immediate vicinity.
                                             25
Computer Networks (21CS52)                            Module 1: Introduction, Physical Layer
     A bidirectional system with two lasers. Convection currents can interfere with laser
                                   communication systems
26