CN Unit 1
CN Unit 1
1.Business Applications
a)Resource Sharing:The goal is to make all programs, equipment, and especially data available to
anyone on the network without regard to the physical location of the resource or the user.
Probably even more important than sharing physical resources such as printers, and tape backup systems, is
sharing information. Companies small and large are vitally dependent on computerized information and large
are vitally dependent on computerized information.
Networks called VPNs (Virtual Private Networks) may be used to join the individual networks at different
sites into one extended network.
b)Providing Communication Medium:Every company that has two or more computers now has
email (electronic mail), which employees generally use for a great deal of daily communication.
Telephone calls between employees may be carried by the computer network instead of by the
phone company. This technology is called IP telephony or Voice over IP (VoIP) when Internet
technology is used.
Desktop sharing lets remote workers see and interact with a graphical computer screen. This
makes it easy for two or more people who work far apart to read and write a shared blackboardor
write a report together.
c)Doing Business Electronically: Airlines, bookstores, and other retailers have discovered that many
customers like the convenience of shopping from home.
2.Home Network Applications
a)Access to remote information: Internet access provides home users with connectivity to remote
computers.As with companies, home users can access information, communicate with other
people, and buy products and services with e-commerce
Any teenager worth his or her salt is addicted to instant messaging. This facility, derived from the
UNIX talk program in use since around 1970, allows two people to type messages at each other in
real time. There are multi-person messaging services too, such as the Twitter service that lets
people send short text messages called ‘‘tweets’’ to their circle of friends or other willing audiences.
person-to-person communications and accessing information are social network applications like
Facebook
c)Interactive Entertainment
Many people already pay their bills, manage their bank accounts, and handle their investments
electronically.
3.Mobile Users: Mobile computers, such as laptop and handheld computers, are one of the
Social networks, message boards, content sharing sites, and a host of other applications allow people to
share their views with like-minded individuals.
The trouble comes with topics that people actually care about, like politics, religion, or sex. Views that are
publicly posted may be deeply offensive to somepeople.
Worse yet, they may not be politically correct. Furthermore, opinions need not be limited to text; high-
resolution color photographs and video clips are easily shared over computer networks. Some people take a
live-and-let-live view,but others feel that posting certain material (e.g., verbal attacks on particular
countries or religions, pornography, etc.) is simply unacceptable and that such content must be censored.
Different countries have different and conflicting laws in this area.
Network Hardware
The computer networks can be discussed in two dimensions
i) Transmission technology ii) Scale
There are two types of transmission technology that are in widespread use:
Broadcast links
Point-to-point links.
Point-to-point links connect individual pairs of machines. To go from the source to the destination
on a network made up of point-to-point links, short messages, called packets in certain contexts,
may have to first visit one or more intermediate machines. Often multiple routes, of different
lengths, are possible, so finding good ones is important in point-to-point networks. Point-to-point
transmission with exactly one sender and exactly one receiver is sometimes called unicasting.
On a broadcast network, the communication channel is shared by all the machines on the network;
packets sent by any machine are received by all the others. An address field within each packet
specifies the intended recipient. Upon receiving a packet, a machine checks the address field. If
the packet is intended for the receiving machine, that machine processes the packet; if the packet
is intended for some other machine, it is just ignored. A wireless network is a common example
of a broadcast link, with communication shared over a coverage region that depends on the wireless
channel and the transmitting machine.
When a packet with this code is transmitted, it is received and processed by every machine on the
network. This mode of operation is called broadcasting. Some broadcast systems also support
transmission to a subset of the machines, which known as multicasting.
Scale
An alternative criterion for classifying networks is by scale. Distance is important as a
classification metric because different technologies are used at different scales.
Personal Area Network
PANs (Personal Area Networks) let devices communicate over the range of a person. A common
example is a wireless network that connects a computer with its peripherals. Almost every
computer has an attached monitor, keyboard, mouse, and printer. Without using wireless, this
connection must be done with cables. some companies have designed a short-range wireless
network called Bluetooth to connect these components without wires. The idea is that if our devices
have Bluetooth, then we need no cables. You just put them down, turn them on, and they work
together.
In the simplest form, Bluetooth networks use the master-slave paradigm. The system unit (the PC)
is normally the master, talking to the mouse, keyboard, etc., as slaves. The master tells the slaves
what addresses to use, when they can broadcast, how long they can transmit, what frequencies they
can use, and so on.
TOPOLOGY
Physical Topology
The term physical topology refers to the way in which a network is laid out physically. One or more
devices connect to a link; two or more links form a topology. The topology of a network is the
geometric representation of the relationship of all the links and linking devices (usually called
nodes) to one another. There are four basic topologies possible: mesh, star, bus, and ring
Mesh: In a mesh topology, every device has a dedicated point-to-point link to every other device.
The term dedicated means that the link carries traffic only between the two devices it connects. To
find the number of physical links in a fully connected mesh network with n nodes, we first consider
that each node must be connected to every other node. Node 1 must be connected to n - I nodes,
node 2 must be connected to n – 1 nodes, and finally node n must be connected to n - 1 nodes. We
need n(n - 1) physical links. However, if each physical link allows communication in both directions
(duplex mode), we can divide the number of links by 2. In other words, we can say that in a mesh
topology, we need n(n -1) /2 duplex-mode links.
To accommodate that many links, every device on the network must have n – 1 input/output
(VO) ports to be connected to the other n - 1 stations.
Advantages:
1. The use of dedicated links guarantees that each connection can carry its own data load, thus
eliminating the traffic problems that can occur when links must be shared by multiple
devices.
2. A mesh topology is robust. If one link becomes unusable, it does not incapacitate the entire
system. Third, there is the advantage of privacy or security. When every message travels
along a dedicated line, only the intended recipient sees it. Physical boundaries prevent other
users from gaining access to messages. Finally, point-to-point links make fault
identification and fault isolation easy. Traffic can be routed to avoid links with suspected
problems. This facility enables the network manager to discover the precise location of the
fault and aids in finding its cause and solution.
Disadvantages:
1. Disadvantage of a mesh are related to the amount of cabling because every device must be
connected to every other device, installation and reconnection are difficult.
2. Second, the sheer bulk of the wiring can be greater than the available space (in walls,
ceilings, or floors) can accommodate. Finally, the hardware required to connect each link
(I/O ports and cable) can be prohibitively expensive.
For these reasons a mesh topology is usually implemented in a limited fashion, for example, as a
backbone connecting the main computers of a hybrid network that can include several other
topologies.
Star Topology:
In a star topology, each device has a dedicated point-to-point link only to a central
controller, usually called a hub. The devices are not directly linked to one another. Unlike a mesh
topology, a star topology does not allow direct traffic between devices. The controller acts as an
exchange: If one device wants to send data to another, it sends the data to the controller, which then
relays the data to the other connected device .
A star topology is less expensive than a mesh topology. In a star, each device needs only one link
and one I/O port to connect it to any number of others. This factor also makes it easy to install and
reconfigure. Far less cabling needs to be housed, and additions, moves, and deletions involve only
one connection: between that device and the hub.
Other advantages include robustness. If one link fails, only that link is affected. All other links
remain active. This factor also lends itself to easy fault identification and fault isolation. As long as
the hub is working, it can be used to monitor link problems and bypass defective links.
One big disadvantage of a star topology is the dependency of the whole topology on one single
point, the hub. If the hub goes down, the whole system is dead. Although a star requires far less
cable than a mesh, each node must be linked to a central hub. For this reason, often more cabling is
required in a star than in some other topologies (such as ring or bus).
Bus Topology:
The preceding examples all describe point-to-point connections. A bus topology, on the
other hand, is multipoint. One long cable acts as a backbone to link all the devices in a network
Nodes are connected to the bus cable by drop lines and taps. A drop line is a connection
running between the device and the main cable. A tap is a connector that either splices into the main
cable or punctures the sheathing of a cable to create a contact with the metallic core. As a signal
travels along the backbone, some of its energy is transformed into heat. Therefore, it becomes
weaker and weaker as it travels farther and farther. For this reason there is a limit on the number of
taps a bus can support and on the distance between those taps.
Advantages of a bus topology include ease of installation. Backbone cable can be laid along the
most efficient path, then connected to the nodes by drop lines of various lengths. In this way, a bus
uses less cabling than mesh or star topologies. In a star, for example, four network devices in the
same room require four lengths of cable reaching all the way to the hub. In a bus, this redundancy
is eliminated. Only the backbone cable stretches through the entire facility. Each drop line has to
reach only as far as the nearest point on the backbone.
Disadvantages include difficult reconnection and fault isolation. A bus is usually designed to be
optimally efficient at installation. It can therefore be difficult to add new devices. Signal reflection
at the taps can cause degradation in quality. This degradation can be controlled by limiting the
number and spacing of devices connected to a given length of cable. Adding new devices may
therefore require modification or replacement of the backbone.
In addition, a fault or break in the bus cable stops all transmission, even between devices on the
same side of the problem. The damaged area reflects signals back in the direction of origin, creating
noise in both directions.
Bus topology was the one of the first topologies used in the design of early local area networks.
Ethernet LANs can use a bus topology, but they are less popular.
Ring Topology In a ring topology, each device has a dedicated point-to-point connection with
only the two devices on either side of it. A signal is passed along the ring in one direction, from
device to device, until it reaches its destination. Each device in the ring incorporates a repeater.
When a device receives a signal intended for another device, its repeater regenerates the bits and
passes them along
A ring is relatively easy to install and reconfigure. Each device is linked to only its immediate neighbors (either
physically or logically). To add or delete a device requires changing only two connections. The only constraints are
media and traffic considerations (maximum ring length and number of devices). In addition, fault isolation is
simplified. Generally in a ring, a signal is circulating at all times. If one device does not receive a signal within a
specified period, it can issue an alarm. The alarm alerts the network operator to the problem and its location.
However, unidirectional traffic can be a disadvantage. In a simple ring, a break in the ring (such as a disabled
station) can disable the entire network. This weakness can be solved by using a dual ring or a switch capable of closing
off the break. Ring topology was prevalent when IBM introduced its local-area network Token Ring. Today, the need
for higher-speed LANs has made this topology less popular. Hybrid Topology A network can be hybrid. For example,
we can have a main star topology with each branch connecting several stations in a bus topology as shown in Figure
Network Software
Protocol Hierarchies
To reduce their design complexity, most networks are organized as a stack of layers or levels, each
one built upon the one below it. The number of layers, the name of each layer, the contents of each
layer, and the function of each layer differ from network to network. The purpose of each layer is
to offer certain services to the higher layers while shielding those layers from the details of how
the offered services are actually implemented. In a sense, each layer is a kind of virtual machine,
-offering certain services to the layer above it. When layer n on one machine carries on a
conversation with layer n on another machine, the rules and conventions used in this conversation
are collectively known as the layer n protocol. Basically, a protocol is an agreement between the
communicating parties on how communication is to proceed. Between each pair of adjacent layers
is an interface. The interface defines which primitive operations and services the lower layer makes
available to the upper one.
A set of layers and protocols is called a network architecture. A list of the protocols used by a
certain system, one protocol per layer, is called a protocol stack.
In networking, a protocol defines the rules that both the sender and receiver and
all intermediate devices need to follow to be able to communicate effectively.
A protocol provides a communication service that the process use to exchange
messages.
When communication is simple, we may need only one simple protocol.
When the communication is complex, we may need to divide the task between
different layers, in which case we need a protocol at each layer, or protocol
layering.
Protocol layering is that it allows us to separate the services from the
implementation.
A layer needs to be able to receive a set of services from the lower layer and to
give the services to the upper layer.
Any modification in one layer will not affect the other layers.
Connection-less service is related to the postal system. It does not include any connection
establishment and connection termination. Connection-less Service does not give a
guarantee of reliability. In this, Packets do not follow the same path to reach their
destination.
Service Primitives
A service is formally specified by a set of primitives (operations) available touser processes to access the
service. These primitives tell the service to perform some action or report on an action taken by a peer entity.
If the protocol stack is located in the operating system, as it often is, the primitives are normally system
calls. These calls cause a trap to kernel mode, which then turns control of the machine
over to the operating system to send the necessary packets
The physical layer coordinates the functions required to transmit a bit stream over a
physical medium.
The physical layer is concerned with the following functions:
Physical characteristics of interfaces and media - The physical layer defines
the characteristics of the interface between the devices and the transmission
medium.
Representation of bits - To transmit the stream of bits, it must be encoded to
signals. The physical layer defines the type of encoding.
Signals: It determines the type of the signal used for transmitting the information.
Data Rate or Transmission rate - The number of bits sent each second –is also
defined by the physical layer.
Synchronization of bits - The sender and receiver must be synchronized at the
bit level. Their clocks must be synchronized
Line Configuration - In a point-to-point configuration, two devices are
connected together through a dedicated link. In a multipoint configuration, a link
is shared between several devices.
Physical Topology - The physical topology defines how devices are connected to
make a network. Devices can be connected using a mesh, bus, star or ring
topology.
Transmission Mode - The physical layer also defines the direction of
transmission between two devices: simplex, half-duplex or full-duplex.
It is responsible for transmitting frames from one node to the next node.
The other responsibilities of this layer are
Framing - Divides the stream of bits received into data units called frames.
Physical addressing – If frames are to be distributed to different systems on the
network , data link layer adds a header to the frame to define the sender and
receiver.
Flow control- If the rate at which the data are absorbed by the receiver is less
than the rate produced in the sender, t he Data link layer imposes a flow
ctrl mechanism.
Error control- Used for detecting and retransmitting damaged or lost frames and
to prevent duplication of frames. This is achieved through a trailer added at the
end of the frame.
Medium Access control -Used to determine which device has control over the
link at any given time.
3. NETWORK LAYER
This layer is responsible for the delivery of packets from source to destination.
It determines the best path to move data from source to the destination based on the
network conditions, the priority of service, and other factors.
The other responsibilities of this layer are
Logical addressing - If a packet passes the network boundary, we need another
addressing system for source and destination called logical address. This
addressing is used to identify the device on the internet.
Routing – Routing is the major component of the network layer, and it determines
the best optimal path out of the multiple paths from source to the destination.
4. TRANSPORT LAYER
5. SESSION LAYER
6. PRESENTATION LAYER
It is concerned with the syntax and semantics of information exchanged between two
systems.
The other responsibilities of this layer are
Translation – Different computers use different encoding system, this layer is
responsible for interoperability between these different encoding methods. It will
change the message into some common format.
Encryption and decryption-It means that sender transforms the original
information to another form and sends the resulting message over the n/w. and
vice versa.
Compression and expansion-Compression reduces the number of bits contained
in the information particularly in text, audio and video.
7. APPLICATION LAYER
This layer enables the user to access the network. It handles issues such as network
transparency, resource allocation, etc. This allows the user to log on to remote user.
The other responsibilities of this layer are
FTAM (File Transfer, Access, Management) - Allows user to access files in
a remote host.
Mail services - Provides email forwarding and storage.
Directory services - Provides database sources to access information about
various sources and objects.
TCP / IP Protocol
The TCP/IP architecture is also called as Internet architecture.
It is developed by the US Defense Advanced Research Project Agency (DARPA)
for its packet switched network (ARPANET).
TCP/IP is a protocol suite used in the Internet today.
It is a 4-layer model. The layers of TCP/IP are
1. Application layer
2. Transport Layer (TCP/UDP)
3. Internet Layer
4. The Host - to - Network Layer
APPLICATION LAYER
An application layer incorporates the function of top three OSI layers. An
application layer is the topmost layer in the TCP/IP model.
It is responsible for handling high-level protocols, issues of representation.
This layer allows the user to interact with the application.
When one application layer protocol wants to communicate with another
application layer, it forwards its data to the transport layer.
Protocols such as FTP, HTTP, SMTP, POP3, etc running in the application layer
provides service to other program running on top of application layer
TRANSPORT LAYER
The transport layer is responsible for the reliability, flow control, and correction
of data which is being sent over the network.
The two protocols used in the transport layer are User Datagram protocol and
Transmission control protocol.
o UDP – UDP provides connectionless service and end-to-end delivery of
transmission. It is an unreliable protocol as it discovers the errors but
not specify the error.
o TCP – TCP provides a full transport layer services to applications. TCP
is a reliable protocol as it detects the error and retransmits the
damaged frames.
INTERNET LAYER
The internet layer is the second layer of the TCP/IP model.
An internet layer is also known as the network layer.
The main responsibility of the internet layer is to send the packets from any
network, and they arrive at the destination irrespective of the route they take.
Internet layer handle the transfer of information across multiple networks through
router and gateway .
IP protocol is used in this layer, and it is the most significant part of the entire
TCP/IP suite.
OSI TCP/IP
The OSI model was developed first, and then The protocols were created first and then built
protocols were created to fit the network the TCP/IP model.
architecture’s needs.
The OSI model represents defines It does not mention the services, interfaces,
administration, interfaces and conventions. It and protocols.
describes clearly which layer provides
services.
The protocols of the OSI model are better The TCP/IP model protocols are not hidden,
unseen and can be returned with another and we cannot fit a new protocol stack in it.
appropriate protocol quickly.
oriented transmission in the network layer; network layer and supports connecting and
however, only connection-oriented connectionless-oriented transmission in the
transmission in the transport layer. transport layer.
The smallest size of the OSI header is 5 bytes. The smallest size of the TCP/IP header is 20
bytes.
Protocols are unknown in the OSI model and In TCP/IP, returning protocol is not difficult.
are returned while the technology modifies.
THE INTERNET
The Internet has revolutionized many aspects of our daily lives. It has affected the way we do
business as well as the way we spend our leisure time. Count the ways you've used the Internet
recently. Perhaps you've sent electronic mail (e-mail) to a business associate, paid a utility bill, read
a newspaper from a distant city, or looked up a local movie schedule-all by using the Internet. Or
maybe you researched a medical topic, booked a hotel reservation, chatted with a fellow Trekkie,
or comparison-shopped for a car. The Internet is a communication system that has brought a wealth
of information to our fingertips and organized it for our use.
A Brief History
A network is a group of connected communicating devices such as computers and printers. An
internet (note the lowercase letter i) is two or more networks that can communicate with each other.
The most notable internet is called the Internet (uppercase letter I), a collaboration of more than
hundreds of thousands of interconnected networks. Private individuals as well as various
organizations such as government agencies, schools, research facilities, corporations, and libraries
in more than 100 countries use the Internet. Millions of people are users. Yet this extraordinary
communication system only came into being in 1969.
In the mid-1960s, mainframe computers in research organizations were standalone devices.
Computers from different manufacturers were unable to communicate with one another. The
Advanced Research Projects Agency (ARPA) in the Department of Defense (DoD) was interested
in finding a way to connect computers so that the researchers they funded could share their findings,
thereby reducing costs and eliminating duplication of effort.
In 1967, at an Association for Computing Machinery (ACM) meeting, ARPA presented its ideas
for ARPANET, a small network of connected computers. The idea was that each host computer
(not necessarily from the same manufacturer) would be attached to a specialized computer, called
an inteiface message processor (IMP). The IMPs, in tum, would be connected to one another. Each
IMP had to be able to communicate with other IMPs as well as with its own attached host. By 1969,
ARPANET was a reality. Four nodes, at the University of California at Los Angeles (UCLA), the
University of California at Santa Barbara (UCSB), Stanford Research Institute (SRI), and the
University of Utah, were connected via the IMPs to form a network. Software called the Network
Control Protocol (NCP) provided communication between the hosts.
In 1972, Vint Cerf and Bob Kahn, both of whom were part of the core ARPANET group,
collaborated on what they called the Internetting Projec1. Cerf and Kahn's landmark 1973 paper
outlined the protocols to achieve end-to-end delivery of packets. This paper on Transmission
Control Protocol (TCP) included concepts such as encapsulation, the datagram, and the functions
of a gateway. Shortly thereafter, authorities made a decision to split TCP into two protocols:
Transmission Control Protocol (TCP) and Internetworking Protocol (lP). IP would handle datagram
routing while TCP would be responsible for higher-level functions such as
segmentation, reassembly, and error detection. The internetworking protocol became
known as TCPIIP.
Transmission media is a communication channel that carries the information from the sender to the receiver
o Data is transmitted through the electromagnetic signals.
o The main functionality of the transmission media is to carry the information
in the form of bits (Either as Electrical signals or Light pulses).
o It is a physical path between transmitter and receiver in data communication.
o The characteristics and quality of data transmission are determined by the
characteristics of medium and signal.
o Transmission media is of two types : Guided Media (Wired) and UnGuided
Media (wireless).
o In guided (wired) media, medium characteristics are more important whereas, in
transmitted one due to the transmission impairment. The quality of the signals
will get destroyed due to transmission impairment.
o Interference: An interference is defined as the process of disrupting a signal
Twisted pair is a physical media made up of a pair of cables twisted with each
other.
A twisted pair cable is cheap as compared to other transmission media.
Installation of the twisted pair cable is easy, and it is a lightweight cable.
The frequency ranges for twisted pair cable is from 0 to 3.5KHz.
A twisted pair consists of two insulated copper wires arranged in a regular spiral
pattern.
Unshielded Twisted Pair
An unshielded twisted pair is widely used in telecommunication.
Following are the categories of the unshielded twisted pair cable:
o Category 1: Suports low-speed data.
o Category 2: It can support upto 4Mbps.
o Category 3: It can support upto 16Mbps.
o Category 4: It can support upto 20Mbps.
o Category 5: It can support upto 200Mbps.
Advantages :
o It is cheap.
o Installation of the unshielded twisted pair is easy.
o It can be used for high-speed LAN.
Disadvantage:
o This cable can only be used for shorter distances because of attenuation.
A shielded twisted pair is a cable that contains the mesh surrounding the wire that allows
the higher transmission rate.
Advantages :
o The cost of the shielded twisted pair cable is not very high and not very low.
o Installation of STP is easy.
o It has higher capacity as compared to unshielded twisted pair cable.
o It has a higher attenuation.
o It is shielded that provides the higher data transmission rate.
Disadvantages:
o It is more expensive as compared to UTP and coaxial cable.
o It has a higher attenuation rate.
COAXIAL CABLE
o The name of the cable is coaxial as it contains two conductors parallel to each
other.
o It has a higher frequency as compared to Twisted pair cable.
o The inner conductor of the coaxial cable is made up of copper, and the outer
conductor is made up of copper mesh.
o The middle core is made up of non-conductive cover that separates the inner
conductor from the outer conductor.
o The middle core is responsible for the data transferring whereas the copper mesh
prevents from the EMI(Electromagnetic interference).
o Common applications of coaxial cable are Cable TV networks and traditional
Ethernet LANs.
o Fibre optic cable is a cable that uses electrical signals for communication.
o Fibre optic is a cable that holds the optical fibres coated in plastic that are used to
send the data by pulses of light.
o The plastic coating protects the optical fibres from heat, cold, electromagnetic
interference from other types of wiring.
o Fibre optics provide faster data transmission than copper wires.
Basic elements of Fibre optic cable:
o Core: The optical fibre consists of a narrow strand of glass or plastic known as
a core. A core is a light transmission area of the fibre. The more the area of
the core, the more light will be transmitted into the fibre.
o Cladding: The concentric layer of glass is known as cladding. The main
functionality of the cladding is to provide the lower refractive index at the core
interface as to cause the reflection within the core so that the light waves are
transmitted through the fibre.
o Jacket: The protective coating consisting of plastic is known as a jacket. The
main purpose of a jacket is to preserve the fibre strength, absorb shock and extra
fibre protection.
Advantages:
o Greater Bandwidth
o Less signal attenuation
o Immunity to electromagnetic interference
o Resistance to corrosive materials
o Light weight
o Greater immunity to tapping
Disadvantages :
o Requires Expertise for Installation and maintenance
o Unidirectional light propagation.
o Higher Cost.
Multimode Propagation
Multimode is so named because multiple beams from a light source move through
the core in different paths.
How these beams move within the cable depends on the structure of the core.
Single-Mode Propagation
Single-mode uses step-index fiber and a highly focused source of light that limits
beams to a small range of angles, all close to the horizontal.
The single-mode fiber itself is manufactured with a much smaller diameter than
that of multimode fiber, and with substantially lower density (index of refraction).
The decrease in density results in a critical angle that is close enough to 90° to
make the propagation of beams almost horizontal.
In this case, propagation of different beams is almost identical, and delays are
negligible. All the beams arrive at the destination “together” and can be
recombined with little distortion to the signal.
UNGUIDED MEDIA
o An unguided transmission transmits the electromagnetic waves without using any
physical medium. Therefore it is also known as wireless transmission.
o In unguided media, air is the media through which the electromagnetic energy
can flow easily.
Unguided transmission is broadly classified into three categories : Radio Waves, Microwaves ,
Infrared
RADIO WAVES
o Radio waves are the electromagnetic waves that are transmitted in all the
directions of free space.
o Radio waves are omnidirectional, i.e., the signals are propagated in all the
directions.
o The range in frequencies of radio waves is from 3Khz to 1Ghz.
o In the case of radio waves, the sending and receiving antenna are not aligned, i.e.,
the wave sent by the sending antenna can be received by any receiving antenna.
o An example of the radio wave is FM radio.
MICROWAVES
Microwaves are of two types - Terrestrial microwave & Satellite microwave
Terrestrial Microwave
o Terrestrial Microwave transmission is a technology that transmits the focused
beam of a radio signal from one ground-based microwave transmission antenna to
another.
o Microwaves are the electromagnetic waves having the frequency in the range
from 1GHz to 1000 GHz.
o Microwaves are unidirectional as the sending and receiving antenna is to be
aligned, i.e., the waves sent by the sending antenna are narrowly focused.
o In this case, antennas are mounted on the towers to send a beam to another
antenna which is km away.
o It works on the line of sight transmission, i.e., the antennas mounted on the
towers are at the direct sight of each other.
Satellite Microwave
o A satellite is a physical object that revolves around the earth at a known height.
o Satellite communication is more reliable nowadays as it offers more flexibility
than cable and fibre optic systems.
o We can communicate with any point on the globe by using satellite
communication.
o The satellite accepts the signal that is transmitted from the earth station, and
it amplifies the signal. The amplified signal is retransmitted to another earth station.
INFRARED WAVES
o An infrared transmission is a wireless technology used for communication over
short ranges.
o The frequency of the infrared in the range from 300 GHz to 400 THz.
o It is used for short-range communication such as data transfer between two cell
phones, TV remote operation, data transfer between a computer and cell phone
and devices that resides in the same closed area.
Characteristics of Infrared:
o It supports high bandwidth, and hence the data rate will be very high.
o Infrared waves cannot penetrate the walls. Therefore, the infrared communication
in one room cannot be interrupted by the nearby rooms.
o An infrared communication provides better security with minimum interference.
o Infrared communication is unreliable outside the building because the sun rays
will interfere with the infrared waves.