Communication Networks
Communication Networks
Data Communication: The transport of digital data between computers, addressing how
communication protocols enable reliable and efficient data transfer.
3. Multiplexing: Combining multiple data channels into one and separating them later.
4. Classification of Networks: Based on distance, such as LAN, MAN, WAN, and PAN, along with
the roles of switches and routers.
5. Internet Evolution and Protocols: From ARPANET to TCP/IP standards, and the roles of
organizations like ISO, ITU, and IETF in standardization.
1. Data Communication:
o Key aspects include how computers are connected, the types of media used for data
transport, and how digital data is represented on the medium. Communication
protocols play a critical role in this process.
2. Communication Protocols:
o Protocols are responsible for ensuring that data transfer happens in a uniform manner.
They define the design of data units and ensure that the transfer between computers is
both reliable and efficient.
3. Networking Principles:
Broadcast: One sender transmits data to all other peers, often with some peers
being unknown.
4. Transmission Principles:
Serial Transmission: Data is sent one bit at a time over a single channel.
5. Multiplexing:
o Multiplexing is the process of combining multiple data channels into a single channel at
the source, while demultiplexing is separating them at the destination. This concept is
crucial for efficiently utilizing the communication channel and can be applied at any
layer of the OSI model.
6. Classification of Networks:
Local Area Network (LAN): Covers a limited geographical area like a building,
with transmission speeds up to 1000 Mbps and simple topologies like bus, star,
ring, tree, or mesh.
Metropolitan Area Network (MAN): Designed for larger areas like towns,
typically using similar technologies to LAN.
Wide Area Network (WAN): Covers large distances and connects LANs and
MANs through complex topologies, often using routers and point-to-point
connections.
Personal Area Network (PAN): Covers very short distances, like a few meters.
7. Internet Evolution:
o The Internet evolved from ARPANET, which was the first operational packet-switched
network. The need for standardized communication across different systems led to the
development of TCP/IP protocols, which are now the backbone of the Internet.
Delay: The time taken for data to travel from source to destination.
Reliability: Ensuring the network operates with fault tolerance and stability.
9. Standardization:
IEEE: Develops standards for local area networks, such as the IEEE 802 family
(e.g., Ethernet, Wi-Fi).
Twisted Pair: Consists of two insulated copper wires twisted together to reduce
electromagnetic interference. Categories include Cat 3, Cat 5, Cat 6, and Cat 7,
each supporting higher bandwidth and longer distances.
Optical Fiber: Transmits data as light pulses. It offers nearly unlimited data rates
(up to 50,000 Gbps), is insensitive to electromagnetic disturbances, and has a
very low bit error rate (~10⁻¹²).
2. Unguided Media:
3. Design Factors:
o Bandwidth directly affects data rates: Higher bandwidth leads to higher data rates.
o Transmission impairments like attenuation and interference can reduce signal quality.
4. Optical Transmission:
o Single-mode Fiber: A thin core (8-10 µm) prevents dispersion, making it ideal for long-
distance communication with minimal signal loss.
o Multi-mode Fiber: A thicker core (50 µm) allows multiple rays of light to propagate, but
it can suffer from dispersion, limiting its effective distance.
5. Wireless Propagation:
o Ground Wave: Follows the Earth's surface and is used for low-frequency communication
(up to 2 MHz).
o Sky Wave: Signal is reflected from the ionosphere, used in long-distance radio
communication.
o Line of Sight: Above 30 MHz, signals must travel in a straight path; they can extend
beyond visual range due to atmospheric refraction.
1. Transmission Media:
The document begins by differentiating between guided and unguided media, emphasizing that
the characteristics of the medium and the signal define the quality of transmission.
The two key concerns in transmission media are data rate and distance.
2. Design Factors:
Transmission Impairments: Factors like attenuation (signal loss over distance) and interference
can degrade the quality of the signal.
Number of Receivers: In guided media, the more receivers connected to a transmission line, the
greater the attenuation.
Twisted Pair:
o Twisted pair cables transmit data using electrical signals. Electromagnetic interference is
a challenge, but twisting the wires helps reduce this interference.
o Categories:
Cat 5: Widely used for Ethernet (100Base-Tx) and ATM networks, with a
bandwidth of 100 MHz.
Cat 6 and Cat 7: Offer much higher bandwidth (up to 625 MHz), supporting
Gigabit Ethernet and beyond.
o Shielded Twisted Pair (STP): Each pair of wires is shielded, providing better protection
from interference.
Coaxial Cable:
o Coaxial cables are insulated copper cables that offer better shielding than twisted pair.
They are capable of higher data rates (1-2 Gbps) and can span longer distances (up to 1
km). However, they have largely been replaced by twisted pair in many networks.
o Bit Error Rate: Around 10⁻⁹, which indicates very reliable data transmission.
Optical Fiber:
o Optical fiber offers the highest data rates, theoretically up to 50,000 Gbps, and is ideal
for long-distance transmission.
o Bit Error Rate: Around 10⁻¹², making it extremely reliable for transmitting data over long
distances.
Single-Mode Fiber: Has a small core (8-10 µm), minimizing dispersion and
allowing for long-distance transmission.
Multimode Fiber: Has a larger core (50 µm), supporting multiple light paths, but
suffers from higher dispersion.
Wireless Transmission:
o Electromagnetic waves (frequencies ranging from 10 kHz to 300 GHz) are used for
wireless communication.
Microwave Transmission:
o Satellite Microwave: Satellites act as relay stations, receiving and transmitting signals
over large distances. Common frequencies are in the 5.925-6.425 GHz range for uplinks
and 3.7-4.2 GHz for downlinks.
o Uses include television broadcasts, GPS, and long-distance telephony.
Broadcast Radio:
o Radio frequencies (30 MHz - 1 GHz) are used for omnidirectional broadcast, commonly
used in FM radio and TV broadcasting. The signals require a line of sight and are subject
to multipath interference.
Infrared:
o Infrared transmission uses modulated noncoherent infrared light. It requires line of sight
and is blocked by walls. Typical applications include TV remote controls and IRD ports.
5. Wireless Propagation:
o Ground Wave: Follows the contour of the earth and is used for AM radio (up to 2 MHz).
o Sky Wave: Signals are reflected or refracted by the ionosphere, making it possible to
transmit over long distances. Commonly used in amateur radio and international
broadcasts (BBC World Service, Voice of America).
o Line of Sight: Used for higher frequencies (above 30 MHz) and requires clear paths
between transmitter and receiver. Refraction allows the signal to travel beyond the
visual line of sight.
6. Transmission Impairments:
Attenuation: Signal loss over distance is a critical factor in both wired and wireless transmission.
For example, optical fibers experience weakening due to absorption and dispersion, which can
be mitigated by using higher-quality materials and light sources.
Satellite Communication: Satellites orbiting the earth relay communication signals, enabling
long-distance communication. These signals require geostationary orbits and are typically
spaced at least 3-4° apart to avoid interference.
Based on the content from the document 04-ccn.pdf, here’s a detailed overview of the OSI and TCP/IP
Models for Computer Communication and Networking:
OSI Model:
The Open Systems Interconnection (OSI) model was developed by the International Organization for
Standardization (ISO). It serves as a theoretical framework to standardize the functions of a
telecommunication or computing system without focusing on its internal structure.
o Concerned with the physical interface between the computer and the network.
Other related physical layer matters like connectors and electrical signals.
o Responsible for the transfer of data between two systems over a physical link.
3. Network Layer:
4. Transport Layer:
5. Session Layer:
6. Presentation Layer:
o Ensures that data sent from the application layer of one system can be properly
interpreted by the application layer of another system.
7. Application Layer:
o Provides support for various network applications like email, file transfers, and remote
access.
TCP/IP Model:
The TCP/IP (Transmission Control Protocol/Internet Protocol) model is a practical, widely used
framework that forms the basis for the Internet. It was developed by the US Defense Advanced
Research Project Agency (DARPA) for the ARPANET packet-switched network. It is used globally as the
protocol suite for the Internet.
1. Host-to-Network Layer (equivalent to the OSI’s Physical and Data Link Layers):
o Handles the exchange of data between a device and the network it is connected to.
2. Internet Layer:
3. Transport Layer:
o Uses protocols like TCP (for reliable, connection-oriented communication) and UDP (for
fast, connectionless communication).
4. Application Layer:
o Provides support for user applications and communication services like SMTP (Simple
Mail Transfer Protocol), FTP (File Transfer Protocol), and Telnet.
1. Development:
o TCP/IP was developed by DARPA and is a practical model that serves as the foundation
for the Internet.
2. Layers:
o TCP/IP has four layers, where the Application Layer encompasses the functions of OSI's
Application, Presentation, and Session layers.
3. Usage:
o TCP/IP is the de facto standard for modern networking.
o OSI is a theoretical system that came after TCP/IP and is primarily used as a teaching
tool and reference model.
Protocols are a set of rules and conventions that define how data is transmitted and received across a
network. They ensure that devices, such as computers, routers, and other networked systems, can
communicate with each other effectively, regardless of differences in hardware, software, or
geographical location.
1. Syntax: The structure or format of the data (e.g., how headers are added to data packets).
2. Semantics: The meaning of each section of bits (e.g., what specific fields in a packet represent).
3. Timing: Rules about when data should be sent and how fast.
Types of Protocols:
There are various types of protocols that serve different functions in a network. Some of the most
common include:
1. HTTP (HyperText Transfer Protocol): Used for transmitting web pages over the internet.
2. FTP (File Transfer Protocol): Used for transferring files between computers on a network.
3. TCP (Transmission Control Protocol): Ensures reliable, ordered delivery of data between
devices.
4. UDP (User Datagram Protocol): Allows faster, connectionless communication but with less
reliability.
5. IP (Internet Protocol): Responsible for routing data across networks using IP addresses.
Purpose of Protocols:
Error Handling: Many protocols include mechanisms to detect and correct transmission errors.
Security: Some protocols, like SSL/TLS, include encryption to secure data during transmission.
Efficiency: Protocols help manage network traffic efficiently by determining packet size,
addressing methods, and routing mechanisms.
Protocols are a set of rules and conventions that define how data is transmitted and received across a
network. They ensure that devices, such as computers, routers, and other networked systems, can
communicate with each other effectively, regardless of differences in hardware, software, or
geographical location.
1. Syntax: The structure or format of the data (e.g., how headers are added to data packets).
2. Semantics: The meaning of each section of bits (e.g., what specific fields in a packet represent).
3. Timing: Rules about when data should be sent and how fast.
Types of Protocols:
There are various types of protocols that serve different functions in a network. Some of the most
common include:
o Usage: Whenever you access a website, your browser uses HTTP to request data from
the web server, which then sends the content back to your browser for display.
o Function: Enables the transfer of files between client and server on a network.
o Usage: Often used for uploading or downloading files between a local computer and a
remote server. It is commonly employed in web development when updating website
files or sharing large files.
o Usage: TCP is used in applications where accurate data transmission is crucial, such as
web browsing, file transfers, and emails. It establishes a connection, checks for errors,
and ensures data is delivered in the correct order.
o Usage: Commonly used for real-time applications where speed is more important than
reliability, such as video streaming, online gaming, and voice-over IP (VoIP) calls.
o Function: Enables the transfer of files between client and server on a network.
o Usage: Used in various network environments where large files need to be uploaded or
downloaded, especially for backup solutions or exchanging data between different
systems.
o Usage: Most commonly used in office and home networks to automatically configure IP
addresses for devices such as computers, smartphones, or printers, allowing them to
communicate on the network without manual configuration.
o Usage: Whenever a user types a website URL into a browser, DNS is used to resolve the
domain name to the corresponding IP address so the browser can connect to the web
server hosting that site.
8. IP (Internet Protocol):
o Usage: The core protocol that directs data from one device to another by identifying
each device with an IP address. It is used in every activity on the internet, such as web
browsing, sending emails, and file transfers.
o Usage: When you send an email, SMTP is responsible for routing that message from
your email client (like Outlook or Gmail) to the recipient's email server. It's the backbone
of email transmission.
Usage: Used by websites to secure data exchange, particularly during online transactions, login
processes, or when sending sensitive information. Websites using HTTPS (the secure version of
HTTP) rely on SSL/TLS for encryption.
Purpose of Protocols:
3. Security: Some protocols, like SSL/TLS, include encryption to secure data during transmission.
For instance, when conducting online banking, your information is encrypted to prevent
unauthorized access.
4. Efficiency: Protocols help manage network traffic efficiently by determining packet size,
addressing methods, and routing mechanisms. IP, for example, ensures that data packets are
delivered to the correct destination using the shortest possible route.
Here’s a detailed explanation based on the document you provided about Modulation and Multiplexing
in the context of Computer Communication & Networking (CCN):
Modulation:
Modulation is the technique where an information signal is used to modify a carrier signal. This allows
the information to be transmitted over longer distances and ensures more efficient use of the
communication medium.
Purpose:
o Information signals (like audio or data) are typically low power and cannot be
transmitted over long distances by themselves.
o It also enables the use of smaller antennas since high-frequency signals radiate more
efficiently from smaller antennas.
Types of Modulation:
o In AM, the amplitude of the carrier signal is modified according to the information
signal.
o The required bandwidth is twice the bandwidth of the modulating signal. Since the
spectrum is symmetric around the carrier frequency, one side can be discarded to save
bandwidth.
o Here, the frequency of the carrier signal changes in relation to the information signal.
o In PM, it’s the phase of the carrier signal that changes based on the information signal.
The phase shift results in changes in frequency as well, but they are proportional to the
derivative of the amplitude.
1. Long-Distance Transmission: Modulation makes it easier to transmit signals over long distances
by using high-frequency carrier waves.
Multiplexing:
Multiplexing is a technique used to combine multiple signals for transmission over a single
communication channel or medium. This optimizes bandwidth usage and allows several communication
streams to share the same transmission path.
Purpose:
o As data traffic increases, multiplexing becomes essential to avoid the need for separate
physical links for each signal.
o Multiplexing reduces the cost of communication and makes efficient use of available
bandwidth.
Types of Multiplexing:
o FDM divides the available frequency spectrum into smaller frequency bands, each used
by a different signal.
o Each signal modulates a separate carrier frequency, and the combined signals are
transmitted together.
o Usage: FDM is used in analog communication systems such as radio and television
broadcasting and cable TV systems.
Synchronous TDM: Each signal is given a time slot even if no data is present.
This can lead to inefficiency if some time slots are unused.
Statistical TDM: Time slots are dynamically assigned based on the data's
presence, which improves efficiency.
o CDMA is a multiplexing technique that assigns a unique code to each signal. All signals
are transmitted on the same frequency but are differentiated using their unique codes.
o This allows many signals to share the same bandwidth while minimizing interference.
o Usage: CDMA is widely used in mobile phone networks and wireless communication.
1. Cost Efficiency: Multiplexing reduces the number of physical links needed by allowing multiple
signals to share a single transmission path.
3. Scalability: As the demand for communication increases, multiplexing allows more signals to be
added without requiring additional transmission lines.
Transmission Impairments:
Transmission impairments occur in any communication system and degrade the quality of signals,
whether analog or digital. These impairments can result in the corruption or distortion of data during
transmission.
1. Attenuation:
o Cause: This loss depends on the medium, distance, and frequency of the signal.
o Effect: The received signal must be strong enough to be detected and should be
significantly higher than the noise to avoid errors.
o Solution:
2. Delay Distortion:
o Cause: This impairment is only observed in guided media, such as cables, where the
propagation velocity varies with frequency.
o Effect: In digital signals, delay distortion can cause intersymbol interference, where one
bit spills over into another, leading to errors in data interpretation.
3. Noise:
o Definition: Noise refers to any unwanted or random signal that interferes with the
transmitted information.
o Cause: Noise can enter the communication system through the transmission medium or
can be generated internally by the communication equipment.
o Types of Noise:
Thermal Noise: Also called white noise, it is caused by the random motion of
electrons in a conductor due to heat.
Excess Noise: Also known as flicker noise or pink noise, it is observed at low
frequencies.
o Effect: Noise corrupts the transmitted information, leading to errors in the received
data. The level of noise is crucial in determining the quality of the communication
system.
o Solution: Noise reduction techniques, such as filtering, error correction, and shielding,
can minimize its effect.
Signal-to-Noise Ratio (SNR):
Definition: SNR is a measure of the strength of the signal relative to the noise in the system.
Effect: A higher SNR indicates a better quality signal with less noise. Conversely, a lower SNR
means the signal is heavily affected by noise.
Network Security:
Network security involves safeguarding data and resources in a network from unauthorized access,
misuse, or malicious attacks. It encompasses various services and mechanisms to ensure the
confidentiality, integrity, availability, and authenticity of data.
Security Requirements:
1. Confidentiality:
2. Integrity:
3. Availability:
4. Authenticity:
o Verifies the identity of users or systems to ensure that the data comes from a legitimate
source.
5. Accountability:
o Requires that the actions of entities in the network can be traced uniquely to ensure
responsibility for actions such as non-repudiation and intrusion detection.
o Examples:
o Prevention: Can be mitigated by encryption, but they are difficult to detect since they
don't modify the data.
2. Active Attacks:
o Examples:
o Detection and Recovery: Unlike passive attacks, active attacks can be detected, and
efforts focus on both detection and recovery, though prevention is more challenging.
Encryption Methods:
Encryption is one of the fundamental techniques to safeguard network data and ensure confidentiality.
1. Symmetric Encryption:
o Mechanism: Both the sender and receiver use the same secret key for encryption and
decryption.
o Challenges: Securely sharing and distributing the secret key between parties.
o Attacks:
Brute Force: Attempting every possible key to decrypt the data. Longer key sizes
make brute force attacks infeasible.
o Common Algorithms:
Data Encryption Standard (DES): Uses 56-bit keys and 64-bit blocks, but it has
been broken due to its small key size.
Advanced Encryption Standard (AES): Uses 128, 192, or 256-bit keys and 128-
bit blocks. It is more secure and efficient than DES.
o Mechanism: Involves two keys—a public key (for encryption) and a private key (for
decryption). The public key can be shared openly, while the private key is kept secret.
o Operation:
Message Authentication:
Authentication ensures that messages come from legitimate sources and haven’t been tampered with
during transmission.
o The MAC is generated by applying a secret key to the message, ensuring only the
intended receiver can verify the authenticity.
2. Digital Signatures:
o A digital signature authenticates the origin of a message and ensures the integrity of the
data.
o Operation:
The sender encrypts a hash of the message with their private key.
The recipient decrypts the hash using the sender’s public key to verify the
message's authenticity.
Link Encryption:
o Encrypts all data along the communication links between devices, including headers and
metadata.
End-to-End Encryption:
o Encrypts the data only at the source and decrypts it at the final destination.
o Provides higher security, but does not protect the headers or routing information.
Solution: A combination of both link and end-to-end encryption is often used to maximize security.
Key Distribution:
For symmetric encryption, securely distributing the secret key is crucial. Possible methods include:
1. Direct Distribution: One party selects the key and securely delivers it to the other party.
2. Third-Party Distribution: A trusted third party generates the key and securely delivers it to both
parties.