1.1 What is a computer network?
A computer network is a system in which a number of
independent computers are linked together to share data
and peripherals, such as files and printers. In the
modern world, computer networks have become almost
indispensable.
All major businesses, and governmental and educational
institutions make use of computer networks to such an
extent that it is now difficult to imagine a world without
them.
12/24/23
Definition cont…
2
Networking - the interconnection of workstations, peripherals, terminals and other
devices.
Whatis.com: “In information technology, networking is the construction, design,
and use of network, including the physical (cabling, hub, bridge, switch, router, and
so forth), the selection and use of telecommunication protocol and computer
software for using and managing the network, and the establishment of operation
policies and procedures related to the network.”
12/24/23
Benefits of Network Computing
3
Networks increase efficiency and reduce costs.
Computer networks achieve these goals in four
primary ways:
I. Sharing Information (Or Data)
II. Sharing Hardware (Peripheral Devices)
III. Sharing Programs/Software
IV. Centralizing Administration And Support
12/24/23
1.2. Basics of Data Communication
4
Data transmission is the process of conveying data
between two points by way of a communication
medium. A wide variety of media are available :
Bounded media confine the data to specific physical
pathways. Common examples of bounded media are wire and
optical fiber cables.
unbounded media transmit the data-carrying signal through
space, independent of a cable. Broadcast radio and television
are examples of unbounded media
12/24/23
5
The term communication can be defined as the
process of transferring messages between two entities.
Based on what these two entities are, there are three
basic types of communication:
I. Human-to-Human
II. Computer-to-computer
III. Human-to-Computer
12/24/23
6
In all the three cases, three basic elements
can be identified.
The source (the sender)
The media (the channel)
The destination (the receiver)
12/24/23
1.3 Fundamentals of Information Transmission
media and coding
7
A message should first be encoded in such
a way that it can be transmitted through a
channel (medium), it is then transmitted,
and finally, it is decoded into a form that
can be understood by the destination at the
other end. This holds true for voice
communication, or data communication
12/24/23
8
ion
est inat
D
ding
D eco
n
smissio
Tran
ding
E n co
er
Send
12/24/23
9
Data communication involves transporting
data from one point to another. This is an
instance of computer-to-computer
communication, i.e., both the source and the
destination are computer devices, and the
transmission media may be telephone lines,
satellite links, microwave links, etc.
12/24/23
Transmission Impairment
10
It means that signals that are transmitted at the
beginning of the medium are not the same as the
signals that are received at the end of the medium
that is what is sent is not what is received.
The transmission impairment mainly causes
because of the following reasons.
Attenuation
It is the loss of energy which can be occurred due
to the decrease in signal & increase in the distance.
12/24/23
11
Distortion
Distortion mainly occurs because of the change in
signal shape. This kind of distortion can be observed
from various signals which have different
frequencies.
Every frequency component has its separate
propagation speed because they arrive at a different
time which leads to the delay in distortion.
Noise
When data is transmitted above a transmission
medium, an unwanted signal can be added to it. So
the noise can be created.
12/24/23
Transmission Mode
12
Simplex :
Communication can take place in only one
direction like one-way traffic. Devices
connected to such a circuit are either a send-
only or a receive only device e.g a line
printer. This is very inadequate because the
sender needs an acknowledgement, control
or error signal.
12/24/23
Simplex
13
Sender Receiver
12/24/23
14
HALF-DUPLEX: transmits data in both
directions but only in one direction at a
time. It can alternatively send and receive
data. It requires two wires. It is good for
voice communication because only one
person is supposed to speak at a time.
12/24/23
15
Half-duplex
Sender Receiver
(Sender )
(Receiver)
12/24/23
16
FULL DUPLEX:
It allows information to flow simultaneously in
both directions on the transmission path. It is
an advantage over half-duplex which requires
the lines to be turned-around each time the
direction is reversed and half duplex is
unacceptable in some applications which
require simultaneous transmission in both
directions.
12/24/23
17
Full-duplex
Sender Receiver
and and
Receiver Sender
12/24/23
The Three Mode of Data transmission
18
12/24/23
Elements of Data Communication
19
There are mainly five elements of data communications.
1. message
2. sender
3. receiver
4. transmission medium
5. protocol
The message simply refers to data or piece of information
which is to be communicated.
Sender It is simple a device that sends data message.
12/24/23
Cont’d…
20
Receiver: It is a device that receives message.
Transmission medium: It is physical path by which
data or message travels from sender to receiver.
Protocol: the protocol is a set of rules that govern
data communication.
12/24/23
Protocols and standards
21
A protocol is a set of rules that govern data
communications.
A protocol defines:
what is communicated,
how it is communicated, and
when it is communicated.
12/24/23
Cont’d…
22
The key elements of a protocol are:
syntax, semantics, and timing.
Syntax: structure or format of the data
Semantics: the meaning of each section of bits
Timing : refers to two characteristics: when data should
be sent and how fast they can be sent.
12/24/23
Protocols and standards (cont..)
23
Standards ensure open and competitive market for
equipment manufacturers and in guaranteeing national
and international interoperability of data and
telecommunications technology and processes.
Data communication standards fall into two categories:
de facto (meaning "by fact" or "by convention") and
de jure (meaning "by law" or "by regulation").
12/24/23
Circuit Switching and Packet Switching
24
Circuit Switching
Circuit switching is a switching technique that establishes
a dedicated path between sender and receiver.
In the Circuit Switching Technique, once the connection
is established then the dedicated path will remain to exist
until the connection is terminated.
Circuit switching in a network operates in a similar way
as the telephone works.
A complete end-to-end path must exist before the
communication takes place.
12/24/23
Cont’d…
25
In case of circuit switching technique, when any user
wants to send the data, voice, video, a request signal is
sent to the receiver then the receiver sends back the
acknowledgment to ensure the availability of the
dedicated path.
After receiving the acknowledgment, dedicated path
transfers the data.
Circuit switching is used in public telephone network and
It is used for voice transmission.
Fixed data can be transferred at a time in circuit
switching technology.
12/24/23
Packet Switching
26
The packet switching is a switching technique in which the
message is sent in one go, but it is divided into smaller
pieces, and they are sent individually.
The message splits into smaller pieces known as packets.
Packets are given a unique number to identify their order at
the receiving end.
Every packet contains some information in its headers such
as source address, destination address and sequence
number.
12/24/23
27
Packets will travel across the network, taking the
shortest path as possible.
All the packets are reassembled at the receiving
end in correct order.
If any packet is missing or corrupted, then the
message will be sent to resend the message.
If the correct order of the packets is reached, then
the acknowledgment message will be sent.
12/24/23
Types of Networks
Based on geographical Area
28
Local Area Network
Privately owned
Links the devices in a single office, building, or
campus
Limited in size and distance
Has speed of 100 or 1000 Mbps (today)
12/24/23
Cont’d…
29
A LAN is a high-speed communications system designed
to link computers and other data processing devices
together within a small geographic area such as:
a workgroup, department, or a single floor of a
building.
Several LANs can also be interconnected within a
building or campus of buildings to extend connectivity.
12/24/23
LAN
30
12/24/23
Metropolitan Area Networks (MAN)
31
Is designed to extend over an entire city
It connect a number of LANs in to a larger network
so that resources can be shared LAN-to-LAN as
well as device to device.
Can be wholly owned and operated by a private
company, or it may be a service provided by a
public company, such as a local telephone
company.
12/24/23
Cont’d…
32
12/24/23
Wide Area Network (WAN)
33
Provides long-distance transmission of data, image,
audio, and video information over large
geographic areas that may comprise a country, a
continent, or even the whole world.
12/24/23
Types of Networks
Based on Architecture
34
1. Peer-to-Peer Networks
When LAN and WAN technologies are used, many
computers are interconnected to provide services to their
users.
To accomplish this, networked computers take on different
roles or functions in relation to each other.
Some types of applications require computers to function as
equal partners.
Other types of applications distribute their work so that one
computer functions to serve a number of others in an unequal
relationship.
12/24/23
Cont’d…
35
Two computers generally use request and response
protocols to communicate with each other.
12/24/23
Cont’d…
36
One computer issues a request for a service, and a second
computer receives and responds to that request.
The requestor acts like a client and the responder acts like a server.
In a peer-to-peer network, networked computers act as equal
partners, or peers.
As peers, each computer can take on the client function or the
server function.
Computer A may request for a file from Computer B, which then
sends the file to Computer A.
Computer A acts like the client and Computer B acts like the
server.
At a later time, Computers A and B can reverse roles.
12/24/23
Cont’d…
37
In a peer-to-peer network:
individual users control their own resources.
The users may decide to share certain files with other
users.
The users may also require passwords before they allow
others to access their resources.
Since individual users make these decisions, there is no
central point of control or administration in the network.
In addition, individual users must back up their own
systems to be able to recover from data loss in case of
failures.
12/24/23
Cont’d…
38
When a computer acts as a server, the user of that machine
may experience reduced performance as the machine
serves the requests made by other systems.
Peer-to-peer networks are relatively easy to install and
operate.
No additional equipment is necessary beyond a suitable
operating system installed on each computer.
Since users control their own resources, no dedicated
administrators are needed.
12/24/23
Cont’d…
39
As networks grow, peer-to-peer relationships become
increasingly difficult to coordinate.
A peer-to-peer network works well with ten or fewer computers.
Since peer-to-peer networks do not scale well, their efficiency
decreases rapidly as the number of computers on the
network increases.
Also, individual users control access to the resources on their
computers, which means security may be difficult to maintain.
The client/server model of networking can be used to overcome
the limitations of the peer-to-peer network
12/24/23
2. Client/Server Networks
40
In a client/server arrangement, network services are located on
a dedicated computer called a server.
The server responds to the requests of clients.
The server is a central computer that is continuously available
to respond to requests from clients for file, print, application,
and other services.
Most network operating systems adopt the form of a
client/server relationship.
Typically, desktop computers function as clients and one or
more computers with additional processing power, memory,
and specialized software function as servers.
12/24/23
Cont’d…
41
12/24/23
Cont’d…
42
12/24/23
Cont’d…
43
12/24/23
Cont’d…
44
Servers are designed to handle requests from many clients
simultaneously.
Before a client can access the server resources, the client
must be identified and be authorized to use the resource.
Each client is assigned an account name and password that
is verified by an authentication service.
The authentication service guards access to the network.
With the centralization of user accounts, security, and
access control, server-based networks simplify the
administration of large networks.
12/24/23
Cont’d…
45
The concentration of network resources such as files, printers, and
applications on servers also makes it easier to back-up and maintain the
data.
Resources can be located on specialized, dedicated servers for easier
access.
Most client/server systems also include ways to enhance the network with
new services that extend the usefulness of the network.
The centralized functions in a client/server network has substantial
advantages and some disadvantages.
Although a centralized server enhances security, ease of access, and
control, it introduces a single point of failure into the network.
Without an operational server, the network cannot function at all.
Servers require a trained, expert staff member to administer and maintain.
Server systems also require additional hardware and specialized software
that add to the cost
12/24/23
Advantages and Disadvantages of Peer-to-
Peer and Client/Server Networks
46
12/24/23
Advantage and disadvantage cont…
47
12/24/23
Components of a Network
48
The components required to operate a network can
be divided into two major categories.
1. Hardware 2. Software
The hardware components of a network consist of
the following five items
Server Cabling
Workstation Network Interface Cards (NIC)
A concentrator or wiring center (optional)
12/24/23
Network components (cont…)
49
The software necessary to operate a network consists
of four items
Network operating system
Server software
The operating system of the workstation
Client software
12/24/23
Network components (cont…)
50
Hardware
The Server
The server functions as the central repository
resources/services the network provides.
Usually the server is also responsible for controlling
which users on which computers in the network are
granted access to a service.
Workstations
A place where the services of the server are used
Usually not as good as the server in one way or another
12/24/23
Network components (cont…)
51
Cabling
This is what connects the file server and
workstations. Another phrase for cabling is
transmission media.
There are various types of transmission media,
including coaxial cable, twisted-pair cable (both
shielded and unshielded), and fiber-optic.
12/24/23
Network components (cont…)
52
Network interface card (NIC)
The NIC is located in every workstation on the LAN as
well as in the server.
It is a board that plugs into one of the expansion slots
on the motherboard of a workstation and the server,
thereby providing a connector on the back to hook to
some sort of transmission media (including wireless
media).
Acts as a “transmitter” and “receiver” – transceiver.
12/24/23
Network components (cont…)
53
To accommodate multiple workstations, a hub or central
data collecting area is often used, although certain network
architectures such as linear bus structures do not use hubs
or concentrators.
On certain networks, a hub allows for multiple connections
or splitting of the network cable.
Two types
Hubs: share bandwidth but are cheaper
Switches: conserve bandwidth but are more expensive
12/24/23
Network components (cont…)
54
Software
The Network Operating System
Software that resides on the server.
Controls virtually all the activity on the network.
The NOS manages access to the resource on the
server and handles security of the resources on the
server.
12/24/23
Network components (cont…)
55
The workstation operating system
The operating system software for each workstation is
loaded at the workstation.
This software is essential for the workstation to operate,
even if that workstation is not part of a network
The server software
Usually loaded on the server
Provides an interface through the service given to clients
12/24/23
Network components (cont…)
56
Most popular ones are web server, mail server,
print server, file server, database server, etc.
The client software
Used to access the service given by the server
software on the server
Capable of interfacing with server software
E.g. web browsers, e-mail clients etc
12/24/23
1.4: Network Topologies
57
12/24/23
58
Topology refers to the way in which multiple
devices are interconnected via communication
links.
There are two types of topology: physical and
logical.
Physical topology is the mapping of the nodes
(computers) of a network and the physical
connections between them – i.e., the layout of
wiring, cables, the locations of nodes, and the
interconnections between the nodes and the cabling
12/24/23
59
or wiring system.
Logical topology is bound to network protocols and
describe how data is moved across the network.
There are four main network topologies; bus, ring,
mesh, star, and hybrid.
The following four types of physical topologies
are frequently used in computer networking:
1.Star 2. Bus 3. Ring 4. Hybrid
12/24/23
1. Bus Topology
60
In a bus topology, all devices attach to the same
transmission medium.
The medium has a physical beginning and end.
The terminating resistor prevents data reflections
from coming across as data corruption.
The bus is considered a multipoint system because all
devices tap into the same backbone cable.
12/24/23
61
An important characteristic to remember in bus
topologies is that all data signals are broadcast
throughout the bus structure.
In the following diagram, if node B sends a signal to
node C, the signal propagates for the length of the
cable and is seen by nodes A and D as well.
It is necessary to have an addressing mechanism so
that each node understands which messages it is to
receive and which to ignore.
12/24/23
62
12/24/23
Benefits of Bus topology
63
Cabling costs are minimized because of
the common trunk.
12/24/23
Disadvantages of Bus topology
64
Difficult to trouble shoot because no
central distribution points exist.
Cable breaks can disable the entire
segment because they remove the
required termination from each of the two
cable fragments.
Example: Ethernet, (10Base2)
12/24/23
2. Star Topology
65
In a star topology all stations are wired to a central
wiring concentrator called a hub. Similar to a bus
topology, packets sent from one station to another
are repeated to all ports on the hub. This allows all
stations to see each packet sent on the network, but
only the station a packet is addressed to pays
attention to it.
12/24/23
66
The diagram illustrates a star topology LAN -- which
is a more robust topology than the bus topology. In a
star topology, each station is connected to a central
wiring concentrator, or hub, by an individual length of
twisted pair cable. The cable is connected to the
station's NIC at one end and to a port on the hub at the
other. The hubs are placed in wiring closets centrally
located in a building.
12/24/23
67
12/24/23
Advantages of Stars topology
68
Most modern cabling systems are designed in a star
physical topology. The benefits of the star topology
are:
Each device is isolated on its own cable.
It is a reliable network and easy to modify
Easy to add new workstation.
A node can fail without affecting other nodes
12/24/23
69
Advantage cont…
The hub or switch is slightly more expensive
All data goes through the central point, which can
be equipped with diagnostic devices that make it
easy to trouble shoot and manage the network.
Hierarchical organization allows isolation of traffic
on the channel.
12/24/23
70
Disadvantages of Star topology
Because point-to-point wiring is utilized
for each node, more cable is required.
Hub failures results in a shutdown of the
entire network
12/24/23
71
3. Ring Topology
The ring topology is a physical, closed
loop consisting of point-to-point links.
In the diagram, you can see how each
node on the ring acts as a repeater. It
receives a transmission from the
previous node and amplifies it before
passing it on.
12/24/23
72
12/24/23
73
Benefits of Ring topology
Ring topology has the following
advantage:
Each repeater duplicates the data signals
so that very little signal degradation
occurs.
12/24/23
Disadvantages of Ring topology
74
Ring topology has the following disadvantages:
A break in the ring can disable the entire network. Many
ring designs incorporate extra cabling that can be
switched in if a primary cable fails.
Because each node must have the capability of
functioning as a repeater, the networking devices tend to
be more expensive.
12/24/23
4. Hybrid Topology
75
12/24/23
76
The hybrid topology scheme combines
multiple topologies into one large topology.
The hybrid network is common in large
wide-area networks. Because each topology
has its own strengths and weaknesses,
several different types can be combined for
maximum effectiveness.
12/24/23
Benefits of Hybrid topology
77
Hybrid topology has the following advantages:
One company can combine the benefits of several
different types of topologies.
Workgroup efficiency and traffic can be
customized
12/24/23
Disadvantages of Hybrid
78
topology
The disadvantages of hybrid topology
include the following:
Devices on one topology cannot be
placed into another topology without
some hardware changes
12/24/23
79
12/24/23
80
A reference model is a conceptual blueprint of how
communications should take place. It addresses all
the processes required for effective communication
and divides these processes into logical groupings
called layers. When a communication system is
designed in this manner, it’s known as layered
architecture.
12/24/23
81
Think of it like this: You and some friends want to
start a company. One of the first things you’ll do is
sit down and think through what tasks must be
done, who will do them, the order in which they
will be done, and how they relate to each other.
Ultimately, you might group these tasks into
departments. Let’s say you decide to have an order-
taking department, an inventory department, and a
shipping department. Each of your departments has
its own unique tasks keeping its staff members
busy and requiring them to focus on only their own
duties.
12/24/23
82
In the above scenario, departments as a metaphor
for the layers in a communication system. For
things to run smoothly, the staff of each department
will have to trust and rely heavily upon the others
to do their jobs and competently handle their
unique responsibilities. The communication
processes that are related to each other are bound,
or grouped together, at a particular layer.
The technical term for this idea is called binding.
12/24/23
83
OSI Reference Model:
The Open Systems Interconnection reference
model is a layered, abstract representation created
as a guideline for network protocol design.
The OSI model divides the networking process into
seven logical layers, each of which has unique
functionality and to which are assigned specific
services and protocols.
In this model, information is passed from one layer
12/24/23
84
to the next, starting at the Application layer on the
transmitting host, proceeding down the hierarchy to
the Physical layer, then passing over the
communications channel to the destination host,
where the information proceeds back up the
hierarchy, ending at the Application layer.
Advantages of Reference Models
The OSI model is hierarchical, and the same
benefits and advantages can apply to any layered
12/24/23
85
model. The primary purpose of all such models,
especially the OSI model, is to allow different
vendors’ networks to interoperate.
Advantages of using the OSI layered model
include, but are not limited to, the following:
It divides the network communication process into
smaller and simpler components, thus aiding
component development, design, and troubleshooting.
It allows multiple-vendor development through
standardization of network components.
12/24/23
86
It encourages industry standardization by defining
what functions occur at each layer of the model.
It allows various types of network hardware and
software to communicate.
It prevents changes in one layer from affecting other
layers, so it does not hamper development.
The OSI isn’t a physical model, though. Rather, it’s
a set of guidelines that application developers can
use to create and implement applications that run
on a network. It also provides a framework for
12/24/23
87
creating and implementing networking standards,
devices, and Internetworking schemes.
The OSI has seven different layers, divided into
two groups. The top three layers define how the
applications within the end stations will
communicate with each other and with users. The
bottom four layers define how data is transmitted
end to end.
Understand that the user interfaces with the
12/24/23
88
computer at the Application layer and also that the
upper layers are responsible for applications
communicating between hosts. Remember that
none of the upper layers knows anything about
networking or network addresses. That’s the
responsibility of the four bottom layers.
12/24/23
89
•Data flow is divided into
seven smaller and
manageable steps.
•What devices operate at
each layer.
•As a result, you will
understand how to trouble
shoot network problems.
12/24/23
90
• The U.S. Department of Defense (DoD)
created the TCP/IP reference model
because it wanted a network that could
survive any conditions, even a nuclear war.
•The main purpose was to move packets
from any point to any other point regardless
of the condition of any particular node.
12/24/23
91
12/24/23
Transmission media
92
a transmission medium is a physical path between
the transmitter and the receiver.
Transmission Media is broadly classified into the
following types:
1 Guided
2 unguided
12/24/23
93
Guided Media:
It is also referred to as Wired or Bounded
transmission media. Signals being transmitted are
directed and confined in a narrow pathway by
using physical links.
Features:
High Speed
Secure
Used for comparatively shorter distances
There are 3 major types of Guided Media:
12/24/23
1Coaxial Cable
94
The coaxial cable design has been adapted for different
purposes. Coax is an important type of cable that is
used in wireless and cable access technologies. Coax
cables are used to attach antennas to wireless devices.
The coaxial cable carries radio frequency (RF) energy
between the antennas and the radio equipment.
Coax is also the most widely used media for
transporting high radio frequency signals over wire,
especially cable television signals. Traditional cable
television, exclusively transmitting in one direction,
was composed completely of coax cable.
12/24/23
Coaxial Cable
95
12/24/23
Coaxial …
96
They come in two basic sizes
Thicknet
Has larger diameter
Good noise rejection characteristics
Longer cable run
Difficult to lay the cable
It is rarely used in LANs
Thinnet
Smaller diameter
Relatively flexible, easier to lay the cable
Poor noise rejection
Supports lower bandwidth
No longer in use
12/24/23
2 Fiber Optics
97
It uses the concept of reflection of light through a
core made up of glass or plastic. The core is
surrounded by a less dense glass or plastic covering
called the cladding. It is used for the transmission
of large volumes of data.
The cable can be unidirectional or bidirectional.
The WDM (Wavelength Division Multiplexer)
supports two modes, namely unidirectional and
bidirectional mode.
12/24/23
3Twisted pair
98
This type of copper cable comes in
different formats:
Shielded Twisted Pair (STP)
Unshielded Twisted Pair (UTP)
12/24/23
STP
99
STP cable shields the entire bundle of wires
within the cable as well as the individual wire
pairs. STP provides better noise protection
than UTP cabling, however at a significantly
higher price
12/24/23
Shielded Twisted Pair (STP)
100
12/24/23
UTP
101
UTP is a four-pair wire medium used in a variety of
networks.
each pair of wires is twisted around each other.
This type of cable relies on the cancellation effect
produced by the twisted wire pairs to limit signal
degradation caused by EMI and RFI.
Category 5e is the cable most frequently
recommended and implemented in installations.
Category 6 UTP cables are also available
12/24/23
Unshielded Twisted Pair (UTP)
102
12/24/23
The figure shows some commonly used copper media and
connectors.
103
12/24/23
UTP
104
Advantages
is easy to install
Is less expensive than other types of networking
media.
Has small external diameter
Disadvantages
Error prone
Commonly used connector for LANs is an RJ-45
connector,
12/24/23
UTP connections
105
The transmit pin of the source device needs to
ultimately connect to the receiving pin of the
destination device
There are three types of connections that are used
to connect different devices
Straight Through cables
Crossover Cables
Rollover cables
12/24/23
Straight Through cables
106
Are used to connect dissimilar devices
Switch/Hub to PC
Switch/Hub to Router
Straight Through cable
pin out
12/24/23
Cross over cable
107
Connects
Hub to hub
Switch to switch
PC to PC
PC to Router??
Pin out:
12/24/23
UTP implementation
An RJ-45 connector for UTP cable
RJ stand for Registered Jack
45 refers to the specific wiring sequence
A transceiver converts one type of connection to another
Example: AUI to RJ-45, coax, or fibre optic connector
Crossover Straight-through
Switch to router
Switch to switch Router to router
Switch to PC or server
Switch to hub PC to PC
Hub to PC or server
Hub to hub Router to PC ???
X to no X
108 12/24/23
Rollover Cable
109
Connects
A PC with console port of a router
Also called Console Cable
Pin-out:
12/24/23
Fiber Optic Cables
110
Light rays are transmitted through the core
Two types of cable
Multimode and Singlemode fiber cables
12/24/23
Fiber Cable
111
Unguided Media
112
It is also referred to as Wireless or Unbounded
transmission media. No physical medium is required
for the transmission of electromagnetic signals.
Features:
The signal is broadcasted through air
Less Secure
Used for larger distances
There are some types of Signals transmitted through
unguided media:
12/24/23
1 Radiowaves
113
These are easy to generate and can penetrate
through buildings. The sending and receiving
antennas need not be aligned. Frequency
Range:3KHz – 1GHz. AM and FM radios and
cordless phones use Radio waves for transmission.
12/24/23
2 Microwaves
114
It is a line of sight transmission i.e. the sending and
receiving antennas need to be properly aligned with
each other. The distance covered by the signal is
directly proportional to the height of the antenna.
Frequency Range:1GHz – 300GHz. These are
majorly used for mobile phone communication and
television distribution.
12/24/23
3 Infrared
115
Infrared waves are used for very short distance
communication. They cannot penetrate through
obstacles. This prevents interference between
systems. Frequency Range:300GHz – 400THz. It is
used in TV remotes, wireless mouse, keyboard,
printer, etc.
12/24/23
End of Chapter One
116
12/24/23
117
End of Chapter One
Thank You !
12/24/23