Internet Infrastructure

Possibly to most important foundation block of Internet Infrastructure is the Network. Without a network connection no data can pass over the Internet.

The Internet: Computer Network Hierarchy
Every computer that is connected to the Internet is part of a network. For example, you may use a modem to connect to an Internet Service Provider(ISP). When you connect to your ISP, you become part of their network. The ISP may then connect to a larger network and become part of their network. The Internet is simply a network of networks. DNS is an Internet service that translates domain names/hostnames to IP addresses and IP addresses to their associated domain names/host names. DNS helping each visitor refer to the desired website only by typing its alpha-numeric name (domain name) in the browser instead of its real numeric system name (IP address).


Internet Protocol: IP Addresses
A typical IP address might be 216.27.22.162. Every machine on the Internet has a unique identifying number, called an IP Address. The IP stands for Internet Protocol, which is the language that computers use to communicate over the Internet. A typical IP address is make it easier for us humans to remember, IP addresses are normally expressed in decimal format. The four numbers in an IP address are called octets, because they each have eight positions when viewed in binary form. If you add all the positions together, you get 32, which is why IP addresses are considered 32-bit numbers.

The octets serve a purpose other than simply separating the numbers. They are used to create classes of IP addresses that can be assigned to a particular business, government or other entity based on size and need. The octets are split into two sections: Network and Host. The Network section always contains the first octet. It is used to identify the network that a computer belongs to. Host sometimes referred to as Node is identifies the actual computer on the network. The Host section always contains the last octet.

IP address structure and classification



Class A
Class A addresses are assigned to networks with a very large number of hosts. The high-order bit in a class A address is always set to 0. The next seven bits (completing the first octet) complete the network ID. The remaining 24 bits (the last three octets) represent the host ID. This allows for 126 networks and 16,777,214 hosts per network.



Class B
Class B addresses are assigned to medium-sized to large-sized networks. The two high-order bits in a class B address are always set to binary 1 0. The next 14 bits (completing the first two octets) complete the network ID. The remaining 16 bits (last two octets) represent the host ID. This allows for 16,384 networks and 65,534 hosts per network.
 



Class C
Class C addresses are used for small networks. The three high-order bits in a class C address are set to binary 1 1 0. The next 21 bits (completing the first three octets) complete the network ID. The remaining 8 bits (last octet) represent the host ID. This allows for 2,097,152 networks and 254 hosts per network.


Class D
Class D addresses are reserved for IP multicast addresses. The four high-order bits in a class D address are always set to binary 1 1 1 0. The remaining bits are for the address that interested hosts recognize. Microsoft supports class D addresses for applications to multicast data to multicast-capable hosts on an internetwork.


Class E
Class E is an experimental address that is reserved for future use. The high-order bits in a class E address are set to 1111.

The network ID cannot begin with the number 127. The number 127 in a class A address is reserved for internal loopback functions. For example, 127.0.0.1 is the common loopback address.
·         Loopback means the interface created and designated to test a local port or interface. It routes test messages from their source device back to the source without any processing or modification.
·         The loopback IP address is the address used to access itself. A loopback interface is also known as a virtual IP, which does not associate with hardware interface.
·         The loopback address is used to test network software without physically installing a Network Interface Card (NIC), and without having to physically connect the machine to a TCP/IP network.


Internet Protocol: Domain Name System
Although people can type address information like http://207.241.148.80/ into their Web browser to visit sites, being able to use proper names like http://www.hotmail.com/ is much more practical. When someone types a site's name into their browser, DNS looks up the corresponding IP address for that site, the data required to make the desired network connections between Web browsers and Web servers.

The DNS organizes its servers into a hierarchy. For the Internet, so-called root name servers reside at the top of the DNS hierarchy. The Internet root name servers manage DNS server information for the Web's top-level domains (like ".com" and ".uk"). Servers at the next lower level of the DNS hierarchy track second-level domain names and addresses (like "hotmail.com").

Hierarchy of domain names


ISP
Short for Internet Service Provider, it refers to a computer access to the Internet. The service provider usually provides a software package,username and password. You can then log on to the Internet and browse the World Wide Web and send and receive e-mail. ISPs also serve large companies, providing a direct connection from the company's networks to the Internet. ISPs.

An ISP is a company that provides individuals and other companies access to the Internet and other related services such as Web site building and virtual hosting. An ISP has the equipment and the telecommunication line access required to have a point-of-presence on the Internet for the geographic area served. The larger ISPs have their own high-speed leased lines so that they are less dependent on the telecommunication providers and can provide better service to their customers.


HTTP  (Hypertext Transfer Protocol)
HTTP stands for Hypertext Transfer Protocol. It is an TCP/IP based communication protocol which is used to deliver virtually all files and other data, collectively called resources, on the World Wide Web. These resources could be HTML files, image files, query results, or anything else.Every Web server on the Internet conforms to the hypertext transfer protocol (HTTP). The Hypertext Transfer Protocol (HTTP) is an application-level TCP/IP based protocol with the lightness and speed necessary for distributed, collaborative, hypermedia information systems (internet).

There are three important things about HTTP of which you should be aware:

·         HTTP is connectionless: After a request is made, the client disconnects from the server and waits for a response. The server must re-establish the connection after it process the request.
·         HTTP is media independent: Any type of data can be sent by HTTP as long as both the client and server know how to handle the data content. How content is handled is determined by the MIME specification.
·         HTTP is stateless: This is a direct result of HTTP's being connectionless. The server and client are aware of each other only during a request. Afterwards, each forgets the other. For this reason neither the client nor the browser can retain information between different request across the web pages.

The diagram shows where HTTP Protocol fits in communication:

















Unbound Media

Unbound Media is based on air and implementations including microwave, laser, infrared and radio
Microwaves travels at high frequency than radio waves and provide through put as a wireless network media. Micro wave transmission requires the sender to be inside of the receiver.

Following are the types of Microwaves.
· Terrestrial Micro waves
· Satellite Micro waves

1. Terrestrial Micro waves:
Terrestrial Micro waves are used are used to transmit wireless signals across a few miles. Terrestrial system requires that direct parabolic antennas can be pointed to each other. These systems operate in a low Giga Hertz range. two types of antennas are used for terrestrial microwave communication are parabolic dish and horn antenna.

A parabolic dish antenna is good at catching a wide range of signal waves and directing them to a common point. Every wave that is parallel to the line of sight reflects back to the focus on a common point.

a horn antenna looks like a gigantic scoop that broadcasts the assembled signals that are deflected outward in a series of narrow parallel beams by the curve head. signals are received in a manner similar to the parabolic dish antenna and are deflected down into the stem.



VIDEO!!!



2. Satellite Micro waves
The main problem with aero wave communication is the curvature of the earth, mountains & other structure often block the line of side. Due to this reason, many repeats are required for long distance which increases the cost of data transmission between the two points. This problem is recommended by using satellites.

Satellite micro wave transmission is used to transmit signals through out the world. These system use satellites in orbit about 50,000 Km above the earth. Satellite dishes are used to send the signals to the satellite where it is again send back down to the receiver satellite. These transmissions also use directional parabolic antenna’ with in line of side.

In satellite communication micro wave signals at 6 GHz is transmitted from a transmitter on the earth through the satellite position in space. By the time signal reaches the satellites becomes weaker due to 50,000 Km distance. The satellite amplifies week signals and transmits it back to the earth at the frequency less than 6 GHz.
 


other information.......
WiFi:
Fairly recently the IEEE 802.11 standard became more popular as it suites mobile computing devices really well. The IEEE 802.11 standard is another term for WiFi essentially is wireless networking. This standard allows two computers that have wireless NICs to communicate with one another with no strings (wires) attached. This standard makes use of radio waves that are transmitted through the air to communicate. Speeds of either 54 Mbps or 108 Mbps are supported but higher speeds are in the pipeline.

IEEE (Institute of Electrical and Electronics Engineers).
The IEEE describes itself as "the world's largest technical professional society; promoting the development and application of electro technology and allied sciences for the benefit of humanity, the advancement of the profession, and the well-being of our members." One of the technologies they have developed is known as Ethernet 802 standard which governs local area networks (wired LANs). Ethernet governs the way in which Data Communications are done across the spectrum.

Difference Between 3G And 4G

4G speeds are meant to exceed that of 3G. Current 3G speeds are topped out at 14Mbps downlink and 5.8Mbps uplink. To be able to qualify as a 4G technology, speeds of up to 100Mbps must be reached for a moving user and 1Gbps for a stationary user. So far, these speeds are only reachable with wired LANs.

different:
1. 3G stands for 3rd generation while 4G stands for 4th generation
2. 3G technologies are in widespread use while 4G compliant technologies are still in the horizon
3. 4G speeds are much faster compared to 3G
4. 3G is a mix of circuit and packet switching network while 4G is only a packet switching network

Cellular phone
is a device that can make and receive telephone calls over a radio link whilst moving around a wide geographic area. It does so by connecting to a cellular network provided by a mobile phone operator, allowing access to the public telephone network. By contrast, a cordless telephone is used only within the short range of a single, private base station.
In addition to telephony, modern mobile phones also support a wide variety of other services such as text messaging, MMS, email, Internet access, short-range wireless communications (infrared, Bluetooth), business applications, gaming and photography. Mobile phones that offer these and more general computing capabilities are referred to as smartphones.

Radio frequency (RF) 
is a rate of oscillation in the range of about 3 kHz to 300 GHz, which corresponds to the frequency of radio waves, and the alternating currents which carry radio signals. RF usually refers to electrical rather than mechanical oscillations, although mechanical RF systems do exist

Uplink and downlink
In satellite telecommunication, a downlink is the link from a satellite down to one or more ground stations or receivers, and an uplink is the link from a ground station up to a satellite. Some companies sell uplink and downlink services to television stations, corporations, and to other telecommunication carriers. A company can specialize in providing uplinks, downlinks, or both.
The following table shows the main frequency bands used for satellite links.

Frequency BandDownlinkUplink
C3,700-4,200 MHz5,925-6,425 MHz
Ku11.7-12.2 GHz14.0-14.5 GHz
Ka17.7-21.2 GHz27.5-31.0 GHz

Cabling

Cable is the medium through which information usually moves from one network device to another. There are several types of cable which are commonly used with LANs. In some cases, a network will utilize only one type of cable, other networks will use a variety of cable types. The type of cable chosen for a network is related to the network's topology, protocol, and size. Understanding the characteristics of different types of cable and how they relate to other aspects of a network is necessary for the development of a successful network.

The following sections discuss the types of cables used in networks.
Unshielded twisted pair (UTP) is the most popular and is generally the best option for school networks

Unshielded twisted pair
The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices. The tighter the twisting, the higher the supported transmission rate and the greater the cost per foot. 

Categories of Unshielded Twisted Pair

CategorySpeedUse
11 MbpsVoice Only (Telephone Wire)
24 MbpsLocalTalk & Telephone (Rarely used)
316 Mbps10BaseT Ethernet
420 MbpsToken Ring (Rarely used)
5100 Mbps (2 pair)100BaseT Ethernet
1000 Mbps (4 pair)Gigabit Ethernet
5e1,000 MbpsGigabit Ethernet
610,000 MbpsGigabit Ethernet

Unshielded Twisted Pair Connector

The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a plastic connector that looks like a large telephone-style connector. A slot allows the RJ-45 to be inserted only one way. RJ stands for Registered Jack, implying that the connector follows a standard borrowed from the telephone industry. This standard designates which wire goes with each pin inside the connector.

RJ-45 connector

Shielded Twisted Pair (STP) Cable

Although UTP cable is the least expensive cable, it may be susceptible to radio and electrical frequency interference. If you must place cable in environments with lots of potential interference, or if you must place cable in extremely sensitive environments that may be susceptible to the electrical current in the UTP, shielded twisted pair may be the solution. Shielded cables can also help to extend the maximum distance of the cables.
Shielded twisted pair cable is available in three different configurations:
  1. Each pair of wires is individually shielded with foil.
  2. There is a foil or braid shield inside the jacket covering all wires.
  3. There is a shield around each individual pair, as well as around the entire group of wires.

Coaxial Cable

Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between the center conductor and a braided metal shield. The metal shield helps to block any outside interference from fluorescent lights, motors, and other computers.

Coaxial cable
Although coaxial cabling is difficult to install, it is highly resistant to signal interference. In addition, it can support greater cable lengths between network devices than twisted pair cable. The two types of coaxial cabling are thick coaxial and thin coaxial.
Thin coaxial cable is also referred to as thinnet. 10Base2 refers to the specifications for thin coaxial cable carrying Ethernet signals. The 2 refers to the approximate maximum segment length being 200 meters. In actual fact the maximum segment length is 185 meters. Thin coaxial cable has been popular in school networks, especially linear bus networks.
Thick coaxial cable is also referred to as thicknet. 10Base5 refers to the specifications for thick coaxial cable carrying Ethernet signals. The 5 refers to the maximum segment length being 500 meters. Thick coaxial cable has an extra protective plastic cover that helps keep moisture away from the center conductor. This makes thick coaxial a great choice when running longer lengths in a linear bus network. One disadvantage of thick coaxial is that it does not bend easily and is difficult to install.

Coaxial Cable Connectors

The most common type of connector used with coaxial cables is the Bayone-Neill-Concelman (BNC) connector. Different types of adapters are available for BNC connectors, including a T-connector, barrel connector, and terminator. Connectors on the cable are the weakest points in any network. To help avoid problems with your network, always use the BNC connectors that crimp, rather screw, onto the cable.
Fig. 4. BNC connector

Fiber Optic Cable

Fiber optic cabling consists of a center glass core surrounded by several layers of protective materials. It transmits light rather than electronic signals eliminating the problem of electrical interference. This makes it ideal for certain environments that contain a large amount of electrical interference. It has also made it the standard for connecting networks between buildings, due to its immunity to the effects of moisture and lighting.
Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair. It also has the capability to carry information at vastly greater speeds. This capacity broadens communication possibilities to include services such as video conferencing and interactive services. The cost of fiber optic cabling is comparable to copper cabling; however, it is more difficult to install and modify. 10BaseF refers to the specifications for fiber optic cable carrying Ethernet signals.
The center core of fiber cables is made from glass or plastic fibers. A plastic coating then cushions the fiber center, and kevlar fibers help to strengthen the cables and prevent breakage. The outer insulating jacket made of teflon or PVC.

Fiber optic cable
There are two common types of fiber cables -- single mode and multimode. Multimode cable has a larger diameter; however, both cables provide high bandwidth at high speeds. Single mode can provide more distance, but it is more expensive.


VIDEO!!!!





SpecificationCable Type
10BaseTUnshielded Twisted Pair
10Base2Thin Coaxial
10Base5Thick Coaxial
100BaseTUnshielded Twisted Pair
100BaseFXFiber Optic
100BaseBXSingle mode Fiber
100BaseSXMultimode Fiber
1000BaseTUnshielded Twisted Pair
1000BaseFXFiber Optic
1000BaseBXSingle mode Fiber
1000BaseSXMultimode Fiber


week 6: Network topology

Network topology is the study of the arrangement or mapping of the elements (links, nodes, etc.) of a network, especially the physical (real) and logical (virtual) interconnections between nodes.

Logical topology :
the mapping of the flow of data between the nodes in the network determines the logical topology of the network

Physical topology
Any given node in the LAN will have one or more links to one or more other nodes in the network and the mapping of these links and nodes onto a graph results in a geometrical shape that determines the physical topology of the network

There are several basic types of topology in networks:
1. Bus topology
A linear bus topology consists of a main run of cable with a terminator at each end. All nodes (file server, workstations, and peripherals) are connected to the linear cable.Ethernet and LocalTalk networks use a linear bus topology.The bus cable carries the transmitted message along the cable. As the message arrives at each workstation, the workstation computer checks the destination address contained in the message to see if it matches it's own. If the address does not match, the workstation does nothing more. If the workstation address matches that contained in the message, the workstation processes the message. The message is transmitted along the cable and is visible to all computers connected to that cable.

Advantages of a Linear Bus Topology
  • Easy to connect a computer or peripheral to a linear bus. 
  • Requires less cable length than a star topology.
Disadvantages
  • Entire network shuts down if there is a break in the main cable. 
  • A faulty cable or workstation will take the entire LAN down 
  • terminators are required at both ends of the backbone cable. 
  • Difficult to identify the problem if the entire network shuts down. 
  • Not meant to be used as a stand-alone solution in a large building. 


 2.Star topology 
A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub or concentrator. Data on a star network passes through the hub or concentrator before continuing to its destination. The hub or concentrator manages and controls all functions of the network. It also acts as a repeater for the data flow.This configuration is common with twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable.The protocols used with star configurations are usually Ethernet or LocalTalk.

Advantages
  • Easy to install, and wire. 
  • Easy to add new workstations 
  • No disruptions to the network when connecting or removing devices. 
  • Any non-centralised failure will have very little effect on the network 
  • Easy to detect faults and to remove parts. 
  • Centralized control Centralized network/hub monitoring

Disadvantages
  • Requires more cable length than a linear topology. 
  • If the hub or concentrator fails, nodes attached are disabled. 
  • More expensive than linear bus topologies because of the cost of the concentrators.

3.Star-Wired
A star-wired topology may appear (externally) to be the same as a star topology. Internally, the MAU (multistation access unit) of a star-wired ring contains wiring that allows information to pass from one device to another in a circle or ring. The Token Ring protocol uses a star-wired topology.


4. tree topology 
A tree topology combines characteristics of linear bus and star topologies.It consists of groups of star-configured workstations connected to a linear bus backbone cable. Tree topologies allow for the expansion of an existing network, and enable schools to configure a network to meet their needs.

Advantage
  • Point-to-point wiring for individual segments.
Disadvantages
  • Overall length of each segment is limited by the type of cabling used. 
  • if the backbone line breaks, the entire segment goes down. 
  • More difficult to configure and wire than other topologies.

VIDEO!!!



1. A network interface controller is a computer hardware component that connects a computer to a computer network.Whereas network interface controllers were commonly implemented on expansion cards that plug into a computer bus, the low cost and ubiquity of the Ethernet standard means that most newer computers have a network interface built into the motherboard.


2. A networking operating system (NOS) is the software that runs on a server and enables the server to manage data, users, groups, security, applications, and other networking functions. The network operating system is designed to allow shared file and printer access among multiple computers in a network, typically a local area network (LAN), a private network or to other networks. The most popular network operating systems are Microsoft Windows Server 2003, Microsoft Windows Server 2008, UNIX,Linux, Mac OS X, and Novell NetWare.

3. A network switch or switching hub is a computer networking device that connects network devices. The term commonly refers to a multi-port network bridge that processes and routes data at the data link layer of the OSI model. Switches that additionally process data at the network layer and above are often referred to as layer-3 switches or multilayer switches.

4. REPEATER is a network device used to regenerate or replicate a signal. Repeaters are used in transmission systems to regenerate analog or digital signals distorted by transmission loss. Analog repeaters frequently can only amplify the signal while digital repeaters can reconstruct a signal to near its original quality. In a data network, a repeater can relay messages between sub networks that use different protocols or cable types. Hubs can operate as repeaters by relaying messages to all connected computers. A repeater cannot do the intelligent routing performed by bridges and routers.


5. LocalTalk refers to the physical networking -- that means the built-in controller in many Apple computers, the cables and the expansion cards required on some systems. The "official" Apple cabling system typically uses a "bus topology" where each device in the network is directly connected to the next device in a daisy chain. The illustration on the Farallon book cover below gives an idea of how a bus looks.


6. Token ring local area network (LAN) technology is a local area network protocol which resides at the data link layer (DLL) of the OSI model. It uses a special three-byte frame called a token that travels around the ring. Token-possession grants the possessor permission to transmit on the medium. Token ring frames travel completely around the loop.


7. Ethernet is a family of computer networking technologies for local area networks (LANs) commercially introduced in 1980. Ethernet has largely replaced competing wired LAN technologies.




FOR THE FURTHER INFORMATION, PLZ CLICK:

week 5: Networking



Hey everyone,

This week we will discuss about networking. The lec notes are cover the introduction, importance of networking, network components, methods, networks devices and software. But we just focus about the introduction, types of networking and network components. Others will discuss next week….I think so……….

1st of all, we talk about computer networking. What is computer networking? Computer networking is connecting a computer with other computers or other devices to enable them to communicate with each other such as
· Computer devices/equipments
· transmission media to send/control data/signals,
· Communication devices to transmit/send data from sources to destinations
· Software

Next, is about types of the networking. Common examples of area network types are:

LAN - Local Area Network





WAN - Wide Area Network




PAN - Personal Area Network




MAN - Metropolitan Area Network





Last, is about network components. Network components can be categories into 5. There are terminals, transmission media, network electronics, software and network architecture standards.

1. Terminals & workstation: Normally refers to data sources and destinations. Example: Personal computers, terminals, workstations, computers, Automatic teller machines (ATM)

2. Transmission media: The physical media used to transmit data in a networked environment. It is also use to transmit signal and electrical pulse through a medium. 2 types of transmission media are bounded/guided and unbounded/unguided. Examples of bounded media are twisted pair wire, coaxial cable and fiber optic cables. Examples of unbounded are AM & FM radio, TV broadcasting, satellite communication, microwave radio, infrared signals

3. Network electronic devices are devices that control data transmission from sources to destinations. It also act as interface between different transmission media or communication protocol. For examples: Bridges, concentrators, routers, Front End Processors, Private Branch, Switches Exchange (PBX), Hubs, Multiplexers, and Gateways.

4. Software: At the nodes, it involves techniques and protocols. Functions of the software are measure the data transmits to the destination.

5. Network architecture standards: Architecture is blueprint of standards for a network consisting of items such as choice of media, media interfaces, encoding methods, transmission protocols, routing protocols and so on. It is needed to ensure interoperability between various devices and equipment made by different vendors.




More information:
1. Bridges

A Bridge does just what you would expect it to do - it joins two networks together so as far as data packets are concerned it looks like one large network




A bridge is not as capable as a Router - but it is less expensive.


2. Hub
The network 'Hub' allows computers to share data packets within a network.



Each computer will be connected to a single 'port' on the hub. So if you purchase an '8 port hub', you will be able to connect up to eight computers together.
You can also 'daisy chain' hubs to allow even more computers to join the network.
However there is a problem with doing this - see 'Switches' for more details.



Typical network making use of a hub:



3. Switches
A switch has a number of ports and it stores the addresses of all devices that are directly or indirectly connected to it on each port.
As a data packet comes into the switch, its destination address is examined and a direct connection is made between the two machines.


4. Protocols
A 'protocol' is a rather technical word. But it simply means an agreed method of doing something.
A 'NETWORK PROTOCOL' is the agreed method of communication to be used within the network.
Each device / computer will use this protocol.


5. End nodes

Within a vast computer network, the individual computers on the periphery of the network, those that do not also connect other networks, and those that often connect transiently to one or more clouds are called end nodes. Typically, within the cloud computing construct, the individual user / customer computer that connects into one well-managed cloud is called an end node. Since these computers are a part of the network yet unmanaged by the cloud's host, they present significant risks to the entire cloud. This is called the End Node Problem. There are several means to remedy this problem but all require instilling trust in the end node computer.


6. Gateways
if your computer does not use the AOL protocol (and the chances are it won't). Then how do you get email to your friend on the AOL network?
Answer: A gateway.



A gateway converts the data passing between dissimilar networks so that each side can communicate with each other. i.e converts data into the correct network protocol.
The gateway is a mixture of hardware components and software.
This is unlike a standard 'Bridge' which simply joins two networks together that share the same protocol.


6. Routers
A Router is a device that transfers data from one network to another in an intelligent way. It has the task of forwarding data packets to their destination by the most efficient route.
In order to do this, the router has a micro computer inside it. This holds a table in memory that contains a list of all the networks it is connected to, along with the latest information on how busy each path in the network is, at that moment. This is called the 'routing table'



7. Bluetooth
Bluetooth is a proprietary open wireless technology standard for exchanging data over short distances (using short-wavelength radio transmissions in the ISM band from 2400–2480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. It can connect several devices, overcoming problems of synchronization. The devices can switch roles, by agreement, and the slave can become the master. At any given time, data can be transferred between the master and one other device.
8. Infra-Red
This is a very familiar method of transferring data if you are at all aware of your remote control ! The television remote control makes use of an infra-red link. Personal organisers often make use of an infra-red link to synchronise calendars and 'to-do' lists.



Take a look!!!


week 4: Data communication

hello, everyone.
today we will talk about data communication.



Data Communications
what is data communication? it is the transfer of data or information between a source and a receiver. The source transmits the data and the receiver receives it. The actual generation of the information is not part of Data Communications nor is the resulting action of the information at the receiver. Data Communication is interested in the transfer of data, the method of transfer and the preservation of the data during the transfer process.
MoDem (types of signal)
Modem, device that converts between analog and digital signals. Digital signals, which are used by computers, are made up of separate units, usually represented by a series of 1's and 0's. Analog signals vary continuously; an example of an analog signal is a sound wave.
Modems are often used to enable computers to communicate with each other across telephone lines. A modem converts the digital signals of the sending computer to analog signals that can be transmitted through telephone lines. When the signal reaches its destination, another modem reconstructs the original digital signal, which is processed by the receiving computer.
To convert a digital signal to an analog one, the modem generates a carrier wave and modulates it according to the digital signal. The process of receiving the analog signal and converting it back to a digital signal is called demodulation. The word "modem" is a contraction of its two basic functions: modulation and demodulation.

Amplitude, period, frequency

Amplitude (A): how high the peaks are or how low the troughs are, in meters.
The displacement is how far the wave vibrates / oscillates about its equilibrium (center) position.
Amplitude is correlated with the total energy of the system in periodic motion. Larger amplitude = greater energy.
Period (T): the time it takes for one cycle, in seconds.
Frequency (f): the rate, or how many cycles per second, in Hertz (cycles per second). 

Coaxial Cable

Coaxial Cable consists of 2 conductors. The inner conductor is held inside an insulator with the other conductor woven around it providing a shield. An insulating protective coating called a jacket covers the outer conductor.
The outer shield protects the inner conductor from outside electrical signals. The distance between the outer conductor (shield) and inner conductor plus the type of material used for insulating the inner conductor determine the cable properties or impedance. 
Optical Fibre
Optical Fibre consists of thin glass fibres that can carry information at frequencies in the visible light spectrum and beyond. It made of glass or plastic & transmits signals in the form of light
Advantages-

  • Noise resistance. Light is not affected by electrical or magnetic field. 
  • Less signal attenuation. Transmission distance is further b4 regenerated 
  • Higher bandwidth. Higher data rates 
Disadvantages
  • Fibre-optic cable is expecsive 
  • Fragility. Glass fibre is easy to broken than wire. Making it less useful for applications where handware portability is required.

Data transmissions
The physical connection determines how many bits (1's or 0's) can be transmitted at a single instance of time. If only 1 bit of information can be transmitted over the data transmission medium at a time then it is considered a Serial Communication.

If more than 1 bit of information is transmitted over the data transmission medium at a time then it is considered a Parallel Communication. 




Data Flow
Data flow is the flow of data between 2 points. The direction of the data flow can be described as:
Simplex: data flows in only one direction on the data communication line (medium). Examples are Radio and Television broadcasts. They go from the TV station to your home television.


Half-Duplex: data flows in both directions but only one direction at a time on the data communication line. Ex. Conversation on walkie-talkies is a half-duplex data flow. Each person takes turns talking. If both talk at once - nothing occurs!


Full-Duplex: data flows in both directions simultaneously. Modems are configured to flow data in both directions. 



Modes of Transmitting Data
  • Asynchronous Transmission sends only 1 character at a time. A character being a letter of the alphabet or number or control character. Preceding each character is a Start bit and ending each character is 1 or more Stop bits. For example: for every byte of data, add 1 Start Bit and 2 Stop Bits. 11 bits are required to send 8 bits! Asynchronous is used in slow transfer rates typically up to 56 kbps.
  • Synchronous Transmission sends packets of characters at a time. Each packet is preceded by a Start Frame which is used to tell the receiving station that a new packet of characters is arriving and to synchronize the receiving station's internal clock. The packets also have End Frames to indicate the end of the packet. The packet can contain up to 64,000 bits. Both Start and End Frames have a special bit sequence that the receiving station recognizes to indicate the start and end of a packet. The Start and End frames may be only 2 bytes each

Multiplexing
Multiplexing is the transmission of multiple data communication sessions over a common wire or medium. Multiplexing reduces the number of wires or cable required to connect multiple sessions. A session is considered to be data communication between two devices: computer to computer, terminal to computer,




for further information, you can also view this website
Intro to data communication

music