Unit2 (Latest) 2
Unit2 (Latest) 2
Communication
What is a WAN?
• 1970s
• Large organisations to have a single computer with TIME SHARING OS allowing individual users access
through terminals connected through cables. Such large organisations would be connected with other
organisations through telephone infrastructure forming a Wide Area Network.
• Today
• Organisations (like banks) connected various branches or sites with the help of a dedicated NETWORK
connected through fibre optics. The communication between these branches is handled by switches. Sites
have access to WAN but NOT the individual users.
Why use WANs?
• For running JOBs on a remote computer.
• For DATA STORAGE AND BACK UPs on a remote computer.
• For sending messages to a remote computer.
What is a LAN?
• 1980s
• Personal Computers allowed users to have their separate computer at their own desk. But to be able to
share some resources* they needed to be connected to each other. This gave rise to what we know as a
Local Area Network (LANs are PCs connected to each other within a single site or building)
• Today
• Used to connect (wirelessly or wired) a site or branch while forming part of a larger WAN.
• Each LAN is connected to another LAN using special hardware.
*Why use a LAN?
• LANs can allow for shared resources (and reducing costs) to individual users in a company such as :-
• Application being installed on an APPLICATION SERVER
• Large files being saved on a FILE SERVER.
• A common printer for an entire floor in the form of a PRINT SERVER.
• Mail server, allowing for “paper less” communications.
The Internet:-
• It is a network of networks (LAN(s)àWAN)
• With the rise of mobile devices and wireless
networks the scope of the Internet has enormously
grown.
The Client Server Model/Architecture:-
• The client (end system or web browser) is connected to a
powerful central computer or server (which can be part
of a LAN or a hosted on the Internet).
• The server will provide services to clients (for example by
allowing access to database for e-commerce or financial
transactions).
Repeaters vs Amplifiers
Repeater regenerates the original signal and then retransmits the regenerated signal. It will also
eliminate signal interference while reproducing signal bit by bit. Repeaters are used in fixed
environments such as buildings.
In contract Amplifiers amplifies a signal by increasing its “amplitude”. Furthermore, amplifier
simply increases the power of the entire signal without distinguishing b/w actual data and the
noise it carries. Amplifiers are used in mobile environments such as remote areas.
Twisted Pair
• Copper Transmission medium
• Currently used for telephone headsets and lines as well as ethernet LAN cable.
• Can be shielded (confined in foil or mesh shield to protect against electromagnetic interference) or unshielded (cables
are just twisted together to reduce noise).
Fibre Optic
• Best performance but highest cost.
• A bundled Fibre Optic contains many individual fibres (either glass or plastic).
• Data is transferred via rapid pulses (according to binary value) of light.
• Lesser noise but are more fragile therefore require more shielding. Coaxial
• Provide higher bandwidth and is the technology of choice long distance cabling. Which is • Copper Transmission Medium
why they are considered as a large part of the internet backbone. • Extensively used for cable television companies.
• Not used for long distance telephone cabling.
Infrared:-
• Data transfer is carried out using Infrared light waves.
• Has the highest frequency.
• Highest possibility to attenuation due to which its use is limited indoors.
• Cannot penetrate through walls.
• Mobile devices (PC or smartphone) and peripherals (mouse or keyboard) come equipped with an IrDA
(infra red data association) port for infrared data transfer.
Radio:-
• Radio (such as Broadcast Radio) have the greatest ability to penetrate solid
• Can be used for both transferring signals over long distance (Cellular Radio) as well as short distances
such as within an office or home (Bluetooth or WiFi).
Cellular Radio is an example of BROADCAST radio that is used for mobile communications (such as wireless modems
and cell phones) to transmit voice and digital data.
Microwaves a.k.a Fixed Wireless:-
• Provide high speed transmission between an earth-based station (GPS device or reflective dish) and space station
(satellite) that rely on “line of sight”.
• For best uplink (Earth to Space) and downlink (Space to Earth) transmissions, microwave stations must be
placed on top of buildings to avoid possible obstacles.
• Microwaves are used where installing physical media is difficult or impossible but line of sight is available.
• Wireless LANS
• WIFI (or WLAN some countries) is the term associated to a
wireless ETHERNET.
• The standard uses radio frequencies for data transmissions.
• The central device in WIFI LAN is a Wireless Access Point
(WAP).
• The WAP can communicate with an end system in the WLAN
provided that the end system has a WIRELESS NETWORK
INTERFACE CARD (WNIC).
There may still be some traditional LANs operating now. However, most LANs use a SWITCH now. In a STAR CONFIGURATION with a
SWITCH as the central device each end system is connected to the central device via full duplex connection. Since the link is dedicated there
are no chances of collisions and that is why CSMA/CD is not needed anymore. Because there might be high levels of activity the switch
needs to be able to store an incoming message in a buffer until the cable is free for the transmission to take place
The Internet Infrastructure:-
Calling the Internet another WAN give us very little idea of its complexity. The Internet is the biggest internetwork in existence. Moreover, it
operates as a WHOLE (one entity). Interestingly, The Internet is still evolving.
Internet Service Providers:-
Due to it’s immense size and constantly evolving state, one of the drawbacks of the Internet is
that there is no defined structure. However, if there some implementation of Hierarchy, it is in
the form of Internet Service Providers (ISPs).
By simple logic, an ISP is a company that provides internet access. The most common ISPs are
the ones that deliver Internet connectivity to your home. In reality, ISPs operate in three Tiers.
Tier 1 (Backbone) Tier 2 (Middle Tier) and Tier 3 (Access Tier). Connections between ISPs are
handled by Internet Exchange Points or IXPs (location where different ISPs meet to exchange
local traffic via a switch)
Tier 1:-
This tier exchanges traffic with other tier1’s through what is known as “peering
agreements” (backbones agree to exchange content amongst each other thereby allowing
global coverage).
These are more commonly known as the Backbones. They are responsible for
contributing to internet infrastructures such as the Internet sea cables (under water
fibres). Tier 1 ISPs provide traffic to other Tier ISPs and NOT to end users.
Without them Internet traffic cannot be exchanged between continents and countries.
Examples:- Hibernia Networks, Cogent Communications, Level 3 Communications
Tier 2:-
Tier 3:-
Tier 2 ISPs primarily connect the Tier 3s with
Tier 3 ISPs solely rely on
the Tier 1s. They operate on peering agreements
purchasing internet transit and
as well as purchasing Internet Transit (data
delivering it to homes and
being carried from one network or provider to
businesses. Tier 3 operate strictly
another and being charged according to the
on a purchasing model.
amount of data).
Examples:- Verizon and Comcast.
Examples:- British Telekom, Vodafone, Easynet
Router:-
The Internet can also be seen as a series of connections that used to carry out most of the traffic. These connections comprise of under
sea fibre optics connected via nodes forming a “mesh” structure. At these nodes is a device known as a “Router”.
These routers not only provide the general mesh for Internet communications but also for connectivity within an ISP network.
Each router is connected to several other routers and its function (apart from connectivity) is to also find the best possible route for a
transmission. More details of the working of a router will be discussed later in this course.
PSTN (Public Switched Telephone Network):-
- Is the basis for the original Internet infrastructure.
- In early stages of networking the telephone network only provided transmission of analogue voice data.
- For digital data to be communicated between computers both sender side and receiving side were equipped with “modems”
(modulator/demodulator).
- The internet services were provided via a “dial up network” that provided modest speeds to end users. For organisations, a leased line
was provided for higher speeds.
Cell Phone Network:-
There is an alternate method for Internet Access for devices with cell phone capability. Mobile Phone companies act as ISPs and cellular
devices connect to a cell tower to access the wireless telephone network that in turn connects the device to the internet.
Applications that make use of the Internet
What is the World Wide Web?
The Internet and WWW are often considered the same (huge misconception). The Internet is a Network of Networks (Internetwork). Whereas
the WWW is a distributed application that runs on the Internet which connects millions of webpages with each other by extensively using
hyper linking.
Cloud Computing
An alternate approach is a PUBLIC CLOUD which is created, owned and managed by a third-
Cloud Computing is the process of providing
party cloud service provider. (Amazon, Google, Microsoft).
computing services to an end user via the
1. Is accessible using your browser making it easily accessible from anywhere using any device by
Internet.
any individual person or organisation.
PRIVATE CLOUD:- 2. Implemented on very large mainframe computers or server farms. They have massive amounts
1. Created, maintained and installed of available space allowing for easy scalability.
on-site only. Access is granted
through private network. The main advangtage of using Public Cloud is its versatility and “pay as you go” structure that
2. Installation in on-site but creation allows customers the provision of more capacity on demand. However, one disadvantage related to
and maintenance is outsourced to the use of a public cloud system is it’s lack of privacy. The cloud service provider has complete
a third party. access to all data stored on the cloud. This means that the user cannot be sure if their data is
3. Outsourced and accessible via the hidden from third parties. Moreover, the user is stricly relying on the cloud service provider with
Internet (not on-site). Access to respected to the security of their data.
only authorized users. The services provided by the cloud can be categorised in the following manner:-
A Private Cloud usually exists behind a • Infrastructure Provision (IAAS)
firewall and offer better security and • Platform Provision (PAAS)
control but are expensive. • Software Provision (SAAS)
001 00010
001 represent LAN 1 00010 represents
workstation 2