This action might not be possible to undo. Are you sure you want to continue?
Coaxial Cable Coaxial cable has traditionally been an important part of the long distance telephone network. Today, it faces increasing competition from optical fiber, terrestrial microwave, and satellite. Using frequency-division multiplexing (FDM), a coaxial cable can carry over 10,000 voice channels simultaneously. Physical Description
Coaxial cable Coaxial cable, like twisted pair, consists of two conductors, but constructed differently to permit it to operate over a wider range frequency. It consists of hollow outer cylindrical conductor that surrounds a single inner wire conductor. The inner conductor is held in place by either regularly spaced insulating rings or a solid dielectric material. The outer conductor is covered with jacket or shield. The physical description is illustrated in figure 5.2. A single coaxial cable has a diameter of from 1 to 2.5cm. Because of its shielded, concentric construction, coaxial cable is much less susceptible to interference and crosstalk than twisted pair. Coaxial cable can be used over long distances and support more stations on a shared line than twisted pair. Coaxial cable is perhaps the most versatile transmission medium and is enjoying widespread use in a wide variety of applications. The most important of these are used in television distribution and Long-distance telephone transmission. Also they find applications in Short-run computer system links and Local area networks. Coaxial cable is spreading rapidly as a means of distributing TV signals to individual homes-cable TV. From its modest beginnings as Community Antenna Television (CATV), designed to provide service to remote areas, cable TV will eventually reach almost as many homes and offices as the telephone. A cable TV system can carry dozens or even hundreds of TV channels at ranges up to a few tens of kilometers. Coaxial cable is also commonly used for short range connections between devices. Using digital signaling, coaxial cable can be used to provide high-speed I/O channels on computer systems.
Optical Fiber A optical fiber is a thin, flexible medium capable of guiding an optical ray. Total internal reflection is the basic principle on which the transmission of data takes place through fibers. . If the angle of incidence is sufficiently large, then the light in the fiber will reflect repeatedly in the interface between the materials. The fiber need not be straight but can conduct light even when bent. An optical fiber has a cylindrical shape and consists of three concentric sections; the core, the cladding and the jacket. The core is the inner most sections and consists of one or more very thin strands, or fibers, made of glass or plastic and is as shown in Figure 5.5. The core has a diameter in the range of 8 to 100mm. Each fiber is surrounded by its own cladding, a glass or plastic coating that has optical properties different from those of the core. Various glasses and plastics can be used to make optical fibers. The lowest losses have been obtained using fibers of ultra-pure fused silica. Ultra pure fiber is difficult to manufacture; higher loss multi component glass fibers are more economical and still provide good performance. Plastic fiber is even less costly and can be used for short-haul links, for which moderately high losses are acceptable.
. The continuing improvements in performance and decline in prices. and its use in military applications is growing. The outermost layer. abrasion.The interface between the core and cladding acts as a reflector to confine light that would otherwise escape the core. have made it increasingly attractive for LAN. Optical fiber already enjoys considerable use in long-distance telecommunications. crushing and other environmental dangers. together with the inherent advantages of optical fiber. is the jacket. The jacket is composed of plastic and other material layered to protect against moisture. One of the most significant technological breakthroughs in data transmission has been the development of practical fiber optic communication systems. surrounding one or a bundle of cladded fibers.
and how many protocols are being supported. routers use the software-configured network address to make decisions. and it also makes them more complex because they have to work harder to determine the information.fledged computer system with multiple network cards and its own operating system. As a consequence. Packets received on one port may be retransmitted or forwarded on another port. Bridge interconnects two Token Ring LANs : Bridges are networking devices that divide up networks. which can look at the ultimate destination for a packet and analyze the best way to get it there. 3.2. stations on either side of a bridge may be transmitting simultaneously without causing collisions. Bridges Bridges are intelligent devices that operate at layer 2 and are used to interconnect LANs of the same type. which is the number of packets transferred per second from input to output port. the network layer that routes data o different networks. Router performance is measured using its packet. A bridge functions by blocking or forwarding data. Unlike repeaters. Routers operate on Layer 3. A bridge unlike repeaters will not start retransmission until it has received the complete packet. This rate depends on packet size. which use the hardware-configured MAC address to determine the destination of the data. A router is often a full . bridges may provide filtering and forwarding services across the link. What are the functions of (i) Routers (iii) Bridges Answer Router A router is an intelligent packet sorter. based on the destination MAC address written into each frame of data. Also explain the following concepts with respect to Error Detection and Correction: Parity Bits Cyclic Redundancy Check .forwarding rate. Unlike bridges and switches. This approach makes routers more functional than bridges or switches. Define the terms Error Detection and Correction with respect to Data Transmission.
3. by choosing check bits carefully. Hamming Distance: Given any two codewords. The larger the Hamming distance.Answer There are two types of attacks against errors: Error Detecting Codes: Include enough redundancy bits to detect errors and use ACKs and retransmissions to recover from the errors. 5. In general. the better able the code can detect errors. It is used for error detection and is most commonly used as Error correction is relatively expensive (computationally and in bandwidth). However. each character in ASCII systems) so that the number of 1 bits always adds up to an even (odd) number. we can determine how many of the bits differ. 2. yielding an n = (m+r)-bit codeword. the resulting codewords will have a large Hamming Distance. Data is 1000000 After using even parity the code becomes 10000001 2. Using this technique the receiver acknowledges correctly received frames and discards incorrect ones. 4. If the total number of bits including the appended bit is even. Error Correcting Codes: Include enough redundancy to detect and correct errors. no matter how large the message. Significance? If two codewords are d bits apart. Parity Bits parity: A single parity bit is appended to each data block (e.g. A code's Hamming Distance is defined as the minimum Hamming Distance between any two of its legal codewords (from all possible codewords). For example. the parity bit appended is called odd parity of even parity: 1. Simply exclusive or (XOR) the two words. the parity bit appended is called even parity. d errors are required to convert one to the other. If the total number of bits including the appended bit is odd. Data is 1111101 After using even parity the code becomes 11111010 Error Detection or Cyclic Redundant Code (CRC) The most popular error detection codes are based on polynomial codes or cyclic redundancy codes (CRCs). 10 redundancy bits are required to correct 1 single-bit error in a 1000-bit message. . and count the number of 1 bits in the result. we consider the following some of the terms and conventions used: 1. all possible data words are legal. Similarly. Detection? In contrast. Messages (frames) consist of m data (message) bits and r redundancy bits. To understand and deal with errors. detecting a single bit error requires only a single-bit.
THEN delay one time-slot and start over. THEN transmit. 1-Persistent CSMA : 1-Persistent CSMA is selfish. IF the channel is busy. Non-Persistent CSMA : Non-persistent CSMA is less greedy. The algorithm is given below: • • • Sense the channel. IF the channel is idle. .4. Write notes on (i) Non-Persistent CSMA (ii) 1-Persistent CSMA (iii) P – Persistent CSMA Answer 1. 2. THEN continue to listen until channel is idle. IF the channel is idle. IF the channel is busy. The algorithm is given below: • • • Sense the channel. THEN transmit. 3. THEN wait a random amount of time and start over. If the channel is busy. The algorithm is given below: • • • Sense the channel. THEN with probability p transmit and with probability (1-p) delay for one time slot and start over. Now transmit immediately. IF the channel is idle. P – Persistent CSMA : p – Persistent CSMA is a slotted approximation.
such as the Internet. also perform routing. split data up into packets. Dynamic routing attempts to solve this problem by constructing routing tables automatically. and allowing the network to act nearly autonomously in avoiding network failures and blockages. Circuit switched networks. Explain about Dynamic or Adaptive Routing algorithms with necessary example. such as the voice telephone network. However.5. Dynamic routing dominates the Internet. . in order to find paths for circuits (such as telephone calls) over which they can send large amounts of data without continually repeating the complete destination address. Answer Dynamic or adaptive Routing algorithms in contrast change their routing decisions to reflect changes in topology and usually the traffic as well. one should not suppose that networking technology has developed to the point of the complete automation of routing. Packet-switched networks. based on information carried by routing protocols. each labeled with the complete destination address and each routed individually. the configuration of the routing protocols often requires a skilled touch.
The problem occurs when the network can lose. After each connection is released. it will no longer know which connection identifiers have already been used. The connection establishment protocol introduced by Tomlinson is known as a three way handshake. Putting a hop counter in each packet 3. If a machine crashes and loses its memory. When a connection is released. a new one is generated. Another possibility is to give each connection a connection identifier that is a sequence number incremented for each connection established. 1. Here each time a transport address is needed. each transport entity could update a table listing obsolete connections this scheme has basic flaws: it requires each transport entity to maintain a certain amount of history information indefinitely. Time stamping each packet. Answer Connection establishment Establishing a connection sounds easy but in practice it is not so. This number is chosen by initiating party. Discuss the problems that occur while establishing a connection.6. The Major problem is the existence of delayed duplicates. the address is discarded. store and duplicate packets. Restricted subnet design 2. Another mechanism is to kill off the aged packets. It can be solved in various ways but not of them work satisfactorily. One way is to use throw away transport addresses. This protocol does not require both sides to begin sending with the same sequence number . Packet lifetime can be restricted to a known maximum using one of the following ways.
This action might not be possible to undo. Are you sure you want to continue?