Module 1 -- Computer Networks


Index

  1. What is a Computer Network?
  2. Types of Topologies in Computer Networks
  3. 1. Point-to-Point Topology
  4. 2. Mesh Topology
  5. 3. Star Topology
  6. 5. Ring Topology
  7. 6. Tree Topology
  8. 7. Hybrid Topology
  9. Protocols used in Computer Networks
  10. 1. Hypertext Transfer Protocol(HTTP)
  11. 2. Transmission Control Protocol (TCP)
  12. Manchester encoding vs Differential Manchester Encoding
  13. The OSI Model
  14. Layers of the OSI Model
  15. Transmission Media
  16. 1. Guided Media
  17. 2. Unguided Media
  18. Devices that work in the layers of the OSI Model
  19. 1. Repeater (Physical Layer)
  20. 2. Hub (Physical Layer)
  21. 3. Bridge (Physical and Data Link Layer)
  22. 4. Switch (Data Link Layer)
  23. LAN Local Area Network
  24. Wireless Lan (Wi-Fi or WLAN)
  25. Connecting LANs
  26. Virtual LAN (VLAN)

What is a Computer Network?

A computer network is a system of interconnected computing devices that allow them to communicate, share resources, and exchange data using established protocols.

Key Elements:


Types of Topologies in Computer Networks

Connection Topologies

https://www.geeksforgeeks.org/types-of-network-topology/

Network topology refers to the arrangement of different elements like nodes, links, or devices in a computer network. Common types of network topology include bus, star, ring, mesh, and tree topologies, each with its advantages and disadvantages. In this article, we will discuss different types of network topology in detail.

1. Point-to-Point Topology

Point-to-point topology is a type of topology that works on the functionality of the sender and receiver. It is the simplest communication between two nodes, in which one is the sender and the other one is the receiver. Point-to-Point provides high bandwidth.

Pasted image 20250319143017.png


2. Mesh Topology

In a mesh topology, every device is connected to another device via a particular channel. Every device is connected to another via dedicated channels. These channels are known as links. In Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration Protocols), DHCP (Dynamic Host Configuration Protocol), etc.

Pasted image 20250319143121.png

Suppose, the N number of devices are connected with each other in a mesh topology, the total number of ports that are required by each device is N-1.

So if there are 6 devices in this case, each device will need 5 ports.

Advantages of Mesh Topology

Disadvantages of Mesh Topology

A common example of mesh topology is the internet backbone, where various internet service providers are connected to each other via dedicated channels. This topology is also used in military communication systems and aircraft navigation systems.


3. Star Topology

In Star Topology, all the devices are connected to a single hub through a cable. This hub is the central node and all other nodes are connected to the central node. The hub can be passive in nature i.e., not an intelligent hub such as broadcasting devices, at the same time the hub can be intelligent known as an active hub. Active hubs have repeaters in them. Coaxial cables or RJ-45 cables are used to connect the computers. In Star Topology, many popular Ethernet LAN protocols are used as CD(Collision Detection), CSMA (Carrier Sense Multiple Access), etc.

Pasted image 20250319143421.png

Advantages of Star Topology

Disadvantages of Star Topology

A common example of star topology is a local area network (LAN) in an office where all computers are connected to a central hub. This topology is also used in wireless networks where all devices are connected to a wireless access point.


4. Bus Topology

Bus Topology is a network type in which every computer and network device is connected to a single cable. It is bi-directional. It is a multi-point connection and a non-robust topology because if the backbone fails the topology crashes. In Bus Topology, various MAC (Media Access Control) protocols are followed by LAN ethernet connections like TDMAPure Aloha, CDMA, Slotted Aloha, etc.

Pasted image 20250319143629.png

Advantages of Bus Topology

Disadvantages of Bus Topology


5. Ring Topology

In a Ring Topology, it forms a ring connecting devices with exactly two neighboring devices. A number of repeaters are used for Ring topology with a large number of nodes, because if someone wants to send some data to the last node in the ring topology with 100 nodes, then the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are used in the network.

The data flows in one direction, i.e. it is unidirectional, but it can be made bidirectional by having 2 connections between each Network Node, it is called Dual Ring Topology. In-Ring Topology, the Token Ring Passing protocol is used by the workstations to transmit the data.

Pasted image 20250319144151.png

Pasted image 20250319144454.png

The most common access method of ring topology is token passing.

Advantages of Ring Topology

Disadvantages of Ring Topology


6. Tree Topology

Tree topology is the variation of the Star topology. This topology has a hierarchical flow of data. In Tree Topology, protocols like DHCP and SAC (Standard Automatic Configuration) are used.

Pasted image 20250319144644.png

In tree topology, the various secondary hubs are connected to the central hub which contains the repeater. This data flow from top to bottom i.e. from the central hub to the secondary and then to the devices or from bottom to top i.e. devices to the secondary hub and then to the central hub. It is a multi-point connection and a non-robust topology because if the backbone fails the topology crashes.

Advantages of Tree Topology

Disadvantages of Tree Topology

A common example of a tree topology is the hierarchy in a large organization. At the top of the tree is the CEO, who is connected to the different departments or divisions (child nodes) of the company. Each department has its own hierarchy, with managers overseeing different teams (grandchild nodes). The team members (leaf nodes) are at the bottom of the hierarchy, connected to their respective managers and departments.


7. Hybrid Topology

Hybrid Topology is the combination of all the various types of topologies we have studied above. Hybrid Topology is used when the nodes are free to take any form. It means these can be individuals such as Ring or Star topology or can be a combination of various types of topologies seen above. Each individual topology uses the protocol that has been discussed earlier.

Pasted image 20250319144921.png

Advantages of Hybrid Topology

Disadvantages of Hybrid Topology

A common example of a hybrid topology is a university campus network. The network may have a backbone of a star topology, with each building connected to the backbone through a switch or router. Within each building, there may be a bus or ring topology connecting the different rooms and offices. The wireless access points also create a mesh topology for wireless devices. This hybrid topology allows for efficient communication between different buildings while providing flexibility and redundancy within each building.


Protocols used in Computer Networks

https://www.geeksforgeeks.org/types-of-network-protocols-and-their-uses/

How do Network Protocols Work?

It is essential to understand how devices communicate over a network by recognizing network protocols. The Open Systems Interconnection (OSI), the most widely used model, illustrates how computer systems interact with one another over a network. The communication mechanism between two network devices is shown by seven different layers in the OSI model. Every layer in the OSI model works based on different network protocols. At every layer, one or more protocols are there for network communication. To enable network-to-network connections, the Internet Protocol (IP), for instance, routes data by controlling information like the source and destination addresses of data packets. It is known as a network layer protocol.

(We will study OSI model after this section)

Types of Network Protocols

In most cases, communication across a network like the Internet uses the OSI model. The OSI model has a total of seven layers. Secured connections, network management, and network communication are the three main tasks that the network protocol performs. The purpose of protocols is to link different devices.

The protocols can be broadly classified into three major categories:

In module 1 we will only study the protocols related to Network Communication.

1. Hypertext Transfer Protocol(HTTP)

HTTP stands for “Hypertext Transfer Protocol.” It is a set of rules for sharing data on the World Wide Web (WWW). HTTP helps web browsers and servers communicate, allowing people to access and share information over the internet.

Key Points

What is HyperText?

Data such as text, images, and other multimedia files are shared on the World Wide Web.

Working of HTTP

First of all, whenever we want to open any website we first open a web browser after that we will type the URL of that website (e.g., www.facebook.com ). This URL is now sent to the Domain Name Server (DNS). Then DNS first checks records for this URL in their database, and then DNS will return the IP address to the web browser corresponding to this URL. Now the browser is able to send requests to the actual server.

After the server sends data to the client, the connection will be closed. If we want something else from the server we should have to re-establish the connection between the client and the server.

Pasted image 20250319145622.png

What is an HTTP Request?

HTTP request is simply termed as the information or data that is needed by Internet browsers for loading a website. This is simply known as HTTP Request.

There is some common information that is generally present in all HTTP requests. These are mentioned below.

HTTP Request Headers

HTTP Request Headers generally store information in the form of key-value and must be present in each HTTP Request. The use of this Request Header is to provide core information about the client’s information, etc.

HTTP Request Body

HTTP Request Body simply contains the information that has to be transferred. HTTP Request has the information or data to be sent to these browsers.

What is HTTP Response?

HTTP Response is simply the answer to what a Server gets when the request is raised. There are various things contained in HTTP Response, some of them are listed below.

Pasted image 20250319152324.png

HTTP Response Headers

HTTP Response headers are simply like an HTTP Request where it has that work to send some important files and data to the HTTP Response Body.

HTTP Response Body

HTTP Responses are the responses that are received successfully upon the request. Generally, it comes under the requests generated by the web. In most cases, the request is to transfer the HTML data into a webpage.

What is an HTTP Status Code?

HTTP Status Codes are the 3-digit codes that tell the message or simply tell us about the HTTP Request whether it has been completed or not. There are simply 5 types of status codes.


2. Transmission Control Protocol (TCP)

The TCP/IP model is a fundamental framework for computer networking. It stands for Transmission Control Protocol/Internet Protocol, which are the core protocols of the Internet. This model defines how data is transmitted over networks, ensuring reliable communication between devices. It consists of four layers: the Link Layer, the Internet Layer, the Transport Layer, and the Application Layer. Each layer has specific functions that help manage different aspects of network communication, making it essential for understanding and working with modern networks.

What Does TCP/IP Do?

The main work of TCP/IP is to transfer the data of a computer from one device to another. The main condition of this process is to make data reliable and accurate so that the receiver will receive the same information which is sent by the sender. To ensure that, each message reaches its final destination accurately, the TCP/IP model divides its data into packets and combines them at the other end, which helps in maintaining the accuracy of the data while transferring from one end to another end.

Difference Between TCP and IP

Feature TCP (Transmission Control Protocol) IP (Internet Protocol)
Purpose Ensures reliable, ordered, and error-checked delivery of data between applications. Provides addressing and routing of packets across networks.
Type Connection-oriented Connectionless
Function Manages data transmission between devices, ensuring data integrity and order. Routes packets of data from the source to the destination based on IP addresses.
Error Handling Yes, includes error checking and recovery mechanisms. No, IP itself does not handle errors; relies on upper-layer protocols like TCP.
Flow Control Yes, includes flow control mechanisms. No
Congestion Control Yes, manages network congestion. No
Data Segmentation Breaks data into smaller packets and reassembles them at the destination. Breaks data into packets but does not handle reassembly.
Header Size Larger, 20-60 bytes Smaller, typically 20 bytes
Reliability Provides reliable data transfer Does not guarantee delivery, reliability, or order.
Transmission Acknowledgment Yes, acknowledges receipt of data packets. No

Layers of TCP/IP Model

OSI vs TCP

Pasted image 20250319153720.png


More protocols are on https://www.geeksforgeeks.org/types-of-network-protocols-and-their-uses/


Manchester encoding vs Differential Manchester Encoding

https://www.youtube.com/watch?v=3IaB2a8tXLA&list=PLxCzCOWd7aiGFBD2-2joCpWOLUrDLvVV_&index=8

Manchester Encoding

Manchester encoding is a method of data transmission used in computer networks and telecommunications. It works by combining the clock and data signals into one stream, making it easier to synchronize the data. Each bit of data is represented by a transition; a change from high to low or low to high in the signal. This helps ensure that the data is correctly interpreted by the receiving device. It is widely used in Ethernet technology and other digital communication systems due to its reliability and simplicity.

Pasted image 20250320214710.png

This is how 1 and 0 are represented in Dr. Thomas' Manchester Encoding.

Pasted image 20250320215106.png

And this is how the IEEE 8.02 convention works for Manchester Encoding.

So Manchester Encoding was all about state changes, or vertex points, representing either 1 or 0, depending on the convention.


Differential Manchester Encoding

Pasted image 20250320215520.png

This is how 1s and 0s are represented in Differential Manchester Encoding.

Differential Manchester encoding works on representing "edge" transitions. That a 1 or 0 is categorized as a signal goes to a high or low, not after it reaches a high or low as it was in the normal Manchester Encoding.


The OSI Model

https://www.geeksforgeeks.org/open-systems-interconnection-model-osi/

The OSI (Open Systems Interconnection) Model is a set of rules that explains how different computer systems communicate over a network. OSI Model was developed by the International Organization for Standardization (ISO). The OSI Model consists of 7 layers and each layer has specific functions and responsibilities. This layered approach makes it easier for different devices and technologies to work together. OSI Model provides a clear structure for data transmission and managing network issues. The OSI Model is widely used as a reference to understand how network systems function.

Pasted image 20250319154757.png

Layers of the OSI Model

There are 7 layers in the OSI Model and each layer has its specific role in handling data. All the layers are mentioned below:

1. Physical Layer

Pasted image 20250319181004.png


Pasted image 20250319214259.png


3. Network Layer

Pasted image 20250319214345.png


4. Transport Layer

Pasted image 20250319214400.png


5. Session Layer

Pasted image 20250319214428.png


6. Presentation Layer

Pasted image 20250319214455.png


7. Application Layer

Pasted image 20250319214511.png


How the Layers Work Together


Devices that work in the layers of the OSI Model

1. Repeater (Physical Layer)

https://www.youtube.com/watch?v=mf4bRP_puNQ&list=PLxCzCOWd7aiGFBD2-2joCpWOLUrDLvVV_&index=11

Pasted image 20250320220818.png

1. Role and Operation at the Physical Layer


2. Purpose of Using Repeaters


3. Difference Between a Repeater and an Amplifier


4. Characteristics of Repeaters


5. Collision Domain Considerations


2. Hub (Physical Layer)

https://www.youtube.com/watch?v=3N5a9cHYzCM&list=PLxCzCOWd7aiGFBD2-2joCpWOLUrDLvVV_&index=12

Pasted image 20250321144842.png

A hub is a basic networking device that, much like a repeater, operates at the physical layer of the OSI model. It’s often described as a "multiport repeater" because its main function is to broadcast signals it receives to all other connected ports. Here’s a detailed breakdown of how a hub works and its role in computer networks:


1. Operating Principle


2. How a Hub Works


3. Comparison with Other Devices


4. Practical Implications and Limitations


3. Bridge (Physical and Data Link Layer)

https://www.youtube.com/watch?v=dDP36_ZBs6A&list=PLxCzCOWd7aiGFBD2-2joCpWOLUrDLvVV_&index=13

Bridge in Computer Networks

A bridge is a network device that operates at the data link layer (Layer 2) of the OSI model. Unlike hubs and repeaters, which function at the physical layer and do not manage traffic intelligently, a bridge filters, forwards, and manages network traffic based on MAC addresses. This makes bridges a crucial component in improving network efficiency and reducing congestion.


1. What is a Bridge?

Pasted image 20250321214310.png

A bridge is a networking device that connects two or more LAN segments and filters traffic based on MAC addresses. Its primary function is to reduce collisions by dividing a single large network into smaller segments.

Example Use Case:

Imagine you have two separate LAN segments in an office. Instead of making all devices share the same network (causing collisions and congestion), you can use a bridge to connect them while keeping their traffic separate unless communication is required between the segments.


2. How Does a Bridge Work?

A bridge operates as follows:

  1. Listening & Learning (MAC Address Table Building)

    • When a bridge is first connected, it operates in a learning mode, where it listens to incoming frames and records the source MAC addresses in a table (MAC Address Table or Filtering Table).
    • It keeps track of which MAC address belongs to which network segment.
  2. Filtering & Forwarding

    • If a frame arrives at the bridge, it checks the destination MAC address:
      • If the destination MAC address is in the same segment:
        → The bridge blocks the frame from being forwarded (reducing unnecessary traffic).
      • If the destination MAC address is in another segment:
        → The bridge forwards the frame only to the required segment.
  3. Broadcast Handling

    • Bridges do not filter broadcast traffic (e.g., ARP requests), meaning broadcasts will still reach all devices on connected segments.

3. Types of Bridges

There are different types of bridges based on their functionality:

1. Transparent Bridge

2. Source-Route Bridge

3. Translational Bridge


4. Difference Between Bridge, Hub, and Switch

Feature Hub Bridge Switch
OSI Layer Physical (Layer 1) Data Link (Layer 2) Data Link (Layer 2)
Traffic Handling Broadcasts all data Filters and forwards Intelligent forwarding
MAC Address Learning No Yes Yes
Collision Domain Single Multiple Multiple
Broadcast Domain Single Single Multiple
Speed & Efficiency Slow (network congestion) Moderate Fast (less congestion)

5. Advantages of a Bridge

Reduces Collisions: By segmenting a network, it prevents unnecessary traffic.
Improves Network Performance: Ensures only necessary traffic is forwarded.
Works Transparently: No need for manual configuration (for transparent bridges).
Connects Different Media Types: Can bridge different network types (e.g., Ethernet to Wi-Fi).

Disadvantages

Cannot Filter Broadcast Traffic: Broadcasts still pass through bridges, potentially causing congestion.
Limited Scalability: Bridges are effective for small networks but can slow down large networks.
Slower than Switches: Bridges process frames using software, whereas switches use hardware (ASICs), making them faster.


6. Real-World Use of Bridges


4. Switch (Data Link Layer)

https://www.youtube.com/watch?v=vdtqEPKYB5M&list=PLxCzCOWd7aiGFBD2-2joCpWOLUrDLvVV_&index=14

Pasted image 20250321214348.png

What is a Switch in Networking?

A network switch is a device that operates at the Data Link Layer (Layer 2) of the OSI model and is responsible for efficiently forwarding network traffic based on MAC addresses. Unlike hubs and bridges, which flood traffic across all ports, a switch intelligently directs data only to the intended recipient.

Modern Layer 3 switches also have routing capabilities, allowing them to function like routers by making decisions based on IP addresses.


1. How Does a Switch Work?

A switch functions by learning the MAC addresses of connected devices and directing network traffic efficiently. The process involves:

  1. MAC Address Learning

    • The switch maintains a MAC Address Table (MAT) (also called a CAM Table).
    • It listens to incoming frames and records the source MAC address along with the port it came from.
  2. Frame Forwarding

    • When a frame arrives at the switch, it checks the destination MAC address:
      • If the MAC address is known, it forwards the frame directly to the correct port.
      • If the MAC address is unknown, it floods the frame to all ports except the source port (similar to a hub).
  3. Filtering & Collision Prevention

    • Unlike a hub, which sends data to all devices, a switch sends it only where needed, reducing collisions.
    • Each device connected to a switch gets a dedicated bandwidth, improving performance.
  4. Broadcast & Multicast Handling

    • Broadcast frames (e.g., ARP requests) are still sent to all devices in the network segment.
    • Multicast traffic is handled more efficiently than with hubs or bridges.

2. Types of Switches

Switches can be classified based on functionality and layers of operation.

Based on OSI Layer

Switch Type Layer Function
Layer 2 Switch Data Link Layer Works with MAC addresses, forwards Ethernet frames
Layer 3 Switch Network Layer Functions like a router, forwards packets based on IP addresses
Layer 4-7 Switch (Application Switch) Transport/Application Layer Handles QoS (Quality of Service), Load Balancing, and Deep Packet Inspection

Based on Functionality

Type Description
Unmanaged Switch Plug-and-play, no configuration needed, used for small networks
Managed Switch Configurable with VLANs, QoS, SNMP monitoring, used in enterprises
Smart Switch Partially managed, limited settings compared to full-managed switches
PoE Switch (Power over Ethernet) Supplies power to connected devices like IP cameras, VoIP phones, etc.
Stackable Switch Multiple switches act as a single unit, increasing scalability
Modular Switch Expandable with additional network modules

3. Difference Between Switch, Hub, Bridge, and Router

Feature Hub Bridge Switch Router
Layer Physical (Layer 1) Data Link (Layer 2) Data Link (Layer 2) Network (Layer 3)
Traffic Handling Broadcasts all data Filters & forwards Intelligent forwarding Routes packets between networks
MAC Address Learning No Yes Yes No (uses IP addresses)
Collision Domain Single Multiple Multiple Multiple
Broadcast Domain Single Single Multiple (if VLANs used) Multiple
Performance Slow (congestion) Moderate Fast Fastest (for inter-network)
Example Use Case Small home networks Segmenting networks Office networks Connecting different networks (e.g., Internet to LAN)

4. Advantages of a Switch

Reduces Network Congestion: Unlike hubs, switches send data only to the intended recipient.
Improves Bandwidth Efficiency: Dedicated connections prevent bandwidth sharing.
Supports VLANs (Virtual LANs): Managed switches allow for better network segmentation.
Enhanced Security: Can restrict access and filter MAC addresses.
Full-Duplex Communication: Devices can send and receive data simultaneously, unlike half-duplex hubs.

Disadvantages

Higher Cost: More expensive than hubs and bridges.
Limited to LANs: Switches do not route traffic between different networks (unless using Layer 3 switches).
Configuration Complexity: Managed switches require technical knowledge to set up VLANs and security policies.


5. Use Cases of Switches

  1. Enterprise Networks:

    • Managed switches are used for efficient data handling.
    • VLANs separate departments for security and performance.
  2. Data Centers:

    • High-performance Layer 3 switches connect multiple servers.
    • Load balancing helps optimize server traffic.
  3. Home and Small Office Networks:

    • Unmanaged switches expand network ports for devices like PCs and printers.
  4. VoIP & IP Camera Systems:

    • PoE switches power devices like security cameras and VoIP phones.
  5. Gaming & High-Speed Networks:

    • Switches with low latency ensure fast data transfers for gaming and video streaming.

Router (Physical, Data Link and Network Layer)

https://www.youtube.com/watch?v=JhBnOamc_8s&list=PLxCzCOWd7aiGFBD2-2joCpWOLUrDLvVV_&index=15

A router is a networking device that primarily operates at the Network Layer (Layer 3) of the OSI model, and sometimes even higher layers. Its main purpose is to direct data packets between different networks by determining the best path for the data to travel. Here’s an in-depth explanation of routers and how they function:

Pasted image 20250322123840.png


1. What is a Router?


2. How Does a Router Work?

  1. Packet Reception:
    When a data packet arrives at a router, it is first received on one of the router’s interfaces (ports).

  2. Header Inspection:
    The router reads the packet's header to extract the destination IP address.

  3. Routing Table Lookup:
    Using its routing table, which is a database of possible paths, the router determines the next hop or the best exit interface for forwarding the packet.

    • Static Routing: Routes are manually configured by a network administrator.

    • Dynamic Routing: Routes are automatically learned and updated using routing protocols.

  4. Packet Forwarding:
    After determining the optimal path, the router forwards the packet to the next network node or directly to its final destination if it is directly connected.

  5. Network Address Translation (NAT):
    Routers, especially those in home or small office networks, often perform NAT to allow multiple devices with private IP addresses to share a single public IP address for internet access.


3. Types of Routers


4. Key Functions and Features


5. Routers vs. Other Networking Devices

Feature Hub Bridge Switch Router
OSI Layer Physical (Layer 1) Data Link (Layer 2) Data Link (Layer 2) Network (Layer 3)
Traffic Handling Broadcasts all data Filters based on MAC addresses Forwards intelligently based on MAC addresses Routes packets based on IP addresses
Intelligence None Limited (MAC filtering) Moderate (MAC learning) High (routing algorithms, NAT, ACLs)
Network Segmentation No Yes (splitting collision domains) Yes (VLAN support) Yes (different subnets/networks)
Use Case Small, simple networks Connecting LAN segments Efficient LAN communication Connecting and managing multiple networks

6. Real-World Applications of Routers


How does the routing table of a router work?

A router’s routing table is essentially its “map” of the network. It stores the paths that data packets should take to reach different network destinations. Here’s a detailed explanation of how it works:


1. Components of a Routing Table

A typical routing table entry includes:


2. How the Routing Table is Used

  1. Packet Reception:
    When a router receives a packet, it looks at the destination IP address in the packet’s header.

  2. Longest Prefix Match:
    The router searches the routing table for the most specific entry that matches the destination IP address. This is known as the “longest prefix match” rule:

    • For example, if there are entries for both 192.168.1.0/24 and 192.168.0.0/16, and the destination IP is 192.168.1.50, the /24 entry is more specific and will be used.
  3. Route Selection:
    Based on the lookup:

    • The router identifies the next hop (the next router or destination) and the interface through which to forward the packet.

    • It also considers the metric to choose the best possible route if there are multiple matches.

  4. Packet Forwarding:
    The router sends the packet out through the identified interface toward the next hop. This process is repeated at each router until the packet reaches its final destination.


3. Dynamic vs. Static Routing


4. Routing Protocols and Updates


5. Key Functions of a Routing Table


Transmission Media

https://www.geeksforgeeks.org/types-transmission-media/

Transmission media refers to the physical medium through which data is transmitted from one device to another within a network. These medium can be wired or wireless. The choice of medium depends on factors like distance, speed, and interference. In this article, we will discuss the transmission media.

Pasted image 20250319211715.png

1. Guided Media

1. Twisted Pair Cable

It consists of 2 separately insulated conductor wires wound about each other. Generally, several such pairs are bundled together in a protective sheath. They are the most widely used Transmission Media. Twisted Pair is of two types:

Pasted image 20250319211811.png

Advantages of Unshielded Twisted Pair

Disadvantages of Unshielded Twisted Pair

Shielded Twisted Pair (STP): Shielded Twisted Pair (STP) cable consists of a special jacket (a copper braid covering or a foil shield) to block external interference. It is used in fast-data-rate Ethernet and in voice and data channels of telephone lines.

Advantages of Shielded Twisted Pair

Disadvantages of Shielded Twisted Pair

Pasted image 20250319212451.png


2. Coaxial Cable

Coaxial cable has an outer plastic covering containing an insulation layer made of PVC or Teflon and 2 parallel conductors each having a separate insulated protection cover. The coaxial cable transmits information in two modes: Baseband mode(dedicated cable bandwidth) and Broadband mode(cable bandwidth is split into separate ranges). Cable TVs and analog television networks widely use Coaxial cables.

Pasted image 20250319212540.png

Advantages of Coaxial Cable

Disadvantages of Coaxial Cable


3. Optical Fiber Cable

Optical Fibre Cable uses the concept total internal reflection of light through a core made up of glass. The core is surrounded by a less dense glass or plastic covering called the coating. It is used for the transmission of large volumes of data. The cable can be unidirectional or bidirectional. The WDM (Wavelength Division Multiplexer) supports two modes, namely unidirectional and bidirectional mode.

Pasted image 20250319212646.png

Advantages of Optical Fibre Cable

Disadvantages of Optical Fibre Cable

Applications of Optical Fibre Cable


2. Unguided Media

1. Radio Waves

Radio waves are easy to generate and can penetrate through buildings. The sending and receiving antennas need not be aligned. Frequency Range:3KHz – 1GHz. AM and FM radios and cordless phones use Radio waves for transmission.

Types of Radio Waves:

Radio Wave Components:

Pasted image 20250319212842.png


2. Microwaves

It is a line of sight transmission i.e. the sending and receiving antennas need to be properly aligned with each other. The distance covered by the signal is directly proportional to the height of the antenna. Frequency Range:1GHz – 300GHz. Micro waves are majorly used for mobile phone communication and television distribution.

Advantages:

Disadvantages:

Pasted image 20250319213046.png


3. Infrared

Infrared waves are used for very short distance communication. They cannot penetrate through obstacles. This prevents interference between systems. Frequency Range:300GHz – 400THz. It is used in TV remotes, wireless mouse, keyboard, printer, etc.

Pasted image 20250319213119.png


Difference Between Radio Waves, Micro Waves, and Infrared Waves

Basis Radiowave Microwave Infrared wave
Direction These are omni-directional in nature. These are unidirectional in nature. These are unidirectional in nature.
Penetration At low frequency, they can penetrate through solid objects and walls but high frequency they bounce off the obstacle. At low frequency, they can penetrate through solid objects and walls. at high frequency, they cannot penetrate. They cannot penetrate through any solid object and walls.
Frequency range Frequency range: 3 KHz to 1GHz. Frequency range: 1 GHz to 300 GHz. Frequency range: 300 GHz to 400 GHz.
Security These offers poor security. These offers medium security. These offers high security.
Attenuation Attenuation is high. Attenuation is variable. Attenuation is low.
Government License Some frequencies in the radio-waves require government license to use these. Some frequencies in the microwaves require government license to use these. There is no need of government license to use these waves.
Usage Cost Setup and usage Cost is moderate. Setup and usage Cost is high. Usage Cost is very less.
Communication These are used in long distance communication. These are used in long distance communication. These are not used in long distance communication.

LAN : Local Area Network

A Local Area Network (LAN) is a network that interconnects devices within a limited geographic area—typically a home, office, or campus. LANs are designed for high-speed communication and resource sharing (like printers, files, and applications) among connected devices.

Key Characteristics:

Pasted image 20250319213540.png


Wired LAN (also known as Ethernet)

https://www.geeksforgeeks.org/what-is-ethernet/

A Wired LAN uses physical cabling (such as Ethernet cables) to connect devices. This is the traditional method of establishing LAN connectivity.

Features:

Common Components:


Wireless Lan (Wi-Fi or WLAN)

Overview:
A Wireless LAN uses radio waves instead of cables to connect devices. The most common example is Wi-Fi, which enables devices like laptops, smartphones, and tablets to access the network.

Features:

Common Components:

Pasted image 20250319213939.png


Connecting LANs

Overview:
Connecting LANs can refer to linking different segments or separate LANs together to form a larger network or to allow communication between them. This is important in larger organizations or multi-building campuses.

Methods & Components:

Benefits:


Virtual LAN (VLAN)

Pasted image 20250319214058.png

A Virtual LAN (VLAN) is a logical grouping of devices on one or more physical LANs that are segmented to create separate broadcast domains. Although the devices might be connected to the same physical network, VLANs allow network administrators to partition the network logically.

Key Characteristics:

Implementation Techniques:


Multiplexing Techniques (Bandwidth Utilization)

Multiplexing is a technique that allows multiple signals or data streams to be combined and transmitted simultaneously over a single communication channel. This maximizes the use of the available bandwidth.

a. Frequency Division Multiplexing (FDM)

b. Time Division Multiplexing (TDM)

c. Wavelength Division Multiplexing (WDM)


Spread Spectrum

Spread spectrum is a method used primarily in wireless communications to spread the transmitted signal over a wider bandwidth than the minimum required. This technique enhances security and resistance to interference.

Key Concepts

Spread spectrum techniques are critical for modern wireless communication standards because they improve both performance and security.