Radio waves, also called radio waves as they were discovered by German physicist Heinrich Hertz in 1888, are electromagnetic waves, that is to say the combined oscillation of an electric field and a magnetic field. Radio waves, infrared, visible light, ultraviolet, X-rays or gamma rays are all examples of electromagnetic waves. [Read more…] about Radio Wave – What is a Radio Wave Transmission?.
Transmission System – What is an Transmission System?
Data transmission can be divided into parallel and serial data transmission. [Read more…] about Transmission System – What is an Transmission System?
Data Communication Software
Now, in wider sense we may understand that a transmitter or sender may be a terminal (computer) responsible for with communication and application software controls the terminal and processes data. There may be more than one terminal connected to the sender. [Read more…] about Data Communication Software
Frequency Shift Keying (FSK)
In “frequency shift keying (FSK)”, the frequency of a sinusoidal carrier is shifted between two discrete values. One of these frequencies (f1) represents a binary “1” and the other value (f0) represents a binary “0”. The representation of digital data using FSK is as shown in Fig. Note that there is no change in the amplitude of the carrier. [Read more…] about Frequency Shift Keying (FSK)
Amplitude Shift Keying (ASK)
Amplitude Shift Keying (ASK) is the simplest type of digital CW modulation. Here the carrier is a sinewave of frequency fc. We can represent the carrier signal mathematically as follows: [Read more…] about Amplitude Shift Keying (ASK)
Multicasting – What is Multicasting?
The broadcast systems generally allow the possibility of addressing a packet to all destinations by using a special code in the address field. When a packet with this code is transmitted then it is received and processed by every machine on the network. This mode is called broadcasting. [Read more…] about Multicasting – What is Multicasting?
Buffering – What is Buffering in Internet?
When data is sent to the receiver, flow control should be carried out so that the flow of data does not overwhelm the receiver. Any receiving device has a limited speed at which it can process the incoming data and a limited amount of memory to store the incoming data. The receiving device should be able to inform the sending device before these limits are reached so that the transmission is stopped or reduced, temporarily. [Read more…] about Buffering – What is Buffering in Internet?
Frame Relay – What is Frame Relay?
Frame Relay (frame relay) is a packet switching technology that fragmented into transmission units called frames and sent in high-speed bursts through a digital network. Establishes an exclusive connection during the transmission period called virtual connection. [Read more…] about Frame Relay – What is Frame Relay?
X.25 – What is X.25 Networks?
• X.25 is a standard used by many older public networks specially outside the U.S.
• This was developed in 1970s by CCITT for providing an interface between public packet-switched network and their customers.
• The packet switching networks use X.25 protocol. The X.25 recommendations were first prepared in1976 and then revised in1978,1980 and 1984. [Read more…] about X.25 – What is X.25 Networks?
What is Switched Multimegabit Data Service (SMDS)? Advantages & Disadvantages of SMDS
The Multimegabit Data Switching Service (SMDS) is not a protocol, but rather a “metropolitan area service (MAN).” In essence, it is a method of transmitting ATM cells (Asynchronous Transfer Mode) through a shared bus. First used in 1992, it obtained its support when the Regional Bell Operating Companies (RBOC) and other local communication service providers (LEC) began to feel competitive pressure from long-distance communication companies (IXC) in local markets and considered that the best defense against competition was a high-speed data transmission system. SMDS, thanks to its relatively low cost and high-speed data switching service, seemed the perfect solution and many of the LECs in large metropolitan areas began offering the service. [Read more…] about What is Switched Multimegabit Data Service (SMDS)? Advantages & Disadvantages of SMDS
ARPANET – What is ARPANET?
This may be considered as the breakthrough for many of current ideas, algorithms and Internet technologies. It started Paul Baran in 1960s funded by Advanced Research Projects Agency (ARPA), an organization of the united States Defense Department and, therefore, named as Advanced Research Projects Agency Network (ARPANET) predecessor of the modern Internet. It was world’s first fully operational packet switching computer network and the world’s first successful computer network to implement the TCP/IP reference model that was used earlier by ARPANET, before being used in the Internet. The ARPANET is the first network that planed the seed of interent.
[Read more…] about ARPANET – What is ARPANET?
What is a Wide Area Network (WAN)? – Difference between WAN and LAN
In today’s modern telecommunications, the need to expand networks is rapidly growing. While a LAN can cover most communication and resource sharing needs within a campus or company, WAN connectivity allows users and organizations to take more significant advantage of services such as the Internet, e-commerce, and videoconferencing. [Read more…] about What is a Wide Area Network (WAN)? – Difference between WAN and LAN
What is LAN (Local Area Network) | Definition of LAN
What is lan: It is a privately-owned network and stands for local area network. A network is a group of computers and other devices connected so they can pass information back and forth. The local area network (LAN) is a network which is designed to operate over a small physical area such as an office, factory or a group of buildings up to a few kilometers in size. LANs very widely used in a variety of computers to share resources (e.g., printers) and exchange information. [Read more…] about What is LAN (Local Area Network) | Definition of LAN
Types of Transmission Technology
The transmission means, is that sending a signal from one location to another. Transmission technologies refer to the physical layer protocol such as modulation, demodulation, line coding, error control etc. The transmission technology can be categorized broadly into two types: [Read more…] about Types of Transmission Technology
TFTP – Trivial File Transfer Protocol (TFTP)
• Trivial file transfer protocol (TFTP) is suited for those applications that do not require complex procedures of FTP and do not have enough resources (RAM, ROM) for this purpose. [Read more…] about TFTP – Trivial File Transfer Protocol (TFTP)
SIP- What is the Session Initiation Protocol (SIP)?
• Session Initiation Protocol (SIP) was designed by IETF and is described in RFC 3261. [Read more…] about SIP- What is the Session Initiation Protocol (SIP)?
HTTP Cookie – What is the HTTP cookie?
• Cookie is a special header sent by the server to the client or browser. [Read more…] about HTTP Cookie – What is the HTTP cookie?
WWW Defined – What is the World Wide Web (WWW)?
The WWW is the brainchild of Tim Berners Lee a CERN who had the idea of creating an electronic web of research information. The web is currently the fastest growing Internet information system, with new resources being added regularly. The web relies on a set of protocols, conventions and software to operate. The web is a distributed system of delivering linked documents over the Internet. [Read more…] about WWW Defined – What is the World Wide Web (WWW)?
Digital Signatures- What is Digital Signatures?
• Signature is the proof to the receiver that the document comes from the correct entity. The person who signs it takes the responsibility of the content present in the document. [Read more…] about Digital Signatures- What is Digital Signatures?
SHA-1 – What is Secure Hash Algorithm-l (SHA-1)?
• Security Hash Algorithm (SHA) was developed in 1993 by the National Institute of Standards and Technology (NIST) and National Security Agency (NSA). [Read more…] about SHA-1 – What is Secure Hash Algorithm-l (SHA-1)?
Cryptography – What is Cryptography?
• Cryptography is a technique to provide message confidentiality.
• The term cryptography is a Greek word which means “secret writing”. [Read more…] about Cryptography – What is Cryptography?
Network Security Services– What is Network Security Services?
Network security can provide the following services related to a message and entity. [Read more…] about Network Security Services– What is Network Security Services?
Network Security – What is Network Security Threats?
• Computer Security means to protect information. It deals with prevention and detection of unauthorized actions by users of a computer. [Read more…] about Network Security – What is Network Security Threats?
Flooding – What is flooding?
Flooding is the static routing algorithm. In this algorithm, every incoming packet is sent on all outgoing lines except the line on which it has arrived.
One major problem of this algorithm is that it generates a large number of duplicate packets on the network.
Several measures are takes to stop the duplication of packets. These are:
1. One solution is to include a hop counter in the header of each packet. This counter is decremented at each hop along the path. When this counter reaches zero the packet is discarded. Ideally, the hop counter should become zero at the destination hop, indicating that there are no more intermediate hops and destination is reached. This requires the knowledge of exact number of hops from a source to destination.
2. Another technique is to keep the track of the packed that have been flooded, to avoid sending them a second time. For this, the source router put a sequence number in each packet it receives from its hosts. Each router then needs a list per source router telling which sequence numbers originating at that source have already been seen. If an incoming packet is on the list, it is not flooded.
3. Another solution is to use selective flooding. In selective flooding the routers do not send every incoming packet out on every output line. Instead packet is sent only on those lines which are approximately going in the right direction.
Tunneling – What is Tunneling?
• Tunneling is an internetworking strategy that is used when source and destination networks of same type are connected through a network of different type. [Read more…] about Tunneling – What is Tunneling?
Quality of Service (QOS)
The notion of quality of service, or QoS, concerns certain characteristics of a network connection under the sole of the network service provider liability.
A QoS value applies to the whole of a network connection. It must be identical at both ends of the connection, even if it is supported by several interconnected subnetworks each offering different services.
QoS is described by parameters. Defining a QoS parameter indicates how to measure or determine its value, mentioning if necessary the events specified by the network service primitives.
Two types of QoS parameters have been defined:
• Those whose values are transmitted peer users via the Network service during the establishment phase of the network connection. During this transmission, a tripartite negotiation can take place between users and the network service provider to define a value for the QoS parameters.
• Those whose values are transmitted or negotiated between users and network service provider. For these QoS parameters, it is possible to obtain, by local means, information on the value to the supplier and values to each user of the network service.
The main QoS parameters are:
• Time of establishment of the network connection. Is the time that elapses between a network connection request and confirmation of the connection? This QoS parameter indicates the maximum time acceptable to the user.
• Probability of failure of the establishment of the network connection. This probability is established from the applications which have not been met in the normal time limit for establishing the connection.
• Flow data transfer. The flow rate defines the number of bytes transported over a network connection in a reasonably long time (a few minutes, a few hours or days). The difficulty in determining the speed of a connection network comes from the asynchronous transport packets. To obtain a value acceptable, observe the network on a sequence of several packages and consider number of bytes of data transported taking into account the elapsed time since the application or the data transfer indication.
• Transit time when transferring data. The transit time corresponds to elapsed time between a data transfer request and indicating transfer of data. This transit time is difficult to calculate because of the geographical distribution ends. The satisfaction of a quality service on the transit time may moreover contradict flow control.
• Residual error rate. Is calculated from the number of packets that arrive erroneous, lost or duplicated on the total number of transmitted packets. It is a rate Error packet. Also denotes the probability that a packet does not arrive correctly to the receiver.
• Transfer Probability incident. Is obtained by the ratio of the number of incidents listed on the total number of transfer taken. To have a correct estimate of this probability, just consider the number of network disconnection relative to the number of transfer taken.
• Probability of failure of the network connection. Is calculated from the number of release and resetting of a network connection based on the number of transfer made.
• Release time the network connection. This is the maximum acceptable delay between a disconnection request and the actual release.
• Probability of failure upon release of the network connection. The number Liberation of failure required by the total number requested release.
The following three additional parameters used to characterize the quality of Service:
• Protection of the network connection. Determines the probability that the network connection be in working order throughout the period when it is opened by the user. There is ways to protect a connection by duplicating or having a Backup connection ready to be opened in case of failure. The value for a telephone network is 99.999%, the so-called five nines, equivalent to a few minutes of downtime per year. The protection is much lower for an IP network, with a value of the order of 99.9%, three or nine. This value arises besides problem for IP telephony, which requires stronger protection telephone connections.
• Priority of the network connection. Determines priority of access to a connection network, the holding priority of a network connection and priority of data connection.
• Maximum acceptable cost. Determines if the network connection is tolerable or not. The definition of the cost is quite complex since it depends on the use of resources for the establishment, maintenance and release of the connection network.
Flow Characteristics
Traditionally, four types of characteristics are attributed to a flow: reliability, delay, jitter and bandwidth.
Reliability
• Reliability is an important characteristic of flow.
• Lack of reliability means losing a packet or acknowledgement which then requires retransmission.
• However, the sensitivity of application programs to reliability is not the same. For example, it is more important that electronic mail, file transfer, and internet access have reliable transmissions than audio conferencing or telephony.
Delay
• Source to destination delay is another flow characteristic.
• Applications can tolerate delay in different degrees.
• In this case, telephony, audio conferencing, video conferencing and remote log in need minimum delay while delay in file transfer or e-mail is less important.
Jitter
• Jitter is defined as the variation in delay for packets belonging to the same flow.
• High Jitter means the difference between delays is large and low jitter means the variation is small.
• For example, if four packets depart at times 0, 1,2,3 and arrive at 20, 21,22, 23, all have same delay, 20 units of time. On the other hand, if the above four packets arrive at 21,23,21, and 28 they will have different delays of21, 22, 19 and 24.
Bandwidth
• Different applications need different bandwidths.
• In video conferencing we need to send million of bits per second to refresh a colour screen while the total number of bits in an email may not reach even a million.
DVMRP – What is DVMRP (Distance Vector Multicast Routing Protocol)?
• The distance vector multicast routing protocol is multicast routing protocol that takes the routing decision based upon the source address of the packet. [Read more…] about DVMRP – What is DVMRP (Distance Vector Multicast Routing Protocol)?
IGMP – What is Internet Group Management Protocol (IGMP)?
• Internet Group Management Protocol is a group management protocol that mainly manages the group membership in a multicast network. [Read more…] about IGMP – What is Internet Group Management Protocol (IGMP)?