Chapter-Communication & Networking
Chapter-Communication & Networking
Chapter-Communication & Networking
2.0 Introduction
In this chapter we will know communication systems and its backbone, bandwidth,
different ways of data transmission, medium of data communication, wireless
communication technology with different generation of mobile communication system,
computer networking and its types with their topologies and cloud computation.
Ever since ancient times, people continuously have devised new techniques and
technologies for communicating their ideas, needs and desires to others. Thus, many
forms of communication systems have appeared over the years. The basic motivations
behind each new one were to improve the transmission quality, to increase the
transmission capacity, so that more information could be sent or to increase the
transmission distance.
2-3
Communication Systems and Networking
The transmitter with the help of an antenna produces signals which are carried
through radio carrier wave. The receiver also with the help of an antenna receives
the signal. Some information is unwanted and must be discarded and hence the
electronic filters help in the separation of radio signals from other unwanted
signals which are further amplified to an optimum level Finally the signals are
decoded in an information which can be easily understood by the individuals for
them to respond accordingly.
Hence the communication actually takes place between the speaker and the
receiver simultaneously.
In the Duplex communication system, two devices can communicate with each
other at the same time.
A type of communication system involves the sender and the receiver where the
sender is in charge of sending signals and the recipients only listen to it and
respond accordingly. Such communication is also called Simplex communication
system.
A walkie talkie works on the half duplex communication system. The military
personnel while interacting has to say “Over” for the other person to respond. He
needs to speak the security code correctly for the other person to speak. The other
party will never communicate unless and until the code is correct and complete.
All the above modes of communication work for a common objective ie to transfer the
information from one party to the other party. The various models of communication
system help us to understand the route of flow of information from the sender to the
recipients through some medium.
2-5
Communication Systems and Networking
2.1.2Data Communication
• Delivery: The System must deliver data to the correct destination. Data must be
received by the intended device or user and only by that device or user
• Accuracy: The system must deliver data accurately. Data that have been altered in
transmission and left behind are useless.
• Timeliness: The system must deliver data in a timely manner. Data delivered late
are useless. In the case of video, audio and voice data, timely delivery means
delivering data as they are produced, in the same order that they are produced and
without significant delay. Surely you don’t want to watch last part of the film at
beginning or watch it with missing middle part. This kind of delivery called real-
time transmission.
2-6
Communication Systems and Networking
2.1.3 Bandwidth
Bandwidth is very important for every part of this chapter. In computer networks,
bandwidth is used as a synonym for data transfer rate, the amount of data that can be
carried from one point to another in a given time period (usually a second). Network
bandwidth is usually expressed in bits per second (bps); modern networks typically have
speeds measured in the millions of bits per second (megabits per second, or Mbps) or
billions of bits per second (gigabits per second, or Gbps).
To understand bandwidth you have to understand signal first. An electrical signal takes
the form of a change in voltage or current over time. There are two types of signal:
Analog and Digital. An analog signal’s values are continuous over time. These values
represent a level on some variable, such as voltage or intensity and they range between a
minimum and a maximum value. An analog signal can be periodic or aperiodic. Periodic
signals repeat in a regular pattern; aperiodic signal does not. The repetition behavior of a
periodic signal is measured in cycles per second or hertz (Hz). For example, a 50 Hz
signal repeats its pattern 50 times in a second. Each repetition is a cycle and consists of a
continuous process in which the signal’s value changes continuously from a peak to a
trough and back to the peak.
A digital signal’s possible levels are represented by discrete values within a limited range.
These values are created using sequences of 0 and 1 value. The number of possible values
that can be represented depends on the number of bits that are allocated to represent a
2-7
Communication Systems and Networking
single value. For example, using ten bits, 1024 possible values can be represented.
Following figure: 2 is a representation of a digital signal. It represents 01001100011,
which represented in binary form. In regular or decimal representation it is equivalent to
611.
The signals we consider are usually electromagnetic waves. They propagate at the speed
of light (300,000Km/sec) in the vacuum or slightly slower (200,000Km/sec) in materials.
There are two types of transmission: Baseband and Broadband.
Bandwidth refers to the amount of data, a cable or any medium can carry; measured in
bits per second (bps) for digital signals or in hertz (Hz) for analog signals such as sound
waves. An analog bandwidth is computed by subtracting the lower frequency from the
higher one. For example, the bandwidth of the human voice is roughly 2,700 Hz (3,000
Hz - 300 Hz). Here 3000 Hz is highest frequency and 300 Hz is lowest frequency. In this
chapter we only consider digital bandwidth.
You might hear an advertisement that says, "This computer has a 32-bit or 64-bit Pentium
processor with 1 gigabyte of RAM and 640 gigabyte of hard disk space? Now watch
carefully, sometimes it says bit and sometime byte. Bits and Bytes are common
computing terms that are very confusing for first time. Their representation are quite
similar (e.g. KBps for kilobytes per second and Kbps for kilobits per second) and used in
similar applications, i.e. data transfer or measuring. Then question is: what is the
difference between these? In simple way: "1 Byte = 8 bit". And we also denote them
2-8
Communication Systems and Networking
different ways: "B"(Uppercase) = byte and "b"(Lowercase) = bit. Let’s go a little bit
deeper.
Most of the hard disk manufacturers use decimal form, which is slightly different than
previous one. Now for this case:
1 byte (B) = 8 bits (b) [This is same for all kind of cases]
Now if you buy a new Hard Disk or Pen drive/Flash drive you probably noticed, although
these shops are selling 500 GB hard disk or 8 GB pen drive, but your computer showing
different size, if we say more precisely, it is less than 500 GB or 8 GB. You probably feel
cheated. Are they really cheating or something else? Let’s investigate it right now. We are
going to check it for 8 GB pen drive. According to the modern data storage device
manufactures 1 GB=1,000,000,000 bytes= 1000 MB. So 8 GB=8000 MB as it is a round
figure, but when you connect it to your computer, it calculates as 1KB =1024Bytes,
1MB=1024KB and 1GB=1024MB. So 8GB = 8*1024*1024*1024 Bytes=
8589934592Bytes! So your computer is going to show 589934592Bytes or about 0.5GB
is missing. i.e. you can use about 7.5 GB. If it is a 500 GB hard disk, then you can use
only about 450 GB of storage space. It is a manufacturing parameter. Now you see both
manufacturer and your computer are right. They just calculate it in different ways.
Same kind of ideas goes to your internet speed information. Sometimes you will see some
Internet service providers offers high speed internet like 256K, 512K or 1M connections.
But when you use internet, you only gets 64KB, 128KB and 256KB respectively. The
reason is these company advertise their speed in bit, which is 256Kb/s, 512Kb/s etc. but if
you convert it in byte you will get 64KB/s, 128KB/s as you know 1byte = 8bit. This is
just a business trick.
2.1.4Communication Model
If you wondered how a network works, then you have to understand communication
model. A communication model is a common backbone of any type of communication
system. If you know this model, then you will understand any kind of communication
system. Let’s understand a communication system for an example: by calling a friend of
yours. We are going to help you to call your friend with the help of this model and its
elements. Any communication network has five basic key elements:
• Encoder (Transmitter): As you call your friend, your voice can’t send directly to
your friend over network. Your voice first encoded into some electromagnetic
signal then transmits. This is the job of transmitter. It encodes your voice data
(analogue) into electromagnetic signal (digital) then transmits.
Communication Model
• Decoder (Receiver): As you see your friend can’t understand your voice which is
encoded into electromagnetic signal earlier. So electromagnetic signal needs to
convert into voice data. Well this is the job of receiver, just opposite of
Transmitter. The receiver accepts the signal from the transmission system and
converts it into original voicedata form.
• Destination: This is your friend’s mobile which receives these converted original
voice data. And the reply of your friend, could be done as same way, which is
called ’feedback’.
2 - 11
Communication Systems and Networking
Data transmission refers to the movement of data in form of bits between two or more
digital devices. This transfer of data takes place via some form of transmission media (for
example: coaxial cable, fiber optics etc.). There are mainly two types of transmission:
Parallel Transmission and Serial Transmission.
Parallel Transmission
▪ Asynchronous Transmission
▪ Synchronous Transmission
▪ Isochronous Transmission
of the character. When receiver receives this, then it discards start bit & stop bit and gets
original data.
Asynchronous Transmission
Synchronous Transmission
As you see in following figure, the data blocks are grouped and spaced in regular
intervals as ’data’ and preceded by special characters called ’syn’ or synchronous
characters. After the ’syn’ characters are received by the other device (where we want to
send), they are decoded and used to synchronize the connection. After the connection is
correctly synchronized, data transmission begins and data starts to transmit.
Isochronous Transmission
Isochronous data transfer is commonly used for where data must be delivered within
certain time constraints, like video streaming. Isochronous systems do not have an error
detection mechanism (acknowledgment of receiver) because if an error were detected,
time constraints would make it impossible to resend the data. In this transmission the
clock is provided at a constant rate by a single device for all other devices on the network.
For example from following figure: 8, data must be transmitted in 125µs into all devices
and if one device missed some data bits, then that device never going to get it back again.
The way in which data is transmitted from one place to another is called data transmission
mode. It indicates the direction of flow of information. Sometimes, data transmission
modes are also called directional modes. Different types of data transmission modes are
as follows:
• Simplex Mode
• Half-duplex Mode
• Full-duplex Mode
Simplex Mode: In simplex mode, data can flow in only one direction. In this mode, a
sender can only send data but cannot receive it. Similarly, a receiver can only receive data
but cannot send it. Data sent from CPU/Mainframe to Monitor or Keyboard to CPU is
examples of simplex mode.
2 - 18
Communication Systems and Networking
Simplex Mode
Half-Duplex Mode: In half-duplex mode, data can flow in both directions but only in one
direction at a time. In this mode, data is sent and received alternatively.
Half-Duplex Mode
Full-Duplex Mode: In full duplex-mode, data can flow in both directions at the same
time. The telephone communication system is an example of full-duplex communication
mode where two persons can talk at the same time.
Full-Duplex Mode
According To selection of path in a network i.e. routing, data transmission mode can be
divided into many ways:
2 - 19
Communication Systems and Networking
• Unicast
• Broadcast
• Multicast
• Anycast
• Geocast
Unicast: Think about your classroom with all students. You have a message. You need to
deliver it. If you deliver your message only one of the students, then it is going to be
unicast. Unicast is the term used to describe communication where a piece of information
is sent from one point to another point. In this case there is just one sender and one
receiver.
Broadcast: Now if you deliver your message all the students of the class, then it is
broadcast. Broadcast is the term used to describe communication where a piece of
information is sent from one point to all other points. In this case there is just one sender,
but the information is sent to all connected receivers.
Multicast: Now you have to deliver your message only some students of the class but not
all of them. This is multicast. Multicast is the term used to describe communication where
a piece of information is sent to a set of other points. In this case information is
distributed to a set of receivers. In figure below, sender S transmits data to only three
subscribers (X), among all five of them. So it is multicast.
Anycast: Here you deliver your message to the nearest student to you and then that
informed student deliver message to his nearest student and so on. This is known as
Anycast. Anycast is a communication that takes place over a network between a single
sender and the nearest of a group of receivers.
Geocast
2 - 20
Communication Systems and Networking
The means through which data is transformed from one place to another is called
transmission or communication media. There are two categories of transmission media
used in computer communication:
• Wired/Bounded/Guided media
• Wireless/Unbounded/Unguided media
2.1.7.1 Bounded Media
Bounded media is the physical links through which signals are confined to narrow path.
Bounded media are made up an external conductor (Usually copper) bounded by jacket
material. Bounded media are great for working purpose because they offer high speed,
2 - 22
Communication Systems and Networking
good security and low cost. However, some time they cannot be used due distant
communication. Three common types of bounded media are used for data transmission.
These are:
• Coaxial Cable
• Twisted Pairs Cable
• Fiber Optics Cable
A. Coaxial Cable
Coaxial Cable
• Low cost and easy installation are main characteristics of Coaxial Cable.
• Easy wiring and expansion with medium level EMI immunity makes it excellent
communication medium.
The most popular network cabling is twisted pair. It is light weight, easy to install,
inexpensive and support many different types of network. It also supports the speed of
100 Mbps. Twisted pair cabling is made of pairs of solid copper twisted along each other.
The twists are done to reduce lots of problems like EMI interference. The number of pairs
in the cable depends on the type. There are two types of twisted pairs cabling:
i. Unshielded Twisted Pair (UTP): UTP is more common. It can be either voice grade
(for voice transmission like phone) or data grade (for date transmission like computer
files) depending on the condition. UTP cable normally has an impedance of 100 ohm.
UTP cost less than STP and easily available due to its many use.
Low cost, easy installation with effective EMI immunity is main advantage of UTP cable.
But high attenuation makes it impossible for long distance communication. Usually it has
100 meter limitation. But it is capable of high speed data transmission.
Unshielded Twisted Pair (UTP) Cable Shielded Twisted Pair (STP) Cable
ii. Shielded Twisted Pair (STP): It is similar to UTP but has a mesh shielding that’s
protects it from EMI which allows for higher transmission rate
2 - 24
Communication Systems and Networking
STP has higher capacity than UTP. It has moderate immunity from EMI. It is shielded
and has a faster data transmission rate than UTP and coaxial cable. But it is expensive
comparing UTP and coaxial. Difficult installation and high attenuation are main
disadvantage of STP cable. That’s why it has same 100 meter limitation like UTP.
Fiber optic cable uses electrical signals to transmit data. It uses light. In fiber optic cable
light only moves in one direction for two way communication to take place. So a second
connection must be made between the two devices. A laser at one device sends pulse of
light through this cable to other device. These pulses translated into "1’s" and "0’s" at the
other end.
In the center of fiber cable is a glass stand or core. The light from the laser moves through
this glass to the other device around the internal core is a reflective material known as
CLADDING. No light escapes the glass core because of this reflective cladding. Fiber
optic cable has bandwidth more than 2 Gbps (Gigabits per Second).
2 - 25
Communication Systems and Networking
Unbounded / Unguided media or wireless media doesn’t use any physical connectors
between the two devices. Usually the transmission is send through the atmosphere.
Wireless media is used when a physical obstruction or distance blocks are used with
normal cable media. The three types of wireless media are:
• Radio Waves
• Micro Waves
• Infrared Waves
A. Radio Waves
It has frequency between 10 KHz to 1 GHz. Radio waves has the following types.
• Short waves
• VHF (Very High Frequency)
• UHF (Ultra High Frequency)
i. Short Waves: Short wave transmission can be divided into following categories.
• Low Power, Single Frequency: As the name shows this system transmits from
one frequency and has low power out. Low cost, preconfigured simple installation
with 1Mbps to 10Mbps transmission rate capabilities are its key feature. But high
attenuation and low immunity to EMI are only down point of this medium. The
normal operating ranges of these devices are 20 to 25 meters.
• High Power, Single Frequency: This is similar to low power single frequency.
These devices can communicate over greater distances. Although it is more costly
than low power single frequency but it is easier to install. It has low attenuation
for long distance but low immunity to EMI. It is capable of 1Mbps to 10Mbps
data transmission.
2 - 27
Communication Systems and Networking
B. Micro Waves
Micro waves travels at high frequency than radio waves and provide through put as a
wireless network media. Following are the types of Micro waves.
i. Terrestrial Micro waves: Terrestrial Micro waves are used to transmit wireless signals
across a few miles. Terrestrial system requires that direct parabolic antennas can be
pointed to each other. It is moderately costly and difficult to installation. It has variable
attenuation and low immunity to EMI. It can transmit from 1Mbps to 10Mbps.
ii. Satellite Micro Waves: Satellite micro wave transmission is used to transmit signals
throughout the world. These systems use satellites in orbit about 50,000 Km above the
earth. Satellite dishes are used to send the signals to the satellite where it is again send
back down to the receiver satellite.
In satellite communication micro wave signals is transmitted from a transmitter on the
earth through the satellite position in space. By the time signal reaches the satellites
becomes weaker due to 50,000 Km distance. The satellite amplifies weak signals and
transmits it back to the earth.
It is very costly and very difficult to install. Variable attenuation and low immunity to
EMI are its key point characteristics. And it also needs high security because signal needs
to broadcast here i.e. every receiver receives its signal.
2 - 28
Communication Systems and Networking
C. Infrared Waves
Infrared frequencies are just below visible light. These high frequencies allow high speed
data transmission. This technology is similar to the use of a remote control for a TV.
Infrared transmission can be affected by objects obstructing sender or receiver. Although
it has high immunity to EMI and variable attenuation, its installation is not very easy.
With wide range of cost it has transmission capabilities of 100Kbps to 16Mbps.
In a world of increasing mobility, there is a growing need for people to communicate with
each other and have timely access to information regardless of the location of the
individuals or the information. A phone call placed from a moving train may close a
business deal, remote access to medical records by a doctor may save a life or a request
for reconnaissance updates by a soldier with a handheld device may affect the outcome of
a battle. Each of these instances of mobile communications poses a challenge that can be
met only with an efficient, reliable, wireless communication network. The four key
benefits of wireless technology are:
• You are rarely out of touch - you don’t need to carry cables in order to access
office networks.
• Greater flexibility and mobility for users - people can be networked without sitting
at PC.
A. Bluetooth
The key features of Bluetooth technology are robustness, low power and low cost. The
Bluetooth Specification defines a uniform simple structure for a wide range of devices to
connect and communicate with each other. When two Bluetooth enabled devices connect
to each other, this is called pairing. The structure and the global acceptance of Bluetooth
technology means any Bluetooth enabled device, almost everywhere in the world, can
connect to other Bluetooth enabled devices located in proximity to one another.
Advantages of Bluetooth
• Bluetooth does not require a clear line of sight between the synced devices. This
means that the devices need not be facing each other.
• The fact that this technology requires no cables and wires is something that has
made it so popular.
• One major advantage is its simplicity of use. Anyone can figure out how to set up
a connection and sync two devices with ease. Moreover, the technology is
completely free to use and requires no charges to be paid to any service provider.
2 - 30
Communication Systems and Networking
• The chances of other wireless networks interfering with yours are very low. This
is because of the low-powered wireless signals that the technology adopts, and
also because of something known as frequency hopping.
Disadvantages of Bluetooth
• Though the transfer speeds are impressive at around 25 Mbps, certain other
technologies like Wi-Fi Direct can offer speeds up to 250 Mbps. This is an area
that can be improved upon in the near future.
• Even though the security is good, it is even better on Wi-Fi Direct. This can be
accounted to the (comparatively) larger range of Bluetooth and also to the lack of
a line of sight. Someone who knows how to hack such networks can do so
eventually.
• The battery usage during a single transfer is negligible, but there are some people
who leave the device switched on in their devices. This inevitably eats into the
battery of these devices, and lowers the battery life considerably.
B. Wi-Fi
Wi-Fi (Wireless Fidelity) is the way to connect devices together without wires. Wi-Fi is
often referred to as "wireless internet", because that’s what it is most often used for,
accessing the internet. When you see people surfing the web in a cafe, they’re probably
using Wi-Fi. Wireless technology has widely spread lately and you can get connected
almost anywhere; at home, at work, in libraries, schools, airports, hotels and even in some
restaurants.
Like mobile phones, a Wi-Fi network makes use of radio waves to transmit information
across a network. The computer should include a wireless adapter that will translate data
sent into a radio signal. This same signal will be transmitted, via an antenna, to a decoder
known as the router. Once decoded, the data will be sent to the Internet through a wired
ethernet connection. As the wireless network will work as a two-way traffic, the data
received from the Internet will also pass through the router to be coded into a radio signal
so that it can be used as original form. Areas which are enabled with Wi-Fi connectivity
are known as Hot Spots. The term Hotspot is used to define an area where Wi-Fi access is
available.
The speed of Wi-Fi connection depends on how many other people are connected to the
same "access point." If the coffee shop or airport terminal is crowded, your Wi-Fi internet
2 - 31
Communication Systems and Networking
connection may slow down a bit. There are several different types of Wi-Fi, but the end
result is still the same, wireless communication.
Advantages of Wi-Fi
• The main advantages of using Wi-Fi technology is the lack of wires. This is a
wireless connection that can merge together multiple devices.
• Wi-Fi network is particularly useful in cases where the wiring is not possible or
even unacceptable. For example, it is often used in the halls of conferences and
international exhibitions. It is ideal for buildings that are considered architectural
monuments of history, as it excludes the wiring cables.
• Wi-Fi networks are widely used to connect a variety of devices, not only between
themselves but also to the Internet. And almost all modern laptops, tablets, and
some mobile phones have this feature. It is very convenient and allows you to
connect to the internet almost anywhere, not just where the cables are laid. Today,
you can access the network, for example, being in the park for a walk across the
street or in an airport lounge. The main thing that was available near the point of
Wi-Fi.
• Another advantage can be pretty easy to create a mesh Wi-Fi. To connect a new
device to your network, simply turn on the Wi-Fi and do the simple setting in the
software. In the case of wire technologies still need to pull the wire. Therefore,
many modern offices are switching to this technology.
• Standardization of Wi-Fi technology allows you to connect to the network in any
country, although there are still little features of its application. All equipment
with technology Wi-Fi certified and allows us to achieve high compatibility.
Disadvantages of Wi-Fi
• Call quality is greatly influenced by the environment, is particularly sensitive to
electromagnetic radiation generated by household appliances. This primarily
affects the speed of data transmission.
• Despite the global standardization, many devices from different manufacturers are
not fully compatible, which in turn affects the speed of communication.
• Wi-Fi has a limited radius of action and it is suitable for home networking, which
is more dependent on the environment. For example, a typical home router with
Wi-Fi in the room has a range of up to 45 meters and up to 450 meters outside.
2 - 32
Communication Systems and Networking
• At high density Wi-Fi-points operating in the same or adjacent channels, they can
interfere with each other. This affects the quality of the connection. This problem
is common in apartment buildings, where many residents are using this
technology.
Really Wi-Fi technology is not perfect and has many flaws that limit its use. However,
the benefits of it are much greater. Therefore, every day, this modern technology is
increasingly used and becomes a popular.
C. Wi-MAX
WiMAX stands for Worldwide Interoperability for Microwave Access. Around 2004,
WiMAX technology becomes progressively more discussed. Many experts made claims
about the WiMAX technology, some claimed it would have significantly greater range
than 3G, higher data rates, would be built into all computing devices and as an effect it
would take over the market for 3G like services. WiMAX itself is a 4G technology.
The WiMAX network operates similarly to a Wi-Fi connection, but there are few key
differences. WiMAX transmitters can cover an estimated 30-mile radius whereas Wi-Fi’s
range is about 100 feet. In other words, WiMAX turns many small, scattered hot spots
into one huge wireless hot spot.
WiMAX initially offers up to about 40 Mbps capacity per wireless channel for both fixed
(using at home) and portable (using when moving for example in running vehicle)
applications. WiMAX can support voice and video as well as Internet data.
Advantages of WiMAX
Disadvantages of WiMAX
5. WiMAX is very power intensive technology and requires strong electrical support.
D. Wi-Fi Direct
Wi-Fi CERTIFIED Wi-Fi Direct® is a certification mark for devices supporting a
technology that enables Wi-Fi devices to connect directly, making it simple and
convenient to do things like print, share, sync and display. Products bearing the Wi-Fi
Direct certification mark can connect to one another without joining a traditional home,
office or hotspot network.Wi-Fi Direct allows two devices to establish a direct, peer-to-
peer Wi-Fi connection without requiring a wireless router. Wi-Fi becomes a way of
communicating wirelessly, like Bluetooth.
Mobile phones, cameras, printers, PCs, and gaming devices connect to each other directly
to transfer content and share applications quickly and easily. Devices can make a one-to-
one connection, or a group of several devices can connect simultaneously. Connecting
Wi-Fi Direct-certified devices is easy and simple, with the push of a button, tapping two
NFC-capable devices together, or entering a PIN. Moreover, all Wi-Fi Direct connections
are protected by WPA2™, the latest Wi-Fi security technology. With Wi-Fi Direct, you
do not need an access point or internet connection – your personal Wi-Fi network goes
with you wherever you go.
A set of optional pre-defined services let devices send files, print documents, play media
and display screens between and among devices easily, no matter the vendor. The
standard enhanced services let users “discover, connect and do” in a single step to
perform these common tasks. The new service platform also fosters innovative
development opportunities for new applications to take advantage of direct device-to-
device connections.
2 - 34
Communication Systems and Networking
Mobile communication allows transmission of voice and multimedia data over mobile
device without having connected to any physical or fixed link. Mobile communication is
evolving day by day and has become a must have for everyone. Mobile communication
technologies are not only benefiting businesses to perform their operation faster and
efficiently but also raising the standard of human lives. Although by Mobile
Communication we understand only mobile phone but it also includes other mobile
devices like Notebook, Tablet, and Netbook. But mobile phone networks or cellular
network will be our main concern here for now.
▪ Mobile Phone
▪ Roaming
Roaming refers to the continued data service you get when you go outside of your mobile
operator’s coverage area. This service must be available with your current phone plan.
Domestic roaming is usually free. Unfortunately, international roaming is usually very
costly. You can trigger data roaming fees in several ways: by making or receiving phone
calls, by sending or receiving text (SMS) messages and/or by downloading or uploading
any Internet content (such as emails or accessing web pages).
Before we show you how mobile communication works, you should go back at first of
this chapter and check Network Communication Model again. Because this time, we are
going to show the same example with a little bit details. The area you live in are divided
into ’cells’ of prescribed size and each cell is having one mobile base station which we
call a mobile tower. This is the tower whose signal bar phone shows in screen. When you
turn your mobile on, it keeps on sending signals to nearest mobile base station via
2 - 37
Communication Systems and Networking
microwave transmission. Mobile base station keeps records of SIM and related data of
your mobile into network computer. This is true for every mobile in coverage of that
network tower.
When anyone tries to call anybody in another area, which is also covered by another cell
of network, mobile number data of that person is then constantly transmitted to network
computer of nearest mobile base station of caller. Immediately after verification of the
number, network computer tries to locate the person to whom you are calling via nearest
cell and base station. When your friend is traced by nearest base station, ring is rung on
receiver phone. Let’s tell this by example again with figure. You want to call your friend
Jalil. Now your friend is far away from where you live. Suppose you are in your home
and it is covered by Base Station-1. Your friend Jalil lives in another place which is
covered by Base Station-2. Now when you call Jalil your identity data will be transferred
to Base Station-1 and then forwards to network computer. Network computer will check
your identity, then after verifying it will search your friend Jalil in every cell. When your
friend will be found, it will connect you to your friend. This whole thing is done when
you heard “bipbip” buzzing sound in your phone while trying to call someone.
Now we see when someone receives the call, what will happen? When receiver/friend
picks up the call, base station of receiver and transmitter (you phone works as a
transmitter) creates unique channel between them. When you speak, your voice is
2 - 38
Communication Systems and Networking
converted to analog form by microphone of the mobile. This analog signal is then
converted to digital form and is being sent to nearest mobile base station through
microwave signals. When nearest mobile base station of caller receives microwave
signals, it converts it immediately to digital form and it sends to the receiver’s (your
friend Jalil) nearest mobile phone base station via unique channel that was created earlier.
The whole process is shown below. Now are you seeing any similarity with Network
Communication Model where we explained it earlier with same type of example?
Mobile Communication
Now receiver’s nearest mobile base station transmits the calling data by microwave
signals and these signals are received by phone receiver of your friend to whom you are
calling. Receiver of your friend’s mobile phone then immediately converts that
microwave signals to digital form and then to analog form and so in amplified voice form.
And speaker of that phone speaks that voice of caller. When your friend replies/talks to
you, it then again happens in reverse and your conversation goes on at the same way.
There are several different mobile phone standards. The current and most popular mobile
communications standards are GSM (Global System for Mobile Communications) and
CDMA (Code Division Multiple Access).
2 - 39
Communication Systems and Networking
GSM or global system for mobile communication is a digital cellular system. It was
originated in Finland Europe. However now it is throughout the world. GSM accounts for
80% of total mobile phone technologies market all over the world. There are over more
than 3 billion users of GSM now. The use of GSM is possible due to the SIM (subscribers
identity module) is easy to use, affordable and helps you carry your cell phone
everywhere. Originally GSM is a 2G technology. GSM offers moderate security. It allows
for encryption between the end user and the service base station. This network supports
international roaming, hence is the popular choice among users.
In Bangladesh, mobile operator like Teletalk, Grameenphone, Banglalink, Robi and Airtel
are using GSM service.
Advantages of GSM
• Less signal deterioration inside buildings.
• Ability to use repeaters.
• Talk time is generally higher in GSM phones due to the pulse nature of
transmission.
• The availability of Subscriber Identity Modules allows users to switch networks
and handsets at will, aside from a subsidy lock.
• GSM covers virtually all parts of the world so international roaming is not a
problem.
• The much bigger number of subscribers globally creates a better network effect
for GSM handset makers, carriers and end users.
Disadvantages of GSM
• Interferes with some electronics, especially certain audio amplifiers.
• Intellectual property is concentrated among a few industry participants, creating
barriers to entry for new entrants and limiting competition among phone
manufacturers. Situation is however worse in CDMA-based systems like IS-95,
where Qualcomm is the major IP holder.
• GSM has a fixed maximum cell site range of 120 km, which is imposed by
technical limitations. This is expanded from the old limit of 35 km.
2 - 40
Communication Systems and Networking
In Bangladesh only Citycell offers CDMA service for users. But due to limitation of the
current technology, Citycell plans to go for GSM technology.
module) Card
3 Global market 25% 75%
share
4 Dominance Dominant standard in the U.S. Dominant standard
worldwide except the U.S.
5 Data transfer EVDO/3G/4G/LTE GPRS/E/3G/4G/LTE
6 Network There is one physical channel and a Every cell has a
special code for every device in the corresponding network
coverage network. Using this code, tower, which serves the
the signal of the device is mobile phones in that
multiplexed, and the same physical cellular area.
channel is used to send the signal.
7 International Less Accessible Most Accessible
roaming
8 Frequency Single (850 MHz) Multiple
band (850/900/1800/1900 MHz)
9 Network Handset specific SIM specific. User has
service option to select handset of
his choice.
▪ 0G Technology
Characteristics of 0G technology
• This system was analog in nature.
These mobile telephones were placed in vehicles (truck, cars etc.). The device (telephone)
would connect to local telephone network only if it is in the range of 20KM.
2 - 42
Communication Systems and Networking
▪ 0.5G Technology
0.5G was the advance version of 0G. This 0.5G technology had introduced ARP
(Autoradiopuhelin) as the first commercial public mobile phone network. This ARP
network was launched in 1971 in Finland.
• This network contains cells (Land area was divided into small sectors, each sector
is known as cell, a cell is covered by a radio network with one transceiver) with
the cell size of 30 km.
• Calls would get disconnected while moving from one cell to another.
The only difference with previous one is: you can carry this phone with you without any
vehicle.
▪ 1G Technology
1G refers to the first generation of wireless telephone technology. These are the analog
telecommunications standards that were introduced in the 1980s and continued until
being replaced by 2G digital telecommunications.
The main difference between two succeeding mobile telephone systems, 1G and 2G, is
that the radio signals that 1G networks use are analog, while 2G networks are digital.
▪ 2G Technology
Second generation (2G) telephone technology is based on GSM or in other word global
system for mobile communication. Second generation was launched inFinland in the year
1991. Although it is originally introduced in Europe but is usedworldwide.
2 - 43
Communication Systems and Networking
Characteristics of 2G technology
• 2G technologies can be divided into Time Division Multiple Access
(TDMA)based and Code Division Multiple Access (CDMA)based standards.
• GSM is TDMAbased standard. 2G networks were built mainly for voice services
and slow data transmission. It supports services such as text messages, picture
messages and MMS (Multimedia Messages).
• It holds sufficient security for both the sender and the receiver.
• All text messages are digitally encrypted. This digital encryption allows for the
transfer of data in such a way that only the intended receiver can receive and read
it.
HSCSD (High-speed circuit-switched data) is a system for data calls on GSM networks
that came before packet based systems such as GPRS and EDGE. HSCSD is able to
provide a raw transmission rate of up to 57.6 kbps to individual users. It has better error
correction system. HSCSD was never widely adopted outside of Europe.
GPRS (General packet radio service) is 2.5G technology. GPRS supports multi-user
network sharing of individual radio channels and time slots. Thus GPRS supports many
more users than HSCSD but in a bursty manner. It can also be used for WAP, SMS &
MMS services, as well as Internet access. A user can achieve as much as 171.2 kbps
speed here.
EDGE (Enhanced Data Rates for GSM Evolution) is 2.75G technology. EDGE is the part
of GSM technology. It introduces a new degree of error control and protection. But the
covering range is smaller in EDGE than in HSCSD or GPRS. Both your phone and
network must support EDGE, otherwise the phone will revert automatically to GPRS.
2 - 44
Communication Systems and Networking
▪ 3G Technology
Applications of 3G
The bandwidth and location information available to 3G devices gives rise to applications
not previously available to mobile phone users. Some of the applications are:
• Global Positioning System (GPS)
• Location-based services
• Mobile TV
• Telemedicine
• Video Conferencing
• Video on demand
In marketing 3G services, video telephony has often been used as the main feature for 3G.
A certain euphoria was created, which led to huge spectrum licensing fees in many
countries including Bangladesh. Since these spectrums licensing fees were collected
many years before any income could be expected from 3G businesses and since enormous
investments are necessary to build the 3G networks, many telecommunication operators
got into great financial difficulties, which greatly delayed 3G roll-out in many countries.
Plus you need 3G enabled phones to use 3G service.
The most significant features offered by third generation (3G) mobile technologies are the
momentous capacity and broadband capabilities to support greater numbers of voice and
data for customers. Plus higher data rates at lower incremental cost than 2G. 3G networks
have potential transfer speeds of up to 3 Mbps (about 15 seconds to download a 3 minute
MP3 song). For comparison, the fastest 2G phones can achieve up to 144Kbps (about 8
minutes to download a 3 minute song). 3G phones can accommodate broadband
applications like video conferencing, streaming video from the Web and instantly
downloading e-mail messages with attachments. 3G network have more enhanced
security than 2G.
Teletalk, a government owned mobile phone operator is the first, who started 3G service
in Bangladesh from October, 2012. Recently Bangladesh Telecommunication Regulatory
Commission (BTRC) carries out an auction for 3G license in September, 2013. The four
cellphone operators Grameenphone, Robi, Banglalink and Airtel are won licenses for 3G.
All of these operators already stared experimental 3G service from October, 2013.
These systems are basically enhanced version of 3G. It supports a higher throughput and
speed at packet data rates of 14.4 MB/s downlink and 5.7MB/s uplink, supporting higher
data needs of users. 3.5G Data transmission technology is HSDPA. In 3.75G Data
transmission technology is HSUPA. In 3.9G Data transmission technology is HSPA
Evolution/HSPA+.
In 3.9G download peak data rates is 28Mbps and upload peak data rates is 11Mbps.
Although 3.9G is better than 3.75G and 3.75G is by all means technically superior to
3.5G, there will not be a noticeable transfer speed difference for most of the users. 3.9G
technology also known as pre-4G. Some operator branded their 3.9G service as 4G
service. However without fulfilling all requirements of 4G, it is just a business strategy.
You will know more about 4G next.
In Bangladesh, Airtel uses 3.75G, 3.9G technologies, Robi uses 3.5G technology,
Grameenphone uses 3.9G technology, Banglalink uses 3.5G technology andteletalk uses
3.5G technology.
▪ 4G Technology
4G is short for fourth-generation, the successor wireless access technology to 3G. The
IEEE (Institute of Electrical and Electronics Engineers) official name for 4G is "3G and
beyond". In general, a generation is defined by the result of technology changes over a
10-15 year time frame. Thus, 4G would refer to whatever is deployed in the 2006-2015
period. The speed and standards of this technology of wireless needs to be at least 100
2 - 46
Communication Systems and Networking
Megabits per second for mobile operation and up to 1 Gigabit per second for stationary to
pass as 4G.
Applications of 4G
4G applications include:
• Amended mobile web access
• IP telephony
• Gaming services
• High-definition mobile TV
• Video conferencing
• 3D television
• Cloud computing.
Long Term Evolution (LTE), this buzzword is a version of 4G that is becoming the latest
advertised technology but still not true 4G as the standards are set. This is true for 4G
WiMAX service too. When you start hearing about LTE Advanced and WIMAX Release
2, then we will be talking about true fourth generation wireless technologies because they
are the only two formats realized by the International Telecommunications Union as True
4G at this time. For using LTE service, one must need LTE supported mobile.
In Bangladesh some internet service providers deployed 4G WiMAX service from 2009.
None of them are true 4G. 4G LTE service is still unavailable in Bangladesh. Only recent
winner of 3G bidding will get opportunity for 4G LTE service according to 3G guidelines
of Bangladesh Telecommunication Regulatory Commission (BTRC).
▪ 5G Technology:
Although it is not started yet, it is the next standard phase of 4G technology. 5G is also
referred to as beyond 2020 mobile communications technologies. Any particular
2 - 47
Communication Systems and Networking
specification for 5G not available yet but 5G is bringing a new touch and making the life
real mobile life.
Computer networks are established using different software and hardware technologies.
Computer networks can be established using different hardware structures such as
Ethernet, optical fiber or merely using wireless connections. Ethernet network is the most
common and widely used technology to establish any computer network. The network
based on the use of Ethernet network is formed by physically connecting the individual
computer units to each other through wiring.
• Resource sharing is the main objective of the computer network. The goal is to
provide all the program, data and hardware is available to everyone on the
network without regard to the physical location.
2 - 48
Communication Systems and Networking
• Computer network helped organization in saving money. This is due to the fact
that the small computer has much better price to the performance ratio comparison
than the powerful computer like mainframe computer. Mainframe computer are
more than ten times faster comparing other computers, but they cost thousands
times more.
• Computer network helps people who live or work apart to report together. So,
when one user prepared some documentation, he can make the document online
enabling which makes other to read and convey their opinions. Thus computer
network is a powerful communication medium.
• Only authorized user can access resource in a computer network. Users are
authenticated by their security systems. Hence it is not possible to access the data
without proper account. This increases security
Networking. Due to its small size, it is possible for one person to administrate a Local
Area Network. It is divided in some parts. Each part has some devices
(Computer/Notebook) which are connected to server through Hub. All devices can share
information with server; even they can connect to each other.
Advantages of LAN
• Workstations can share peripheral devices like printers. This is cheaper than buying a
printer for every workstation.
• Workstations do not necessarily need their own hard disk or CD-ROM drives which
make them cheaper to buy than stand-alone PCs.
• User can save their work centrally on the network’s file server. This means that they can
retrieve their work from any workstation on the network.
• They don’t need to go back to the same workstation all the time.
• Users can communicate with each other and transfer data between workstations very
easily.
• One copy of each application package such as a word processor, spreadsheet etc. can be
loaded onto the file and shared by all users.
• When a new version comes out, it only has to be loaded onto the server instead of onto
every workstation.
Disadvantages of LAN
• Special security measures are needed to stop users from using programs and data that
they should not have access to;
• Networks are difficult to set up and need to be maintained by skilled technicians.
• If the file server develops a serious fault, all the users are affected, rather than just one
user in the case of a stand-alone machine.
B. WLAN (Wireless Local Area Networks): Wireless Local Area Networks are same as
LAN networks, except they do not require network cables to connect each other. Instead
they use wireless medium. Wireless Area Networks are commonly seen being used by a
Wi-Fi internet connection. Wireless LAN connections offer a surprising amount of
mobility for users with laptops and smart phones while being able to stay connected to the
network.
Advantages of WLAN
• Flexible
2 - 50
Communication Systems and Networking
• Greater mobility
• Enables network connection for different kinds of devices
• No cables – no mess
• Increased productivity
Disadvantages of WLAN
• Higher price
• Interference
• Less reliable
C. WAN (Wide Area Networks): Wide Area Networks are used to connect server
machines where information is stored and computers across continents or countries for
constant information updates. Wide Area Networks, are used across the globe, many
networks connect with one another across continents to create one giant Wide Area
Network. Wide Area Networks use optic fiber as their communication medium. The
largest example of a Wide Area Network is the internet itself, which connects all users in
the world.
Advantages of WAN
• WAN can connect the computer to a wider area geographically, for example
connecting Dhaka, Bangladesh with the world.
• WAN network seeks to connect schools in Dhaka with other places in the world as
an example of Tokyo in just a few minutes, without the need to provide a large
sum of money for a payphone.
Disadvantages of WAN
• It requires many equipment and data before local and metropolitan networks
related to global communication.
Advantages of MAN
Disadvantages of MAN
• Also, this equipment generally has to be installed for the first time, as the copper
traditionally used for the phone network is generally considered to be too slow to
be annexed for this purpose.
E. CAN (Campus Area Networks): Campus Area Networks are usually a connection of
many small LAN networks which are often used on university campuses and office
buildings. Campus Area Networks allow for easy file sharing between different
departments. This type of network offers a lot of simplicity in the transfer and
downloading of files.
F. SAN (Storage Area Network): Storage Area Networks are primarily used as
information databases. They are not usually used by large organizations. They are
2 - 52
Communication Systems and Networking
specifically used for the storage of information and easy retrieval of specific pieces of
data whenever required. Storage Area Networks are usually used by websites which offer
downloading services.
G. SAN (System Area Network): System Area Networks are speed oriented networks
which provide high speed internet connections to a cluster of computers. These are
primarily used for server purposes and allow other computers to connect to these System
Area Networks.
The Network devices are playing an important role in Network Communication, each
device has different role. Here we discuss some common and most used network devices
shortly.
Modem Switch
A. Network Hub
Networks using a Star topology require a central point for the devices to connect.
Originally this device was called a concentrator since it consolidated the cable runs from
all network devices. The basic form of concentrator is the hub.
As shown in Figure; the hub is a hardware device that contains multiple, independent
ports that match the cable type of the network. Most common hubs interconnect Category
3 or 5 twisted-pair cable with RJ-45 ends, although Coax BNC and Fiber Optic BNC hubs
also exist. The hub is considered the least common denominator in device concentrators.
Hubs offer an inexpensive option for transporting data between devices, but hubs don't
offer any form of intelligence. Hubs can be active or passive.
An active hub strengthens and regenerates the incoming signals before sending the data
on to its destination.
Passive hubs do nothing with the signal.
B. Network Modem
A modem is a network device that both modulates and demodulates analog signals for
encoding and decoding digital information for processing. Modems accomplish both of
these tasks simultaneously and for this reason, the term modem is a combination of
"modulate" and "demodulate."
C. Network Bridge
2 - 56
Communication Systems and Networking
abridge is used to join two network segments together; it allows computers on either
segment to access resources on the other. They can also be used to divide large networks
into smaller segments. Bridges have all the features of repeaters, but can have more
nodes, and since the network is divided, there is fewer computers competing for resources
on each segment thus improving network performance.
Bridges can also connect networks that run at different speeds, different topologies, or
different protocols. But they cannot, join an Ethernet segment with a Token Ring
segment, because these use different networking standards. Bridges operate at both the
Physical Layer and the MAC sublayer of the Data Link layer. Bridges read the MAC
header of each frame to determine on which side of the bridge the destination device is
located, the bridge then repeats the transmission to the segment where the device is
located.
D. Network Gateway
A gateway is a device used to connect networks using different protocols. Gateways
operate at the network layer of the OSI model. In order to communicate with a host on
another network, an IP host must be configured with a route to the destination network. If
a configuration route is not found, the host uses the gateway (default IP router) to transmit
the traffic to the destination host. The default t gateway is where the IP sends packets that
are destined for remote networks. If no default gateway is specified, communication is
limited to the local network. Gateways receive data from a network using one type of
protocol stack, remove that protocol stack and repackage it with the protocol stack that
the other network can use.
E. Network Router
Routers are networking devices used to extend or segment networks by forwarding
packets from one logical network to another. Routers are most often used in large
internetworks that use the TCP/IP protocol suite and for connecting TCP/IP hosts and
local area networks (LANs) to the Internet using dedicated leased lines.
F. Network Switch
Switches are a special type of hub that offers an additional layer of intelligence to basic,
physical-layer repeater hubs. A switch must be able to read the MAC address of each
frame it receives. This information allows switches to repeat incoming data frames only
2 - 57
Communication Systems and Networking
to the computer or computers to which a frame is addressed. This speeds up the network
and reduces congestion.
The main function of network is to share resources and information between users. It
allows computers to send data back and forth. This data could be emails and message or
pictures, videos or other information. Functions of networks are:
File and Data Sharing: With networking, however, files can be shared instantaneously
across the network, whether with one user or with hundreds.
2 - 61
Communication Systems and Networking
Resource Sharing: Computer networking also allows the sharing of network resources,
such as printers, dedicated servers, backup systems, input devices and Internet
connections.
When two or more computers are connected with each other using any medium in such a
way that, they communicate with each other and share their resources, then it is called
computer network and a physical interconnection in a variety of ways is called topology.
Topology is the structure or arrangement of a network which may be physical or logical.
Physical topology included devices, location and installation of cables etc. Logical
topology included fact, that where and how data transmit from one location to another
location in a network. Physical Topologies includes:
• Point-to-point topology
• Bus topology
• Star topology
• Ring topology
• Mesh topology
• Tree topology
same transmission line by using a cable, usually coaxial. The advantages of this topology
are that it is easy to implement and it functions easily; on the other hand, it is highly
vulnerable, since if one of the connection is defective, the whole network will be affected.
Star topology is much less vulnerable, as one of the connections can easily be removed by
disconnecting it from the hub, without paralyzing the rest of the network. The critical
point in this network is hub, as without it, communication between the computers on the
network is no longer possible.
• Due to the centralized nature, it is easy to detect faults in the network devices.
• As the analysis of traffic is easy, the topology poses lesser security risk.
• Data packets do not have to pass through many nodes, like in the case of a ring
network. Thus, with the use of a high-capacity central hub, traffic load can be
handled at fairly decent speeds.
Disadvantages of Star Topology
• Network operation depends on the functioning of the central hub. Hence, central
hub failure leads to failure of the entire network.
• Also, the number of nodes that can be added depends on the capacity of the
central hub.
• The setup cost is quite high.
D. Ring Topology: In a ring-topology network, computers each take turns
communicating, creating a loop of computers in which they each "have their turn to
speak" one after another. The fair sharing of the network performance does not degrade
but failure of one computer can affect the total network.
Advantages of Ring Topology
• This type of network topology is very organized. Each node gets to send the data
when it receives an empty token. This helps to reduces chances of collision. Also
in ring topology all the traffic flows in only one direction at very high speed.
• Even when the load on the network increases, its performance is better than that of
Bus topology.
• There is no need for network server to control the connectivity between
workstations.
• Additional components do not affect the performance of network.
• Each computer has equal access to resources.
E. Mesh Topology: The mesh topology connects all devices (nodes) to each other for
redundancy and fault tolerance. It is used in critical networks like banks and financial
2 - 64
Communication Systems and Networking
institutions. Implementing the mesh topology is expensive and difficult. But if any line is
down, complete network can operate normally without any problems. When every device
has a connection to every other devices in a network it is called full mesh topology.
F. Tree Topology: Tree Topology integrates the characteristics of Star and Bus
Topology. In Tree Topology, the number of star networks is connected using bus. This
main cable seems like a main stem of a tree and other star networks as the branches. It is
also called Expanded Star Topology.
Expansion of network, error detection & correction are key features of tree topology. But
because of tree topology it is relies heavily on bus which makes it vulnerable.
• Each star segment gets a dedicated link from the central bus. Thus, failing of one
segment does not affect the rest of the network.
• Fault identification is easy.
• The network can be expanded by the addition of secondary nodes. Thus,
scalability is achieved.
Disadvantages of Tree Topology
• As multiple segments are connected to a central bus, the network depends heavily
on the bus. Its failure affects the entire network.
• Owing to its size and complexity, maintenance is not easy and costs are high.
Also, configuration is difficult in comparison to that in other topologies.
• Though it is scalable, the number of nodes that can be added depends on the
capacity of the central bus and on the cable type.
Hybrid Topology
Public Clouds: Public clouds are made available to the general public by a service
provider who hosts the cloud infrastructure. Generally, public cloud providers like
Amazon, Microsoft or Google owns and operate the infrastructure and offer access over
the Internet. With this model, customers have no visibility or control over the
infrastructure.
Hybrid Clouds: Hybrid Clouds are a composition of two or more clouds (private,
community or public) that bound together offering the advantages of multiple deployment
models. In a hybrid cloud, you can leverage third party cloud providers in either a full or
partial manner. Hybrid cloud increases the flexibility of computing.
Flexibility: A cloud-based service can instantly meet the demand of user because of the
vast capacity of the cloud service provider.
Disaster Recovery: When companies start relying on cloud based services, they no
longer need complex disaster recovery plans. Cloud computing providers take care of
most issues and they do it faster.
Cap-Ex Free: Cloud computing services are typically pay as you go, so there is no need
for capital expenditure at all.
Work from Anywhere: As long as employees have internet access, they can work from
anywhere.
2 - 68
Communication Systems and Networking
Security: About 800,000 notebooks are reported lost/stolenevery year. This can have
some serious monetary implications, but when everything is stored in the cloud, data can
still be accessed no matter what happens to a computer.
Summary:
• In Baseband, data is sent as digital signals through the media as a single channel that
uses the entire bandwidth of the media.
2 - 69
Communication Systems and Networking
• The way in which data is transmitted from one place to another is called data
transmission mode.
• In half-duplex mode, data can flow in both directions but only in one direction at a
time.
• In full duplex-mode, data can flow in both directions at the same time.
• In multicast a piece of information is sent from one or more points to a set of other
points.
• Any cast is communication that takes place over a network between a single sender
and the nearest of a group of receivers.
• Coaxial Cable, Twisted Pairs Cable and Fiber Optics Cable are bounded media
• Depending on ranges wireless communication systems are divided into these types:
WWAN, WPAN, WLAN, WMAN and WBA.
2 - 70
Communication Systems and Networking
• Mobile Station (MS), Base Station (BS), Base Station Controller (BSC), Mobile
Switching Center (MSC), Public Switched Telephone Network (PSTN) are basic
components of Mobile Communication System.
• In bus topology, all computers are linked to the same transmission line by using a
cable.
• In star topology, the network computers are linked to a piece of hardware called a
hub.