Unit 4-1
Unit 4-1
Unit 4-1
The communication system is a system which describes the information exchange between two
points. The process of transmission and reception of information is called communication. The major
elements of communication are the Transmitter of information, the Channel or medium of
communication and the Receiver of information.
Table of Contents
Objective Questions
(1) Analogue
(2) Digital
In digital technology, the data are generated and processed in two states: High (represented as 1)
and low (represented as 0). Digital technology stores and transmits data in the form of 1s and 0s.
Depending on the communication channel, the communication system is categorised as follows:
Skywave communication
Satellite communication
1. Internet
4. Television
The definitions of the terms used in the communication system are discussed below.
Information
Message or information is the entity that is to be transmitted. It can be in the form of audio, video,
temperature, picture, pressure, etc.
Signal
The single-valued function of time carries the information. The information is converted into an
electrical form for transmission.
Transducer
It is a device or an arrangement that converts one form of energy to the other. An electrical
transducer converts physical variables such as pressure, force, and temperature into corresponding
electrical signal variations. For example, a microphone converts audio signals into electrical signals.
The photodetector converts light signals into electrical signals.
Amplifier
The electronic circuit or device that increases the amplitude or the strength of the transmitted signal
is called an amplifier. When the signal strength becomes less than the required value, amplification
can be done anywhere between the transmitter and receiver. A DC power source will be provided for
the amplification.
Modulator
As the original message signal cannot be transmitted over a large distance because of their low
frequency and amplitude, they are superimposed with high frequency and amplitude waves called
carrier waves. This phenomenon of superimposing of message signals with a carrier wave is called
modulation, and the resultant wave is a modulated wave which is to be transmitted.
There are different types of modulation, and they are explained below:
The process of changing the amplitude of the signal wave by impressing or superimposing it on a
high-frequency carrier wave, keeping its frequency constant, is called amplitude modulation.
Frequency modulation is a technique in which the frequency of the message signal is varied by
modulating with a carrier wave. It is better than amplitude modulation because it eliminates noise
from various sources.
The phase of the carrier wave changes the phase of the signal wave. The phase shift after modulation
is dependent on the frequency of the carrier wave as well. Phase modulated waves are immune to
noise to a greater extent.
Transmitter
It is the arrangement that processes the message signal into a suitable form for transmission and,
subsequently, reception.
Antenna
An antenna is a structure or a device that will radiate and receive electromagnetic waves. So, they
are used in both transmitters and receivers. An antenna is basically a metallic object, often a
collection of wires. The electromagnetic waves are polarised according to the position of the
antenna.
Channel
A channel refers to a physical medium such as wire, cables, or space through which the signal is
passed from the transmitter to the receiver. There are many channel impairments that affect channel
performance to a pronounced level. Noise, attenuation and distortion, to mention the major
impairments.
Noise
Noise is one of the channel imperfections or impairments in the received signal at the destination.
There are external and internal sources that cause noise. External sources include interference, i.e.
interference from nearby transmitted signals (cross talk), interference generated by a natural source
such as lightning, solar or cosmic radiation, automobile-generated radiation, etc. The external noise
can be minimised and eliminated by the appropriate design of the channel and shielding of cables.
Also, by digital transmission, external noise can be minimised.
Internal sources include noise due to random motion and collision of electrons in the conductors and
thermal noise due to diffusion and recombination of charge carriers in other electronic devices.
Internal noise can be minimised by cooling and using digital technology for transmission.
Learn More:
Attenuation
Attenuation is a problem caused by the medium. When the signal is propagating for a longer distance
through a medium, depending on the length of the medium, the initial power decreases. The loss in
initial power is directly proportional to the length of the medium. Using amplifiers, the signal power
is strengthened or amplified so as to reduce attenuation. Also, digital signals are comparatively less
prone to attenuation than analogue signals.
Distortion
It is also another type of channel problem. When the signal is distorted, the distorted signal may
have a frequency and bandwidth different from the transmitted signal. The variation in the signal
frequency can be linear or non-linear.
Receiver
An arrangement that extracts the message or information from the transmitted signal at the output
end of the channel and reproduces it in a suitable form as the original message signal is a receiver.
Demodulator
It is the inverse phenomenon of modulation, i.e., the process of separation of the message signal
from the carrier wave takes place in the demodulator. The information is retrieved from the
modulated wave.
Repeaters
Repeaters are placed at different locations in between the transmitter and receiver. A repeater
receives the transmitted signal, amplifies it and sends it to the next repeater without distorting the
original signal.
Block Diagram of Communication Systems
The block diagram given below represents the flow of the signal from the source to the destination.
The role of every device and arrangement discussed above will help to understand better.
Objective Questions
a) Transmitter b) Transducer
2. A device which provides output in electrical form or it has input in electrical form is called a
____.
a) Transmitter b) Receiver
c) Repeater d) Transducer
a) Distortion b) Interference
c) Attenuation d) Noise
4. The disturbance or distortion in the transmission and processing of message signals is called
______.
a) Noise b) Attenuation
a) Receiver b) Amplifier
Answers
1. d
2. d
3. c
4. a
5. b
Network topology refers to the arrangement of different elements like nodes, links, or devices in a
computer network. Common types of network topology include bus, star, ring, mesh, and tree
topologies, each with its advantages and disadvantages. In this article, we will discuss different types
of network topology in detail.
Network topology is the way devices are connected in a network. It defines how these components
are connected and how data transfer between the network. Understanding the different types of
network topologies can help in choosing the right design for a specific network.
There are two major categories of Network Topology i.e. Physical Network topology and Logical
Network Topology. Physical Network Topology refers to the actual structure of the physical medium
for the transmission of data. Logical network Topology refers to the transmission of data between
devices present in the network irrespective of the way devices are connected. The structure of the
network is important for the proper functioning of the network. one must choose the most suitable
topology as per their requirement.
Mesh Topology
Star Topology
Bus Topology
Ring Topology
Tree Topology
Hybrid Topology
A strong understanding of network topologies is essential for competitive exams like GATE, where
computer networks are a significant subject. To deepen your knowledge and enhance your exam
preparation, consider enrolling in the GATE CS Self-Paced Course . This course covers all critical
networking concepts, including detailed explanations of various network topologies, equipping you
with the expertise needed to excel in your exams.
Point-to-point topology is a type of topology that works on the functionality of the sender and
receiver. It is the simplest communication between two nodes, in which one is the sender and the
other one is the receiver. Point-to-Point provides high bandwidth.
Mesh Topology
In a mesh topology, every device is connected to another device via a particular channel. Every
device is connected to another via dedicated channels. These channels are known as links. In Mesh
Topology, the protocols used are AHCP (Ad Hoc Configuration Protocols), DHCP (Dynamic Host
Configuration Protocol), etc.
Mesh Topology
Suppose, the N number of devices are connected with each other in a mesh topology, the
total number of ports that are required by each device is N-1. In Figure 1, there are 5 devices
connected to each other, hence the total number of ports required by each device is 4. The
total number of ports required = N * (N-1).
Suppose, N number of devices are connected with each other in a mesh topology, then the
total number of dedicated links required to connect them is N C 2 i.e. N(N-1)/2. In Figure 1,
there are 5 devices connected to each other, hence the total number of links required is
5*4/2 = 10.
The fault is diagnosed easily. Data is reliable because data is transferred among the devices
through dedicated channels or links.
The cost of cables is high as bulk wiring is required, hence suitable for less number of
devices.
The cost of maintenance is high.
A common example of mesh topology is the internet backbone, where various internet service
providers are connected to each other via dedicated channels. This topology is also used in military
communication systems and aircraft navigation systems.
Star Topology
In Star Topology, all the devices are connected to a single hub through a cable. This hub is the central
node and all other nodes are connected to the central node. The hub can be passive in nature i.e.,
not an intelligent hub such as broadcasting devices, at the same time the hub can be intelligent
known as an active hub. Active hubs have repeaters in them. Coaxial cables or RJ-45 cables are used
to connect the computers. In Star Topology, many popular Ethernet LAN protocols are used as
CD(Collision Detection), CSMA (Carrier Sense Multiple Access), etc.
Star Topology
If N devices are connected to each other in a star topology, then the number of cables
required to connect them is N. So, it is easy to set up.
Each device requires only 1 port i.e. to connect to the hub, therefore the total number of
ports required is N.
It is Robust. If one link fails only that link will affect and not other than that.
If the concentrator (hub) on which the whole topology relies fails, the whole system will
crash down.
A common example of star topology is a local area network (LAN) in an office where all computers
are connected to a central hub. This topology is also used in wireless networks where all devices are
connected to a wireless access point.
Bus Topology
Bus Topology is a network type in which every computer and network device is connected to a single
cable. It is bi-directional. It is a multi-point connection and a non-robust topology because if the
backbone fails the topology crashes. In Bus Topology, various MAC (Media Access Control) protocols
are followed by LAN ethernet connections like TDMA, Pure Aloha, CDMA, Slotted Aloha, etc.
Bus Topology
If N devices are connected to each other in a bus topology, then the number of cables
required to connect them is 1, known as backbone cable, and N drop lines are required.
Coaxial or twisted pair cables are mainly used in bus-based networks that support up to 10
Mbps.
The cost of the cable is less compared to other topologies, but it is used to build small
networks.
Bus topology is familiar technology as installation and troubleshooting techniques are well
known.
If the common cable fails, then the whole system will crash down.
If the network traffic is heavy, it increases collisions in the network. To avoid this, various
protocols are used in the MAC layer known as Pure Aloha, Slotted Aloha, CSMA/CD, etc.
A common example of bus topology is the Ethernet LAN, where all devices are connected to a single
coaxial cable or twisted pair cable. This topology is also used in cable television networks.
Ring Topology
In a Ring Topology, it forms a ring connecting devices with exactly two neighboring devices. A
number of repeaters are used for Ring topology with a large number of nodes, because if someone
wants to send some data to the last node in the ring topology with 100 nodes, then the data will
have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are
used in the network.
The data flows in one direction, i.e. it is unidirectional, but it can be made bidirectional by having 2
connections between each Network Node, it is called Dual Ring Topology. In-Ring Topology, the Token
Ring Passing protocol is used by the workstations to transmit the data.
Ring Topology
Token passing: It is a network access method in which a token is passed from one node to
another node.
One station is known as a monitor station which takes all the responsibility for performing
the operations.
To transmit the data, the station has to hold the token. After the transmission is done, the
token is to be released for other stations to use.
When no station is transmitting the data, then the token will circulate in the ring.
There are two types of token release techniques: Early token release releases the token just
after transmitting the data and Delayed token release releases the token after the
acknowledgment is received from the receiver.
The failure of a single node in the network can cause the entire network to fail.
The addition of stations in between or the removal of stations can disturb the whole
topology.
Less secure.
Tree Topology
Tree topology is the variation of the Star topology. This topology has a hierarchical flow of data. In
Tree Topology, protocols like DHCP and SAC (Standard Automatic Configuration) are used.
Tree Topology
In tree topology, the various secondary hubs are connected to the central hub which contains the
repeater. This data flow from top to bottom i.e. from the central hub to the secondary and then to
the devices or from bottom to top i.e. devices to the secondary hub and then to the central hub. It is
a multi-point connection and a non-robust topology because if the backbone fails the topology
crashes.
It allows more devices to be attached to a single central hub thus it decreases the distance
that is traveled by the signal to come to the devices.
It allows the network to get isolated and also prioritize from different computers.
Error detection and error correction are very easy in a tree topology.
A common example of a tree topology is the hierarchy in a large organization. At the top of the tree
is the CEO, who is connected to the different departments or divisions (child nodes) of the company.
Each department has its own hierarchy, with managers overseeing different teams (grandchild
nodes). The team members (leaf nodes) are at the bottom of the hierarchy, connected to their
respective managers and departments.
Hybrid Topology
Hybrid Topology is the combination of all the various types of topologies we have studied above.
Hybrid Topology is used when the nodes are free to take any form. It means these can be individuals
such as Ring or Star topology or can be a combination of various types of topologies seen above.
Each individual topology uses the protocol that has been discussed earlier.
Hybrid Topology
The above figure shows the structure of the Hybrid topology. As seen it contains a combination of all
different types of networks.
The size of the network can be easily expanded by adding new devices.
The infrastructure cost is very high as a hybrid network requires a lot of cabling and network
devices .
A common example of a hybrid topology is a university campus network. The network may have a
backbone of a star topology, with each building connected to the backbone through a switch or
router. Within each building, there may be a bus or ring topology connecting the different rooms and
offices. The wireless access points also create a mesh topology for wireless devices. This hybrid
topology allows for efficient communication between different buildings while providing flexibility
and redundancy within each building.
Network Topology is important because it defines how devices are connected and how they
communicate in the network. Here are some points that defines why network topology is important.
Network Performance: Upon choosing the appropriate topology as per requirement, it helps
in running the network easily and hence increases network performance.
Network Reliability: Some topologies like Star, Mesh are reliable as if one connection fails,
they provide an alternative for that connection, hence it works as a backup.
Network Security: Network Topology helps in understanding how devices are connected and
hence provides a better security to the network.
A computer network is a group of computers linked to each other that enables the computer to
communicate with another computer and share their resources, data, and applications.
A computer network can be categorized by their size. A computer network is mainly of four types:
o Local Area Network is a group of computers connected to each other in a small area such as
building, office.
o LAN is used for connecting two or more personal computers through a communication
medium such as twisted pair, coaxial cable, etc.
o It is less costly as it is built with inexpensive hardware such as hubs, network adapters, and
ethernet cables.
o The data is transferred at an extremely faster rate in Local Area Network.
o Personal Area Network is a network arranged within an individual person, typically within a
range of 10 meters.
o Personal Area Network is used for connecting the computer devices of personal use is known
as Personal Area Network.
o Thomas Zimmerman was the first research scientist to bring the idea of the Personal Area
Network.
o Personal computer devices that are used to develop the personal area network are the
laptop, mobile phones, media player and play stations.
There are two types of Personal Area Network:
Wireless Personal Area Network: Wireless Personal Area Network is developed by simply using
wireless technologies such as WiFi, Bluetooth. It is a low range network.
Wired Personal Area Network: Wired Personal Area Network is created by using the USB.
o Body Area Network: Body Area Network is a network that moves with a person. For
example, a mobile network moves with a person. Suppose a person establishes a network
connection and then creates a connection with another device to share the information.
o Offline Network: An offline network can be created inside the home, so it is also known as
a home network. A home network is designed to integrate the devices such as printers,
computer, television but they are not connected to the internet.
o Small Home Office: It is used to connect a variety of devices to the internet and to a
corporate network using a VPN
o Government agencies use MAN to connect to the citizens and private industries.
o In MAN, various LANs are connected to each other through a telephone exchange line.
o The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN, OC-3, ADSL,
etc.
o A Wide Area Network is a network that extends over a large geographical area such as states
or countries.
o A Wide Area Network is not limited to a single location, but it spans over a large geographical
area through a telephone line, fibre optic cable or satellite links.
o The internet is one of the biggest WAN in the world.
o A Wide Area Network is widely used in the field of Business, government, and education.
o Last mile: A telecom company is used to provide the internet services to the customers in
hundreds of cities by connecting their home with fiber.
o Private network: A bank provides a private network that connects the 44 offices. This
network is made by using the telephone leased line provided by the telecom company.
o Geographical area: A Wide Area Network provides a large geographical area. Suppose if the
branch of our office is in a different city then we can connect with them through WAN. The
internet provides a leased line through which we can connect with another branch.
o Centralized data: In case of WAN network, data is centralized. Therefore, we do not need to
buy the emails, files or back up servers.
o Get updated files: Software companies work on the live server. Therefore, the programmers
get the updated files within seconds.
o Exchange messages: In a WAN network, messages are transmitted fast. The web application
like Facebook, Whatsapp, Skype allows you to communicate with friends.
o Sharing of software and resources: In WAN network, we can share the software and other
resources like a hard drive, RAM.
o Global business: We can do the business over the internet globally.
o High bandwidth: If we use the leased lines for our company then this gives the high
bandwidth. The high bandwidth increases the data transfer rate which in turn increases the
productivity of our company.
o Security issue: A WAN network has more security issues as compared to LAN and MAN
network as all the technologies are combined together that creates the security problem.
o Needs Firewall & antivirus software: The data is transferred on the internet which can be
changed or hacked by the hackers, so the firewall needs to be used. Some people can inject
the virus in our system so antivirus is needed to protect from such a virus.
o High Setup cost: An installation cost of the WAN network is high as it involves the purchasing
of routers, switches.
In this article, we are discussing the significant differences between the Internet and the Intranet,
which will help understand the requirements of both. This will also help us decide which one of them
we need for personal use and commercial use. Let's first understand both with the definitions:
What is the Internet?
The Internet is a global network that uses TCP / IP protocols to connect millions of computers
worldwide. It can include different networks, such as private, public, organizational, academic,
government, etc. It allows users to communicate with each other and share massive amounts of data
in various formats. Internet is available in both modes, wired and wireless. In wired mode, the data
travels through fiber optic cables, whereas in wireless mode, the data travels through radio waves.
o File sharing
o Voice Calls, Video Conferencing, and Chatting with friends, family members, and colleagues
The internet is a network created by connecting a large number of computers or computer networks.
It is a type of network that cannot be owned by an entity. It is formed using networks of networks
configured using complex standards and rules (such as protocols). The Internet works through a
packet routing network following the protocols, where the packet routing is the technique of routing
data packets from source computer to a destination computer.
However, there are several protocols; the transmission and internet protocols are the primary
impelling agents that help build the Internet network. The other common protocols used by the
connected networks are HTTP, FTP, and SMTP. Besides, the protocols and applications like Telnet,
Gopher, WWW, Usenet News, Internet Relay Chat, etc. are also used throughout the working of the
Internet.
Advantages of Internet
o The Internet establishes a network of devices from different locations all around the world.
o It keeps the people updated on what's happening worldwide with the latest news and
technologies.
o It connects people through communities, forums, social networking sites and helps them
work together digitally.
o The Internet has made selling and purchasing of products and services easier.
o The Internet is the best platform for people to show their talent, such as singing, dancing,
drawing, etc.
What is Intranet?
An Intranet is a part of the Internet and is owned and used privately by an organization. It is mainly
used to connect all the computers and establish a private network of an organization to provide
employees the ability to collaborate on projects, manage or update information, share calendars,
and to-do list, etc. Organizations prefer using Intranet to keep their data inaccessible from outsiders,
making their suspicious data and project information secure. Intranet includes a firewall to prevent
unauthorized users from accessing the network.
The websites created over Intranet look almost similar and act like any other website on the Internet.
However, these websites are much more task-oriented than promotional design websites on the
Internet. Like the Internet, the intranet's websites can also provide the interface to form
communication in the shape of chatting, image sharing, audio-video conferencing, etc. All these
activities can only be used by authorized users who have permission to access the Intranet network.
Advertisement
Intranet usually runs in a client/server environment where the computers are connected using local
area networks. Each computer is identified by the MAC address or an IP address, which remains
unique for every computer. As an Internet, the Intranet also uses the client-server model based on
the TCP / IP protocol suite. Because web browsers do not depend on the platform, they are also used
on Intranet to access and retrieve information from the server within the organization. Besides, there
is no need to install any special kind of software on the systems on the Intranet. But most companies
use customized software designed purposely for company-specific tasks.
In addition to the protocols, Intranet uses a firewall to filter unwanted elements to the network and
protects it from external intruders. It also includes network connectivity and the public
telecommunication system, which help access and share the company's data, projects, and
operations securely with the staff.
Advantages of Intranet
o The intranet is helping organizations to access internal and external information securely.
o The intranet is fast, easy-to-use, and low-cost to implement.
Few key differences between the Internet and the Intranet are listed below:
o The Internet is a global system of computer networks available for everyone, whereas
Intranet is a network of computers owned by any organization for a certain group of people.
o The total number of users using the Internet is very high, whereas total users on Intranet are
limited.
o Information on the Internet is broad that involves almost every topic, category and field. In
contrast, Intranet includes limited information that refers to any group or organization, such
as the company's databases.
o The Internet can be accessed and used by anyone, whereas the Intranet is limited to
organization employees or admin with login details.
o The Internet is a public network that is not considered safe, while the Intranet is a safer
network.
o The intranet is usually owned by a firm, institution, or organization, but any single person or
an organization does not own the internet.
The other major differences between the Internet and the Intranet can be explained in a tabulated
form, as below: