Unit II Layer and Protocols Final
Unit II Layer and Protocols Final
High Speed
Secure
Used for comparatively shorter distances
There are 3 major types of Guided Media:
Coaxial Cable
Coaxial cable has an outer plastic covering containing an insulation layer made of PVC or
Teflon and 2 parallel conductors each having a separate insulated protection cover.
The coaxial cable transmits information in two modes: Baseband mode(dedicated cable
bandwidth) and Broadband mode(cable bandwidth is split into separate ranges). Cable TVs
and analog television networks widely use Coaxial cables.
Stripline
Stripline is a transverse electromagnetic (TEM) transmission line medium invented by
Robert M. Barrett of the Air Force Cambridge Research Centre in the 1950s. Stripline is
the earliest form of the planar transmission line. It uses a conducting material to transmit
high-frequency waves it is also called a waveguide. This conducting material is
sandwiched between two layers of the ground plane which are usually shorted to provide
EMI immunity.
Microstripline
A microstripline is a type of transmission media used to carry high-frequency signals,
commonly found in microwave and radio frequency circuits. It consists of a flat, narrow
conducting strip (usually made of metal) placed on top of a dielectric material (an
insulating layer), with a metal ground plane on the other side.
2. Unguided Media
Radio waves are easy to generate and can penetrate through buildings. The sending and
receiving antennas need not be aligned. Frequency Range:3KHz - 1GHz. AM and FM radios
and cordless phones use Radio waves for transmission.
Types of Radio Waves:
Short Wave: AM Radio
VHF (Very High Frequency): FM Radio/TV
UHF (Ultra High Frequency): TV
Radio Wave Components:
Transmitter: Responsible for encoding the signal.
Receiver: Responsible for decoding the signal.
Radiowave
Microwaves
It is a line-of-sight transmission i.e. the sending and receiving antennas need to be properly
aligned with each other. The distance covered by the signal is directly proportional to the
height of the antenna. Frequency Range:1GHz - 300GHz. Micro waves are majorly used for
mobile phone communication and television distribution.
Advantages:
Cheaper than using cables
Ease of communication in difficult terrains
Communication over oceans
Disadvantages:
Insecure communication.
Out of phase signal.
Bandwidth is limited.
High cost of design, implementation, and maintenance.
Infrared
Infrared waves are used for very short distance communication. They cannot penetrate
through obstacles. This prevents interference between systems. Frequency Range:300GHz -
400THz. It is used in TV remotes, wireless mouse, keyboard, printer, etc.
Copper Cable
Definition:
Copper cable refers to cables that use copper conductors to transmit electrical signals. It’s one
of the oldest and most common media for wired communication.
Wireless communication is the transfer of data or information between two or more devices
without using physical cables. Instead, it uses electromagnetic waves (radio, infrared,
microwave, etc.) to transmit signals through the air or space.
Disadvantages:
Examples
Mobile phones (4G/5G)
Wi-Fi internet
Bluetooth headphones and speakers
GPS navigation
Satellite television
What is Bandwidth?
Bandwidth refers to the maximum amount of data that can be transmitted over a network
connection in a given amount of time. It's typically measured in bits per second (bps), or in
higher units like Mbps (megabits per second) or Gbps (gigabits per second). A bit is the
smallest unit of digital data, and it is represented by a 1 or 0.
We might use terms like kilobits per second (Kbps or 1,000 bits per second) or megabits
per second (Mbps or 1,000,000 bits per second) to describe how many bits can be
delivered or received in a second because the number of bits might be rather enormous. A
typical internet speed is around 10Mbps (megabits per second), which equates to roughly
1.3MBps (megabytes per second).
Noiseless Channel
For a noiseless channel, the Nyquist bit rate formula defines the theoretical maximum bit rate.
Nyquist proved that if an arbitrary signal has been run through a low-pass filter of bandwidth,
the filtered signal can be completely reconstructed by making only 2*Bandwidth (exact)
samples per second. Sampling the line faster than 2*Bandwidth times per second is pointless
because the higher-frequency components that such sampling could recover have already
been filtered out.
If the signal consists of L discrete levels, Nyquist's theorem states:
BitRate = 2 * Bandwidth * log2(L) bits/sec
In the above equation, bandwidth is the bandwidth of the channel, L is the number of signal
levels used to represent data, and BitRate is the bit rate in bits per second. Bandwidth is a
fixed quantity, so it cannot be changed. Hence, the data rate is directly proportional to the
number of signal levels.
It is the potential of carrier channels that It is the amount of data transmitted during a
can carry data. specified period over a network.
It does not depend on the properties of the While it gets affected by the sender or
sender or receiver. receiver.
Data rate governs the speed of data transmission. A very important consideration in data
communication is how fast we can send data, in bits per second, over a channel. Data rate
depends upon 3 factors:
The bandwidth available
Number of levels in digital signal
The quality of the channel – level of noise
Meaning: The amount of data transmitted per second over a communication
channel.
Unit: bits per second (bps), kbps, Mbps, Gbps.
Formula (basic idea):
Data Rate≈Bandwidth×log2(1+SNR)\text{Data Rate} \approx \text{Bandwidth} \times
\log_2(1 + \text{SNR})Data Rate≈Bandwidth×log2(1+SNR)
(from Shannon–Hartley theorem)
Influence: Higher bandwidth and better signal quality = higher data rate.
Channel Capacity
The channel capacity (C) is the highest achievable data rate (in bits per second) at
which information can be sent over a channel with arbitrarily low error as the message
length increases.
C=Blog2(1+SN)(bits/sec)
Where:
B: Bandwidth of the channel (Hz)
S: Signal power
N: Noise power
Meaning: The maximum possible data rate a communication channel can achieve
without errors, given its bandwidth and noise.
C=Blog2(1+SNR)C = B \log_2(1 + \text{SNR})C=Blog2(1+SNR)
Where:
o CCC = Channel Capacity (bps)
o BBB = Bandwidth (Hz)
o SNRSNRSNR = Signal-to-Noise Ratio (unitless)
B/C=log2(1+N/S)(bits/sec/Hz)
What is an IP Address?
Magine every device on the internet as a house. For you to send a letter to a friend living in
one of these houses, you need their home address. In the digital world, this home address is
what we call an IP (Internet Protocol) Address.
An IP address (Internet Protocol address) is a unique identifier assigned to each device
connected to a network that uses the Internet Protocol for communication.
Types of IP Address
1. Based on Addressing Scheme (IPv4 vs. IPv6)
IPv4:
This is the most common form of IP Address. It consists of four sets of numbers separated by
dots. For example, 192.158.1.38. Each set of numbers can range from 0 to 255. This format
can support over 4 billion unique addresses. Here's how the structure is broken down:
Four Octets: Each octet represents eight bits, or a byte, and can take a value from 0 to
255. This range is derived from the possible combinations of eight bits (2^8 = 256
combinations).
Example of IPv4 Address: 192.168.1.1
o 192 is the first octet
o 168 is the second octet
o 1 is the third octet
o 1 is the fourth octet
Each part of the IP address can indicate various aspects of the network configuration, from
the network itself to the specific device within that network. In most cases, the network part
of the address is represented by the first one to three octets, while the remaining section
identifies the host (device).
IPv6:
IPv6 addresses were created to deal with the shortage of IPv4 addresses. They use 128 bits
instead of 32, offering a vastly greater number of possible addresses. These addresses are
expressed as eight groups of four hexadecimal digits, each group representing 16 bits. The
groups are separated by colons.
Example of IPv6 Address: 2001:0db8:85a3:0000:0000:8a2e:0370:7334
o Each group (like 2001, 0db8, 85a3, etc.) represents a 16-bit block of the
address.
For detailed information, refer to this article - IPv4 vs. IPv6
Private IP Addresses
Private IP addresses are used within private networks (such as home networks, office
networks, etc.) and are not routable on the internet. This means that devices with private IP
addresses cannot directly communicate with devices on the internet without a translating
mechanism like a router performing Network Address Translation (NAT). Key features
include:
Not globally unique: Private IP addresses are only required to be unique within their
own network. Different private networks can use the same range of IP addresses
without conflict.
Local communication: These addresses are used for communication between devices
within the same network. They cannot be used to communicate directly with devices
on the internet.
Defined ranges: The Internet Assigned Numbers Authority (IANA) has reserved
specific IP address ranges for private use:
o IPv4: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, 192.168.0.0
to 192.168.255.255
o IPv6: Addresses starting with FD or FC
3. Based on Assignment Method (Static vs. Dynamic)
Static IP Addresses:
These are permanently assigned to a device, typically important for servers or devices
that need a constant address.
Reliable for network services that require regular access such as websites, remote
management.
Dynamic IP Addresses:
Temporarily assigned from a pool of available addresses by the Dynamic Host
Configuration Protocol (DHCP).
Cost-effective and efficient for providers, perfect for consumer devices that do not
require permanent addresses.
Introduction To Subnetting
Subnetting is the process of dividing a large network into smaller networks called "subnets."
Subnets provide each group of devices with their own space to communicate, which ultimately
helps the network to work easily. This also boosts security and makes it easier to manage the
network, as each subnet can be monitored and controlled separately.
Introduction to Subnet
A subnet is like a smaller group within a large network. It is a way to split a large network
into smaller networks so that devices present in one network can transmit data more easily.
For example, in a company, different departments can each have their own subnet, keeping
their data traffic separate from others. Subnet makes the network faster and easier to manage
and also improves the security of the network.
The client initiates communication (e.g., web browser), and the server responds (e.g.,
web server).
2. Request/Response Communication
Example: An HTTP client sends a GET request → the server returns an HTML page.
4. Stateless vs Stateful
Stateful: The server keeps track of the client’s session (e.g., FTP, Telnet).
5. Port Numbers
HTTP → Port 80
FTP → Port 21
SMTP → Port 25
DNS → Port 53
Most application protocols run over TCP (reliable) or UDP (faster but unreliable).
7. Human-Readable Command
Many application protocols use commands that are readable for debugging.
Example (SMTP):
8. Security
Some of the SMTP commands are HELLO, MAIL FROM, RCPT TO, DATA, QUIT,
VERIFY, SIZE, etc. SMTP sends an error message if the mail is not delivered to the receiver
hence, reliable protocol.
POP (Post Office Protocol):
POP (Post Office Protocol) is used to get emails from a mail server to your personal
device.
The current version used is POP3.
It works at the application layer of the network.
How POP3 Works:
When you check your email using POP3, it downloads the emails from the server to
your device.
After downloading, the emails are usually deleted from the server.
Once downloaded, you can read emails offline, so it uses less internet.
Some of the POP commands are LOG IN, STAT, LIST, RETR, DELE, RSET, and QUIT. For more
details please refer to the POP Full-Form article.
Web Protocols :
A protocol is a set of predefined rules that handle how data is exchanged between computers
over the Internet. It ensures that devices can communicate in a structured, reliable, and secure
manner. In essence, protocols dictate how data is sent, received, formatted, and processed.
there are over 200 recognized protocols in use today across various domains like networking,
security, and applications, more than 90% of internet communication relies on a few key
protocols—HTTP, HTTPS, TCP/IP, FTP, and DNS—commonly known as web protocols.
1. HTTP (Hypertext Transfer Protocol)
Used to load websites and view content.
Sends and receives HTML pages, images, etc.
Works on port 80
Not secure (data can be seen by hackers)
2. HTTPS (HTTP Secure)
Same as HTTP but encrypted
Uses SSL/TLS for security
Works on port 443
Keeps login info, passwords, and payment data safe
You see a lock icon 🔒 in the browser when using HTTPS