CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and...
-
Upload
sandra-hines -
Category
Documents
-
view
216 -
download
1
Transcript of CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and...
![Page 1: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/1.jpg)
Dr. Clincy Lecture 1
CS 4500
Ch3: Underlying Technologies (2 of 3)
Lecture #4
Finish LANs and start Pt-to-Pt WANs
![Page 2: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/2.jpg)
Dr. Clincy Lecture 2
CS 4500
Ethernet implementationEach device on an Ethernet network has a NIC (network interface card)
Contains the physical address –ah ha, this is how I can change locations and still get emails
Some implementations of Ethernet:
• 10BASE5 (thick ethernet)
• 10BASE2 (thin ethernet)
• 10BASE-T (twisted pair)
• 10BASE-FL (fiber link)
Ethernet addressing:
• Unicast
• Multicast
• Broadcast
Connects host to medium and perform CSMA/CD
British naval connector or bayonet nut connector – for coaxial cable
![Page 3: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/3.jpg)
Dr. Clincy Lecture 3
CS 4500
Ethernet implementation
![Page 4: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/4.jpg)
Dr. Clincy Lecture 4
CS 4500
Ethernet implementation
Unshielded twisted pair
![Page 5: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/5.jpg)
Dr. Clincy Lecture 5
CS 4500
Ethernet implementation
![Page 6: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/6.jpg)
Dr. Clincy Lecture 6
CS 4500
Fast Ethernet implementation
100 Mbps Ethernet2-wire type (100BASE-TX or 100BASE-FX)
4-wire type (only 100BASE-T4)
To make faster, collision domain was decreased 10 fold (250 meters vs 2500 meters)
How did they go from 10Mbps to 100Mbps – collision domain
![Page 7: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/7.jpg)
Dr. Clincy Lecture 7
CS 4500
Fast Ethernet implementation
![Page 8: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/8.jpg)
Dr. Clincy Lecture 8
CS 4500
Fast Ethernet implementation
![Page 9: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/9.jpg)
Dr. Clincy Lecture 9
CS 4500
Gigabit Ethernet implementationNeed for data rates higher than 100 Mbps resulted in a 1000 Mbps Ethernet called gigabit Ethernet
Again, we had the choice to either decrease the collision domain or increase the minimum frame size
Because 25 meters for the 100 Mbps Ethernet was short enough, the minimum frame size was increased to get the desired speed
Another option is to do away with the CSMA/CD overhead by connecting every station to the hub using 2 separate paths (this will do away with collisions) – called full-duplex Ethernet (can still have half-duplex)
![Page 10: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/10.jpg)
Dr. Clincy Lecture 10
CS 4500
Gigabit Ethernet implementation
![Page 11: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/11.jpg)
Dr. Clincy Lecture 11
CS 4500
Ten-Gigabit Ethernet implementationNo half-duplex at all – only full duplex
![Page 12: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/12.jpg)
Dr. Clincy Lecture 12
CS 4500
Token Ring LAN
• Token Ring is a protocol defined by IEEE 802.5
• Use a token passing ACCESS method
Token Passing Method
• During idle times (network not being used), a token circulates
• The token is passed station to station until a station needs to send data
• When the station sends it’s data, it holds the token
• The data (or frame) circulates and get re-generated by each station
• The Rx takes in and COPY the frame (based on destination address)
• The data then continues back to the original Tx
• Token is then release to circulate
![Page 13: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/13.jpg)
Dr. Clincy Lecture 13
CS 4500
Token Ring layers• Uses the same layers as Ethernet (MAC and LLC)
• LLC Layer – logical link control layer – performs the error and flow control routines (same as Ethernet)
• MAC Layer – media access control layer –it implements the Token Passing Access Method (versus Ethernet’s CSMA/CD access method)
Token Ring
![Page 14: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/14.jpg)
Dr. Clincy Lecture 14
CS 4500
Token Ring Data frame• Token Ring frame defines 3 types of frames: data, token and abort
• Data Frame – carries a protocol data unit (actual data) and is addressed to a specific Rx (not broadcasted)
• Token Frame – is the placeholder frame (token) and uses only 3 of the 9 fields (SD, AC and ED)
• Abort Frame – doesn’t carry any info and is used to stop transmission
• SD – start delimiter – alert and synch the Rx
• AC – Access control - 3 bits set priority, 1 bit tells what type of frame, 1 bit is a monitor bit tells which station is monitoring or sending at the time, and 3 reservation bits for station wishing for access
• FC – Frame control – 1 bit tells if PDU is control info or data, 7 bits is used by Token Ring (ie. tells how to use AC field info)
• DA – Destination address
• SA – Source Address
• Data
• CRC – cyclic redundancy check – error checking
• ED – end delimiter – signals end of data
• FS – frame status – intermediate stations can set it letting the Tx know they read it, Rx can set it letting the Tx know it was copied and can be discarded now
![Page 15: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/15.jpg)
Dr. Clincy Lecture 15
CS 4500
Token Ring Implementation• Token Ring is a series of shielded twisted pair transport medium linking each station into a ring
• Because the token needs to pass through each station with in the ring, if a station is down, it could be a problem
• Therefore, for each station, a switch is used to by pass the down (or disabled) station
• These bypass switches are packaged together as a MAU – multi-station access unit
NOTE: As we covered last lecture, don’t confuse the Ring Token technology with the Ring topology. With a ring topology approach, you would want to traverse in either direction (this is the main benefit of a ring topology) – explain Ethernet in ring topology.
![Page 16: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/16.jpg)
Dr. Clincy Lecture 16
CS 4500
FDDI Ring• FDDI stands for Fiber Distributed Data
Interconnect• Data rate is the same as Fast Ethernet (100 Mbps)• Light signals versus electrical signals are used• Uses a token passing access method with self-
healing• What do we mean by “self healing” ? Ability to
detect and fix problems. The hardware automatically recognizes and fix problems
![Page 17: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/17.jpg)
Dr. Clincy Lecture 17
CS 4500
FDDI Ring• How does the “self-healing” works ?• Two independent rings connecting all stations are used – dual
counter-rotating rings• The second ring is used only if a failure occurs• Functions like a Token Ring LAN until a failure (ie. fiber cut, node
failure)• In this case, the intermediate (non-Rx) nodes keep copies of the sent
frame too
![Page 18: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/18.jpg)
Dr. Clincy Lecture 18
CS 4500
FDDI Ring• When the station detects it can’t communicate with the adjacent
station, it uses the second ring to bypass the adjacent station• Given a fiber cut or node failure, this station is bypassed and the
ring is closed
![Page 19: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/19.jpg)
Dr. Clincy Lecture 19
CS 4500
FDDI Frame
![Page 20: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/20.jpg)
Dr. Clincy Lecture 20
CS 4500
WIRELESS LANSWireless communication is one of the fastest growing technologies. The demand for connecting devices without the use of cables is increasing everywhere. Wireless LANs can be found on college campuses, in office buildings, and in many public areas. In this section, we concentrate on two
wireless technologies for LANs: 1) IEEE 802.11 wireless LANs,
sometimes called wireless Ethernet, 2) and Bluetooth, a technology for small
wireless LANs.
![Page 21: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/21.jpg)
Dr. Clincy Lecture 21
CS 4500
Wireless Transmission (not in book)
• Wireless devices can transmit signals using radio frequency narrow band, infrared waves and radio frequency spread spectrum.
• The frequency spread spectrum technique is typically used for internet applications
• Two types of frequency spread spectrum techniques: (1) FHSS- Frequency Hopping Spread Spectrum and (2) DSSS – Direct Sequence Spread Spectrum
![Page 22: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/22.jpg)
Dr. Clincy Lecture 22
CS 4500
FHSS- Frequency Hopping Spread Spectrum (not in book)
• Tx transmits at different carrier frequencies for the same period of time (rotates between a set of frequencies)
• The required bandwidth must be N times the original bandwidth, where N is the number of different carrier frequencies
• Tx and Rx must agree to the hopping pattern. In this case, the first bit signal is transmitted in spectrum 2.01-2.02Ghz, 2nd bit transmitted in the 2.03-2.04 Ghz spectrum, 3rd bit transmitted in the 2.04-2.05 GHz spectrum, etc..
• Good technique for security reasons – if someone tunes to one of the 5 frequency spectrums below, they would only get 1/5 of the info being transmitted.
![Page 23: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/23.jpg)
Dr. Clincy Lecture 23
CS 4500
DSSS – Direct Sequence Spread Spectrum (not in book)
• Each bit sent by the Tx is replaced with a set of bits called a “chip code”
• For the time it takes to send the original single bit, it now will take more time to send the chip code
• Therefore, the data rate must be N times the original data rate, where N is the # of bits of the chip code
• Also, the bandwidth for the chip code should N times greater than the original bit stream’s BW Example of original bits
being transmitted as 6-bit chip codes
![Page 24: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/24.jpg)
Dr. Clincy Lecture 24
CS 4500
ISM bands (not in book)
• In 1985, the FCC modified the radio spectrum to allow unlicensed devices (operating at 1 watt or less) to ISM bands – Industrial, Scientific and Medical bands
• Stimulated growth in wireless technology
![Page 25: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/25.jpg)
Dr. Clincy Lecture 25
CS 4500
Wireless LANs Architecture
• IEEE 802.11 covers 2 services – (1) BSS - Basic service set and (2) ESS – Extended service set
• BSS – is the base architecture for a wireless LAN – it contains a stationary or mobile stations and a central access point (optional)
• Without central access point, the BSS can’t transmit to other BSS’s
example ? example ?
![Page 26: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/26.jpg)
Dr. Clincy Lecture 26
CS 4500
Wireless LANs Architecture - ESS• Contains 2 or more BSS’s with central access points
• The BBS’s central access points are connected via a distribution system (could be a wired LAN) – this network is called an Infrastructure network
• BBS’s within reach of one another can communicate
• BBS’s not within reach have to communicate via the central access points
![Page 27: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/27.jpg)
Dr. Clincy Lecture 27
CS 4500
Wireless LANs Access Method• Wireless LANs use an access method similar to CSMA/CD access method discussed
last lecture
• The access method is called CSMA/CA (vs CSMA/CD) and stands for carrier sense multiple access with collision avoidance
• With CSMA/CA, all nodes have equal access and the medium is sensed before data is sent
• However, collision detection is not applicable because the environment is wireless – THEREFORE, COLLISIONS MUST BE AVOIDED.
CSMA/CA Process
• Each station determines how long it needs the medium and all other stations refrain from using it
• After the Tx detects the medium is free, it sends a RTS (request to send) and it contains the amount of time
• The Rx acknowledges the request by issuing a CTS (clear to send) to all stations
• Tx sends data
• Rx acknowledges the receipt of data
Example
![Page 28: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/28.jpg)
Dr. Clincy Lecture 28
CS 4500
CSMA/CA and NAV
SIFS
SIFS
All other stations
• • •
Source Destination
TimeTime Time Time
DIFS
RTS1
SIFS
CTS 2
Data3
ACK 4
NAV(No carrier sensing)
The way collisions are prevented is: when the Tx issues a RTS, a timer called Network Allocation Vector (NAV) is created for the duration of time for (1) to (4) above – all stations affected by this transmission uses the NAV in letting it know when it can check the channel for idleness
If free, Tx waits amount of time called distributed interframe space (DIFS)
After Rx receive RTS, it waits amount of time called short interframe space (SIFS), before send a CTS
![Page 29: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/29.jpg)
Dr. Clincy Lecture 29
CS 4500
Bluetooth
• Wireless LAN technology designed to:– connect devices of different functions (ie phone, camera, printer,
etc)– spontaneously form (devices find each other)– connect to the Internet– be small by nature – large size will cause chaos– Handle data rate of 1 Mbps with 2.4 GHz of bandwidth– Could incur interference between 802.11b wireless LAN and
Bluetooth LANS (802.15)
• The networks are called “Piconet”• Defined by standard 802.15 (PAN)
![Page 30: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/30.jpg)
Dr. Clincy Lecture 30
CS 4500
Bluetooth Architectures (2 types)• Can have up to 8 stations
• One station is the primary and the rest are secondary stations
• all secondary stations synch their clock to the primary station.
• The communications with the primary can be 1-to-1 or 1-to-many
• Can have an unused 8th secondary – must be activated to use and some existing secondary must be deactivated
• Multiple piconets combined is a Scatternet
• A secondary station in one piconet can be a primary station in a 2nd Piconet
![Page 31: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/31.jpg)
Dr. Clincy Lecture 31
CS 4500
Completing coverage of LAN technologies
![Page 32: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/32.jpg)
Dr. Clincy Lecture 32
CS 4500
Internet – Underlying Technologies• Recall the various types of interconnected networks comprising the Internet:
LANs, Point-to-Point WANs and Switched WANs
• We have covered LANS: Ethernet, Token Ring, Wireless and FDDI Ring
• Let’s cover the Point-to-Point WANsPoint-to-Point WANS
• Connect devices via a public network line (ie. telephone company)
• Telephone company – physical layer
• Point-to-Point WAN – data link layer and up
• Company services provided to make the connection:
• Modem (modem to switching station to ISP)
• DSL
• Cable Modem
• T Lines (ie. T1, T3)
• SONET (optical carriers)
![Page 33: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/33.jpg)
Dr. Clincy Lecture 33
CS 4500
Telephony/56K Modem
Uploading,quantization noise
Downloading,no quantization noise
Sampled 8000 times per sec with 8 bits per sample (1 bit for control) = 56 kps
Digital Signal
Analog Signal
Digital Data
![Page 34: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/34.jpg)
Dr. Clincy Lecture 34
CS 4500
P-to-P: DSL – Digital Subscriber Line• DSL – a set of technologies used to provide high-speed data service over copper wires that
connect between the central office and local residences/businesses without expensive repeaters.
• How is DSL implemented ? – high-speed DIGITAL WAN between COs – link between subscriber and the network is analog (becoming more and more digital though)
• How does DSL work ? – divides the given bandwidth into 3 bands and offer phone service on one band and up and down stream traffic on the other 2 – phone service can occur with NO interruptions.
What does POTS stands for ??Ranges changed for 4th Book Ed
![Page 35: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/35.jpg)
Dr. Clincy Lecture 35
CS 4500
P-to-P: Other DSL Services• RADSL – rate adaptive asymmetric DSL – scales back the
speed of ADSL based on the quality of the wire and distance between the CO and user.
• Side Note: A newer version of ADSL called Universal ADSL (or UADSL) is being deployed in an attempt to standardize ADSL to a set of standard speeds – speeds vary across the Country
• HDSL – high bit rate DSL – an digital alternative to T-1 analog service (T-1 contains multiple high-speed analog lines)
• SDSL – symmetric DSL – same as HDSL however only 1 line is provided (is full-duplex)
• VDSL – very high bit rate DSL – similar to ADSL however, in addition to using twisted-pair, coaxial and fiber-optic can be used in getting a much higher bit rate
![Page 36: CS4500CS4500 Dr. ClincyLecture1 Ch3: Underlying Technologies (2 of 3) Lecture #4 Finish LANs and start Pt-to-Pt WANs.](https://reader030.fdocuments.net/reader030/viewer/2022032604/56649e595503460f94b53974/html5/thumbnails/36.jpg)
Dr. Clincy Lecture 36
CS 4500
P-to-P: Cable Modem• Still talking about point-to-point WANS• Uses the cable TV network• How does it work ?. some of the bandwidth dedicated to television signals is used for
data traffic.• How does it work ?. The data signals are modulated into sine waves and placed on analog
channels• How does it work ?. Typically, the BW in a neighborhood (or certain proximity) is shared
(like a LAN in an office). Therefore, you never know if you have access to all of the BW. The more people using cable modems the worst the performance.
• Some cable companies can dedicate some BW for phone service therefore offering voice, video/TV and data services on one cable
• Cable modems are faster than computer modems because they are not limited by the 3000 Hz BW of the telephone line
• The newer cable systems uses digital cable boxes and digital networks can send/receive data on separate digital channels
• (draw picture of typical cable/video network – briefly explain history)