Escolar Documentos
Profissional Documentos
Cultura Documentos
UNIT -1
Network & OSI and TCP/IP Models:
Introduction to communication and networks, protocols and standards, hardware and software
requirement for networks, line configuration, network topologies, network transmission,
transmission modes, categories of networks, advantages of computer networks.
OSI and TCP/IP Models:
Layered architecture, functions of the layers, TCP/IP Protocol suite, comparison of models
Transmission media:
Guided and unguided media, Transmission impairment, Performance, wavelength, Shannon
capacity.
1.1 INTRODUCTION
This chapter provides an introduction to Computer networks and covers fundamental topics like
data, information to the definition of communication and computer networks.
The main objective of data communication and networking is to enable seamless exchange of
data between any two points in the world.
This exchange of data takes place over a computer network.
1.5.1 Simplex
Definition:
A computer network can be defined as a collection of nodes. A node can be any device capable of
transmitting or receiving data. The communicating nodes have to be connected by communication
links. A Compute network should ensure
reliability of the data communication process,
should see security of the data
performance by achieving higher data and smaller delay times
A. Local Area Networks (LAN) is usually limited to a few kilometers of area. It may be
privately owned and could be a network inside an office on one of the floor of a building or a
LAN could be a network consisting of the computers in a entire building.
B. Wide Area Network (WAN) is made of all the networks in a (geographically) large area. The
network in the entire state of Maharashtra could be a WAN
C. Metropolitan Area Network (MAN) is of size between LAN & WAN. It is larger than LAN
but smaller than WAN. It may comprise the entire network in a city like Mumbai.
1.7 PROTOCOL
A Protocol is one of the components of a data communications system. Without protocol
communication cannot occur. The sending device cannot just send the data and expect the
receiving device to receive and further interpret it correctly. When the sender sends a message it
may consist of text, number, images, etc. which are converted into bits and grouped into blocks to
be transmitted and often certain additional information called control information is also added to
help the receiver interpret the data.
For successful communication to occur, the sender and receiver must agree upon certain rules
called protocol.
Standard (ITU-T) 3. American National Standards Institute (ANSI) 4. Institute of Electrical &
Electronics Engineers (IEEE) 5. Electronic Industries Associates (EIA)
Examples of Forums
1. ATM Forum
2. MPLS Forum
3. Frame Relay Forum
Examples of Regulatory Agencies:
1. Federal Communications Committee (FCC)
HUBS
Hubs have no intelligence, meaning they cannot be programmed or have a memory of
devices that are plugged into its ports.
They are quite suitable for small networks but tend to perform poorly on large
networks.
Hubs typically come in both standard (10 Mbps) and Fast Ethernet (100 Mbps)
versions.
SWITCHES
Switches look nearly identical to hubs, but a switch generally contains more
‘intelligence’ than a hub.
Unlike hubs, network switches are capable of inspecting the data packets as they
are received, determining the source and destination device of that packet, and
forwarding that packet appropriately.
By delivering messages only to the connected device that it was intended for,
network switches conserve network bandwidth and offer generally better
performance than hubs.
Most switches are active: that is, they electrically amplify the signal as it moves
from one device to another.
ROUTERS
Routers translate information from one network to another; it is similar to a bridge
with extra intelligence.
7
Routers select the best path to route a message, based on the destination address and
origin.
The router can direct traffic to prevent head-on collisions, and is smart enough to
know when to direct traffic along back roads and shortcuts.
While bridges know the addresses of all computers on each side of the network,
routers know the addresses of computers, bridges, and other routers on the network.
Routers can even ‘listen’ to the entire network to determine which sections are busiest
- they can then redirect data around those sections until they clear up.
BRIDGES
Bridges are devices that allow you to segment a large network into two small, more
efficient networks.
If you are adding an older wiring scheme and want the new network to be up-
to-date, a bridge can connect the two.
A bridge monitors the information traffic on both sides of the network so that it can
pass packets of information to the correct location.
Most bridges can ‘listen’ to the network and automatically figure out the address of
each computer on both sides of the bridge.
The bridge can inspect each message and, if necessary, broadcast it on the other side
of the network.
Bridges manage the traffic to maintain optimum performance on both sides of the
network.
Bridges can be used to connect different types of cabling as long as both networks are
using the same protocol.
GATEWAYS
Gateways are able to connect networks that use completely different protocols or data
formats, such as a LAN to a mainframe.
Generally, a gateway is a combination of hardware and software with the built-in
processing power necessary to perform protocol conversions.
A gateway is slower than a bridge or router.
MODEMS
Modems (MODulator DEModulator) convert data between the analogue form used on
telephone lines and the digital form used on computers.
ADSL modems (also called ADSL routers) are used on many networks to provide the
required connectivity to the Internet.
These modems typically have a reasonable level of intelligence and are capable of
performing a number of advanced networking features including DHCP and Firewall
services.
ADSL modems are a popular choice for connecting small- to medium-size
organisational networks to the Internet using an established ISP.
Point-to-Point
A Point to Point Line Configuration Provide dedicated link between two devices use actual
length of wire or cable to connect the two end including microwave & satellite link. Infrared
remote control & tvs remote control.
The entire capacity of the channel is reserved for transmission between those two devices.
Most point-to-point line configurations use an actual length of wire or cable to connect the
two ends, but other options, such as microwave or satellite links, are also possible.
Point to point network topology is considered to be one of the easiest and most conventional
network topologies. It is also the simplest to establish and understand. To visualize, one can
consider point to point network topology as two phones connected end to end for a two-way
communication
Multipoint Configuration
Multipoint Configuration also known as Multidrop line configuration one or more than
two specific devices share a single link capacity of the channel is shared.
More than two devices share the Link that is the capacity of the channel is shared now. With
shared capacity, there can be two possibilities in a Multipoint Line Config:
Spatial Sharing: If several devices can share the link simultaneously, its called
Spatially shared line configuration
Temporal (Time) Sharing: If users must take turns using the link , then its called
Temporally shared or Time Shared Line Configuration.
Mesh
Every device has a dedicated pt 2 pt link to every other device. Dedicated means that link
carries traffic only between two devices it connects. In mesh topology to find no of physical
links in fully connected mesh network with n nodes we must consider that each mode is
connected to every other node. We need n(n-1)/2 duplex mode links.
Advantages:
It is less expensive than mesh topology.
In star, each device needs only one link and one I/O port to connect it to any number
of others. This makes it easy to install and reconfigure.
Far less cabling needs to be housed and additions, moves, and deletions involves only
on reconnection between the device and the hub.
10
Advantage: -
Ease of installation, bus uses less cabling than mesh or star, redundancy is eliminated.
Disadvantages: -
Difficult reconnection & fault isolation.
Difficult to add new devices.
Ring topology: Each device has a dedicated point to point connection with only the two
devices on either side of it. A signal is passed along the ring in one direction, from device to
device, until it reaches its destination. Each device in the ring incorporates a repeater. When a
device receives a signal intended for a device, its repeater regenerates the bits and passes
them along.
Advantages:
A ring is easy to install and reconfigure. Each device is linked to only its immediate neighbors.
To add or delete a device requires changing only two connections.
Fault isolation is simplified.
Disadvantage:
Unidirectional traffic can be a disadvantage.
In a simple ring, a break in the ring can disable the entire network.
Tree or Expanded Star
A tree topology combines characteristics of linear bus and star topologies. It consists of
groups of star-configured workstations connected to a linear bus backbone cable (See fig. 3).
Tree topologies allow for the expansion of an existing network, and enable schools to
configure a network to meet their needs.
11
run at speeds of 10 Mbps to 100 Mbps, have low delay (microseconds or nanoseconds), and
make very few errors. Newer LANs operate at up to 10 Gbps.
ADVANTAGES OF LAN
1. It allows sharing of expensive resources such as Laser printers, software and mass storage devices
among a number of computers.
2. LAN allows for high-speed exchange of essential information.
3. It contributes to increased productivity. A LAN installation should be studied closely in the context
of its proposed contribution to the long range interest of the organization.
DISADVANTAGES OF LAN
1. The financial cost of LAN is still high in comparison with many other alternatives.
2. It requires memory space in each of the computers used on the network. This reduces the memory
space available for the user’s programs.
3. Some type of security system must be implemented if it is important to protect confidential data.
4. Some control on the part of the user is lost. You may have to share a printer with other users. You
may face a situation like, for example, the entire network suddenly locking up because one user has
made a mistake.
Starting when the Internet attracted a mass audience, the cable TV network operators began
to realize that with some changes to the system, they could provide two-way Internet service
in unused parts of the spectrum. At that point, the cable TV system began to morph from a
way to distribute television to a metropolitan area network.
1) The network size falls intermediate between LAN and WAN. A MAN typically covers an area of
between 5 and 50 km diameter. Many MANs cover an area the size of a city, although in some cases
MANs may be as small as a group of buildings or as large as the North of Scotland.
13
2) A MAN often acts as a high speed network to allow sharing of regional resources. It is also
frequently used to provide a shared connection to other networks using a link to a WAN.
Characteristics of MAN
1) It generally covers towns and cities (50 kms)
2) It is developed in 1980s.
3) Communication medium used for MAN are optical fibers, cables etc.
4) Data rates adequate for distributed computing applications.
Characteristics of WAN
1) It generally covers large distances (states, countries, continents).
2) Communication medium used are satellite, public telephone networks which are connected by
routers.
3) Routers forward packets from one to another (Table 1) a route from the sender to
the receiver.
Wireless Local Area Network
As the term implies, a WAN spans a large physical distance. The Internet is the largest WAN,
spanning the Earth. A WAN is a geographically-dispersed collection of LANs. A network
device called a router connects LANs to a WAN. In IP networking, the router maintains both
a LAN address and a WAN address. A WAN differs from a LAN in several important ways.
Most WANs (like the Internet) are not owned by any one organization but rather exist under
collective or distributed ownership and management. WANs tend to use technology like
ATM, Frame Relay and X.25 for connectivity over the longer distances.
14
15
1.14 OSI and TCP/IP Models: Layers and their functions, comparison of
models.
The OSI model (minus the physical medium) is shown in Fig.1.1. This model is based on a
proposal developed by the International Standards Organization (ISO) as a first step toward
international standardization of the protocols used in the various layers (Day and
Zimmermann, 1983). It was revised in 1995 (Day, 1995). The model is called the ISO OSI
(Open Systems Interconnection) Reference Model because it deals with connecting open
systems—that is, systems that are open for communication with other systems. We will just
call it the OSI model for short.
16
There are 7 layers in the OSI model. Each layer is responsible for a particular aspect of data
communication. For example, one layer may be responsible for establishing connections
between devices, while another layer may be responsible for error checking during transfer.
The layers of the OSI model are divided into two groups: the upper layer and lower layer. The
upper layers focus on user applications and how files are represented on the computers prior
to transport. For the most part, network engineers are more concerned with the lower layers.
It's the lower layers that concentrate on how the communication across a network actually
occurs.
17
18
19
1) Physical Layer
The Physical Layer is the lowest layer in the OSI model and is concerned with how the
physical structure of the network enables transmission of data. It is responsible for defining
the mechanical and electrical specifications for the transmission medium within a connection,
as well as the transformation or encoding of data into “bits”.
Examples: EIA/TIA-232, V.35, EIA/TIA-449, RJ-45, Ethernet, 802.3
• Line Configuration: The physical layer is concerned with the connection of device to
the media. In a point to point configuration two devices are connected to a dedicated
link. In a multipoint configuration a link is shared among several devices.
• Physical Topology: The physical topology defines how devices are connected to make
a network. Devices can be connected by using star, mesh, bus, hybrid, ring topologies.
• Transmission Mode: The physical layer also defines the direction of transmission
between two devices such as simplex or half duplex or full duplex
2) Data Link: -
LAN and WAN protocols occupy the bottom two layers of the OSI model. These two layers,
Physical Layer and Data Link Layer, work very closely together to ensure data transfer across
the physical network. Examples: HDLC, Frame Relay, PPP, ATM, FDDI, IEEE 802.3/802.2
To accomplish accurate delivery, the Data Link Layer provides the following services:
1. Machine address determination of both sending and receiving machines
2. Formatting of Network Layer "packets" into frames with machine addresses attached
3. Sequencing and re- sequencing of frames transmitted out of sequence
Data Link Sub layers: -
Logical Link Control (LLC) responsible for identifying Network layer protocols and
encapsulating them.
Media Access Control (MAC) defines how packets are placed on media.
3) Network Layer: -
The Network Layer is the 3rd layer in the OSI model and is responsible for identifying
computers on a network. This layer works closely with layer 2 to translate data packets from
a logical address (similar to an IP address) into hardware based MAC addresses.
This layer is concerned with 2 functions:
• Routing
• Fragmentation / Reassembly
22
4) Transport Layer
The basic roles of the Transport Layer are to establish end-to-end connections from one
computer to another on the network and provide reliable "transport" of data between devices.
Flow Control
Once the connection has occurred and transfer is in progress, congestion of the data flow can
occur at a destination for a variety of reasons. Possible options include:
The destination can become overwhelmed if multiple devices are trying to send it data
at the same time.
It may become overwhelmed if the source is sending faster than it can physically
receive.
5) Session Layer
The Session Layer establishes, manages, and terminates sessions (different from
connections) between applications as they interact on different hosts on a network.
Its main job is to coordinate the service requests and responses between different hosts for
applications.
Examples: NFS, SQL, RPC, ASP
Three different communication modes exists for data transfer within a session connection:
• Single-duplex
• Half-duplex
• Full-duplex.
Session Layer Services
• Dialog Control: It allows two systems to enter into dialog and communication
between two processes to take place in either half duplex or full duplex.
• Synchronization: It allows the process to add check point or synchronization points
to stream of data.
6) Presentation Layer
The Presentation Layer manipulates the representation of data for transfer to applications on
different devices.
the info from its sender dependent format into a common format. This layer at the
receiving machine changes the common format into its receiver dependent format.
• Encryption: A system must be able to ensure privacy. Encryption means that the
sender transforms the original info into another form and sends the resulting message
out over the network. Decryption does the reverse at the receiving side.
• Compression: Data compression reduces the number of bits contained in the info.
Data Compression becomes particularly important in the transmission of multimedia
such as text, audio, and video.
Just like the OSI model, the TCP/IP model has many layers which are described below:
Host to Host Network: In fact, TCP/IP model does not specify this layer. But it basically
combines functionally of physical and data link layers. Starting at the bottom, the Physical
layer is what deals with hardware (wires, cables, satellite links, NICs, etc.). Utilizing the
existing Physical layer, TCP/IP does not define its own, thus letting the layer be compatible
with all network suites. This layer also encodes and
transmits data over network communications media in the form of bits which are received by
the Physical layer of the destination device. Often combined with this layer is the Data link
layer which is responsible for moving packets from the network layer onto different hosts.
Depending on the connection type, IP packets are transmitted using various methods. Dialup
modems transmit IP packets using PPP
while broadband users transmit using PPoE.
26
Internet Layer: This layer routes and delivers data across similar networks or completely
different networks. The Network layer is responsible for end to end packet delivery while
maintaining routing, flow control, and error control functions. An example of this layer is the
actual Internet Protocol (IP) or the Internet Protocol Security (IPSec).
Transport Layer: The Network layer can be thought of the actual vehicle which transports
information. This layer categorizes end to end message transmissions or connecting
applications as either transmission Control Protocol (TCP) or User Datagram Protocol
(UDP). TCP is a connection oriented protocol which is considered to provide a reliable byte
stream. Some characteristics of TCP are traffic congestion control, data arrives in order, data
has minimal error, and duplicate data is discarded.
The top layer of the TCP/IP model is the Application layer which is used for network
communication. Ports are used by programs to transfer data through this layer. For example,
the File Transfer Protocol uses port 21 while the Hypertext Transfer Protocol uses port 80.
TCP/IP has many benefits. TCP/IP enables crossplatform networking which is useful in this
day image.
This suite also has superior failure recovery and the ability to add networks without
interrupting existing services. The reliability of TCP/IP is also a huge benefit to using this
protocol. The fact that if one part of the network goes down, other parts are still able to
function is what has set TCP/IP above other networking protocols. TCP/IP is also easily
expandable which allows for the unprecedented rate of growth which the Internet possesses.
The OSI and TCP/IP reference models have much in common. Both are based on the concept
of a stack of independent protocols. Also, the functionality of the layers is roughly similar.
For example, in both models the layers up through and including the transport layer are there
to provide an end-to-end, network-independent transport service to processes wishing to
communicate. These layers form the transport provider. Again in both models, the layers
above transport are application-oriented users of the transport service.
Despite these fundamental similarities, the two models also have many differences. In this
section we will focus on the key differences between the two reference models. It is
important to note that we are comparing the reference models here, not the corresponding
27
protocol stacks. The protocols themselves will be discussed later. For an entire book
comparing and contrasting TCP/IP and OSI, see (Piscitello and Chapin, 1993).
Three concepts are central to the OSI model:
1. Services.
2. Interfaces.
3. Protocols.
Probably the biggest contribution of the OSI model is to make the distinction between these
three concepts explicit. Each layer performs some services for the layer above it. The service
definition tells what the layer does, not how entities above it access it or how the layer works.
It defines the layer's semantics.
A layer's interface tells the processes above it how to access it. It specifies what the
parameters are and what results to expect. It, too, says nothing about how the layer works
inside.
Finally, the peer protocols used in a layer are the layer's own business. It can use any
protocols it wants to, as long as it gets the job done (i.e., provides the offered services). It can
also change them at will without affecting software in higher layers.
These ideas fit very nicely with modern ideas about object-oriented programming. An object,
like a layer, has a set of methods (operations) that processes outside the object can invoke.
The semantics of these methods define the set of services that the object offers. The methods'
parameters and results form the object's interface. The code internal to the object is its
protocol and is not visible or of any concern outside the object.
The TCP/IP model did not originally clearly distinguish between service, interface, and
protocol, although people have tried to retrofit it after the fact to make it more OSI-like. For
example, the only real services offered by the internet layer are SEND IP PACKET and
RECEIVE IP PACKET.
As a consequence, the protocols in the OSI model are better hidden than in the TCP/IP model
and can be replaced relatively easily as the technology changes. Being able to make such
changes is one of the main purposes of having layered protocols in the first place.
The OSI reference model was devised before the corresponding protocols were invented. This
ordering means that the model was not biased toward one particular set of protocols, a fact
that made it quite general. The downside of this ordering is that the designers did not have
much experience with the subject and did not have a good idea of which functionality to put
in which layer.
For example, the data link layer originally dealt only with point-to-point networks. When
broadcast networks came around, a new sublayer had to be hacked into the model. When
people started to build real networks using the OSI model and existing protocols, it was
discovered that these networks did not match the required service specifications (wonder of
wonders), so convergence sublayers had to be grafted onto the model to provide a place for
papering over the differences. Finally, the committee originally expected that each country
would have one network, run by the government and using the OSI protocols, so no thought
was given to internetworking. To make a long story short, things did not turn out that way.
With TCP/IP the reverse was true: the protocols came first, and the model was really just a
description of the existing protocols. There was no problem with the protocols fitting the
model. They fit perfectly. The only trouble was that the model did not fit any other protocol
stacks. Consequently, it was not especially useful for describing other, non-TCP/IP networks.
Turning from philosophical matters to more specific ones, an obvious difference between the
two models is the number of layers: the OSI model has seven layers and the TCP/IP has four
layers. Both have (inter)network, transport, and application layers, but the other layers are
different.
Another difference is in the area of connectionless versus connection-oriented
communication. The OSI model supports both connectionless and connection-oriented
communication in the network layer, but only connection-oriented communication in the
transport layer, where it counts (because the transport service is visible to the users). The
28
TCP/IP model has only one mode in the network layer (connectionless) but supports both
modes in the transport layer, giving the users a choice. This choice is especially important for
simple request-response protocols.
1.15 GUIDED MEDIA
The guided transmission media includes cables/wires to transmit the information from source
to destination. The wire may be made up of copper or other metal or may be of glass/fiber. It
includes electrical and light signals to flow in these wires. But these cables are very sensitive
to noise and this degrades the signal also called as attenuation. There are three types of
guided media transmission cables.
III.
Optical Fiber:
These cables are made up of glass or plastic fibers. Its sources are LED or laser diodes. It
uses light beam to transmit the signals. Firstly, the signal converted in to light signal from
electrical signal. It has core and cladding; core is under the cladding. The refractive index of
cladding is lower than that of core.
Advantages:
1. It is protected to electro-magnetic interference, as it used light signals.
2. It is suitable in all types of environment.
3. It guarantees the secure transmission of information.
Disadvantages:
1. It is quite tough to install the equipment of optical fibers.
2. It is expensive.
3. Connection losses are common problems in optical fiber.
Types:
i. Single node: It supports the segment length of up to 2 kilometers.
ii. Multi node: It supports the segment length of up to 100 kilometers.
UNGUIDED MEDIA
Radio Waves
Radio waves are a type of electromagnetic radiation with wavelengths in the electromagnetic
spectrum longer than infrared light. Like all other electromagnetic waves, they travel at the
speed of light. Naturally-occurring radio waves are made by lightning, or by astronomical
objects Artificially generated radio waves are used for fixed and mobile radio
communication, broadcasting, radar and other navigation systems, satellite communication,
computer networks and innumerable other applications.
Different frequencies of radio waves have different propagation characteristics in the Earth's
atmosphere; long waves may cover a part of the Earth very consistently, shorter waves can
reflect off the ionosphere and travel around the world, and much shorter wavelengths bend or
reflect very little and travel on a line of sight.
Range:
2GHz-6GHz: 70km
18GHz-45GHz: 1.6-8km
Microwave
Microwave transmission is line of sight transmission. The transmit station must be in visible
contact with the receive station. This sets a limit on the distance between stations depending
on the local geography. Typically, the line of sight due to the Earth's curvature is only 50 km
to the horizon! Repeater stations must be placed so the data signal can hop, skip and jump
across the country.
30
Microwaves operate at high operating frequencies of 3 to 10 GHz. This allows them to carry
large quantities of data due to their large bandwidth.
Advantages:
a. They require no right of way acquisition between towers.
b. They can carry high quantities of information due to their high operating frequencies.
c. Low cost land purchase: each tower occupies only a small area.
d. High frequency/short wavelength signals require small antennae.
Disadvantages:
a. Attenuation by solid objects: birds, rain, snow and fog.
b. Reflected from flat surfaces like water and metal.
c. Diffracted (split) around solid objects.
d. Refracted by atmosphere, thus causing beam to be projected away from receiver.
Satellite
Satellites are transponders (units that receive on one frequency and retransmit on another)
that are set in geostationary orbits directly over the equator. These geostationary orbits are
36,000 km from the Earth's surface. At this point, the gravitational pull of the Earth and the
centrifugal force of Earth's rotation are balanced and cancel each other out. Centrifugal force
is the rotational force placed on the satellite that wants to fling it out into space.
The uplink is the transmitter of data to the satellite. The downlink is the
receiver of data. Uplinks and downlinks are also called Earth stations
because they are located on the Earth. The footprint is the "shadow" that
the satellite can transmit to, the shadow being the area that can receive
the satellite's transmitted signal.
S.No.
Guided Media Unguided Media
The signal energy propagates within theThe signal energy propagates through
1.
guided media.i.e. through wires. air.
It is mainly suited for point to point lineIt is mainly used for broadcasting
2.
configurations. purpose.
31
The signal propagates in the form ofThe signal propagates in the form of
3.
voltage, current or photons. electromagnetic waves.
We need to consider the average signal power and average noise power because this may
change with time. Figure shown below shows the idea of SNR
32
A high SNR means the signal is less corrupted by noise. A low SNR means the signal is more
corrupted by the noise because SNR is the ratio of two powers. It is often described in decibel
unit, SNRdB, defined as
Throughput
It is a measure of how fast we can actually send data through a network. Although at
first glance, bandwidth in bits/sec and throughput seems the same.
The bandwidth is a potential measurement of link but throughput is an actual measurement
of how fast we send data.
Propagation Time
It measures the time required for bit to travel from source to destination. The propagation time is
calculated by dividing the distance by propagation speed.
Propagation Time = Distance/Propagation Speed
Propagation Speed of electromagnetic signals depends on medium and on frequency of signal.
For eg. In vacuum light is propagated with a speed of 3x 108 m/sec.
Wavelength
It is another characteristic of a signal travelling through a transmission medium. It binds the
period or frequency of simple sine wave to the propagation speed of the medium. The
frequency of the signal is independent of the medium, the wavelength depends on frequency
and medium.
Shanon Capacity
As early as 1924, an AT&T engineer, Henry Nyquist, realized that even a perfect channel has a
finite transmission capacity. He derived an equation expressing the maximum data rate for a finite
bandwidth noiseless channel. In 1948, Claude Shannon carried Nyquist's work further and extended
it to the case of a channel subject to random (that is, thermodynamic) noise (Shannon, 1948). We
will just briefly summarize their now classical results here. Nyquist proved that if a random signal
has been run through a low-pass filter of bandwidth H, the filtered signal can be completely
reconstructed by making only 2H (exact) samples per second. Sampling the line faster than 2H
times per second is pointless because the higher frequency components that such sampling could
recover have already been filtered out. If the signal consists of V discrete levels, Nyquist's theorem
states:
For example, a noiseless 3-kHz channel cannot transmit binary (i.e., two-level) signals at a rate
exceeding 6000 bps. So far we have considered only noiseless channels. If random noise is present,
the situation deteriorates rapidly. And there is always random (thermal) noise present due to the
motion of the molecules in the system. The amount of thermal noise present is measured by the
ratio of the signal power to the noise power, called the signal-to-noise ratio. If we denote the signal
power by S and the noise power by N, the signal-to-noise ratio is S/N. Usually, the ratio itself is not
quoted; instead, the quantity 10 log 10 S/N is given. These units are called decibels (dB). An S/N
ratio of 10 is 10 dB, a ratio of 100 is 20 dB, a ratio of 1000 is 30 dB, and so on. The manufacturers
of stereo amplifiers often characterize the bandwidth (frequency range) over which their product is
linear by giving the 3-dB frequency on each end. These are the points at which the amplification
factor has been approximately halved (because log 103 0.5). Shannon's major result is that the
maximum data rate of a noisy channel whose bandwidth is H Hz, and whose signal-to-noise ratio is
S/N, is given by
For example, a channel of 3000-Hz bandwidth with a signal to thermal noise ratio of 30 dB (typical
parameters of the analog part of the telephone system) can never transmit much more than 30,000
33
bps, no matter how many or how few signal levels are used and no matter how often or how
infrequently samples are taken. Shannon's result was derived from information-theory arguments
and applies to any channel subject to thermal noise. Counterexamples should be treated in the same
category as perpetual motion machines. It should be noted that this is only an upper bound and real
systems rarely achieve it.