Basic Communication Technology
Basic Communication Technology
Basic Communication Technology
Concepts Reinforced
Top-down model I-P-O Model
Modulation techniques Protocols and compatibility
Transmission services Multiplexing
Concepts Introduced
Communications media Cable modem technologies
Wireless point-to-point Serial technologies
technologies Internet service providers
Dial-up modem technologies DSL technologies
OBJECTIVES
After mastering the material in this chapter you should:
■ INTRODUCTION
This chapter begins an in-depth analysis of the OSI Network Reference Model layers
that is carried forward through chapter 8. As detailed in chapter 1, the OSI Network
Reference Model can easily be mapped onto other protocol models such as the
TCP/IP model. This mapping will be detailed throughout the coming chapters.
This chapter introduces communication media, basic point-to-point data com-
munications technologies, and Internet access technologies. It takes the basic con-
cepts introduced in chapter 2 and maps them to real-world technologies that a
typical student interacts with on a daily basis. In addition to technical details,
emphasis is placed on the application and business implications of the technolo-
gies introduced.
■ PHYSICAL LAYER
The first layer of the OSI Network Reference Model, the physical layer, is responsible
for the establishment, maintenance, and termination of physical connections
between communicating devices. The physical layer transmits and receives a stream
of bits. There is no data recognition at the physical layer. The physical layer is
mapped onto the TCP/IP model as the bottom part of the network access layer that
also contains the OSI datalink layer.
Specifically, physical layer operation is controlled by protocols that define the
electrical, mechanical, and procedural specifications for data transmission. Strictly
speaking, the physical layer does not define the specifications for media and connec-
tors. These specifications are sometimes referred to as belonging to Layer zero of the
model, as they underlie layer one.
■ COMMUNICATIONS MEDIA
Although communications media are technically not part of the OSI Network Refer-
ence or TCP/IP models, their importance cannot be understated. Without some sort
of connection between two devices they will not be able to communicate; regardless
of the hardware and protocols used. In this way media is analogous to a highway; it
does not do you any good to have a Ferrari if you need to travel across a swamp that
has no roads.
When two devices that have been working flawlessly cease to operate, there is a
very good chance that the problem can be directly attributed to problems with the
media connecting the devices. Perhaps the first mantra of network troubleshooting
should be, “Check the physical layer.”
There are many different types of data communications media. This section
details commonly used media, their characteristics, and typical application.
The type of phone wire installed in most homes built prior to the mid-1990s consists
of a tan plastic jacket containing four untwisted wires: red, yellow, green, and black.
This cable is typically referred to as four conductor station wire or RYGB. While
Communications Media 73
capable of carrying an analog telephone call, this type of wire is not suitable for data
transmission and should not be confused with unshielded twisted pair (UTP).
Another popular type of phone wiring is flat gray modular cable, also known as
gray satin or silver satin. Inside this flat gray jacket are two, four, six, or eight wires,
which are crimped into either RJ-11 (4 wire), RJ-12 (6 wire), or RJ-45 plugs (8-wire)
using a specialized crimping tool. Premises phone wiring as well as phones; crimp
tools, RJ plugs, and flat gray modular wire are attainable at nearly any hardware or
department store.
Flat gray modular wire is not the same as twisted pair and is suitable only for
carrying data at fairly slow speeds over short distances. For instance, this type of
cable is often used between a PC or workstation and a nearby RJ-11 jack for access to
the telephone system or to carry RS-232 serial communication signals.
Twisted-pair wiring consists of one or more pairs of insulated copper wire twisted
around each other at varying lengths ranging from 2 to 12 twists per foot. The twist-
ing is used as a mechanism to reduce interference between pairs and from outside
sources such as electric motors and fluorescent lights that can cause data errors and
necessitate retransmission. These individually twisted pairs are then grouped
together and covered with a plastic or vinyl jacket, or sheath. No additional shielding
is added before the pairs are wrapped in the plastic jacket. Thus, the completed prod-
uct is known as unshielded twisted pair or UTP. The most common numbers of
pairs combined to form the unshielded twisted pair cables are 2, 3, 4, and 25 pairs of
twisted copper wire..
All UTP cables are not created equal. One of the common appeals of UTP is that it
is often already installed in modern buildings for the purpose of carrying voice con-
versations from telephone handsets to a voice PBX. Most often, when the twisted-pair
wiring for the voice PBX was installed, extra pairs were wired to each office location.
Some people jump to the conclusion that they don’t need to invest in any new wiring
to carry data transmission throughout their building–they can just use the extra pairs
of the existing UTP wiring. The problem lies in the fact that there are six different cate-
gories of UTP as specified by EIA/TIA 568 (Electronics Industry Association/Telecom-
munications Industry Association). EIA/TIA 568 also specifies the following:
• The topology, cable types, and connector types to be used in EIA/TIA 568
compliant wiring schemes
• The minimum performance specifications for cabling, connectors and com-
ponents—such as wall plates, punch down blocks, and patch panels to be
used in an EIA/TIA 568 compliant installation
Wire thickness is measured by gauge and represented with the unit AWG
(American Wire Gauge). The higher the gauge number, the thinner the wire. UTP
wiring of different categories must meet specifications for resistance to different
forces that interfere with signal strength. Two of the more common sources of inter-
ference or loss of signal strength are as follows:
BEYOND CAT 6
Although no official category 7 cable has become standardized, media vendors are
attempting to develop cable that is capable of carrying data at frequencies of up to
600 MHz. Some such attempts are not truly unshielded twisted pair but rather are
FTP or foil-twisted-pair cable that is more closely related to shielded twisted pair.
Practical Advice Buyers must be wary of so-called category 7 cable by focusing on whether the cable
and Information is truly UTP and whether it is a specified EIA/TIA standard.
Anixter, a major cabling manufacturer, has proposed a program to define perfor-
mance characteristics for cabling tested beyond the 100 MHz required for cat 5. Since
higher-speed network architectures such as fast Ethernet and gigabit Ethernet
require four pair of UTP to be transmitting power simultaneously, it was determined
Communications Media 75
that crosstalk should be measured by taking into account the crosstalk influence
from all pairs in the cable (whether 4-pair or 25-pair) rather than just crosstalk
between adjacent pairs, or pair-to-pair, as had been required for cat 5 certification.
This type of crosstalk test is called Powersum Crosstalk. Key performance specifica-
tions for Level 5, 6, 7 are detailed in Figure 3-2.
Regardless of the final standard for category 7 cable, it is likely that the standard
will not support the venerable RJ-45 connector. The design of the RJ-45 simply pro-
motes too much crosstalk to effectively support the higher data speeds associated
with category 7. However, changing the cable could spell the end of the category 7
project. If the connector changes, then it would not be possible to use category 7 cable
and connectors with existing data communication technologies such as fast and giga-
bit Ethernet. Without this backward compatibility, many buyers might simply
choose to migrate their cable plants directly to fiber-optic cable to take advantage of
its even higher bandwidth.
Data transmission characteristics, and therefore the data transmission speed, can be
improved by adding shielding around each individual pair and the entire group of
twisted pairs. This shielding may be a metallic foil or copper braid. The function of
the shield is simple. It “shields” the individual twisted pairs as well as the entire
cable from either EMI (Electromagnetic Interference) or RFI (Radio Frequency Inter-
ference). However, installation of shielded twisted pair can be tricky.
76 Chapter Three/Basic Data Communication Technology
The shielding is metal and therefore a conductor. Often, the shielding is termi-
nated in a drain wire that must be properly grounded on one end of the cable. It is
critical that the shield be grounded on only one end or a ground loop can occur. In a
ground loop a small current flows across the shield from the ground connector at one
end of the cable to the ground connector at the other end of the cable. This current
can actually decrease performance by inducing noise directly into the signal wires—
quite the opposite of why the shielding was added.
Shielded twisted pair is becoming much less common. STP was commonly spec-
ified for token ring installations. However, recent technologies such as high-speed
Ethernet, ATM, and other high-speed network architectures have specified category
5+ UTP rather than STP.
Coaxial Cable
Coaxial cable, more commonly known as coax or cable TV cable, has specialized
insulators and shielding separating two conductors, allowing reliable, high-speed
data transmission over relatively long distances. Figure 3-3 illustrates a cross-section
of a typical coaxial cable. Coax comes in various thicknesses and has been histori-
cally used in Ethernet network architectures. In some cases, these network architec-
ture specifications include required characteristics of the (physical layer) coaxial
cable over which the (data-link layer) MAC layer protocol is transmitted.
Modern local area network implementations rarely use coaxial cable. However,
coaxial cable is still a key component of the cable television system. With the advent
of cable modems and the use of the cable television system as a mechanism to pro-
vide high-speed Internet connectivity to homes coaxial cable continues to play an
important role in data communication.
Fiber-Optic Cable
Fiber-optic cable is the current reliability and performance champion of the data
communication world. Although the most expensive media choice currently avail-
able, fiber-optic media delivers data transmission speeds measured in gigabytes (bil-
lions of characters) per second over distances often measured in miles.
Fiber-optic cable is also one of the most secure of all media, as it is relatively un-
tappable, transmitting only pulses of light, unlike all of the aforementioned media,
which transmit varying levels of electrical pulses. Because fiber optic is really a thin
Light Transmission Modes Once a pulse of light enters the core of the fiber-optic cable,
it will behave differently, depending on the physical characteristics of the core and
cladding of the fiber-optic cable. In a Multimode or Multimode Step Index fiber-
optic cable, the rays of light will bounce off of the cladding at different angles and
continue down the core while others will be absorbed in the cladding. These multiple
rays at varying angles cause distortion and limit the overall transmission capabilities
of the fiber. This type of fiber-optic cable is capable of high bandwidth transmission
but usually over fairly short distances.
By gradually decreasing a characteristic of the core known as the refractive index
from the center to the outer edge, reflected rays are focused along the core more effi-
ciently yielding higher bandwidth over several kilometers. This type of fiber-optic
cable is known as Multimode Graded Index Fiber.
The third type of fiber-optic cable seeks to focus the rays of light even further so
that only a single wavelength can pass through at a time, in a fiber type known as
single mode. Without numerous reflections of rays at multiple angles, distortion is
eliminated and bandwidth is maximized. Single mode is the most expensive fiber-
optic cable, but can be used over the longest distances.
Core Thickness The thickness of fiber-optic cable’s core and cladding is measured in
microns (millionths of an inch). The three major core thicknesses are 50, 62, and 100
microns with their associated claddings being 125, 125, and 140 microns, respec-
tively. The increasing core thicknesses generally allow transmission over longer dis-
tances at a greater expense, however.
Light Source Wavelength The wavelength of the light that is pulsed onto the fiber-
optic cable is measured in nanometers (nm), with the optimal light transmitting
wavelengths coming in three distinct windows of 820 nm, 1,310 nm, and 1,500 nm;
820nm and 1,310nm are most often used for local and campus-wide networking
such as gigabit Ethernet, while 1,310nm and 1,500nm are used by carriers to deliver
high bandwidth fiber-based service over long distances. The higher-frequency light-
emitting sources carry a higher price tag.
Architectures
Gigabit Ethernet
Fast Ethernet
Ethernet
Distance
ATM
Media Type Also Called Bandwidth Limits Connectors Comments/Applications
Applied Problem
4-wire phone Quad RYGB 3 Kbps 200 feet RJ-11 jacks 4 insulated wired-
Solving station wire red,green, yellow, black.
Home phone wiring. Voice
Applications
Flat gray Flat satin, 14.4 Kbps 10-20 feet RJ-11 or Comes with 4,6,8
modular telephone RJ-45 plugs conductors. Used for
cable, silver short data cables using
satin modular (mod-tap)
adapters
Coax- thick Frozen 10 Mbps 500 feet AUI Original Ethernet cabling
yellow (attachment
garden hose unit interface)
Coax-thin RG-58, 10 Mbps 200 feet BNC connector Looks like cable TV cable.
thinnet, Easier to work with than
cheapernet thick coax.
Coax-thin RG-62 2.5 Mbps 200 feet BNC or IBM Similar to RG-58 (thinnet)
data connector but different electrical
characteristics make these
cables NOT
interchangeable
The most basic data communication technologies are those used to directly connect
two devices. These connections can be used to connect a computer to peripheral
devices such as modems, scanners, PDAs, and so on, or as the basis for a directly con-
nected computer-to-computer data connection. Operating at layer one of the OSI
Network Reference Model, these technologies provide a physical connection that can
be used to carry many higher-level protocols.
RS-232 RS-232 is currently the most commonly used serial standard for modem
communication. Standardized by the Electronics Industries Association (EIA), RS-
232 is currently in its third release (RS-232-C). The prevalence of RS-232 in the PC
marketplace is so great that the term serial port has come to mean an RS-232 serial
connection. Although newer serial standards threaten to replace RS-232 as the pre-
dominate serial standard in the not too distant future, it still merits a close inspection.
RS-232 uses electrical signals to transmit the ones and zeroes of the digital datas-
tream. The RS-232 standard defines voltages of between +5 and +15 volts DC on a
given pin to represent a logical zero, otherwise known as a space, and voltages of
between 5 and 15 volts DC to represent logical ones, otherwise known as a mark.
RS-232 can be implemented on a multitude of data connectors. In the case of the
DB-25 connector illustrated in Figure 3-6, the presence or absence of an electrical
charge on each of these 25 pins has been designated as having a specific meaning in
data communications. These standard definitions are officially known as RS-232-C.
They were issued by the Electronics Industries Association (EIA), and are listed in
Figure 3-8.
Although all 25 pins are defined, in most cases, 10 or fewer of the pins are actu-
ally used in the majority of serial transmission applications. On some PCs, such as
1 2 3 4 5 6 7 8 9 10 11 12 13 1 2 3 4 5
14 15 16 17 18 19 20 21 22 23 24 25 6 7 8 9
Figure 3-6 RS-232 Serial Transmission Protocol as Defined for DB-25 and DB-9 Connectors
80 Chapter Three/Basic Data Communication Technology
personal computers as well as many notebook and laptop computers, the serial port
has only 9 pins (DB-9 connector) and the RS-232 serial transmission protocol is sup-
ported as listed in Figure 3-6. Other RS-232 implementations rely on mini-DIN con-
nectors or phono-plug style connectors. Pictures of common RS-232 connectors are
shown in Figure 3-7.
Physical
Standard Standards Interface
Name Body Connector Description
In Sharper Focus RS-422 EIA DB9 DB25 An electrical specification usually associated with
DB37 RS-449 (DB37 Connector). Each signal pin has its own
ground line (balanced) rather than sharing a common
ground. Up to 10Mbps over 1,200 meters. Use of DB25
or DB9 is also possible.
RS-423 EIA DB9 DB25 An electrical specification is usually associated with
DB37 RS-449 (DB37 Connector). Signal pins share a common
ground wire. (Unbalanced signaling) Up to 10 Mbps
over 1,200 meters. Use of DB25 or DB9 is also possible.
RS-449 EIA DB37 plus A physical/mechanical specification for a DB-37
DB9 (37-pin connector), plus an additional DB-9 if required.
Usually associated with either RS-422 or RS-423
electrical specifications.
RS-485 EIA DB9 DB25 Can be used in multipoint applications in which one
DB37 computer controls multiple (up to 64) devices. Often
used in computer-integrated manufacturing
operations or in telecommunications
management networks.
RS-530 EIA DB25 A physical/mechanical specification that works with
RS-422 or RS-423 over a DB-25 connector rather than a
DB-37 connector. Allows speeds of up to 2 Mbps.
V.35 ITU M-Block An international standard for serial transmission up to
48 Kbps defined for an M-block connector. Often used
on data communications equipment that must
interface to high-speed carrier services.
Universal Serial Bus (USB) Although RS-232 is historically the most widely imple-
mented serial standard, a new standard serial communication standard has virtually
replaced RS-232 in all but the most basic applications. This is because three basic archi-
tectural limitations in the RS-232 technology limit its application to new devices such
as scanners, digital cameras, video cameras, and personal digital assistants: RS-232 is
Point-to-Point Data Transmission Technologies 83
slow (only up to 115 Kbps), only supports one device per port, and requires significant
configuration to attach a device.
The universal serial bus (USB) is a high-speed, multipoint serial communications
technology developed by the USB Implementer’s Forum to resolve RS-232’s shortcom-
ings. There are two versions of USB currently available—the original USB 1.1 specifica-
tion and a newer, higher-speed USB 2.0 specification. USB 2.0 is backward compatible
with USB 1.1. However, to gain the higher speeds offered by USB 2.0, devices must be
attached either directly to the computer or to a USB 2.0 compatible hub.
USB version 1.1 operates at either 1.5 Mbps or 12 Mbps. That equates to more
than 1,000 times the maximum speed of RS-232. USB 2.0 can operate at even higher
speeds, up to 480 Mbps. This increased speed is significantly important when sup-
porting such high data devices as scanners and digital cameras. As covered in chap-
ter 4, it is even possible to connect to a local area network (LAN) via a USB network
interface card (NIC).
Both USB 1.1 and USB 2.0 use electrical signals to transmit the ones and zeroes of
the digital datastream. Unlike RS-232, which is ground referenced (uses voltages of
+5Vdc and 0Vdc for ones and zeroes), USB uses a differential electrical signal. A digital
1 is represented when D+ signal line voltage is 200 mv greater than the D– signal volt-
age. Similarly, a digital 0 is represented by the D+ signal voltage being 200 mV less than
the D– signal voltage. Differential signaling offers more noise resistance than ground
referenced signaling while greatly reducing the potential impact of ground loops.
When connected to a computer, low-speed USB devices such as joysticks and PDAs
create virtual serial ports. These ports are typically assigned as if they were physical RS-
232 com ports (COM2, COM3, etc.) Since each of these ports can only use up to 115 Kbps
of bandwidth, they can easily be multiplexed over the same physical USB connection
with no loss of performance. However for high-speed devices such as scanners and
video cameras, it is better to connect them to one of the computer’s USB ports.
USB can support up to 126 devices on each port. Some devices come with two
USB ports so that the user can simply “daisy-chain” the devices together. Although
this solution is functional for a couple of devices, a better solution for larger imple-
mentations is to use a USB hub. As illustrated in Figure 3-10, a USB hub is a device
that connects directly to the computer’s USB port and offers multiple ports to con-
nect other USB devices.
computer with
USB port
4 port 4 port
USB hub USB hub
scanner joystick
digital
camera PDA
MP3
player
IEEE-1394 is a high-speed serial solution ranging in speed from 400 Mbps (origi-
nal specification) to 800 Mbps (1394b). One of the key differentiators between IEEE-
1394 and other serial bus standards is that, in addition to standard asynchronous
communication, IEEE-1394 includes support for isochronous communication. Isochro-
nous communication guarantees data delivery at a constant, predetermined rate. This
allows IEEE-1394 to be used in time critical multimedia solutions. The constant data
delivery rate reduces the need to buffer data, thereby greatly reducing the cost of
implementing the technology compared to a traditional asynchronous solution.
Taking advantage of its isochronous capabilities, the main applications of IEEE-
1394 at the current time are in the transmission of digital data between consumer
electronics devices. IEEE-1394 has been adopted by the digital VCR Manufacturers
Association as its standard interconnection technology. The ongoing conversion of
television from an analog format to digital HDTV technologies will increase the mar-
ketplace for IEEE-1394 technologies in the consumer electronics marketplace.
IEEE-1394 ports are also being introduced in multimedia-capable computers. In
addition to allowing the computer to connect to digital camcorders and VCRs, IEEE-
1394 ports will allow data network solutions to be deployed. To support the use of
IEEE-1394 on computer platforms, the IEEE-1394 Trade Association released an
updated version of the standard known as IEEE-1394b in 2002. The IEEE-1394b stan-
dard increases speeds to 800 Mbps at 100 meters and reduces latency by streamlining
the protocol. Also known as Firewire 800, IEEE-1394b is designed to be backward
compatible with the original IEEE-1394 standard.
IEEE 1394 uses two different connectors: a four-wire connector that supports
full-duplex data transmission and a six-wire connector that also provides power to a
connected device. Figure 3-12 shows these two interface connectors.
Parallel Transmission
IEEE-1394 Connectors
Initially intended for connecting a printer, the parallel port on personal comput-
ers later saw duty as a means of connecting medium-speed peripheral devices such
as scanners, tape drives, and video cameras due to its relatively high speed as com-
pared to RS-232. However, with the proliferation of USB and IEEE 1394, use of the
Centronics parallel port has significantly trailed off to the point that some notebook
computer vendors are no longer including parallel ports on their products.
Wireless Technologies
One of the largest hassles with the explosion of modern computing devices is the
series of cables required to connect them. This is even more of a problem when trav-
eling. If you have a notebook computer, a PDA, a cell phone, and an MP3 player, you
could potentially need three different data cables to connect them, in addition to the
requisite power supplies and cords. Two technologies have been developed as wire-
less cable replacements: Infrared (IRDA) and radio (Bluetooth).
Another key limitation of IrDA is that there must be a direct line of sight between
the two communicating devices. If either is moved, the communication session will
be dropped. This limitation effective prevents IrDA from being used in many appli-
cations such as connecting a PDA to the Internet through a cell phone in a belt hol-
ster. Using IrDA, the phone must be out on a table right in front of the PDA. Between
these limitations and the limited speed available, IrDA is likely to be replaced by
Bluetooth as that standard matures.
Bluetooth Bluetooth is the name given to an emerging wireless radio frequency (RF)
communication standard. Originally developed by Erickson, Bluetooth is currently
backed by Bluetooth Special Interest Group (SIG), a collection of Bluetooth promot-
ers that includes 3COM, IBM, Intel, Microsoft, and Nokia, among others, with the
purpose of developing and promoting the use of the Bluetooth technology.
Bluetooth uses radio frequency communication in the unlicensed 2.4-2.4835 GHz
band using frequency hop spread spectrum (FHSS). As its name suggests, FHSS hops
from one frequency to another throughout the allowable frequency range. The pat-
tern of frequency hopping must be known by the wireless receiver so that the mes-
sage can be reconstructed correctly. A given wireless transceiver’s signal is on a given
frequency for less than 1 second. By constantly changing frequency, the transmission
tends to be less affected by interference, an especially desirable characteristic for
mobile computing applications.
Bluetooth offers data speeds of up to 1 Mbps up to 10 meters. Unlike IrDA, Blue-
tooth supports a LAN-like mode where multiple devices can interact with each other.
Due to the limited size of the Bluetooth coverage area, the terms piconet and personal
area network (PAN) have been coined to describe a Bluetooth coverage zone.
The key limitations of Bluetooth are security and interference with wireless
LANs. The fact that Bluetooth doesn’t require line-of-sight to communicate cuts both
ways: while it makes it possible to use your PDA with your cellular phone that is
stashed in your briefcase, it also makes it possible for someone else with a device hid-
den from view to attempt to gain illicit access to your computing devices. Bluetooth
attempts to mitigate this risk through the use of strong authentication and encryp-
tion technologies. Because Bluetooth uses the same frequency range as IEEE 802.11b
wireless networks, simultaneous use of both technologies greatly affects perfor-
mance. This concept is covered further in chapter 4.
Devices hitting the market that include Bluetooth include cellular phones, PDAs,
headphones, and mobile gaming platforms. Although the technology is too new to
guarantee widespread success, it shows great promise as a way to eliminate the
spaghetti bowl of cords that beleaguers mobile workers.
After connecting to peripheral devices, most people want to connect their computer
to the Internet. While a technical discussion of the Internet is beyond the scope of this
chapter, suffice it to say that it is a large, international network that offers a wide-
ranging selection of data services to any connected computer including e-mail,
instant messaging, Web pages, and streaming media. More detail on the technical
“how” of the Internet will be provided in chapters 7 and 8.
The process of connecting to the Internet is conceptually straightforward: All
you have to do is create a link between your computer and a device connected to the
88 Chapter Three/Basic Data Communication Technology
Internet. The traffic from the local computer that needs to go to the Internet will be
sent across this link. The problem is the distance between the local computer and the
Internet-connected device.
Although the point-to-point data communications technologies previously dis-
cussed provide a means to connect a computer to a local device or even another com-
puter located in close physical proximity, they are not capable of dealing with the
distance between the local computer and the remote Internet connection device. A
whole new class of data communication technologies is required to meet the distance
and speed requirements for Internet access. The Internet access architecture is illus-
trated in Figure 3-14.
In most cases, an individual wishing to connect to the Internet will initiate a link to a
company whose business is extending the Internet to individuals. These companies,
known as Internet service providers (ISPs), take a high-speed connection to the
Internet and—using a collection of Internet access technologies—offer Internet con-
nectivity to individual users.
ISPs range in size from a local provider that focuses on meeting the needs of a
geographically limited area to national and international providers such as America
Online (AOL), which provide service across large geographic areas. In addition to
the area they service, ISPs vary widely in the access technologies offered, data speeds
provided, and pricing methods.
SELECTING AN ISP
Regardless of size, ISPs all provide access to the same Internet. When selecting an ISP
it is important to look at four key criteria:
Managerial
Perspective • Service hosting—Do you need the ISP to host your Web pages, e-mail
addresses, and so on?
• Performance—What types of access technologies does the ISP support? What
data rates are offered? What is the confirmed information rate (CIR—the
Corporate Office
Internet
server
Consumer last
mile T-1, last
mile access
computer frame relay, access device
access ATM, server
server Metro Ethernet (www.slashdot.org)
access phone
device line router
USB/ CSU/DSU
modem LAN
fire wire modem cable
bank, ethernet
cable/DSL line
DSLAM,
CMTS
network protocols
Dial-Up Modems
The first and most basic method for connecting a home computer to the Internet is to
use a dial-up modem. A dial-up modem creates a circuit-switched connection across
the public switched telephone system (PSTN) to another modem that is connected to
the Internet.
Architecture A switched or dial-up line is the type of phone line typically installed in
a home or place of business. To place a call, you pick up the receiver or handset, wait
for a dial tone, and dial the number of the location you wish to call. This ordinary type
of phone service is sometimes called POTS or Plain Old Telephone Service. More
formally, the phone network is referred to as the Public Switched Telephone Net-
work (PSTN). Figure 3-15 illustrates the major components of the PSTN.
As introduced in chapter 1 and detailed in chapter 5, the phone set is connected
to a large switch in a telephone company building called a central office or CO via a
local loop. When a call is dialed, the telephone switch connects the phone set to the
destination set by finding an available circuit or path.
Technology Calls placed over dial-up lines through CO switches that have connec-
tions built from available circuits are called circuit-switched connections. In order to
interface transparently to the PSTN, modems must be able to dial and answer phone
calls to and from other modems.
The next important characteristic related to transmitting data over a dial-up
phone line has to do with how the data are represented on that phone line. First, it is
Local loop
Inter-exchange
circuit
P.O.P.
P.O.P. C.O.
important to realize that today’s dial-up phone network was originally designed to
carry voice conversations efficiently and with reasonable sound quality. This “effi-
ciency of design with reasonable sound quality” meant reproducing a range of the
frequencies of human speech and hearing just wide enough to produce reasonable
sound quality. That range of frequencies, or bandwidth, is 3,100 Hz (From 300 Hz to
3,400 Hz), and is the standard bandwidth of today’s voice-grade dial up circuits
(phone lines). Hz is the abbreviation for hertz. One hertz is one cycle per second. The
higher the number of hertz or cycles per second, the higher the frequency. Frequency,
wavelength, hertz, and cycles per second were introduced in chapter 2.
This 3,100 Hz is all the bandwidth with which the modem operating over a dial-
up circuit has to work. Because the dial-up phone network was designed to be able to
mimic the constantly varying tones or frequencies that characterize human speech,
only these continuous, wave-like tones or frequencies can travel over the dial-up
phone network in this limited bandwidth.
The challenge for the modem is to represent the discrete, digitized ones and
zeroes from the input (PC) side of the modem in a continuous or analog form within a
limited bandwidth so that the data may be transmitted over the dial-up network. Fig-
ure 3-16 summarizes the results of I-P-O analysis involving modems and the PSTN.
The modem’s job is to convert digital data into analog data for transmission over
the dial-up phone network and to convert analog data received from the dial-up net-
work into digital data for the terminal or PC. As previously discussed in chapter 2,
the proper names for these processes are modulation and demodulation. In fact, the
word modem is actually a contraction for Modulator/demodulator.
Most local loops that are used for connection to the PSTN to supply switched,
dial-up phone service are physically described as two-wire circuits. Since one of these
two wires serves as a ground wire for the circuit, that leaves only one wire between
the two ends of the circuit for data signaling. Dial-up or switched two-wire circuits
generate a dial tone.
Given that two-wire dial-up circuits only have one wire for data signaling, only
one modem could be transmitting at a time while the other modem could only be
receiving data. This one direction at a time transmission is known as half-duplex.
Modems that interfaced to a dial-up circuit had to support this half-duplex trans-
mission method. What this meant was that once the two modems completed initial
ISP
Home
Local PC Router
1000001 1000001
PSTN
Internet
Phone network
modem modem
handshaking, one modem would agree to transmit while the other received. In order
for the modems to reverse roles, the initially transmitting DTE (terminal or com-
puter) drops its RTS (request to send) RS-232 Pin # 4 and the transmitting DCE
(modem) drops its CTS (clear to send) RS-232 Pin # 5, and perhaps its carrier wave.
Next, the initially receiving DTE must raise RTS, the initially receiving DCE (modem)
must generate a carrier wave and raise CTS, and the role reversal is complete.
This role reversal is known as turnaround time and can take two-tenths of a sec-
ond or longer. This might not seem like a very long time, but if this role-reversal
needed to be done several thousand times over a long-distance circuit, charged by
usage time, it might have a large dollar impact.
Full-duplex transmission supports simultaneous data signaling in both directions.
Full-duplex transmission might seem to be impossible on two-wire circuits. Until the
advent of the V.32 9,600 bps full-duplex modem, the only way to get full-duplex trans-
mission was to lease a four-wire circuit. Two wires (signal and ground) were for trans-
mitting data and two wires (signal and ground) were for receiving data. There was no
“role reversal” necessary and therefore, no modem turnaround time delays. Modems
manufactured to the CCITT’s V.32 standard (and the later V.34 standard) can transmit
in full-duplex mode, thereby receiving and transmitting simultaneously over dial-up
two-wire circuits using a sophisticated echo cancellation technique.
Echo cancellation takes advantage of sophisticated technology known as digital
signal processors (DSP) that are included in modems that offer echo cancellation. By
first testing the echo characteristics of a given phone line at modem initialization
time, these DSPs are able to actually distinguish the echoed transmission of the local
modem from the intended transmission of the remote modem. By subtracting or can-
celing the echoed local transmission from the total data signal received, only the
intended transmission from the remote modem remains to be processed by the
modem and passed on to the local PC.
NON-STANDARD STANDARDS
In an effort to gain market share during the time when standards-making organiza-
tions are deliberating new standards, vendors often introduce proprietary versions
of pending standards. Before the standardization of V.90 there were two proprietary
56 Kbps modem technologies: X2 from 3COM/US Robotics and K56flex from Lucent
Practical Advice Technologies.
and Information One very important point to keep in mind when purchasing pre-standard data
communications equipment is the ability of the vendor to upgrade that equipment to
92 Chapter Three/Basic Data Communication Technology
meet the specifications of the official standard once it is issued. In some cases, soft-
ware upgrades are possible, while in other cases, hardware upgrades or chip replace-
ment is required. In some cases, these upgrades may be free and easily accomplished
via the Internet, while in other cases, the upgrade may involve returning the equip-
ment to the factory, involving upgrade fees of several hundreds of dollars. Be sure to
understand all of the details regarding standards compliance upgrades before ever
purchasing pre-standards data communications equipment.
V.34 V.34 offers a transmission rate of up to 33.6 Kbps (33,600 bps) over the stan-
dard analog local loop. The highest required speed for a V.34 compliant modem is
28.8 Kbps. The 33.6 Kbps speed is available for modems that make use of an optional
baud rate. As shown in Figure 3-17, the higher speed is achieved by using a lower
baud rate with more bits per baud than the required 28.8 Kbps speed.
It is important to note that although modulation standards have changed in
order to produce higher transmission rates, the associated data compression and
error correction standards have remained constant. The V.34 modem standard insti-
tuted a variety of technical innovations in order to achieve this transmission rate
over dial-up lines of variable quality. The overall effect of these technical innova-
tions is that the V.34 modem is better able than any previous modem standard to
easily and dynamically adjust to variable line conditions in order to optimize trans-
mission rate.
Internet Access Technologies 93
This lack of assurance as to the exact features supported on any given V.34 can
lead to interoperability problems among V.34 modems. The best solution to this
dilemma is to purchase identical modems from a single manufacturer. If this is not
practical, then the time invested to carefully investigate which features of the V.34
standard are implemented in a given modem would be a wise investment indeed.
V.90 According to Shannon’s Law the highest V.34 transmission rate of 33.6 Kbps
should be the maximum transmission rate that a voice-grade telephone line can sup-
port. However, Figure 3-17 claims that modems that adhere to the V.90 standard are
capable of transferring data in at least one direction at speeds up to 56 Kbps per sec-
ond. How can this be? Were telecommunications engineers able to change the laws of
physics?
The answer is obviously no. Shannon’s law is still intact for data transmission
across the PSTN. The telecommunications engineers instead changed the paradigm
in order to alleviate one of the largest components of noise in a traditional modem
implementation. The resulting standard, known as V.90, is a hybrid analog/digital
standard that offers transmission rates of almost double V.34 levels.
A preview of chapter 5 shows that the majority of the telephone system is cur-
rently digital in nature with the local loops from the central offices to the end users
being the only remaining analog connections. An analog telephone signal is con-
verted into a digital signal at the Central Office (CO) for transmission across this dig-
ital telephone system then converted back into an analog signal at the destination CO
for transmission to the destination telephone across the destination local loop.
The limiting factor in exceeding V.34 speeds is the quantization noise associated
with the conversion of the analog signal to a digital signal for transmission across the
digital telephone system. In order to exceed V.34 speeds this analog to digital con-
version and its associated quantization noise must be eliminated. Fortunately the
digital nature of the modern PSTN makes this possible.
QUANTIZATION NOISE
Conversion of a signal from an analog format to a digital format imparts “noise” into
the signal. This can be readily explained by considering the nature of both analog
In Sharper Focus and digital signals. Analog signals can consist of any possible level. Digital signals
can consist only of fixed levels.
As shown in Figure 3-19, when an analog signal is sampled and converted into a
digital signal, a certain level of detail is lost. When the digital signal is converted
back into an analog signal at the destination end of the call, the resulting analog
waveform is not exactly equal to the source waveform. This error is known as quan-
tization noise or quantization error.
While quantization noise is not perceivable by humans on normal telephone
calls, it affects the ability of modems to use the entire bandwidth of the call, thus lim-
iting the potential transmission rate. It is important to note that quantization noise is
created by the analog to digital conversion process, although it does not manifest
itself until subsequent digital to analog conversion.
Internet Access Technologies 95
..0010011000100011..
quantization noise
NOTE: graph exaggerated
for illustration purposes
The V.90 modem standard makes use of the digital PSTN to overcome quantiza-
tion noise by replacing the analog modem on one end of the connection with a digi-
tal server. This server connects directly to its Central Office (CO) via a digital
connection such as an ISDN PRI or T-1 line. By using a direct digital connection, the
server avoids any analog to digital conversions for outgoing transmission, thereby
eliminating quantization noise. At the other end of the connection the CO converts
the digital signal into a clean analog signal and transmits it to the destination
modem. This process is illustrated in Figure 3-20.
By using this technique, a theoretical transmission rate of 56 Kbps can be achieved
from the server to the modem. Note that this is a theoretical rate. An FCC limit on the
amount of power allowed on the local loop reduces this theoretical limit to around 53
Kbps. Physical limitations in the local loop—including the distance from the modem
to the CO, the number of connections or splices in the local loop, and the overall qual-
ity of the local loop—can limit the actual transmission rates further. In the authors’
experience it is far more common to achieve transmission rates of around 44 Kbps,
although connections at rates in excess of 50 Kbps have been noted.
96 Chapter Three/Basic Data Communication Technology
C.O. C.O.
digital/analog NO
digital
digital analog/digital
analog
conversion -or-
digital/analog
analog/digital ISDN/T-1
V.90 modem PSTN
local loop V.90 server
conversion
conversion
A close examination of Figure 3-20 shows that the increased speed offered by
V.90 is limited to the half of the connection originating at the server and terminating
at the modem. The other half of the connection, originating at the modem and termi-
nating at the server, must undergo an analog to digital conversion and therefore
incurs quantization error, limiting speeds to V.34 levels. Because the speeds are dif-
ferent in each direction, V.90 is said to be an asymmetrical transmission technology.
Fortunately, the asymmetrical characteristic of V.90 matches the asymmetrical
nature of the most common modem application: accessing the Internet. In a normal
Internet session, a user sends a fairly short request (such as the address of a Web
page) to a server. The server responds with a much larger collection of data (such the
text and graphics that make up the Web page) to the user; making V.90 a natural fit
for Internet access.
As with all modern modem standards, V.90 compliant modems are backward
compatible with earlier standards. When a connection is initially made, the modem
will attempt to connect at the highest possible V.90 speed. It will then drop back to
slower V.90 levels, then resort to V.34 levels, V.32 levels, and so on, until a carrier
wave can be established. Because of this automatic rate fallback strategy, it is com-
mon for first-time users to comment on the long time required for a V.90 modem to
establish a carrier and begin communicating.
V.42bis and MNP 5 The two predominant data compression standards are V.42 bis
and MNP5. Most modems try to negotiate with each other to implement V.42bis data
compression at initialization. The less-efficient MNP5 protocol is commonly used as
a second option.
V.42bis uses a data compression algorithm known as the Lempel Ziv algorithm.
Ideally, it can compress files, and thereby increase throughput by a 4:1 ratio. Proprietary
improvements to this algorithm by modem manufacturers can be achieved in two ways:
• Increase the amount of memory dedicated to the library, also known as the
dictionary (1.5KB standard, some modems use up to 6KB).
• Increase the size of the pattern of characters, also known as string size, which
can be stored in the dictionary (32 bytes standard, some modems support
strings up to 256 bytes).
Improving the reliability of the data transmission link between two modems will
ultimately make that data transmission faster and more efficient. Fewer retransmis-
sions due to data errors will reduce the overhead associated with correcting errors,
thus reducing the time necessary to transmit a given message. This will minimize the
cost of the data transmission.
Error Prevention Data transmission errors occur when received data is misinter-
preted due to noise or interference on the phone lines over which the data message
traveled. Errors can be prevented by
in cellular phone environments in which line quality can vary significantly over
short periods of time.
• If not enough redundant data are sent, the overall throughput is reduced due
to retransmissions.
• If too much redundant data are sent, the overall throughput is reduced
because the redundant data is taking up space and processing power that
could be occupied by “new” non-redundant data.
For example, if we wanted to send 6 data bits per baud, we would ordinarily
require a 64-point constellation (26). However, by adding a 7th TCM code bit to each
6 data bits, a 128-point constellation would be generated (27). But remember, only 64
constellation points are required to transmit the original 6 data bits per baud, so only
64 of the 128 possible detectable constellation points are defined as valid. If one of the
invalid constellation points is detected, the TCM circuitry selects the most likely
valid constellation point and its associated pattern of bits. In this manner, TCM
reduces errors and the need for retransmission due to line impairments. However,
error detection and correction techniques must still be employed.
The sophistication of a given TCM scheme is measured by the number of poten-
tial trellis codes or states. The greater the number of TCM states, the higher the
required processing power in the modems, and the higher immunity to inter-symbol
interference due to line noise. TCM was first introduced as part of the V.32 modem
standard and is supported by V.34 and V.90 modems.
MNP4 The MNP error control standards were originally developed by Microcom, a
modem manufacturer. The MNP standards include Classes 2, 3, and 4. These error
control standards optimize the full-duplex transmission of data over dial-up lines
through Adaptive Size Packet Assembly and the elimination of redundant or over-
head information from transmissions.
V.42 Not to be confused with the CCITT V.42bis standard for data compression,
V.42 incorporates MNP Class 4 Error Control as the first of two possible error control
protocols. In addition, a second error control protocol known as Link Access Proto-
col for Modems, or LAP-M, adds Selective ARQ to the capabilities of MNP Class 4
Error Control protocol. Selective ARQ, described earlier, only requires retransmis-
sion of specific blocks received in error rather than all blocks subsequent to the block
in which the error was detected. V.42 also provides for negotiation during modem
handshaking to allow two modems to decide whether they will implement MNP 4 or
LAP-M as an error control protocol for their data transmission.
• Travel—PSTN lines are available at residences, hotels, and even modern pay
phones. When combined with a national ISP, a dial-up modem can provide
Internet access just about anywhere.
• Cost—Dial-up modems continue to be the least expensive Internet access
technology in terms of base monthly fee. However, when looking at the
cost/MB of data downloaded, dial-up trails faster technologies by a signifi-
cant margin. If a full-time connection is required, the cost of a second phone
line can quickly drive the cost of dial-up higher than faster alternatives.
• Last resort—Dial-up Internet access is available virtually everywhere, even
those places where other, faster alternatives are not yet available. In some
cases, it is simply dial-up or nothing.
Beyond the Internet access paradigm, dial-up modems have other applications,
including serving as a backup connection for other technologies such as the wide
area networking connections detailed in chapter 6. If the primary connection fails, a
dial-up connection is established to the destination to enable business to continue.
However, due to the reduced speed of a dial-up connection, care must be taken to
ensure that the limited bandwidth is used for the mission-critical applications by
preventing other, less critical applications from using the connection.
cost. The other side of the cost/benefit equation would require the following ques-
tion to be asked, “What is the cost of the business lost during the time that the leased
line is down?” If that lost business can be translated into lost sales dollars in excess of
the incremental cost of establishing and maintaining the dial-up backup for the failed
leased line, then the acquisition of the equipment and phone lines to enable auto-
matic backup would constitute a prudent business decision.
As the Internet has matured, so has the sophistication of the content it carries. With
Web pages growing in size due to the addition of animation and graphics, the explo-
sion of file sharing using networks such as Kazaa, and the promise of real-time voice
and video communication, dial-up modems have become too slow to meet the needs
of the Internet consumer and are being phased out in favor of “broadband” access
technologies. Broadband has many definitions, but the simplest is to consider any
access technology that provides access to the Internet at greater that 56 Kbps to be a
broadband technology.
One of the faster broadband technologies currently available is Digital Sub-
scriber Line (DSL). DSL provides an “always on” connection to the Internet over the
same copper wires that provide dial-up telephone service.
Architecture DSL uses the same physical local loop connection as the local phone
service used in POTS, as illustrated in Figure 3-15. When a local loop is used for DSL
frequency division multiplexing is used to separate the existing voice service from
the DSL service. As detailed earlier in this chapter, a POTS line uses only the bottom
4 KHz of bandwidth on the copper loop. All of the bandwidth above is available for
an alternate service, such as DSL.
As illustrated in Figure 3-21, DSL operates above the POTS frequency range. In
the figure the DSL service operates between 25 Khz and 1,100 Khz. This frequency
range is further broken into two parts for upstream and downstream data. Upstream
uses between 25 Khz and 100 Khz. Downstream data uses 110 Khz to 1100 Khz. This is
1100 kHz
Downstream
Data
110 kHz
GUARDBAND
100 kHz
Upstream
Data
25 kHz
GUARDBAND
4 kHz
0 kHz Voice
PSTN
Phone
switch
Internet
connect to the computer in place of the Ethernet connection. If the modem only sup-
plies a USB connection it must be connected to a computer rather than another net-
work device.
A DSLAM is installed on the central office. This device is analogous to a modem
bank in a dial-up environment. It takes multiple incoming DSL local loops, demodu-
lates their datastreams, and multiplexes them onto a high-speed connection for
transmission to the ISP. These high-speed connections can vary from a T1 to frame
relay, to an OC-3 SONET connection. For more information about these technologies,
please refer to chapter 6. After stripping the data signal from the local loop the
DSLAM sends the underlying POTS signal to the dial-up telephone switch.
DSL modems and DSLAMs are layer two devices: they simply pass the data
between them without interpreting it. From the perspective of the user at the cus-
tomer premises the DSL modem and DSLAM are invisible.
Implementation and Performance A few items affect the speed of DSL services. The
first item is the copper local loop. The quality of the copper in the ground is a major
factor. If you live in an area built in the early 1950s, the copper installed in the ground
is older and might have degraded over time. If you live in a newly constructed area,
the copper could be newer and made with more modern manufacturing techniques.
The quality of the copper is something you may not be able to fix, but it is something
you need to be aware of when dealing with DSL.
Another item that affects the speed of DSL is the distance you are from the cen-
tral office. The farther you are from the central office, the longer the analog signal
needs to travel over the copper. As analog signals travel over copper over a distance,
the signal degrades in power. This signal loss affects the speed at which DSL oper-
ates. In areas where the DSL modem is close to the central office, the DSL modem
may run near its theoretical speeds. In locations where you are farther away from the
central office, the DSL modem will not operate at the theoretical speeds, but will gen-
erally operate at a speed faster than dial-up modems.
Splitter and Media Filters A splitter would be installed on the outside of the house
by the telephone company. The goal is to separate the data service from the voice ser-
vice. This was needed due to the nature of how phone service works. When a phone
goes off hook, a power spike is caused by the contacts opening up on the phone
switch. The power spike sends a frequency blip over the entire frequency spectrum
allowed to pass over the copper pair. The frequency blip, if not stopped, would cause
the DSL modem to “momentarily” drop connection with the DSLAM in the central
office. This would cause data to be lost and the modem would have to reestablish
their connection.
Early DSL modems required these splitters to be installed to eliminate the possi-
bility of phone calls affecting the data service. The splitter separated the wiring
inside the house to a phone set of connections and a single data connection. The
phone connection also had a device installed to eliminate the power spike. The
installation of the splitter increased the cost of the service due to the labor of the per-
son from the telephone company being required to visit each residence to install the
splitter. A consumer installation method was required that would eliminate the truck
roll, thus lowering the cost and decreasing the time it took to turn up each service.
The solution was found in the use of media filter.
Media filters are sent with the DSL modem and installed by the consumer.
Media filters are wire-wrapped magnets that are installed on each phone in the
house that is connected to the phone line the DSL is on. The goal of the filter is to
suppress the high-voltage spike that occurs when a traditional phone is taken “off
hook.” Media filters absorb the frequency blip and allow the DSL modem to work
without interruption.
Consumer Class vs. Business Class DSL As discussed above, DSL can be used for both
business and consumer access to the Internet. As you would expect, business-class
DSL cost more than consumer-class service. Consumer-class DSL usually uses DHCP
for IP addressing and usually allocates 1 IP address per DSL modem. The bandwidth
allocation is generally more in the downstream direction and the upstream direction.
This matches the wants of most consumers: they need to get more information from
the Internet than they send.
Business-class DSL generally allocates a static IP address to the business.
Additional IP addresses can be purchased, for a cost. Businesses generally want to
run a Web site from their location, so the data requirements are different than the
106 Chapter Three/Basic Data Communication Technology
Future of DSL The future of DSL is focused on providing new services over the DSL
modem. DSL providers would like to provide audio and video-on-demand services
over the DSL modem. Both of these services will require the need for quality of ser-
vice (QoS) to allow them to work effectively. QoS will allow the user to make voice
calls over the Internet, stream video to PC, and download files at the same time with-
out the voice or video quality suffering from the file download.
Cable Modems
service providers use a Cable Modem Termination System (CMTS) to add data
transmission capabilities to the existing CTV infrastructure. The CMTS is capable of
providing throughput to multiple homes at rates of up to 50 Mbps. However,
throughput is usually less than 27 Mbps due to the way data are transmitted to
homes from the cable modem service provider.
As can be seen in Figure 3-24 the CTMS is capable of serving multiple distribu-
tion hubs, which, in turn, serve multiple fiber nodes. Each fiber node serves a neigh-
borhood, or physical grouping of homes. Most groupings range from 500 to 2,000
homes on a modern, HFC network. This architecture typically results in speeds to the
home of between 500 Kbps and 1.5 Mbps, depending on network congestion.
Between the fiber nodes and the homes in the neighborhood, the upstream and
downstream bandwidth is shared by the active data subscribers connected to a given
cable network segment. A device known as a diplexer is used to both separate and
combine the upstream and downstream signals and is located at the fiber node.
Once the coaxial cable reaches the subscriber’s home, a frequency splitter is
used to separate the TV signals from the data signals. Assuming the home is pre-
wired for CTV, the existing wiring is used for the CTV signals. The “new” wire is
connected to a cable modem, which, in turn, connects to the subscriber’s PC via 10
Mbps Ethernet or, optional in newer cable modems, a USB connection. Figure 3-25
illustrates this configuration.
The function of a cable modem is essentially the reverse of the CMTS: to modu-
late and demodulate upstream and downstream signals, respectively. As mentioned,
the CMTS uses the same techniques on the upstream and downstream signals at the
head end. Downstream data is modulated at the headend using the 64-QAM modu-
lation technique. The data occupies a 6-MHz channel somewhere in the 50 to 750
MHz range. The signal is demodulated at the cable modem side.
Upstream signals are handled differently. Like their downstream counterparts,
they are modulated at the cable modem side and transmitted back to the CMTS.
Because multiple cable modems must share the upstream bandwidth to the CMTS, a
distribution
Internet fiber/copper
hub
node
IP over SONET,
ATM, or WDM
CMTS
Cable
HeadEnd
distribution fiber/copper
hub node
Coax
VCR TV
Splitter
HOME
Coax
Coax
TV
Splitter
multiple access multiplexing scheme must be used. Time Division Multiple Access
(TDMA) and Frequency Division Multiple Access (FDMA) are commonly used to
allow multiple cable modems to communicate to the CMTS concurrently. Before a
cable modem can transmit to the CMTS, it must request and receive a bandwidth
allocation. This is usually handled as part of the initial power-on handshaking
between the cable modem and the CMTS.
Standards and Technology Initially, there were no standards that defined the modula-
tion schemes used between cable modems and the CMTS. As a result, cable modem
customers were locked into the cable modems offered by their cable company. In
1996, several cable operators commissioned the development of a standard, which
would control compatibility of cable modem equipment, both on the user side, the
cable company side, and the wiring in between. The resulting Data Over Cable Ser-
vice Interface Specification (DOCSIS) standard defines the protocol stack used in
transmissions, modulation techniques for the CMTS, and cable modem and line
speeds. Both cable modems and CMTS systems can be certified as DOCSIS-compli-
ant, which indicates all aspects of the specification are adhered to and ensures inter-
operability between vendors. As long as the CMTS is DOCSIS compliant, the
consumer can purchase any DOCSIS-compliant cable modem with certainty that it
will work with their cable system.
The DOCSIS standard also includes some security enhancements for the privacy
of data. This basic privacy specification is called the BPI, or Baseline Privacy Inter-
face. BPI allows for the use of encryption algorithms to assure the privacy of data
when traveling between the user’s cable modem and the cable company. It should be
noted, however, that the BPI was developed to benefit the provider, not the user. The
implementation of the encryption is done at the cable company, meaning subscribers
have no control over whether encryption is activated or not for their shared “ring.”
Internet Access Technologies 109
Implementation and Performance In many ways a cable modem system has more in
common with an Ethernet local area network than it does with a dial-up modem or
DSL system. Unlike dial-up or DSL, where the bandwidth between the customer
premises and the central office is dedicated to the customer, cable modem systems
require that everyone on the cable segment share a fixed amount of bandwidth.
Because of this, users might find that the service that was blazingly fast when only a
few people shared the segment has grown increasingly slower as more of their
neighbors connect. This shared bandwidth scenario also has security ramifications:
the downstream traffic destined for one cable modem is received by all cable
modems on the segment. Although each cable modem normally ignores traffic not
destined for it, if placed in promiscuous mode the cable modem will pass all incom-
ing traffic to the attached computer. For more information about broadcast shared
media networks, please refer to chapter 4.
Cable modems themselves come is three forms: external, internal, and set-top
box. External cable modems, by far the most popular, are physically distinct. Like all
cable modems, they translate the data signal between the coaxial cable that the cable
company supplies and the 10Base-T Ethernet signal the user’s PC expects. This fla-
vor of modem allows for multiple PCs to share the connection but requires a separate
Ethernet network card to be installed in the subscriber’s PC.
Internal cable modems are packaged as a PCI card installed in the subscriber’s
PC. Internal cable modems are less expensive than their external counterpart, but
they are not “plug” compatible with laptop computers and Macintosh machines.
The final cable modem form factor is the set-top box, which provides network
access on the subscriber’s television. Set-top implementations require a separate
upstream method, usually a standard dial-up modem for return signals. Typically,
this type of implementation was only used for older, broadcast-only cable systems
rather than modern bi-directional systems.
Future of Cable Modems Cable modems offer the highest Internet access connection
speeds currently available. Although the shared media approach used in cable
modems requires the bandwidth on an individual cable segment to be shared among
the users on the segment, most cable modem customers receive excellent data
speeds. As cable companies gain experience in the data communications market-
place, they are in an excellent position to leverage their existing cable plans to pro-
vide additional interactive services to consumers.
After analyzing your needs and the available solutions, it is not uncommon to
find a clear winner. For those people fortunate enough to have multiple viable solu-
tions, monthly cost and data speeds should be the deciding factors.
Key Terms 111
SUMMARY
KEY TERMS
REVIEW QUESTIONS
1. How can the top down model remain useful given 17. Differentiate between IEEE-1394, Firewire, and
the rate of rapidly changing technology? i.Link.
2. Why is twisted pair twisted? 18. At what speeds does IEEE-1394 operate?
3. What is the importance of EIA/TIA 568? 19. What is currently the primary application for
4. What is the most common type category of UTP IEEE-1394?
installed today and why? 20. List the currently available versions of IEEE-1394
5. Why is UTP category 5 favored over shielded and the maximum data speeds offered by each.
twisted pair, coax, and fiber optic cable for many 21. Which point-to-point serial transmission stan-
high speed network architectures? dards offer power to attached devices?
6. Why is shielded twisted pair considered trickier to 22. What is modulated to provide wireless connectiv-
install than UTP? ity via IrDA?
7. What is the difference between powersum 23. What are some of the significant limitations associ-
crosstalk and pair-to-pair crosstalk? ated with IrDA?
8. How are Levels 5, 6, and 7 different from Cate- 24. Which IrDA standard offers multi-point communi-
gory 5? cation?
9. Why are testing and certification specifications 25. What is the size and data transmission speed
required beyond CAT 5? offered by Bluetooth?
10. What are the key advantages of fiber optic media 26. What type of radio frequency communication
over copper media? does Bluetooth use?
11. List the two main types of fiber optic media and 27. What is a piconet?
the advantages of each. 28. What types of devices are likely to include Blue-
12. List the 10 most commonly used RS-232 pins tooth capability?
including name, abbreviation, and DCE/DTE ori- 29. What is the purpose of the I-P-O model and how
entation. can it be used to model both ends of given circuit?
13. What is the name of the device employed to moni- 30. What is an Internet service provider (ISP)? What
tor and manipulate RS-232 signals? types of services does an ISP provide?
14. At what speeds does USB operate? 31. What is the potential throughput of a V.34 modem
15. List three advantages of USB over RS-232. with V.42bis data compression?
16. List the currently available versions of USB and 32. Why are standards important when it comes to
the maximum data speeds offered by each. data compression?
Review Questions 113
33. What is meant by an adaptive protocol? Give at 51. What are the maximum speeds and distance limita-
least two examples. tions of the most commonly available DSL services?
34. What are the key differences between V.32 and 52. Why are splitters or media filters required in DSL
V.32bis? implementations?
35. What does “bis” stand for? 53. What is the difference between consumer and
36. What is the difference between V.42 and V.42bis? business class DSL offerings?
37. How does a V.90 modem system overcome the 54. Is DSL a shared or dedicated connection into the
33.6 Kbps limit as dictated by Shannon’s Law? home?
38. What is quantization error? 55. What type of multiplexing is used by a cable
39. Explain why V.90 is asymmetrical in nature? modem?
40. How fast can a V.90, 56 Kbps modem actually 56. In a cable modem deployment how many televi-
transfer data? sion channels are eliminated to provide bi-direc-
41. Will a V.90 modem provide faster speeds than a tional data services?
V.34 modem in all cases? Why or why not? 57. What piece of equipment is required at the cable
42. What are the major differences between repeaters system head end to enable cable modem usage?
and amplifiers? 58. Is cable modem access a shared or dedicated con-
43. Explain the differences between hardware and nection to the home?
software flow control. 59. What is a cable node and what is its relevance to
44. What is forward error correction and what is the cable modem services?
trade-off involved in such a protocol? 60. What is a diplexer and what is its purpose in a
45. Differentiate between MNP5 and V.42bis. cable modem installation?
46. Differentiate between MNP4 and V.42 61. What is DOCSIS and why is it important?
47. What are the main applications of dial-up Internet 62. What are the technologies developed to improve
access today? security in a cable modem deployment?
48. What does the term broadband mean in the con- 63. What are the three most common form factors for
text of Internet access? a cable modem? List the advantages of each.
49. What existing communication link into the home 64. Which offers higher data rates: DSL or cable
does DSL use? modems?
50. What piece of equipment is required at the central 65. What is fixed-point wireless and where is it ini-
office to enable DSL use? tially being deployed