Csc407-Lecture Notes-1
Csc407-Lecture Notes-1
1.0. INTRODUCTION
Computers are used to generate information. Generated information is not useful in itself.
The information must be delivered to the right destination at the right time. Often information
must be transmitted from one location to another. This process is called data communication.
Here, we will be concerned with the hardware, software and procedures used in data
communication. Office automation is based on communication and the transfer of
information. Advances in communication technology, combined with rapidly evolving
computer technology, have made possible much of the progress in the field. Electronic
communication consists of telecommunication and data communications. Telecommunication
refers to the use of telephone, telegraph, and radio or television facility to transmit
information, either directly or via computer. Data communication means the transfer of data
or information between computer devices.
a. Delivery: The system must deliver data to the correct destination. Data must be received
by the intended device or user and only by that device or user.
b. Accuracy: The system must deliver data accurately. Data that have been altered in
transmission and left uncorrected are unusable. The communication systems employ error
correction and recovery.
c. Timeliness: The system must deliver data in a timely manner. Data delivered late are
useless. In the case of video, audio and voice data, timely delivery means delivering data as
they are produced, in the same order that they are produced, and without significant delay.
This kind of delivery is called real-time transmission.
Page 1 of 36
The transmitter sends the message and the receiver receives the message. The medium is the
channel over which the message is sent and the protocol is the set of rules that guides how the
data is transmitted from encoding to decoding. The message of course is central to all the
components. The message is the data that is being communicated.
Transmitter: The transmitter is the device that sends the message. It can be a computer,
workstation, telephone handset, video camera, and so on.
Receiver: The receiver is the device that receives the message. It can be a computer,
workstation, telephone handset, television, and so on.
Medium: The transmission medium is the physical path by which a message travels from
sender to receiver. It can consist of twisted pair wire, coaxial cable, fiber-optic cable, laser or
radio waves (terrestrial or satellite microwave).
Message: The message is the transmission (data) to be communicated. It can consist of text,
number, pictures, sound, or video or any combination of these.
Protocol: A protocol is a set of rules that governs data communication. It represents an
agreement between the communicating devices. Without a protocol, two devices may be
connected but not communicating, just as a person speaking German cannot be understood by
a person who speaks only Japanese.
Page 2 of 36
communication and for short distance digital data communication. They are usually made up
of copper. Using these wire pairs data transmission speed is normally 9600 bits per second in
a distance of 100 metre.
b.Twisted pair: Twisted pair wire is the most widely used medium for telecommunication.
Twisted-pair cabling consist of copper wires that are twisted into pairs. Ordinary telephone
wires consist of two insulated copper wires twisted into pairs. Computer networking cabling
(wired Ethernet as defined by IEEE 802.3) consists of 4 pairs of copper cabling that can be
utilized for both voice and data transmission. The use of two wires twisted together helps to
reduce crosstalk and electromagnetic induction. The transmission speed ranges from 2
million bits per second to 10 billion bits per second. Twisted pair cabling comes in two forms
which are Unshielded Twisted Pair (UTP) and Shielded twisted-pair (STP) which are
manufactured in different increments for various scenario.
c Coaxial cable: Coaxial cable is widely used for cable television systems, office buildings,
and other work-sites for local area networks. The cables consist of copper or aluminium wire
wrapped with insulating layer typically of
d.Optical fibre: Optical fibre cable consists of one or more filaments of glass fiber wrapped
in protective layers that carries data by means of pulses of light. It transmits light which can
travel over extended distances. Fiber-optic cables are not affected by electromagnetic
radiation. Transmission speed may reach trillions of bits per second. The transmission speed
of fiber optics is hundreds of times faster than for coaxial cables and thousands of times faster
than a twisted-pair wire. This capacity may be further increased by the use of colored light,
i.e., light of multiple wavelengths. Instead of carrying one message in a stream of
monochromatic light impulses, this technology can carry multiple signals in a single fiber.
Wireless technologies
a. Terrestrial microwave: Terrestrial microwaves use Earth based transmitter and receiver.
The equipment looks similar to satellite dishes. Terrestrial microwaves use low-gigahertz
range, which limits all communications to line-of-sight. Path between relay stations spaced
approx, 48 km (30 mi) apart. Microwave antennas are usually placed on top of buildings,
towers, hills, and mountain peaks.
b.Communications satellites: The satellites use microwave radio signals as their
telecommunications medium which are not deflected by the Earth’s atmosphere. The
satellites are stationed in space, typically 35,400 km (22,000 mi) (for geosynchronous
satellites) above the equator. These Earth-orbiting systems are capable of receiving and
relaying voice, data, and TV signals.
a. Narrow band handles low data volumes. Data transmission rates are from 45 to 300 baud.
The low-speed devices might use narrow band communications.
b. Voice band handles moderate data transmission volumes between 300 and 9600 baud.
They are used for applications
Page 3 of 36
ranging from operating a CRT to running a line printer. Their major application is for
telephone voice communication hence, the term voice band. Broadband handles very large
volumes of data. These systems provide data transmission rates of 1 million baud or more.
High-speed data analysis and satellite communications are examples of broadband
communication systems.
1.5. MODEM
A modem (modulator-demodulator) is a device that modulates an analog carrier signal to
encode digital information, and also demodulates such a carrier signal to decode the
transmitted information. The goal is to produce a signal that can be transmitted easily and
decoded to reproduce the original digital data. Modems can be used over any means of
transmitting analog signals, from light emitting diodes to radio. A modem modulates
outgoing digital signals from a computer or other digital device to analog signals for a
conventional copper twisted pair telephone line and demodulates the incoming analog signal
and converts it to a digital signal for the digital device. In recent years, the 2400 bits per
second modem that could carry e-mail has become obsolete. 14.4 Kbps and 28.8 Kbps
modems were temporary landing places on the way to the much higher bandwidth devices
and carriers of tomorrow. From early
a. Landline Modems:
Landline modems are modems which connect to the public switched telephone network
(PSTN). To connect to PSTN, these modems have a jack known as RJ-11, or regular phone
jack. A telephone cable with a RJ-11 plug connects the modem to the nearest phone jack,
which also conforms to the RH-11standard. Landline modems can be further classified into
the followings types:
1. Internal modems: This device is a circuit board that plugs into one of the expansion slots
of the computer. Internal modems usually are cheaper than external modems, but when
problems occur, fixing and troubleshooting the modem can sometimes prove to be quite
difficult. The telephone line plugs into the modem port in the back of the computer. Most
internal modems come installed in the computer you buy. Internal modems are more directly
integrated into the computer system and, therefore, do not need any special attention. Internal
modems are activated when you run a communications program and are turned off when you
exit the program. This convenience is especially useful for novice users. Internal modems
usually cost less than external modems, but the price difference is usually small. The major
disadvantage with internal modems is their location: inside the computer. When you want to
replace an internal modem you have to go inside the computer case to make the switch.
2. External modems: This device is attached to the back of the computer by way of a cable
that plugs into the modem port. It is usually less expensive and very portable. It can be used
with other computers very easily by unplugging it and plugging it into another computer.
This is the simplest type of modem to install because you don’t have to open the computer.
External modems have their own power supply and connect with a cable to a computer’s
serial port. The telephone line plugs into a socket on the rear panel of the modem. Because
external modems have their own power supply, you can turn off the modem to break an
Page 4 of 36
online connection quickly without powering down the computer. Another advantage over an
internal modem is that an external modem’s separate power supply does not drain any power
from the computer. You also can monitor your modem’s connection activity by watching the
status lights.
3. Voice/data/fax modems: This device can be hooked up to your telephone and used to send
information to your computer. Your computer can also send information to a fax machine.
Most computer modems are modems with faxing capabilities.
4. PC Card modem: These modems, designed for portable computers, are the size of a credit
card and fit into the PC Card slot on notebook and handheld computers. These modems are
removed when the modem is not needed. Except for their size, PC Card modems are like a
combination of external and internal modems. These devices are plugged directly into an
external slot in the portable computer, so no cable is required other than the telephone
line connection. The cards are powered by the computer, which is fine unless the computer is
battery-operated. Running a PC Card modem while the portable computer is operating on
battery power drastically decreases the life of your batteries.
b. Wireless Modems:
Wireless modems are radio transmitters/receivers installed into mobile computing devices
(i.e. devices that are used while you are moving such as mobile phones, laptops etc.) Using
wireless modems, one can connect to a network while being mobile. Unlike landline
modems, wireless modems do not plug into an RJ-11 jack.
C. LAN Modems:
LAN modems allow shared remote access to LAN (Local Area Network) resources. LAN
modem comes fully preconfigured for single particular network architecture such as Ethernet
or Token Ring and/or particular network software such as IPX, NetBIOS, NetBEUI etc.
Page 5 of 36
b. You may have a computer that doesn’t have a DVD or BluRay (BD) player. In this case,
you can place a movie disc (DVD or BD) on the computer that has the player, and then view
the movie on a computer that lacks the player
c. You may have a computer with a CD/DVD/BD writer or a backup system but the other
computer doesn’t have it. In this case, you can burn discs or make backups on a computer
that has one of these but using data from a computer that doesn’t have a disc writer or a
backup system
d.You can connect a printer (or a scanner, or a fax machine) to one computer and let other
computers of the network print (or scan, or fax) to that printer (or scanner, or fax machine)
e. You can place a disc with pictures on one computer and let other computers access those
pictures
f. You can create files and store them in one computer, then access those files from the other
computer(s) connected to it.
Page 6 of 36
play together, if they have their computers networked.
e. Internet telephone service: Voice over IP (VoIP) services allows you to make and receive
phone calls through your home network across the Internet.
e. Home entertainment: Newer home entertainment products such as digital video recorders
(DVRs) and video game consoles now support either wired or wireless home networking.
Having these products integrated into your network enables online Internet gaming, video
sharing and other advanced features.
Page 7 of 36
than typing, giving the name of the recipient and the message. That sender’s voice signal is
then digitized and stored.
The system can then either deliver the message at a specified time in future or it can be
retrieved from a database by the recipient. The message is reconverted back into its analog
format when it is delivered or retrieved so that the recipient hears it as the original sender’s
voice on a telephone. Voice messaging requires a computer with an ability to store the audio
messages in digital form and then convert them back in an audio form upon verification. Each
user has a voice mailbox in secondary storage and special equipment converts the audio
message to and from the digital form. The main advantage of voice mail over electronic mail
is that the sender does not have to type. Voice mail also makes it easy to include people in the
firm’s environment in a communication network.
b. Hub
A hub is typically the least expensive, least intelligent, and least complicated. Its job is very
simple: anything that comes in one port is sent out to the others. Every computer connected to
the hub “sees” everything that every other computer on the hub sees. The hub itself is
blissfully ignorant of the data being transmitted. For years, simple hubs have been quick and
easy ways to connect computers in small networks.
c. Switch
A switch does essentially what a hub does but more efficiently. By paying attention to the
traffic that comes across it, it can “learn” where particular addresses are. For example, if it
sees traffic from machine A coming in on port 2, it now knows that machine A is connected
to that port and that traffic to machine A needs to only be sent to that port and not any of the
others. The net result of using a switch over a hub is that most of the network traffic only
goes where it needs to rather than to every port. On busy networks this can make the network
significantly faster.
d. Router
A router is the smartest and most complicated of the bunch. Routers come in all shapes and
sizes from the small four-port broadband routers that are very popular right now to the large
industrial strength devices that drive the internet itself. A simple way to think of a router is as
a computer that can be programmed to understand, possibly manipulate, and route the data its
being asked to handle. For example, broadband routers include the ability to “hide”
computers behind a type of firewall which involves slightly modifying the packets of network
traffic as they traverse the device. All routers include some kind of user interface for
configuring how the router will treat traffic. The really large routers include the equivalent of
a full-blown programming language to describe how they should operate as well as the ability
to communicate with other routers to describe or determine the best way to get network
traffic from point A to point B.
d. Network Repeater
A repeater connects two segments of your network cable. It retimes and regenerates the
signals to proper amplitudes and sends them to the other segments. When talking about,
Ethernet topology, you are probably talking about using a hub as a repeater. Repeaters require
a small amount of time to regenerate the signal. This can cause a propagation delay which
can affect network communication when there are several repeaters in a row. Many network
architectures limit the number of repeaters that can be used in a row. Repeaters work only at
the physical layer of the OSI network model.
Page 8 of 36
e. Bridge
A bridge reads the outermost section of data on the data packet, to tell where the message is
going. It reduces the traffic on other network segments, since it does not send all packets.
Bridges can be programmed to reject packets from particular networks. Bridging occurs at the
data link layer of the OSI model, which means the bridge cannot read IP addresses, but only
the outermost hardware address of the packet. In our case the bridge can read the Ethernet
data which gives the hardware address of the destination address, not the IP address. Bridges
forward all broadcast messages. Only a special bridge called a translation bridge will allow
two networks of different architectures to be connected. Bridges do not normally allow
connection of networks with different architectures. The hardware address is also called the
MAC (media access control) address. To determine the network segment a MAC address
belongs to, bridges use one of the following:
f. Transparent Bridging: They build a table of addresses (bridging table) as they receive
packets. If the address is not in the bridging table, the packet is forwarded to all segments
other than the one it came from. This type of bridge is used on Ethernet networks.
g. Source route bridging: The source computer provides path information inside the packet.
This is used on Token Ring networks
h. Router
There is a device called a router which will function similar to a bridge for network transport
protocols that are not routable, and will function as a router for routable protocols. It
functions at the network and data link layers of the OSI network model.
i. Gateway
A gateway can translate information between different network data formats or network
architectures. It can translate TCP/IP to AppleTalk so computers supporting TCP/IP can
communicate with Apple brand computers. Most gateways operate at the application layer,
but can operate at the network or session layer of the OSI model. Gateways will start at the
lower level and strip information until it gets to the required level and repackage the
information and work its way back toward the hardware layer of the OSI model.
2.8. TELECONFERENCING
The term teleconferencing refers to electronic meetings that involve people who are at
physically different sites. Telecommunication technology system allows meeting participants
to interact with one another without travelling to the same location. Three different types of
teleconferencing exist: audio teleconferencing, video teleconferencing and computer
conferencing.
Page 9 of 36
communication that requires all participants to be present at the same time, it is difficult to
schedule conferences when time zones are far apart.
2.8.3. One-Way Video and Audio: Video and audio signals are sent from a single
transmitting site to one or more receiving sites. This is a good way for a project leader to
disseminate information to team members at remote locations.
2.8.4. One-Way Video and Two-Way Audio: People at the receiving sites can talk to
people at the transmitting site, while everyone views the same video images.
2.8.5. Two-Way Video and Audio: The video and audio communications between all sites
are two-way. Although this is the most effective of the electronically aided conferencing
approaches, it can be the most expensive as well.
Page 10 of 36
Page 11 of 36
3.0. Network planning and design
Network planning and design is an iterative process, encompassing topological design,
network-synthesis, and network-realization, and is aimed at ensuring that a new
telecommunications network or service meets the needs of the subscriber and operator. The
process can be tailored according to each new network or service.
Each of these layers incorporates plans for different time horizons, i.e. the business planning
layer determines the planning that the operator must perform to ensure that the network will
perform as required for its intended life-span. The Operations and Maintenance layer,
however, examines how the network will run on a day-to-day basis.
The network planning process begins with the acquisition of external information. This
includes:
Planning a new network/service involves implementing the new system across the first four
layers of the OSI Reference Model. Choices must be made for the protocols and transmission
technologies.
Topological design: This stage involves determining where to place the components
and how to connect them. The (topological) optimisation methods that can be used in
this stage come from an area of mathematics called Graph Theory. These methods
involve determining the costs of transmission and the cost of switching, and thereby
determining the optimum connection matrix and location of switches and
concentrators.[1]
Network-synthesis: This stage involves determining the size of the components used,
subject to performance criteria such as the Grade of Service (GOS). The method used
is known as "Nonlinear Optimisation", and involves determining the topology,
required GoS, cost of transmission, etc., and using this information to calculate a
routing plan, and the size of the components.[1]
Network realization: This stage involves determining how to meet capacity
requirements, and ensure reliability within the network. The method used is known as
Page 12 of 36
"Multi-commodity Flow Optimisation", and involves determining all information
relating to demand, costs and reliability, and then using this information to calculate
an actual physical circuit plan.
During the process of Network Planning and Design, estimates are made of the expected
traffic intensity and traffic load that the network must support.[1] If a network of a similar
nature already exists, traffic measurements of such a network can be used to calculate the
exact traffic load.[2] If there are no similar networks, then the network planner must use
telecommunications forecasting methods to estimate the expected traffic intensity.[1]
Definition of problem;
Data acquisition;
Choice of forecasting method;
Analysis/Forecasting;
Documentation and analysis of results.
Dimensioning
Dimensioning a new network determines the minimum capacity requirements that will still
allow the Teletraffic Grade of Service (GoS) requirements to be met.[1][2] To do this,
dimensioning involves planning for peak-hour traffic, i.e. that hour during the day during
which traffic intensity is at its peak.[1]
The dimensioning process involves determining the network’s topology, routing plan, traffic
matrix, and GoS requirements, and using this information to determine the maximum call
handling capacity of the switches, and the maximum number of channels required between
the switches.[1] This process requires a complex model that simulates the behavior of the
network equipment and routing protocols.
A dimensioning rule is that the planner must ensure that the traffic load should never
approach a load of 100 percent.[1] To calculate the correct dimensioning to comply with the
above rule, the planner must take on-going measurements of the network’s traffic, and
continuously maintain and upgrade resources to meet the changing requirements.[1][2] Another
reason for over-provisioning is to make sure that traffic can be rerouted in case a failure
occurs in the network.
Because of the complexity of network dimensioning, this is typically done using specialized
software tools. Whereas researchers typically develop custom software to study a particular
problem, network operators typically make use of commercial network planning software.
Page 13 of 36
Traffic engineering
Compared to network engineering, which adds resources such as links, routers and switches
into the network, traffic engineering targets changing traffic paths on the existing network to
alleviate traffic congestion or accommodate more traffic demand.
This technology is critical when the cost of network expansion is prohibitively high and
network load is not optimally balanced. The first part provides financial motivation for traffic
engineering while the second part grants the possibility of deploying this technology.
Survivability
Network survivability enables the network to maintain maximum network connectivity and
quality of service under failure conditions. It has been one of the critical requirements in
network planning and design. It involves design requirements on topology, protocol,
bandwidth allocation, etc.. Topology requirement can be maintaining a minimum two-
connected network against any failure of a single link or node. Protocol requirements include
using dynamic routing protocol to reroute traffic against network dynamics during the
transition of network dimensioning or equipment failures. Bandwidth allocation requirements
pro-actively allocate extra bandwidth to avoid traffic loss under failure conditions. This topic
has been actively studied in conferences, such as the International Workshop on Design of
Reliable Communication Networks.[3]
Tools
There are a wide variety of tools available for network planning and design depending on the
technologies being used. These include:
OPNET
NetSim
Serial communication is used for all long-haul communication and most computer networks,
where the cost of cable and synchronization difficulties make parallel communication
impractical. Serial computer buses are becoming more common even at shorter distances, as
improved signal integrity and transmission speeds in newer serial technologies have begun to
outweigh the parallel bus's advantage of simplicity (no need for serializer and deserializer, or
SerDes) and to outstrip its disadvantages (clock skew, interconnect density). The migration
from PCI to PCI Express is an example.
Page 14 of 36
Fig 4.1. Parallel versus serial communication.
Cables
Many serial communication systems were originally designed to transfer data over relatively
large distances through some sort of data cable.
Practically all long-distance communication transmits data one bit at a time, rather than in
parallel, because it reduces the cost of the cable. The cables that carry this data (other than
"the" serial cable) and the computer ports they plug into are usually referred to with a more
specific name, to reduce confusion.
Keyboard and mouse cables and ports are almost invariably serial—such as PS/2 port and
Apple Desktop Bus and USB.
The cables that carry digital video are almost invariably serial—such as coax cable plugged
into a HD-SDI port, a webcam plugged into a USB port or Firewire port, Ethernet cable
connecting an IP camera to a Power over Ethernet port, FPD-Link, etc.
Other such cables and ports, transmitting data one bit at a time, include Serial ATA, Serial
SCSI, Ethernet cable plugged into Ethernet ports, the Display Data Channel using previously
reserved pins of the VGA connector or the DVI port or the HDMI port.
Page 15 of 36
Serial buses
Many communication systems were generally designed to connect two integrated circuits on
the same printed circuit board, connected by signal traces on that board (rather than external
cables).
Integrated circuits are more expensive when they have more pins. To reduce the number of
pins in a package, many ICs use a serial bus to transfer data when speed is not important.
Some examples of such low-cost serial buses include SPI, I²C, DC-BUS, UNI/O, and 1-Wire.
The communication links, across which computers (or parts of computers) talk to one
another, may be either serial or parallel. A parallel link transmits several streams of data
simultaneously along multiple channels (e.g., wires, printed circuit tracks, or optical fibres);
whereas, a serial link transmits only a single stream of data.
Although a serial link may seem inferior to a parallel one, since it can transmit less data per
clock cycle, it is often the case that serial links can be clocked considerably faster than
parallel links in order to achieve a higher data rate. Several factors allow serial to be clocked
at a higher rate:
Clock skew between different channels is not an issue (for unclocked asynchronous
serial communication links).
A serial connection requires fewer interconnecting cables (e.g., wires/fibres) and
hence occupies less space. The extra space allows for better isolation of the channel
from its surroundings.
Crosstalk is less of an issue, because there are fewer conductors in proximity.
In many cases, serial is cheaper to implement than parallel. Many ICs have serial interfaces,
as opposed to parallel ones, so that they have fewer pins and are therefore less expensive.
Page 16 of 36
The need for synchronization
Whenever an electronic device transmits digital (and sometimes analog) data to another, there
must be a certain rhythm established between the two devices, i.e., the receiving device must
have some way of, within the context of the fluctuating signal that it's receiving, determining
where each unit of data begins and where it ends.
Methods of synchronization
There are two ways to synchronize the two ends of the communication.
The synchronous signalling methods use two different signals. A pulse on one signal
indicates when another bit of information is ready on the other signal.
The asynchronous signalling methods use only one signal. The receiver uses transitions on
that signal to figure out the transmitter bit rate ("autobaud") and timing, and set a local clock
to the proper timing, typically using a phase-locked loop (PLL) to synchronize with the
transmission rate. A pulse from the local clock indicates when another bit is ready.
Synchronous transmission
Practically all parallel communications protocols use synchronous transmission. For example,
in a computer, address information is transmitted synchronously—the address bits over the
address bus, and the read or write 'strobe's of the control bus.
A logical one is indicated when there are two transitions in the same time frame as a zero. In
the Manchester coding a transition from low to high indicates a one and a transition from
high to low indicates a zero. When there are successive ones or zeros, an opposite transition
is required on the edge of the time frame to prepare for the next transition and signal.
Asynchronous transmission
The most common asynchronous signalling, asynchronous start-stop signalling, uses a near-
constant 'bit' timing (+/- 5% local oscillator required at both end of the connection). Using
this, the receiver detects the 'first' edge transition... (the START BIT), then waits 'half a bit
Page 17 of 36
duration' then reads A further delay of one 'whole bit duration' is executed before the next
data bit is 'read' - repeating for length of the whole serial word (typically 7/8-data bits).
Finally an optional STOP bit is appended to identify the end of the data word.
Special level & timing conditions are detected to identify an open-circuit condition (BREAK)
The sync token might be a single pulse (a "start bit" as noted above), or it may be a more
complicated syncword or self-synchronizing code such as HDLC or 8B/10B encoding.
In mathematics, Fourier analysis is the study of the way general functions may be
represented or approximated by sums of simpler trigonometric functions. Fourier analysis
grew from the study of Fourier series, and is named after Joseph Fourier, who showed that
representing a function as a sum of trigonometric functions greatly simplifies the study of
heat transfer.
Today, the subject of Fourier analysis encompasses a vast spectrum of mathematics. In the
sciences and engineering, the process of decomposing a function into oscillatory components
is often called Fourier analysis, while the operation of rebuilding the function from these
pieces is known as Fourier synthesis. For example, determining what component
frequencies are present in a musical note would involve computing the Fourier transform of a
sampled musical note. One could then re-synthesize the same sound by including the
Page 18 of 36
frequency components as revealed in the Fourier analysis. In mathematics, the term Fourier
analysis often refers to the study of both operations.
The decomposition process itself is called a Fourier transformation. Its output, the Fourier
transform, is often given a more specific name, which depends on the domain and other
properties of the function being transformed. Moreover, the original concept of Fourier
analysis has been extended over time to apply to more and more abstract and general
situations, and the general field is often known as harmonic analysis. Each transform used for
analysis (see list of Fourier-related transforms) has a corresponding inverse transform that
can be used for synthesis.
Fourier analysis has many scientific applications – in physics, partial differential equations,
number theory, combinatorics, signal processing, digital image processing, probability
theory, statistics, forensics, option pricing, cryptography, numerical analysis, acoustics,
oceanography, sonar, optics, diffraction, geometry, protein structure analysis, and other areas.
This wide applicability stems from many useful properties of the transforms:
The transforms are linear operators and, with proper normalization, are unitary as well
(a property known as Parseval's theorem or, more generally, as the Plancherel
theorem, and most generally via Pontryagin duality) (Rudin 1990).
The transforms are usually invertible.
The exponential functions are eigen functions of differentiation, which means that this
representation transforms linear differential equations with constant coefficients into
ordinary algebraic ones (Evans 1998). Therefore, the behavior of a linear time-
invariant system can be analyzed at each frequency independently.
By the convolution theorem, Fourier transforms turn the complicated convolution
operation into simple multiplication, which means that they provide an efficient way
to compute convolution-based operations such as polynomial multiplication and
multiplying large numbers (Knuth 1997).
The discrete version of the Fourier transform (see below) can be evaluated quickly on
computers using Fast Fourier Transform (FFT) algorithms. (Conte & de Boor 1980)
Page 19 of 36
5.2. Applications in signal processing
When processing signals, such as audio, radio waves, light waves, seismic waves, and even
images, Fourier analysis can isolate narrowband components of a compound waveform,
concentrating them for easier detection or removal. A large family of signal processing
techniques consist of Fourier-transforming a signal, manipulating the Fourier-transformed
data in a simple way, and reversing the transformation.[3]
Page 20 of 36
Variants of Fourier analysis
A Fourier transform and 3 variations caused by periodic sampling (at interval T) and/or
periodic summation (at interval P) of the underlying time-domain function. The relative
computational ease of the DFT sequence and the insight it gives into S( f ) make it a popular
analysis tool.
Most often, the unqualified term Fourier transform refers to the transform of functions of a
continuous real argument, and it produces a continuous function of frequency, known as a
frequency distribution. One function is transformed into another, and the operation is
reversible. When the domain of the input (initial) function is time (t), and the domain of the
output (final) function is ordinary frequency, the transform of function s(t) at frequency f is
given by the complex number:
Page 21 of 36
Evaluating this quantity for all values of f produces the frequency-domain function. Then s(t)
can be represented as a recombination of complex exponentials of all possible frequencies:
which is the inverse transform formula. The complex number, S( f ), conveys both amplitude
and phase of frequency f.
Fourier series
Main article: Fourier series
The Fourier transform of a periodic function, sP(t), with period P, becomes a Dirac comb
function, modulated by a sequence of complex coefficients:
for all integer values of k, and where ∫P is the integral over any interval of length P.
Page 22 of 36
A sufficient condition for recovering s(t) (and therefore S( f )) from just these samples (i.e.
from the Fourier series) is that the non-zero portion of s(t) be confined to a known interval of
duration P, which is the frequency domain dual of the Nyquist–Shannon sampling theorem.
See Fourier series for more information, including the historical development.
The DTFT is the mathematical dual of the time-domain Fourier series. Thus, a convergent
periodic summation in the frequency domain can be represented by a Fourier series, whose
coefficients are samples of a related continuous time function:
which is known as the DTFT. Thus the DTFT of the s[n] sequence is also the Fourier
transform of the modulated Dirac comb function.[note 2]
The Fourier series coefficients (and inverse transform), are defined by:
Parameter T corresponds to the sampling interval, and this Fourier series can now be
recognized as a form of the Poisson summation formula. Thus we have the important result
that when a discrete data sequence, s[n], is proportional to samples of an underlying
continuous function, s(t), one can observe a periodic summation of the
continuous Fourier transform, S( f ). That is a cornerstone in the foundation of digital signal
processing. Furthermore, under certain idealized conditions one can theoretically recover
S( f ) and s(t) exactly. A sufficient condition for perfect recovery is that the non-zero portion
of S( f ) be confined to a known frequency interval of width 1/T. When that interval is
[−1/2T, 1/2T], the applicable reconstruction formula is the Whittaker–Shannon interpolation
formula.
Another reason to be interested in S1/T ( f ) is that it often provides insight into the amount of
aliasing caused by the sampling process.
Applications of the DTFT are not limited to sampled functions. See Discrete-time Fourier
transform for more information on this and other topics, including:
Page 23 of 36
windowing (finite-length sequences)
transform properties
tabulated transforms of specific functions
Similar to a Fourier series, the DTFT of a periodic sequence, sN[n], with period N, becomes a
Dirac comb function, modulated by a sequence of complex coefficients (see DTFT/Periodic
data):
The S[k] sequence is what is customarily known as the DFT of sN. It is also N-periodic, so it
is never necessary to compute more than N coefficients. The inverse transform is given by:
and
the coefficients are proportional to samples of S1/T ( f ) at discrete intervals of 1/P = 1/NT:
Conversely, when one wants to compute an arbitrary number (N) of discrete samples of one
cycle of a continuous DTFT, S1/T ( f ), it can be done by computing the relatively simple DFT
of sN[n], as defined above. In most cases, N is chosen equal to the length of non-zero portion
of s[n]. Increasing N, known as zero-padding or interpolation, results in more closely spaced
samples of one cycle of S1/T ( f ). Decreasing N, causes overlap (adding) in the time-domain
(analogous to aliasing), which corresponds to decimation in the frequency domain. (see
Sampling the DTFT) In most cases of practical interest, the s[n] sequence represents a longer
sequence that was truncated by the application of a finite-length window function or FIR
filter array.
Page 24 of 36
The DFT can be computed using a fast Fourier transform (FFT) algorithm, which makes it a
practical and important transformation on computers.
transform properties
applications
tabulated transforms of specific functions
Page 25 of 36
Summary
For periodic functions, both the Fourier transform and the DTFT comprise only a discrete set
of frequency components (Fourier series), and the transforms diverge at those frequencies.
One common practice (not discussed above) is to handle that divergence via Dirac delta and
Dirac comb functions. But the same spectral information can be discerned from just one cycle
of the periodic function, since all the other cycles are identical. Similarly, finite-duration
functions can be represented as a Fourier series, with no actual loss of information except that
the periodicity of the inverse transform is a mere artifact.
We also note that it is common in practice for the duration of s(•) to be limited to the period,
P or N. But these formulas do not require that condition.
Page 26 of 36
Page 27 of 36
Duplex (telecommunications)
From Wikipedia, the free encyclopedia
This article includes a list of references, but its sources remain unclear because it has
insufficient inline citations. Please help to improve this article by introducing more precise
citations. (September 2015) (Learn how and when to remove this template message)
In a full-duplex system, both parties can communicate with each other simultaneously. An
example of a full-duplex device is a telephone; the parties at both ends of a call can speak and
be heard by the other party simultaneously. The earphone reproduces the speech of the
remote party as the microphone transmits the speech of the local party, because there is a
two-way communication channel between them, or more strictly speaking, because there are
two communication channels between them.
In a half-duplex system, both parties can communicate with each other, but not
simultaneously; the communication is one direction at a time. An example of a half-duplex
device is a walkie-talkie two-way radio that has a "push-to-talk" button; when the local user
wants to speak to the remote person they push this button, which turns on the transmitter but
turns off the receiver, so they cannot hear the remote person. To listen to the other person
they release the button, which turns on the receiver but turns off the transmitter.
Systems that do not need the duplex capability may instead use simplex communication, in
which one device transmits and the others can only "listen". Examples are broadcast radio
and television, garage door openers, baby monitors, wireless microphones, and surveillance
cameras. In these devices the communication is only in one direction.
Contents
1 Half duplex
2 Full duplex
3 Full-duplex emulation
o 3.1 Time-division duplexing
o 3.2 Frequency-division duplexing
o 3.3 Echo cancellation
4 See also
5 References
6 Further reading
Page 28 of 36
Half duplex
A half-duplex (HDX) system provides communication in both directions, but only one
direction at a time (not simultaneously). Typically, once a party begins receiving a signal, it
must wait for the transmitter to stop transmitting, before replying.
Half-duplex systems are usually used to conserve bandwidth, since only a single
communication channel is needed, which is shared alternately between the two directions.
For example, a walkie-talkie requires only a single frequency for bidirectional
communication, while a cell phone, which is a full-duplex device, requires two frequencies to
carry the two simultaneous voice channels, one in each direction.
In half-duplex systems, if more than one party transmits at the same time, a collision occurs,
resulting in lost messages.
Full duplex
Page 29 of 36
A full-duplex (FDX) system, or sometimes called double-duplex, allows communication in
both directions, and, unlike half-duplex, allows this to happen simultaneously. Land-line
telephone networks are full-duplex, since they allow both callers to speak and be heard at the
same time, with the transition from four to two wires being achieved by a hybrid coil in a
telephone hybrid. Modern cell phones are also full-duplex.[1]
A good analogy for a full-duplex system is a two-lane road with one lane for each direction.
Moreover, in most full-duplex mode systems carrying computer data, transmitted data does
not appear to be sent until it has been received and an acknowledgment is sent back by the
other party. In this way, such systems implement reliable transmission methods.
Two-way radios can be designed as full-duplex systems, transmitting on one frequency and
receiving on another; this is also called frequency-division duplex. Frequency-division
duplex systems can extend their range by using sets of simple repeater stations because the
communications transmitted on any single frequency always travel in the same direction.
Full-duplex Ethernet connections work by making simultaneous use of two physical twisted
pairs inside the same jacket, which are directly connected to each networked device: one pair
is for receiving packets, while the other pair is for sending packets. This effectively makes
the cable itself a collision-free environment and doubles the maximum total transmission
capacity supported by each Ethernet connection.
Full-duplex has also several benefits over the use of half-duplex. First, there are no collisions
so time is not wasted by having to retransmit frames. Second, full transmission capacity is
available in both directions because the send and receive functions are separate. Third, since
there is only one transmitter on each twisted pair, stations (nodes) do not need to wait for
others to complete their transmissions.
Some computer-based systems of the 1960s and 1970s required full-duplex facilities, even
for half-duplex operation, since their poll-and-response schemes could not tolerate the slight
delays in reversing the direction of transmission in a half-duplex line.
Page 30 of 36
Channel access method
In telecommunications and computer networks, a channel access method or multiple access
method allows several terminals connected to the same multi-point transmission medium to
transmit over it and to share its capacity.[1] Examples of shared physical media are wireless
networks, bus networks, ring networks and point-to-point links operating in half-duplex
mode.
A channel access method is based on multiplexing, that allows several data streams or signals
to share the same communication channel or transmission medium. In this context,
multiplexing is provided by the physical layer.
A channel access method is also based on a multiple access protocol and control mechanism,
also known as media access control (MAC). Media access control deals with issues such as
addressing, assigning multiplex channels to different users, and avoiding collisions. Media
access control is a sub-layer in the data link layer of the OSI model and a component of the
link layer of the TCP/IP model.
Contents
These numerous channel access schemes which generally fall into the following
categories:[2][3][1]
Page 31 of 36
devices. An example of FDMA systems were the first-generation (1G) cell-phone systems,
where each phone call was assigned to a specific uplink frequency channel, and another
downlink frequency channel. Each message signal (each phone call) is modulated on a
specific carrier frequency.
The time division multiple access (TDMA) channel access scheme is based on the time-
division multiplexing (TDM) scheme, which provides different time-slots to different data-
streams (in the TDMA case to different transmitters) in a cyclically repetitive frame structure.
For example, node 1 may use time slot 1, node 2 time slot 2, etc. until the last transmitter.
Then it starts all over again, in a repetitive pattern, until a connection is ended and that slot
becomes free or assigned to another node. An advanced form is Dynamic TDMA (DTDMA),
where a scheduling may give different time sometimes but some times node 1 may use time
slot 1 in first frame and use another time slot in next frame.
As an example, 2G cellular systems are based on a combination of TDMA and FDMA. Each
frequency channel is divided into eight timeslots, of which seven are used for seven phone
calls, and one for signalling data.
The code division multiple access (CDMA) scheme is based on spread spectrum, meaning
that a wider radio spectrum in Hertz is used than the data rate of each of the transferred bit
streams, and several message signals are transferred simultaneously over the same carrier
frequency, utilizing different spreading codes. The wide bandwidth makes it possible to send
with a very poor signal-to-noise ratio of much less than 1 (less than 0 dB) according to the
Shannon-Heartly formula, meaning that the transmission power can be reduced to a level
below the level of the noise and co-channel interference (cross talk) from other message
signals sharing the same frequency.
Page 32 of 36
One form is direct sequence spread spectrum (DS-CDMA), used for example in 3G cell
phone systems. Each information bit (or each symbol) is represented by a long code sequence
of several pulses, called chips. The sequence is the spreading code, and each message signal
(for example each phone call) uses a different spreading code.
Subdivisions of FH-CDMA are "fast hopping" where the frequency of hopping is much
higher than the message frequency content and "slow hopping" where the hopping frequency
is comparable to message frequency content. The subdivision is necessary as they are
considerably different.
The following are common circuit mode and channelization channel access methods:
Page 33 of 36
o Frequency-hopping CDMA (FH-CDMA), based on Frequency-hopping spread
spectrum (FHSS)
o Orthogonal frequency-hopping multiple access (OFHMA)
o Multi-carrier code division multiple access (MC-CDMA)
Space-division multiple access (SDMA)
Power-division multiple access (PDMA)
Duplexing methods
Where these methods are used for dividing forward and reverse communication channels,
they are known as duplexing methods, such as:
Note that hybrids of these techniques can be - and frequently are - used. Some examples:
The GSM cellular system combines the use of frequency division duplex (FDD) to prevent
interference between outward and return signals, with FDMA and TDMA to allow multiple
handsets to work in a single cell.
Page 34 of 36
GSM with the GPRS packet switched service combines FDD and FDMA with slotted Aloha for
reservation inquiries, and a Dynamic TDMA scheme for transferring the actual data.
Bluetooth packet mode communication combines frequency hopping (for shared channel
access among several private area networks in the same room) with CSMA/CA (for shared
channel access inside a medium).
IEEE 802.11b wireless local area networks (WLANs) are based on FDMA and DS-CDMA for
avoiding interference among adjacent WLAN cells or access points. This is combined with
CSMA/CA for multiple access within the cell.
HIPERLAN/2 wireless networks combine FDMA with dynamic TDMA, meaning that resource
reservation is achieved by packet scheduling.
G.hn, an ITU-T standard for high-speed networking over home wiring (power lines, phone
lines and coaxial cables) employs a combination of TDMA, Token passing and CSMA/CARP to
allow multiple devices to share the medium.
In local area networks (LANs) and metropolitan area networks (MANs), multiple access
methods enable bus networks, ring networks, hubbed networks, wireless networks and half
duplex point-to-point communication, but are not required in full duplex point-to-point serial
lines between network switches and routers, or in switched networks (logical star topology).
The most common multiple access method is CSMA/CD, which is used in Ethernet.
Although today's Ethernet installations typically are switched, CSMA/CD is utilized anyway
to achieve compatibility with hubs.
Satellite communications
Switching centers
Several ways of categorizing multiple-access schemes and protocols have been used in the
literature. For example, Daniel Minoli (2009)[5] identifies five principal types of multiple-
access schemes: FDMA, TDMA, CDMA, SDMA, and Random access. R. Rom and M. Sidi
(1990)[6] categorize the protocols into Conflict-free access protocols, Aloha protocols, and
Carrier Sensing protocols.
The Telecommunications Handbook (Terplan and Morreale, 2000)[7] identifies the following
MAC categories:
Page 35 of 36
Fixed assigned: TDMA, FDMA+WDMA, CDMA, SDMA
Demand assigned (DA)
o Reservation: DA/TDMA, DA/FDMA+DA/WDMA, DA/CDMA, DA/SDMA
o Polling: Generalized polling, Distributed polling, Token Passing, Implicit polling,
Slotted access
Random access (RA): Pure RA (ALOHA, GRA), Adaptive RA (TRA), CSMA, CSMA/CD, CSMA/CA
Page 36 of 36