Data Transmission
Data Transmission
Introduction
• Data transmission is the process of sending digital or analog
data over a communication medium to one or more
computing, network, communication or electronic devices.
Characteristics of Signals
Amplitude
Frequency
Time period
Classification of Signals
• The systems for smaller office applications and the digital private
branch exchange, or PBX, were developed by using ADC technology
as the foundation to process properly.
Techniques of Analog-to-Digital
Conversion
• PULSE CODE MODULATION
• DELTA MODULATION
PULSE CODE MODULATION
• The most common technique to change an analog
signal to digital data is called pulse code modulation
(PCM). A PCM encoder has the following three
processes:
1. Sampling
2. Quantization
3. Encoding
Sampling – The first step in PCM is sampling. Sampling is a process of measuring the
amplitude of a continuous-time signal at discrete instants, converting the continuous
signal into a discrete signal. There are three sampling methods:
(i) Ideal Sampling: In ideal Sampling also known as Instantaneous sampling pulses
from the analog signal are sampled. This is an ideal sampling method and cannot be
easily implemented.
• Note that the number of bits for each sample is determined from the
number of quantization levels.
• The process records a small positive change called delta. If the delta is positive, the
process records a 1 else the process records a 0.
• The modulator builds a second signal that resembles a staircase. The input signal is
then compared with this gradually made staircase signal.
We have the following rules for output:
• If the input analog signal is higher than the last value of the staircase
signal, increase delta by 1, and the bit in the digital data is 1.
• If the input analog signal is lower than the last value of the staircase
signal, decrease delta by 1, and the bit in the digital data is 0.
• Demodulator – The demodulator takes the digital data and, using the
staircase maker and the delay unit, creates the analog signal. The
created analog signal, however, needs to pass through a low-pass
filter for smoothing.
Applications
• Digital Signal Processing: In this process, the systems for
processing, storing, or transporting almost any analogue signal into
digital format require ADCs to perform well. Let’s an example, in TV
tuner cards this is use as fast video analog-to-digital converters.
• The binary signal when modulated gives a zero value when the binary
data represents 0 while gives the carrier output when data is 1. The
frequency and phase of the carrier signal remain constant.
Advantages of amplitude shift Keying –
• It can be used to transmit digital data over optical fiber.
BPSK also known as phase reversal keying or 2PSK is the simplest form
of phase shift keying. The Phase of the carrier wave is changed
according to the two binary inputs. In Binary Phase shift keying,
difference of 180 phase shift is used between binary 1 and binary 0.This
is regarded as the most robust digital modulation technique and is used
for long distance wireless communication.
Quadrature phase shift keying:
This technique is used to increase the bit rate i.e we can code two bits
onto one single element. It uses four phases to encode two bits per
symbol. QPSK uses phase shifts of multiples of 90 degrees. It has double
data rate carrying capacity compare to BPSK as two bits are mapped on
each constellation points.
Advantages of phase shift Keying –
• It is a more power efficient modulation technique as compared to ASK
and FSK.
• It has lower chances of an error.
• It allows data to be carried along a communication signal much more
efficiently as compared to FSK.
• Parity check bits are also calculated for all columns, then both are sent
along with the data.
• At the receiving end, these are compared with the parity bits
calculated on the received data.
Checksum
• Checksum error detection is a method used to identify errors in
transmitted data.
• The process involves dividing the data into equally sized segments
and using a 1’s complement to calculate the sum of these segments.
• The calculated sum is then sent along with the data to the receiver.
• At the receiver’s end, the same process is repeated and if all zeroes
are obtained in the sum, it means that the data is correct.
Checksum – Operation at Sender’s Side
• Firstly, the data is divided into k segments each of m bits.
• On the sender’s end, the segments are added using 1’s complement
arithmetic to get the sum.
• The sum is complemented to get the checksum.
• The checksum segment is sent along with the data segments.
• Fast Ethernet:
• Gigabit Ethernet:
• Switch Ethernet:
• VLAN stands for Virtual Local Area Networks; they are nothing but a logical
grouping of switch ports to have separate broadcast domains. VLAN reduces the
size of broadcast domains while increasing the number of broadcast domains.
• VLANs can be configured on multiple switches, with each VLAN being treated as
its own subnet or broadcast domain. The broadcasted frames onto the network will
only be switched between the same VLAN ports.
• A Valid ID range is 1-4094. On a VLAN switch, you assign ports with the proper
VLAN ID.
• The switch then allows data that must be sent between various ports with the same
VLAN ID.
Before VLAN working of a switch
After VLAN working of a switch
Types of VLAN
1. Default VLAN
When the switch first boots up, all switch ports are added to the default VLAN.
Generally, all switches have default VLAN as VLAN 1. VLAN1 allows any network
device connected to any switch port to connect with other devices on other switch
ports. The VLAN1, i.e., Default VLAN, can’t be renamed or deleted.
2. Data VLAN
Data VLAN is also known as a user VLAN. The data VLAN is only used for data
generated by users. This VLAN carries data only. It does not carry management
traffic or voice.
3. Voice VLAN
Voice VLAN is configured to carry voice traffic. Voice VLANs typically have higher
transmission priority than most other types of network traffic. We need a separate
voice VLAN to save bandwidth for other applications.
4. Management VLAN
A management VLAN is used to configure the switch for management purposes. It
manages system logging and monitoring. By default, VLAN 1 is the management
VLAN.
5. Native VLAN
This VLAN is used to carry untagged (not belonging to any VLAN) traffic.
How VLAN works?
Here are step-by-step instructions on how VLAN works:
In networking, VLANs are designated by a number.
The range is 1 to 4094. You assign ports on a VLAN switch with the correct VLAN
number.
The switch then permits data to be transmitted between different ports belonging to the
same VLAN.
There should be a means to transport traffic between switches because practically all
networks are bigger than a single switch.
Assigning a port on each network switch with a VLAN and connecting a cable between
them is one quick and straightforward approach to accomplish this.
Network Switch
• Switches maintain tables that match each MAC address to the port
receiving the MAC address.
How does a network switch work?
• All switches transmit data from one location to another, but their
hardware and software configurations can vary greatly. A network
switch can be deployed in the following ways:
• Edge, or access, switches. These switches manage traffic either
coming into or exiting the network. Devices like computers and APs
connect to edge switches.
• Aggregation, or distribution, switches. These switches are placed
within an optional middle layer in a network topology. Edge switches
connect into these and send traffic from switch to switch or send it up
to core switches.
• Core switches. These network switches form the backbone of the
network. Core switches connect aggregation or edge switches, users
or device edge networks to data center networks and enterprise LANs
to routers.
What are the types of switches?
There are several types of switches in networking:
• Virtual switches are software-only switches instantiated inside VM hosting
environments.
• Routing switches connect LANs. In addition to doing MAC-based Layer 2
switching, they perform routing functions at OSI Layer 3 (network layer), directing
traffic based on the IP address in each packet.
• Managed switches let a user adjust each port on the switch. This enables
monitoring and configuration changes.
• Unmanaged switches enable Ethernet devices to pass data automatically using auto
negotiation, which determines parameters such as data rate. The configuration is
fixed and cannot be edited.
• Smart switches can be configured to enable more control over data transmissions,
but they have more limitations compared to managed switches. Smart switches are
also known as partially managed switches.
• Stackable switches are fixed switches that may be connected to one another via a
backplane cable interface to form a single logical switch from two or more physical
switches.
What is PPP
• Point-to-Point Protocol (PPP) is a TCP/IP protocol that is used to
connect one computer system to another. Computers use PPP to
communicate over the telephone network or the Internet.
• FCS field – This field usually contains checksum simply for identification of errors.
It can be either 16 bits or 32 bits in size. It is also calculated over address, control,
protocol, and even information fields. Characters are added to frame for control and
handling of errors.
Multi Protocol Label Switching
(MPLS)
• Multi Protocol Label Switching (MPLS) is an IP packet routing
technique that routes IP packet through paths via labels instead of
looking at complex routing tables of routers. This feature helps in
increasing the delivery rate of IP packets.
• MPLS uses layer 3 service i.e, Internet Protocol, and uses router as
forwarding device. The traffic of different customers is separated from
each other because MPLS works somewhat like VPN.
• It does not work like regular VPN that encrypts the data but it ensures
packet from one customer cannot be received by another customer. An
MPLS header is added to packet that lies between layers 2 and 3.
Hence, it is also considers to be Layer 2.5 protocol.
MPLS Header –
The MPLS Header is 32 bit long and is divided into four parts –
• Label – This field is 20 bit long and can take value b/w 0 & 220 – 1.
• Exp – They are 3 bits long and used for Quality of Service(QoS).
• Bottom of stack (S) – It is of size 1 bit. MPLS labels are stacked one
over other. If there is only one label remained in MPLS header, then
its value is 1 otherwise 0.