Data Communication
Data Communication
Introduction
Data Communication
Data communication is a vital part of the information society because it provides the infrastructure
allowing the computers to communicate with one another. Data communications are the exchange of data
between two devices via some form of transmission medium such as a wired or wireless. For data
communications to occur, the communicating devices must be part of a communication system made up of
combination of hardware and software. The effectiveness of a data communications system depends on
four fundamental characteristics: delivery, accuracy and timeliness.
1. Delivery: The system must deliver data to the correct destination. Data must receive by
the intended device or user and only by that device or user.
2. Accuracy: The system must deliver the data accurately. Data that had altered in
transmission and left uncorrected are unusable.
3. Timeliness: The system must deliver data in a timely manner. Data delivered late are
useless. Data delivering in the same order that they produced, and without significant
delay. This kind of delivery is called real-time transmission.
4. Jitter: Jitter refers to the variation in the packet arrival time. It is the uneven delay in
the delivery of audio or video packets. For example, let us assume that video packets is
sent every 3D Ms. If some of the packets arrive with 3D-ms delay and others with 4D-
ms de-lay, an uneven quality in the video is the result.
Data Representation
Information today comes in different forms such as text, numbers, images, audio, and video.
Text: - In data communications, text is represented as a bit pattern, a sequence of bits (Os
or 1s). Different sets of bit patterns have been design to represent text symbols. Each set a
called a code, and the process of representing symbols is called coding. Today, the
prevalent coding system is called Unicode, which uses 32 bits to represent a symbol or
character used in any language in the world. The American Standard Code for Information
Interchange (ASCII) developed some decades ago in the United States, now constitutes the
first 127 characters in Unicode and referred to as Basic Latin.
Numbers: - Numbers are also represented by bit patterns. However, a code such as ASCII
is not use to represent numbers; the number directly converted to a binary number to
simplify mathematical operations.
Images: - Images are also represented by bit patterns. In its simplest form, an image is
composed of a matrix of pixels (picture elements), where each pixel is a small dot. The size
of the pixel depends on the resolution. For example, an image can be divided in-to 1000
pixels or 10,000 pixels. In the second case, there is a better representation of the image
(better resolution), but more memory is needed to store the image. After an image is divided
into pixels, each pixel is assigned a bit pattern. The size and the value of the pattern depend
on the image. For an image made of only black and white dots (e.g., a chessboard), a I-bit
pattern is enough to represent a pixel. If an image is not made of pure white and pure black
pixels, you can increase the light gray pixel by 10, and a white pixel by 11. There are
several methods to represent color images. One method is called RGB, so called because
each color is made of a combination of three primary colors: red, green, and blue. The
intensity of each color is measured, and a bit pattern is assigned to it. Another method is
YCM, in which a color is made of a combination of three other primary colors: yellow,
cyan, and magenta.
Video: - Video refers to the recording or broadcasting of a picture or movie. Video can
either be produced as a continuous entity (e.g., by a TV camera), or it can be a combination
of images, each a discrete entity, arranged to convey the idea of motion. Again, we can
change video to a digital or an analog signal.
1.1 Evolution of Data Communications Systems
The fundamental purpose of a communications system is the exchange of data between two parties.
Figure presents one particular example, which is the communication between a workstation and a server
over a public telephone network. Another example is the exchange of voice signals between two telephones
over the same network. The key elements of the model are:
A Communication system has following components:
1. Message: It is the information or data to be share. It can consist of text, numbers, pictures,
sound, video, or any combination of these.
2. Sender: The device/computer generates and sends that message.
3. Receiver: is the device or computer that receives the message. The location of receiver
computer is generally different from the sender computer. The distance between sender and
receiver depends upon the types of network used in between.
4. Medium: It is the channel or physical path through which the message carried from sender to
the receiver. The medium can be wired as if twisted pair wire, coaxial cable, fiber-optic cable
or wireless like laser, radio waves, and microwaves.
5. Protocol: It is a set of rules that is govern while the communication occur between the devices.
Both sender and receiver follow same protocols to communicate with each other.
A protocol performs the following functions:
1. Data sequencing: It refers to breaking a long message into smaller packets of fixed size. Data
sequencing rules define the method of numbering packets to detect loss or du-plication of
packets, to identify correctly the packets, which belong to same message.
2. Data routing: Data routing defines the most efficient path between the source and destination.
3. Data formatting: Data formatting rules define which group of bits or characters within packet
constitute data, control, addressing, or other information.
4. Flow control: A communication protocol also prevents a fast sender from overwhelming a
slow receiver. It ensures resource sharing and protection against traffic congestion by
regulating the flow of data on communication lines.
5. Error control: These rules designed to detect errors in messages and to ensure transmission
of correct messages. The most common method is to retransmit erroneous message block. In
such a case, a block having error discarded by the receiver and is re-transmitted by the sender.
6. Precedence and order of transmission: These rules ensure that all the nodes get a chance to
use the communication lines and other resources of the network based on the priorities
assigned to them.
7. Connection establishment and termination: These rules define how connections are
established, maintained and terminated when two nodes of a network want to communicate
with each other.
8. Data security: Providing data security and privacy built into most communication software
packages. It prevents access of data by unauthorized users.
9. Log information: Several communication software designed to develop log information,
which consists of all jobs and data communications tasks that have taken place. Such
information may be use for charging the users of the network based on their usage of the
network resources.
********************
Chapter 2
Data Transmission
Data Transmission
Data transmission refers to the process of transferring data between two or more digital
devices. Data is transmitted from one device to another in analog or digital format. Basically,
data transmission enables devices or components within devices to speak to each other.
Serial Transmission
When data is sent or received using serial data transmission, the data bits are organized in a specific
order, since they can only be sent one after another. The order of the data bits is important as it
dictates how the transmission is organized when it is received. It is viewed as a reliable data
transmission method because a data bit is only sent if the previous data bit has already been
received.
Figure 2.2: Serial Data Transmission
Serial transmission has two classifications: asynchronous and synchronous.
The advantage of using the asynchronous method is that no synchronization is required between
the transmitter and receiver devices. It is also a more cost effective method. A disadvantage is that
data transmission can be slower, but this is not always the case.
Parallel Transmission
When data is sent using parallel data transmission, multiple data bits are transmitted over multiple
channels at the same time. This means that data can be sent much faster than using serial
transmission methods.
A link is a communication pathway that transfer data from one device to another. Devices can
be a computer, printer or any other device that is capable to send and receive data. For visualization
purpose, imagine any link as a line drawn between two points.
For communication to occur, two devices must be connected in some way to the same link at the
same time. There are two possible types of connections:
Point-to-Point Connection
Multipoint Connection
Point-to-Point Connection :
A point-to-point connection provides a dedicated link between two devices. The entire capacity
of the link is reserved for transmission between those two devices. Most point-to-point connections
use a actual length of wire or cable to connect the two end, but other options such as microwave
or satellite links are also possible. Point to point network topology is considered to be one of the
easiest and most conventional network topologies. It is also the simplest to establish and
understand. e.g TV and Remote.
Figure 2.8: Point to Point Protocol
Multipoint Connection :
It is also called Multidrop configuration. In this connection two or more devices share a single
link. More than two devices share the link that is the capacity of the channel is shared now. With
shared capacity, there can be two possibilities in a Multipoint Line configuration:
Spatial Sharing: If several devices can share the link simultaneously, its called Spatially
shared line configuration.
Temporal (Time) Sharing: If users must take turns using the link , then its called
Temporally shared or Time Shared Line configuration.
2.3 Bit Rate/ Baud Rate, Transmission Channel, RS-232C and RS-449 Interface
Standards
Transmission Channels
The data transmission channels is needed for data transmission. These can be Guided Channels
or Unguided Channels.
Guided Media:
Guided media use a physical connection between two devices. The waves are guided along a
physical path over the medium. A signal has to travel within the physical limits of the guided
medium. These may be:
Twisted Pair Cable: Twisted pair cable is a cable, which is made by intertwining two
separate insulated wires together. A twisted pair cable consists of two conductors, which
are normally made of copper. This pair has a bandwidth to distance ratio of about 1 MHz
per kilometer. These are of two types: shielded and un-shielded. Shielded Twisted Pair
(STP) has a fine wire mesh surrounding the wires, which helps to protect the transmission
Unshielded Twisted Pair (UTP) does not have, that mesh. Shielded cable used in older
telephone networks, network, and data communications to reduce outside interference.
Optical Fiber: Optical fiber cable is a cable made of optical fibers that can transmit large
amounts of information at the speed of light. It is a medium and the technology associated
with the transmission of information as light pulses along a glass or plastic strand. Optical
fiber carries much more information than conventional copper wire. In one cable, there are
many optical fibers. The glass fiber requires more protection within an outer cable than
copper. It consists of two concentric cylinders: an inner core and a cladding used to
surround the core. These are made of transparent plastic or glass material. The density of
the core and cladding must be such to be helpful to reflect the beam of light. The core
guides the beam and cladding prevents it. A laser or Light Emitting Diode (LED) usually
generates the signal. The speed of data transfer is high. Due to high speed and little
disturbance, these being used rapidly in telecommunications.
Advantages of Optical Fiber
Higher Bandwidth helps data at a higher rate.
Less signal attenuation.
Immunity to electromagnetic interface.
Lightweight.
Limitations of Optical Fiber
It needs experts to install it and provide maintenance.
Being unidirectional needs two fibers for bi-directional communication.
Cost factor is high.
Unguided Media
Unguided media transfers the signals through wireless medium. It transports electromagnetic
waves in the air, which received by the devices to catch them. These can be:
Radio Waves: Radio waves are an invisible form of electromagnetic radiation, and it is
one of the widest ranges in the electromagnetic spectrum. A radio wave is an
electromagnetic wave propagated by an antenna. The frequency ranges from 3 Kilo-Hertz
to 1 Giga-Hertz. These can travel in any direction and easy to produce waves. It eliminates
the cost of physical medium and is very useful for long distanced communication. These
are of a very long wavelength, such as thousands of meters, tend to travel along the surface
of the earth and even penetrate into the water. These are useful for communication with
submarines and for broadcasting time signals, radio broadcast, cellular telephones, etc.
Each communication service uses a part of the spectrum that is suitable for its needs. These
days' cellular radios are used to provide mobile phone networks. These operate in the VHF
(Very High Frequency) band. These help in multi casting, which means it, transmit a signal
for specific group, which may be more than one. These used in FM radios, cordless phones,
etc. A communication between single source and destination known as unicast and if there
are many receivers to catch the signals sent by sender at any destination, it is called
broadcast.
Bluetooth: Bluetooth is used to send and receive data over short distance in mobile and
related technology. A Bluetooth connection is wireless and automatic, and it has a number
of interesting features that can simplify our daily lives.
Microwaves: Microwaves are radio frequencies, which ranges between about 1 GHz (one
gigahertz) to about 300 GHz. It may be defined as a short electromagnetic wave (longer
than infrared but shorter than radio waves) used for radar and ovens and for transmitting
telephone, facsimile video and data. These are unidirectional waves and hence have less
interference by a pair of aligned antenna to another. Uses of Microwave are radio
transmission, telecommunication carriers and TV stations.
Satellite is another form of microwave system. Repeaters present in the sky supplement it.
Satellites have a high bandwidth and can support variety of channels. It has some
limitations such as:
High set up cost.
The lifetime is limited.
These waves cannot be receive inside the building.
RS-232C
RS-232C is a long-established standard ("C" is the current version) that describes the
physical interface and protocol for relatively low-speed serial data communication between
computers and related devices.
An industry trade group, the Electronic Industries Association (EIA), defined it originally
for teletypewriter devices.
RS-232C is the interface that your computer uses to talk to and exchange data with your
modem and other serial devices.
Somewhere in your PC, typically on a Universal Asynchronous - Receiver/Transmitter
(UART) chip on your motherboard, the data from your computer is transmitted to an
internal or external modem (or other serial device) from its Data Terminal Equipment
(DTE) interface.
Since data in your computer flows along parallel circuits and serial devices can handle only
one bit at a time, the UART chip converts the groups of bits in parallel to a serial stream
of bits.
As your PC's DTE agent, it also communicates with the modem or other serial de-vice,
which, in accordance with the RS-232C standard, has a complementary inter-face called
the Data Communications Equipment (DCE) interface.
One of the advantages of a serial system is that it lends itself to transmission over tele-
phone lines.
The serial digital data can be converted by modem, placed onto a standard voice-grade
telephone line, and converted back to serial digital data at the receiving end of the line by
another modem.
communication eq
This definition defines data terminal equipment, as the equipment is the modem.
A modem cable has pin-to-pin connections and designed to connect DTE device to a DCE
device.
The RS-232C standard is an asynchronous serial communication method.
Serial means that the information is sent 1-bit at a time.
Asynchronous means that no clock signal is sent with the data. Each side uses its own
clock and a start and stop bit. Synchronous communication means that a clock signal is
sent in addition to a data signal.
The RS-232C standard works at the physical layer of the communication standard. This is
the lowest level and the one that physically connects the devices.
The communication is done through the serial port of the PC. This is a male connector with
25 (old) or 9 (new) pins, in both cases only 9 pins, at the most, are used.
Figure 2.30: Connection between DCE to DTE
Interface Standards:
In telecommunications, an interface standard is a standard that describes one or more
functional characteristics (such as code conversion, line assignments, or protocol
compliance) or physical characteristics (such as electrical, mechanical, or optical
characteristics) necessary to allow the exchange of information between two or more
(usually different) systems or pieces of equipment.
An interface standard may include operational characteristics and acceptable levels of
performance.
In the military community, interface standards permit command and control functions to
be performed using communication and computer systems.
RS 449 Interface
Is able to send data at high Speed without stray noise causing interference is to use a
differential form of signaling.
As the RS449 receivers use a differential input, and they are not reference to ground, any
noise that is pick up does not affect the input.
This means that higher levels of noise can be tolerate without any degradation to the
performance to the data communications system.
For the RS449 interface, ten additional circuits' functions have been provided when
compared to RS232.
In addition to this the RS449 interface requires the use of 37 way D-type connectors and
9 way D-type connectors, the latter being necessary when use is made of the secondary
channel interchange circuits.
Transmission Modes
Transmission mode means transferring of data between two devices. It is also known as
communication mode. Buses and networks are design to allow communication to occur between
individual devices that are interconnected. There are three types of transmission mode:
Simplex Mode
Half-Duplex Mode
Full-Duplex Mode
Figure 4.11: Types of Transmission Modes
Simplex Mode
In Simplex mode, the communication is unidirectional, as on a one-way street. Only one
of the two devices on a link can transmit, the other can only receive. The simplex mode
can use the entire capacity of the channel to send data in one direction.
Example: Keyboard and traditional monitors. The keyboard can only introduce input; the
monitor can only give the output.
Half-Duplex Mode
In half-duplex mode, each station can both transmit and receive, but not at the same time.
When one device is sending, the other can only receive, and vice versa. The half-duplex
mode is used in cases where there is no need for communication in both direction at the
same time. The entire capacity of the channel can be utilized for each direction. Example:
Walkie- talkie in which message is sent one at a time and messages are sent in both the
directions.
Figure 2.15: Half- Duplex
Full-Duplex Mode
In full-duplex mode, both stations can transmit and receive simultaneously. In full duplex
mode, signals going in one direction share the capacity of the link with signals going in
other direction, this sharing can occur in two ways:
Either the link must contain two physically separate transmission paths, one
for sending and other for receiving.
Alternatively, the capacity is divided between signals travelling in both
directions.
Full-duplex mode is use when communication in both direction is required all the time. The
capacity of the channel however must be divided between the two directions.
Example: Telephone Network in which there is communication between two persons by a
telephone line, through which both can talk and listen at the same time.
********************
Chapter 3
Signals and Systems
Signals
The signal. Stated in mathematical terms, a signal is merely a function. Analog signals are
continuous-valued; digital signals are discrete-valued. The independent variable of the signal could be time
(speech, for example), space (images), or the integers (denoting the sequencing of letters and numbers in
the football score).
Signals are classified into the following categories:
Example 2: As shown in the following diagram, rectangle function x(t) = x(-t) so it is also even
function.
Figure3.11: Even and Odd Signals
A signal is said to be odd when it satisfies the condition x(t) = -x(-t)
e 0(t )
where
e -t )]
Energy E=
Power P=
NOTE: A signal cannot be both, energy and power simultaneously. In addition, a signal may be
neither energy nor power signal.
Power of energy signal = 0
Energy of power signal
Note: For a real signal, imaginary part should be zero. Similarly, for an imaginary signal, real part
should be zero.
Systems
Is a combination of elements, components that perform some task?
is a set of element which produces o/p in response to i/p
Mathematically, y(n) = f[ x(n) ]
Systems are classified into the following categories:
linear and Non-linear Systems
Time Variant and Time Invariant Systems
linear Time variant and linear Time invariant systems
Static and Dynamic Systems
Causal and Non-causal Systems
Invertible and Non-Invertible Systems
Stable and Unstable Systems
iii. linear Time variant (LTV) and linear Time Invariant (LTI) Systems
If a system is both linear and time variant, then it is called linear time variant (LTV) system. If a
system is both linear and time Invariant then that system is called linear time invariant (LTI) system.
Invertible system
Y(S) = X(S) H1(S) H2(S)
= X(S) H1(S) · 1/(H1(S)) Since H2(S) = 1/( H1(S) )
Y(S) = X(S)
x(t)
Hence, the system is invertible.
If then the system is said to be non-invertible.
nformation rate R is less than C, then one can approach arbitrarily small error probabilities by using
intelligent coding techniques.
********************
Chapter 5
Overview of Data Communication Networking
A computer network is a system in which multiple computers connected to each other to share
information and resources.
The term "computer network" is use to mean an interconnected collection of autonomous
computer. Two computers are said to be interconnect only if they are able to exchange information.
Types of Network:
1. Personal Area Network
A Personal Area Network (PAN) is smallest network, which is very personal to a user. This
may include Bluetooth enabled devices or infrared enabled devices. PAN has connectivity
range up to 10 meters. PAN may include wireless computer keyboard and mouse, Bluetooth
enabled headphones, wireless printers and TV remotes. For example, Piconet is Bluetooth-
enabled Personal Area Network, which may contain up to 8 devices connected together in a
master-slave fashion.
Figure 5.2: PAN
A WAN spans a large geographic area, such as a state, province or country. WANs
often connect multiple smaller networks, such as local area networks (LANs) or metro
area networks (MANs).
The world's most popular WAN is the Internet. Some segments of the Internet, like
VPN-based extranets, are also WANs in themselves.
Finally, many WANs are corporate or research networks that utilize leased lines.
WANs generally utilize different and much more expensive networking equipment
than do LANs. Key technologies often found in WANs include SONET, Frame Relay,
and ATM.
Network Topologies
In this type of network topology, all the nodes of a network are connected to a common
transmission medium having two endpoints.
All the data that travels over the network is transmitted through a common transmission
medium known as the bus or the backbone of the network.
When the transmission medium has exactly two endpoints, the network topology is
- In case the transmission medium, also
called as the network backbone, has more than two endpoints, the network is said to
have a distributed bus topology.
Bus topology is easy to handle and implement and is best suited for small networks.
But the downside of this topology is that the limited cable length limits the number of
stations, thus limiting the performance to a less number of nodes.
In a ring topology, every node in the network is connected to two other nodes and the
first and the last nodes are connected to each other.
The data that are transmitted over the network pass through each of the nodes in the
ring until they reach the destination node.
In a ring network, the data and the signals that pass over the network travel in a single
direction.
The dual ring topology varies in having two connections between each of the network
nodes.
The data flow along two directions in the two rings formed thereby.
The ring topology does not require a central server to manage connectivity be-tween
the nodes and facilitates an orderly network operation.
But, the failure of a single station in the network can render the entire network
inoperable.
Changes and moves in the stations forming the network affect the network operation.
v. Tree Topology:
It is known's as a hierarchical topology and has a central root node that connected to
one or more nodes of a lower hierarchy.
In a symmetrical hierarchy, each node in the network has a specific fixed number of
nodes connected to those at a lower level.
Apart from these basic types of network topologies, there are hybrid network
topologies, which are composed of a combination of two or more basic topologies.
These network mappings aim at harnessing the advantages of each of the basic
topologies used in them.
Network topologies are the physical arrangements of network nodes and wires. What
is interesting is that the inanimate nodes and wires turn 'live' for the trans-mission of
information!
Protocol Architecture:
Is the layered structure of hardware and software that supports the exchange of data
between systems and supports applications such a as electronic mail and file transfer.
The key features of protocol are:
Syntax: concerns the format of the data blocks
Semantics: Includes control information for coordination and error handling
Timing: Includes speed matching and sequencing
1. Physical Layer:
A physical layer covers the physical interface between devices and the rules by which bits
passed from one to another.
It relates to the physical properties of the interface to a transmission medium.
For example, connector that joins one or more circuits.
Electrical part of physical layer relates to the representation of bits.
Functional parts of physical layer specify the function performed by individual circuits
between a system and the transmission medium.
Similarly, procedural part of physical layer species the sequence of events by which bit
streams are exchange across the physical medium.
3. Network Layer:
Determines how data are transferred between network devices
Routes packets according to unique network device addresses
Provides flow and congestion control to prevent network resource depletion
4. Transport Layer:
It provides the mechanism for the exchange of data between and system.
The connection oriented transport service ensures that data are deliver error free, in
sequence with no loss or duplication.
Manages end-to-end message delivery in network
Provides reliable and sequential packet delivery through error recovery and flow control
mechanisms
Provides connectionless oriented packet delivery
5. Session Layer:
It provides the mechanism for controlling the dialog between application in and systems.
Manages user sessions and dialogues
Controls establishment and termination of logic links between users
Reports upper layer errors
6. Presentation Layer:
It defines the format of the date to be exchange between applications.
It defines the syntax used between applications and provides for the selection and
subsequent modification of the presentation used.
Masks the differences of data formats between dissimilar systems
Specifies architecture-independent data transfer format
Encodes and decodes data; encrypts and decrypts data; compresses and decompresses data
7. Application Layer:
Defines interface-to-user processes for communication and data transfer in net-work
Provides standardized services such as virtual terminal, file and job transfer and operations.
The OSI Model we just looked at is just a reference/logical model. It was design to describe the
functions of the communication system by dividing the communication procedure into smaller and
simpler components. However, when we talk about the TCP/IP model, it was designed and
developed by Department of Defense (DOD) in 1960s and is based on standard protocols. It stands
for Transmission Control Protocol/Internet Protocol. The TCP/IP model is a concise version of the
OSI model. It contains four layers, unlike seven layers in the OSI model. The layers are:
1. Process/Application Layer
2. Host-to-Host/Transport Layer
3. Internet Layer
4. Network Access/Link Layer
Figure5.8: Diagrammatic comparison of TCP/IP and OSI model
TCP/IP functionality is divided into four layers, each of which include specific protocols:
The application layer provides applications with standardized data exchange. Its
protocols include the HTTP, FTP, Post Office Protocol 3 (POP3), Simple Mail Transfer
Protocol (SMTP) and Simple Network Management Protocol (SNMP). At the application
layer, the payload is the actual application data.
The transport layer is responsible for maintaining end-to-end communications across the
network. TCP handles communications between hosts and provides flow control,
multiplexing and reliability. The transport protocols include TCP and User Datagram
Protocol (UDP), which is sometimes used instead of TCP for special purposes.
The network layer also called the internet layer, deals with packets and connects
independent networks to transport the packets across network boundaries. The network
layer protocols are the IP and the Internet Control Message Protocol (ICMP), which is used
for error reporting.
The physical layer, also known as the network interface layer or data link layer, consists
of protocols that operate only on a link -- the network component that interconnects nodes
or hosts in the network. The protocols in this lowest layer include Ethernet for local area
networks (LANs) and the Address Resolution Protocol (ARP).
TCP refers to Transmission Control Protocol where as OSI refers to Open Systems
Interconnection.
TCP/IP has four layers & OSI has seven layers.
TCP/IP is more reliable than OSI is less reliable
TCP/IP does not have very strict boundaries where as OSI has strict boundaries
TCP/IP follow a horizontal approach where as OSI follows a vertical approach.
TCP/IP uses both session and presentation layer in the application layer itself and OSI uses
different session and presentation layers.
TCP/IP developed protocols then model where as OSI developed model then protocol.
Transport layer in TCP/IP does not provide assurance delivery of packets and in OSI;
model transport layer provides assurance delivery of packets.
TCP/IP model network layer only provides connection less services whereas Connection
less and connection oriented both services are provided by network layer in OSI model.
Protocols cannot be replaced easily in TCP/IP model While in OSI model; Protocols are
better covered and is easy to replace with the change in technology.
The primary function of LLC is to multiplex protocols over the MAC layer while
transmitting and likewise to de-multiplex the protocols while receiving.
LLC provides hop-to-hop flow and error control.
It allows multipoint communication over computer network.
Frame Sequence Numbers are assign by LLC.
In case of acknowledged services, it tracks acknowledgements
Function of MAC sublayer
It provides an abstraction of the physical layer to the LLC and upper layers of the OSI
network.
It is responsible for encapsulating frames so that they are suitable for transmission via the
physical medium.
It resolves the addressing of source station as well as the destination station, or groups of
destination stations.
It performs multiple access resolutions when more than one data frame to be transmit. It
determines the channel access methods for transmission.
It also performs collision resolution and initiating retransmission in case of collisions.
It generates the frame check sequences and thus contributes to protection against
transmission errors.
i. Fast Ethernet:- Fast Ethernet refers to an Ethernet network that can transfer data at a rate
of 100 Mbit/s.
ii. Gigabit Ethernet:- Gigabit Ethernet delivers a data rate of 1,000 Mbit/s (1 Gbit/s).
iii. 10 Gigabit Ethernet:- 10 Gigabit Ethernet is the recent generation and delivers a data rate
of 10 Gbit/s (10,000 Mbit/s). It is generally use for backbones in high-end applications
requiring high data rates.
Aloha
The Aloha protocol was design as part of a project at the University of Hawaii. It provided data transmission
between computers on several of the Hawaiian Islands involving packet radio networks. Aloha, is a multiple
access protocol at the data link layer and proposes how multiple terminals access the medium without
interference or collision.
There are two different versions of ALOHA:
1. Pure Aloha
Pure Aloha is an un-slotted, decentralized, and simple to implement a protocol. In pure
ALOHA, the stations simply transmit frames whenever they want data to send. It does not check
whether the channel is busy or not before transmitting. In case, two or more stations transmit
simultaneously, the collision occurs and frames are destroyed. Whenever any station transmits a
frame, it expects the acknowledgment from the receiver. If it is not received within a specified time,
the station assumes that the frame or acknowledgment has been destroyed. Then, the station waits
for a random amount of time and sends the frame again. This randomness helps in avoiding more
collisions. This scheme works well in small networks where the load is not much. But in largely
loaded networks, this scheme fails poorly. This led to the development of Slotted Aloha.
To assure pure aloha: Its throughput and rate of transmission of the frame to be predicted.
In the diagram, A starts send the first bit of its frame at t1 and since C sees the channel idle at t2, starts
Throughput and Efficiency The throughput of CSMA/CD is much greater than pure or slotted ALOHA.
InterFrame Space (IFS) When a station finds the channel busy, it waits for a period called
IFS time. IFS can also be used to define the priority of a station or a frame. Higher the IFS
lower is the priority.
Contention Window It is the amount of time divided into slots. A station, which is ready
to send frames, chooses random number of slots as wait time.
Acknowledgements The positive acknowledgements and time-out timer can help
guarantee a successful transmission of the frame.
The entire process for collision avoidance can be explain as follows:
Figure 5.15: Algorithm for CSMA/ CA
5.3 Wide Area Networks
X.25
X.25 is a protocol suite defined by ITU-T for packet switched communications over WAN (Wide Area
Network). It was originally design for use in the 1970s and became very popular in 1980s. Presently, it
is use for networks for ATMs and credit card verification. It allows multiple logical channels to use the
same physical line. It also permits data exchange between terminals with different communication
speeds.
Physical Layer: It lays out the physical, electrical and functional characteristics that
interface between the computer terminal and the link to the packet switched node. X.21
physical implementer is commonly use for the linking.
Data Link Layer: It comprises the link access procedures for exchanging data over the
link. Here, control information for transmission over the link is attach to the packets
from the packet layer to form the LAPB frame (Link Access Procedure Balanced). This
service ensures a bit-oriented, error-free, and ordered delivery of frames.
Packet Layer: This layer defines the format of data packets and the procedures for
control and transmission of the data packets. It provides external virtual circuit service.
Virtual circuits may be of two types: virtual call and permanent virtual circuit. The
virtual call is establish dynamically when needed through call set up procedure, and the
circuit is relinquished through call clearing procedure. Permanent virtual circuit, on the
other hand, is fixed and network assigned.
Equipment used
X.21 implementer
DTE : Data Terminal Equipment
DCTE: Data Circuit Terminating Equipment
Frame Relay
Frame Relay is a packet switched communication service from LANs (Local Area Network) to
backbone networks and WANs. It operates at two layers: physical layer and data link layer. It supports
all standard physical layer protocols. It is mostly implement at the data link layer.
Frame Relay uses virtual circuits to connect a single router to multiple remote sites. In most cases,
permanent virtual circuits are used, i.e. a fixed network-assigned circuit is use through which the user
sees a continuous uninterrupted line. However, switched virtual circuits may also be used.
Frame relay is a fast packet technology based on X.25. Data is transmit by encapsulating them in
multiple sized frames. The protocol does not attempt to correct errors and so it is faster. Error correction
is handle by the endpoints, which are responsible for retransmission of dropped frames.
Frame Relay Devices are
********************
Chapter 6
Transmission Media
Introduction
Transmission media is a communication channel that carries the information from the sender to the
receiver. Data transmit through the electromagnetic signals. The main functionality of the transmission media
is to carry the information in the form of bits through LAN (Local Area Network). It is a physical path between
transmitter and receiver in data communication. In a copper-based network, the bits in the form of electrical
signals. In a fiber based network, the bits in the form of light pulses. In OSI (Open System Interconnection)
phase, transmission media supports the Layer 1. Therefore, it is consider being as a Layer 1 component. The
electrical signals can be send through the copper wire, fiber optics, atmosphere, water, and vacuum. The
characteristics and quality of data transmission are determine by the characteristics of medium and signal.
Transmission media is of two types are wired media and wireless media. In wired media, medium
characteristics are more important whereas, in wireless media, signal characteristics are more important.
Different transmission media have different properties such as bandwidth, delay, cost and ease of installation
and maintenance. The transmission media is available in the lowest layer of the OSI reference model, i.e.,
Physical layer.
Introduction
When a signal transmit over a communication channel, it is subject to different types of
impairments because of imperfect characteristics of the channel. Therefore, the received and the transmitted
signals are not the same. Outcome of the impairments are manifest in two different ways in analog and
digital signals. These impairments introduce random modifications in analog signals leading to distortion.
On the other hand, in case of digital signals, the impairments lead to error in the bit values.
The impairment can be broadly categorizes into the following three types:
Strength of a signal falls off with distance over any transmission medium.
Hence, a received signal must have sufficient strength so that the electronic circuitry in the
receiver can detect the signal.
The signal must maintain a level sufficiently higher than noise to be receive without error.
Attenuation is an increasing concern of frequency.
Hence, amplifiers must use that amplify high frequencies more than lower frequencies.
Attenuation is measure in decibels (dB). It measures the relative strengths of two signals
or one signal at two different point.
Attenuation (dB) = 10log10 (P2/P1)
P1 is power at sending end and P2 is power at receiving end.
Delay Distortion
When more than one signal share a single transmission medium, intermodulation noise
is generated. For example, two signals f1 and f2 will generate signals of frequencies (f1 +
f2) and (f1 - f2), which may interfere with the signals of the same frequencies sent by the
transmitter. Intermodulation noise is introduced due to nonlinearity present in any part of
the communication system.
Cross talk is a result of bunching several conductors together in a single cable. Signal
carrying wires generate electromagnetic radiation, which is induced on other conductors
because of close proximity of the conductors. While using telephone, it is a common
experience to hear conversation of other people in the background. This is known as cross
talk.
Impulse noise is irregular pulses or noise spikes of short duration generated by phenomena
like lightning, spark due to loose contact in electric circuits, etc. Impulse noise is a primary
source of bit-errors in digital data communication. This kind of noise introduces burst
errors.
Single-Bit Error
Burst Error
Single- Bit Error
The only one bit of a given data unit is changed from 1 to 0 or from 0 to 1.
If two bits in one data unit are corrupted and two bits the same position in another data
unit are, also corrupted, then 2D Parity checker will not be able to detect the error.
This technique cannot be used to detect the 4-bit errors or more in some cases.
Checksum
A Checksum is an error detection technique based on the concept of redundancy.
It is divided into two parts:
Checksum Generator
A Checksum generated at the sending side. Checksum generator subdivides the data into equal
segments of n bits each, and all these segments added together by using one's complement
arithmetic. The sum is complemented and appended to the original data, known as checksum
field. The extended data transmitted across the network.
Suppose L is the total sum of the data segments, then the checksum would be. L
Figure 7.21: Check Sum Generator
The Sender follows the given steps:
Checksum Checker
A Checksum is verified at the receiving side. The receiver subdivides the incoming data into
equal segments of n bits each, and all these segments are added together, and then this sum is
complemented. If the complement of the sum is zero, then the data is accepted otherwise data
is rejected.
The Receiver follows the given steps:
A CRC generator uses a modulo-2 division. Firstly, three zeroes are appended at the
end of the data as the length of the divisor is 4 and we know that the length of the
string 0s to be appended is always one less than the length of the divisor.
Now, the string becomes 11100000, and the resultant string is divided by the divisor
1001.
The remainder generated from the binary division is known as CRC remainder. The
generated value of the CRC remainder is 111.
CRC remainder replaces the appended string of 0s at the end of the data unit, and the
final string would be 11100111 which is sent across the network.
Error Correction codes are used to detect and correct the errors when data is transmitted
from the sender to the receiver.
Error Correction can be handle in two ways:
Backward error correction: Once the error is discover, the receiver requests the
sender to retransmit the entire data unit.
Forward error correction: In this case, the receiver uses the error-correcting code,
which automatically corrects the errors.
A single additional bit can detect the error, but cannot correct it.
For correcting the errors, one has to know the exact position of the error.
For example, If we want to calculate a single-bit error, the error correction code will
determine which one of seven bits is in error. To achieve this, we have to add some
additional redundant bits.
Suppose r is the number of redundant bits and d is the total number of the data bits. The
number of redundant bits r can be calculated by using the formula:
2r>=d+r+1
The value of r is calculated by using the above formula. For example, if the value of d is 4, then the
possible smallest value that satisfies the above relation would be 3.
To determine the position of the bit which is in error, a technique developed by R.W Hamming is
Hamming code which can be applied to any length of the data unit and uses the relationship between
data units and redundant units.
Hamming Code
Parity bits: The bit which is appended to the original data of binary bits so that the total
number of 1s is even or odd.
Even parity: To check for even parity, if the total number of 1s is even, then the value
of the parity bit is 0. If the total number of 1s occurrences is odd, then the value of the
parity bit is 1.
Odd Parity: To check for odd parity, if the total number of 1s is even, then the value of
parity bit is 1. If the total number of 1s is odd, then the value of parity bit is 0.
Algorithm of Hamming code:
An information of 'd' bits are added to the redundant bits 'r' to form d + r.
The location of each of the (d + r) digits is assigned a decimal value.
The 'r' bits are placed in the positions 1,2,.....2k-1.
At the receiving end, the parity bits are recalculated. The decimal value of the parity
bits determines the position of an error.
Let us understand the concept of Hamming code through an example:
Suppose the original data is 1010, which is to be sent.
We observe from the above figure that the bit positions that includes 1 in the first position are
1, 3, 5, 7. Now, we perform the even-parity check at these bit positions. The total number of 1
at these bit positions corresponding to r1 is even, therefore, the value of the r1 bit is 0.
Determining r2 bit
The r2 bit is calculated by performing a parity check on the bit positions whose binary
representation includes 1 in the second position.
We observe from the above figure that the bit positions that includes 1 in the second position
are 2, 3, 6, 7. Now, we perform the even-parity check at these bit positions. The total number
of 1 at these bit positions corresponding to r2 is odd, therefore, the value of the r2 bit is 1.
Determining r4 bit
The r4 bit is calculated by performing a parity check on the bit positions whose binary
representation includes 1 in the third position.
We observe from the above figure that the bit positions that includes 1 in the third position are
4, 5, 6, 7. Now, we perform the even-parity check at these bit positions. The total number of 1
at these bit positions corresponding to r4 is even, therefore, the value of the r4 bit is 0.
Suppose the 4th bit is changed from 0 to 1 at the receiving end, then parity bits are
recalculated.
R1 bit
The bit positions of the r1 bit are 1,3,5,7
We observe from the above figure that the binary representation of r1 is 1100. Now, we
perform the even-parity check, the total number of 1s appearing in the r1 bit is an even
number. Therefore, the value of r1 is 0.
R2 bit
The bit positions of r2 bit are 2,3,6,7.
We observe from the above figure that the binary representation of r2 is 1001. Now, we
perform the even-parity check, the total number of 1s appearing in the r2 bit is an even
number. Therefore, the value of r2 is 0.
R4 bit
The bit positions of r4 bit are 4,5,6,7.
We observe from the above figure that the binary representation of r4 is 1011. Now, we
perform the even-parity check, the total number of 1s appearing in the r4 bit is an odd
number. Therefore, the value of r4 is 1.
The binary representation of redundant bits, i.e., r4r2r1 is 100, and its corresponding
decimal value is 4. Therefore, the error occurs in a 4 th bit position. The bit value must be
changed from 1 to 0 to correct the error.
Data Compression
DC stands for Data Compression. DC is a digital signal process in which data to be transmitted is
compressed to reduce the storage amount in bits. In other words, you can say that data storage space is
reduced than usual after applying DC. Data transmission greatly reduces data storage space and
transmission capacity. It is also known as source coding or bit-rate reduction. Database management
system, backup utilities, etc. use data compression method widely. There are many file compression
methods but ZIP and ARC are mostly known file formats.
Figure 7.25: DC
Two Parts of DC
Lossy: In lossy compression method, some part of data is deleted or lost. Because it
identifies and then delete the unnecessary information before transmission.
Lossless: In lossless compression method, compression is done through identifying and
eliminating any statistical redundancy. For instance, when we encode a data source
before transmitting it, its size is effectively reduced and data remains intact and
unchanged.
Benefits of Data Compression
Faster file transfer: It improves the speed of file transfer, as less bandwidth is required
to download the compressed files.
More Storage Capacity: It allows you store more files in the available storage space,
e.g. Lossless compression can reduce a file to 50% of its original size.
Reduces Cost: It allows you reduce the cost of storing data as after compression, you
can store more files in the given storage space.
Reduces latency: On tape, the small file images can be scanned faster to reach a specific
file that reduces latency.
Difference between Lossy Compression and Lossless Compression:
1. Lossy compression is the method, which eliminate the data, which is not noticeable.
While Lossless Compression does not eliminate the data which is not noticeable.
2. In Lossy compression, a file does not restore or rebuilt in its original form. While
in Lossless Compression, A file can be restored in its original form.
3.
Compres
4. Lossy compression reduces the size of data. However, Lossless Compression does
not reduce the size of data.
5. Algorithms used in Lossy compression are: Transform coding, Discrete Cosine
Transform, Discrete Wavelet Transform, fractal compression etc. Algorithms
used in Lossless compression are Run Length Encoding, Lempel-Ziv-Welch,
Huffman Coding, Arithmetic encoding etc.
6. Lossy compression is used in Images, audio, video. Lossless Compression used in
Text, images, sound.
7. Lossy compression has more data-holding capacity. Lossless Compression has
less data-holding capacity than Lossy compression technique.
Chapter 8
Data Link Control and Protocol
Data Control Link
Data Link Control is the service provided by the Data Link Layer to provide reliable data
transfer over the physical medium. For example, In the half-duplex transmission mode, one device can
only transmit the data at a time. If both the devices at the end of the links transmit the data
simultaneously, they will collide and leads to the loss of the information. The Data link layer provides
the coordination among the devices so that no collision occurs.
The Data link layer provides three functions:
Line discipline
Flow Control
Error Control
ENQ/ACK
Poll/select
END/ACK
END/ACK stands for Enquiry/Acknowledgement is use when there is no wrong receiver
available on the link and having a dedicated path between the two devices so that the device capable
of receiving the transmission is the intended one.
END/ACK coordinates which device will start the transmission and whether the recipient is ready
or not.
Working of END/ACK
The transmitter transmits the frame called an Enquiry (ENQ) asking whether the receiver is
available to receive the data or not.
The receiver responses either with the positive acknowledgement (ACK) or with the negative
acknowledgement (NACK) where positive acknowledgement means that the receiver is ready to
receive the transmission and negative acknowledgement means that the receiver is unable to accept
the transmission.
Following are the responses of the receiver:
If the response to the ENQ is positive, the sender will transmit its data, and once all of
its data has been transmit, the device finishes its transmission with an EOT (END-of-
Transmission) frame.
If the response to the ENQ is negative, then the sender disconnects and restarts the
transmission at another time.
If the response is neither negative nor positive, the sender assumes that the ENQ frame
was lost during the transmission and makes three attempts to establish a link before
giving up.
Figure 8.27: Working END/ACK
Poll/Select
The Poll/Select method of line discipline works with those topologies where one device is designated
as a primary station and other devices are secondary stations.
Working of Poll/Select
In this, the primary device and multiple secondary devices consist of a single
transmission line, and all the exchanges are made through the primary device even
though the destination is a secondary device.
The primary device has control over the communication link, and the secondary device
follows the instructions of the primary device.
The primary device determines which device is allowed to use the communication
channel. Therefore, we can say that it is an initiator of the session.
If the primary device wants to receive the data from the secondary device, it asks the
secondary device that they anything to send, this process is known as polling.
If the primary device wants to send some data to the secondary device, then it tells the
target secondary to get ready to receive the data, this process is known as selecting.
Select
The select mode is used when the primary device has something to send.
When the primary device wants to send some data, then it alerts the secondary device
for the upcoming transmission by transmitting a Select (SEL) frame, one field of the
frame includes the address of the intended secondary device.
When the secondary device receives the SEL frame, it sends an acknowledgement that
indicates the secondary ready status.
If the secondary device is ready to accept the data, then the primary device sends two
or more data frames to the intended secondary device. Once the data has been
transmitted, the secondary sends an acknowledgement specifies that the data has been
received.
The Poll mode is used when the primary device wants to receive some data from the
secondary device.
When a primary device wants to receive the data, then it asks each device whether it
has anything to send.
Firstly, the primary asks (poll) the first secondary device, if it responds with the NACK
(Negative Acknowledgement) means that it has nothing to send. Now, it approaches
the second secondary device, it responds with the ACK means that it has the data to
send. The secondary device can send more than one frame one after another or
sometimes it may be required to send ACK before sending each one, depending on the
type of the protocol being used.
Flow Control
A set of procedures tells the sender how much data it can transmit before the data
overwhelms the receiver.
The receiving device has limited speed and limited memory to store the data. Therefore,
the receiving device must be able to inform the sending device to stop the transmission
temporarily before the limits are reached.
It requires a buffer, a block of memory for storing the information until they are processed.
Two methods have been developed to control the flow of data:
Stop-and-wait
Sliding window
Stop-and-wait
In the Stop-and-wait method, the sender waits for an acknowledgement after every
frame it sends.
When acknowledgement is received, then only next frame is sent. The process of
alternately sending and waiting of a frame continues until the sender transmits the EOT
(End of transmission) frame.
Advantage of Stop-and-wait
Stop-and-wait technique is inefficient to use as each frame must travel across all the
way to the receiver, and an acknowledgement travels all the way before the next frame
is sent. Each frame sent and received uses the entire time needed to traverse the link.
Sliding Window
The Sliding Window is a method of flow control in which a sender can transmit the
several frames before getting an acknowledgement.
In Sliding Window Control, multiple frames can be sent one after another, due to which
capacity of the communication channel can be utilized efficiently.
A single ACK acknowledge multiple frames.
Sliding Window refers to imaginary boxes at both the sender and receiver end.
The window can hold the frames at either end, and it provides the upper limit on the
number of frames that can be transmitted before the acknowledgement.
Frames can be acknowledged even when the window is not completely filled.
The window has a specific size in which they are numbered as modulo-n means that
they are numbered from 0 to n-1. For example, if n = 8, the frames are numbered from
0,1,2,3,4,5,6,7,0,1,2,3,4,5,6,7,0,1........
The size of the window is represented as n-1. Therefore, maximum n-1 frames can be
sent before acknowledgement.
When the receiver sends the ACK, it includes the number of the next frame that it wants
to receive. For example, to acknowledge the string of frames ending with frame number
4, the receiver will send the ACK containing the number 5. When the sender sees the
ACK with the number 5, it got to know that the frames from 0 through 4 have been
received.
Sender Window
At the beginning of a transmission, the sender window contains n-1 frames, and when
they are sent out, the left boundary moves inward shrinking the size of the window. For
example, if the size of the window is w if three frames are sent out, then the number of
frames left out in the sender window is w-3.
Once the ACK has arrived, then the sender window expands to the number which will
be equal to the number of frames acknowledged by ACK.
For example, the size of the window is 7, and if frames 0 through 4 have been sent out
and no acknowledgement has arrived, then the sender window contains only two
frames, i.e., 5 and 6. Now, if ACK has arrived with a number 4 which means that 0
through 3 frames have arrived undamaged and the sender window is expanded to
include the next four frames. Therefore, the sender window contains six frames
(5,6,7,0,1,2).
Receiver Window
At the beginning of transmission, the receiver window does not contain n frames, but
it contains n-1 spaces for frames.
When the new frame arrives, the size of the window shrinks.
The receiver window does not represent the number of frames received, but it
represents the number of frames that can be received before an ACK is sent. For
example, the size of the window is w, if three frames are received then the number of
spaces available in the window is (w-3).
Once the acknowledgement is sent, the receiver window expands by the number equal
to the number of frames acknowledged.
Suppose the size of the window is 7 means that the receiver window contains seven
spaces for seven frames. If the one frame is received, then the receiver window shrinks
and moving the boundary from 0 to 1. In this way, window shrinks one by one, so
window now contains the six spaces. If frames from 0 through 4 have sent, then the
window contains two spaces before an acknowledgement is sent.
Error Control
Error Control is a technique of error detection and retransmission.
Categories of Error Control:
Stop-and-wait ARQ
Stop-and-wait ARQ is a technique used to retransmit the data in case of damaged or lost frames.
This technique works on the principle that the sender will not transmit the next frame until it receives
the acknowledgement of the last transmitted frame.
Four features are required for the retransmission:
The sending device keeps a copy of the last transmitted frame until the acknowledgement
is received. Keeping the copy allows the sender to retransmit the data if the frame is not
received correctly.
Both the data frames and the ACK frames are numbered alternately 0 and 1 so that they
can be identified individually. Suppose data 1 frame acknowledges the data 0 frame
means that the data 0 frame has been arrived correctly and expects to receive data 1 frame.
If an error occurs in the last transmitted frame, then the receiver sends the NAK frame
which is not numbered. On receiving the NAK frame, sender retransmits the data.
It works with the timer. If the acknowledgement is not received within the allotted time,
then the sender assumes that the frame is lost during the transmission, so it will retransmit
the frame.
Two possibilities of the retransmission:
Damaged Frame: When the receiver receives a damaged frame, i.e., the frame contains
an error, then it returns the NAK frame. For example, when the data 0 frame is sent,
and then the receiver sends the ACK 1 frame means that the data 0 has arrived correctly,
and transmits the data 1 frame. The sender transmits the next frame: data 1. It reaches
undamaged, and the receiver returns ACK 0. The sender transmits the next frame: data
0. The receiver reports an error and returns the NAK frame. The sender retransmits the
data 0 frame.
Lost Frame: Sender is equipped with the timer and starts when the frame is transmitted.
Sometimes the frame has not arrived at the receiving end so that it can be acknowledged
neither positively nor negatively. The sender waits for acknowledgement until the timer
goes off. If the timer goes off, it retransmits the last transmitted frame.
Sliding Window ARQ
Sliding Window ARQ is a technique used for continuous transmission error control.
Three Features used for retransmission:
In this case, the sender keeps the copies of all the transmitted frames until they have
been acknowledged. Suppose the frames from 0 through 4 have been transmitted, and
the last acknowledgement was for frame 2, the sender has to keep the copies of frames
3 and 4 until they receive correctly.
The receiver can send either NAK or ACK depending on the conditions. The NAK
frame tells the sender that the data have been received damaged. Since the sliding
window is a continuous transmission mechanism, both ACK and NAK must be
numbered for the identification of a frame. The ACK frame consists of a number that
represents the next frame which the receiver expects to receive. The NAK frame
consists of a number that represents the damaged frame.
The sliding window ARQ is equipped with the timer to handle the lost
acknowledgements. Suppose then n-1 frames have been sent before receiving any
acknowledgement. The sender waits for the acknowledgement, so it starts the timer and
waits before sending any more. If the allotted time runs out, the sender retransmits one
or all the frames depending upon the protocol used.
Two protocols used in sliding window ARQ:
Go-Back-n ARQ: In Go-Back-N ARQ protocol, if one frame is lost or damaged, then
it retransmits all the frames after which it does not receive the positive ACK.
Three possibilities can occur for retransmission:
Damaged Frame: When the frame is damaged, then the receiver sends a NAK frame.
Lost Data Frame: In Sliding window protocols, data frames are sent sequentially. If
any of the frames is lost, then the next frame arrive at the receiver is out of sequence.
The receiver checks the sequence number of each of the frame, discovers the frame that
has been skipped, and returns the NAK for the missing frame. The sending device
retransmits the frame indicated by NAK as well as the frames transmitted after the lost
frame.
Lost Acknowledgement: The sender can send as many frames as the windows allow
before waiting for any acknowledgement. Once the limit of the window is reached, the
sender has no more frames to send; it must wait for the acknowledgement. If the
acknowledgement is lost, then the sender could wait forever. To avoid such situation,
the sender is equipped with the timer that starts counting whenever the window capacity
is reached. If the acknowledgement has not been received within the time limit, then
the sender retransmits the frame since the last ACK.
Selective-Reject ARQ
Multiplexing is a technique used to combine and send the multiple data streams over a
single medium. The process of combining the data streams is known as multiplexing
and hardware used for multiplexing is known as a multiplexer.
Multiplexing is achieved by using a device called Multiplexer (MUX) that combines n
input lines to generate a single output line. Multiplexing follows many-to-one, i.e., n
input lines and one output line.
Demultiplexing is achieved by using a device called DE multiplexer (DEMUX)
available at the receiving end. DEMUX separates a signal into its component signals
(one input and n outputs). Therefore, we can say that demultiplexing follows the one-
to-many approach.
Why Multiplexing?
The transmission medium is used to send the signal from sender to receiver. The
medium can only have one signal at a time.
If there are multiple signals to share one medium, then the medium must be divided in
such a way that each signal is given some portion of the available bandwidth. For
example: If there are 10 signals and bandwidth of medium is100 units, then the 10 unit
is shared by each signal.
When multiple signals share the common medium, there is a possibility of collision.
Multiplexing concept is used to avoid such collision.
Transmission services are very expensive.
History of Multiplexing
The 'n' input lines are transmitted through a multiplexer and multiplexer combines the
signals to form a composite signal.
The composite signal is passed through a Demultiplexer and demultiplexer separates a
signal to component signals and transfers them to their respective destinations.
Advantages of Multiplexing:
Multiplexing Techniques
Multiplexing techniques can be classified as:
Advantages Of FDM:
FDM is used for analog signals.
FDM process is very simple and easy modulation.
A Large number of signals can be sent through an FDM simultaneously.
It does not require any synchronization between sender and receiver.
Disadvantages Of FDM:
FDM technique is used only when low-speed channels are required.
It suffers the problem of crosstalk.
A Large number of modulators are required.
It requires a high bandwidth channel.
Applications Of FDM:
FDM is commonly used in TV networks.
It is used in FM and AM broadcasting. Each FM radio station has different
frequencies, and they are multiplexed to form a composite signal. The
multiplexed signal is transmitted in the air.
ii. Wavelength Division Multiplexing (WDM)
Wavelength Division Multiplexing is same as FDM except that the optical signals are
transmitted through the fiber optic cable.
WDM is used on fiber optics to increase the capacity of a single fiber.
It is used to utilize the high data rate capability of fiber optic cable.
It is an analog multiplexing technique.
Optical signals from different source are combined to form a wider band of light with the
help of multiplexer.
At the receiving end, demultiplexer separates the signals to transmit them to their
respective destinations.
Multiplexing and Demultiplexing can be achieved by using a prism.
Prism can perform a role of multiplexer by combining the various optical signals to form
a composite signal, and the composite signal is transmitted through a fiber optical cable.
Prism also performs a reverse operation, i.e., demultiplexing the signal.
The capacity of the channel is not fully utilized as the empty slots are also transmitted
which is having no data. In the above figure, the first frame is completely filled, but in
the last two frames, some slots are empty. Therefore, we can say that the capacity of the
channel is not utilized efficiently.
The speed of the transmission medium should be greater than the total speed of the input
lines. An alternative approach to the Synchronous TDM is Asynchronous Time Division
Multiplexing.
Asynchronous TDM
In the above diagram, there are 4 devices, but only two devices are sending the data, i.e., A and C.
Therefore, the data of A and C are only transmitted through the transmission line.
Frame of above diagram can be represented as:
The above figure shows that the data part contains the address to determine the source of the data.
Switching
When a user accesses the internet or another computer network outside their immediate
location, messages are sent through the network of transmission media. This technique
of transferring the information from one computer network to another network is known
as switching.
Switching in a computer network is achieved by using switches. A switch is a small
hardware device which is used to join multiple computers together with one local area
network (LAN).
Network switches operate at layer 2 (Data link layer) in the OSI model.
Switching is transparent to the user and does not require any configuration in the home
network.
Switches are used to forward the packets based on MAC addresses.
A Switch is used to transfer the data only to the device that has been addressed. It verifies
the destination address to route the packet appropriately.
It is operated in full duplex mode.
Packet collision is minimum as it directly communicates between source and destination.
It does not broadcast the message as it works with limited bandwidth.
Why is Switching Concept required?
Switching concept is developed because of the following reasons:
Switching techniques
In large networks, there can be multiple paths from sender to receiver. The switching technique will
decide the best route for data transmission. Switching technique is used to connect the systems for making
one-to-one communication.
Classification of Switching Techniques
i. Circuit Switching
Circuit switching is a switching technique that establishes a dedicated path between
sender and receiver.
In the Circuit Switching Technique, once the connection is established then the
dedicated path will remain to exist until the connection is terminated.
Circuit switching in a network operates in a similar way as the telephone works.
A complete end-to-end path must exist before the communication takes place.
In case of circuit switching technique, when any user wants to send the data, voice,
video, a request signal is sent to the receiver then the receiver sends back the
acknowledgment to ensure the availability of the dedicated path. After receiving the
acknowledgment, dedicated path transfers the data.
Circuit switching is used in public telephone network. It is used for voice
transmission.
Fixed data can be transferred at a time in circuit switching technology.
Communication through circuit switching has 3 phases:
Circuit establishment
Data transfer
Circuit Disconnect
a. Crossbar Switch
The Crossbar switch is a switch that has n input lines and n output lines. The crossbar switch has
n2 intersection points known as cross points.
Disadvantage of Crossbar switch:
The number of cross points increases as the number of stations is increased. Therefore, it becomes
very expensive for a large switch. The solution to this is to use a multistage switch.
b. Multistage Switch
Multistage Switch is made by splitting the crossbar switch into the smaller units and then
interconnecting them.
It reduces the number of cross points.
If one path fails, then there will be an availability of another path.
Advantages Of Circuit Switching:
In the case of Circuit Switching technique, the communication channel is
dedicated.
It has fixed bandwidth.
Disadvantages Of Circuit Switching:
Once the dedicated path is established, the only delay occurs in the speed of data
transmission.
It takes a long time to establish a connection approx. 10 seconds during which no
data can be transmitted.
It is more expensive than other switching techniques as a dedicated path is
required for each connection.
It is inefficient to use because once the path is established and no data is
transferred, then the capacity of the path is wasted.
In this case, the connection is dedicated therefore no other data can be transferred
even if the channel is free.
Cellular Configuration
In all cellular systems, land area is divided into a number of cells each with its radio service. In AMPS
the area is large which in digital services, the area is much smaller. Conventionally cells are hexagonal
in shape. Each cell uses a frequency range that is not use by its adjacent cells. However, frequencies
may be reused in non-adjacent cells.
At the center of each cell is a base station through which mobile phones and other mobile devices
transmit data and voice.
The following diagram represents the configuration.
Digital Transmission
Data can be represented either in analog or digital form. The computers used the digital form to
store the information. Therefore, the data needs to be convert into digital form so that a computer can use
it.
A line code is the code used for data transmission of a digital signal over a transmission line. This
process of coding is chosen to avoid overlap and distortion of signal such as inter-symbol interference.
Properties of Line Coding
As the coding is done to make more bits transmit on a single signal, the bandwidth
used is much reduced.
For a given bandwidth, the power is efficiently used.
The probability of error is much reduced.
Error detection is done and the bipolar too has a correction capability.
Power density is much favorable.
The timing content is adequate.
Long strings of 1s and 0s is avoided to maintain transparency.
DIGITAL-TO-DIGITAL CONVERSION
Digital-to-digital encoding is the representation of digital information by a digital signal. When binary
1s and 0s generated by the computer are translated into a sequence of voltage pulses that can be
propagated over a wire, this process is known as digital-to-digital encoding.
i. Unipolar
Digital transmission system sends the voltage pulses over the medium link such as wire
or cable.
In most types of encoding, one voltage level represents 0, and another voltage level
represents 1.
The polarity of each pulse determines whether it is positive or negative.
This type of encoding is known as Unipolar encoding as it uses only one polarity.
In Unipolar encoding, the polarity is assigned to the 1 binary state.
In this, 1s are represented as a positive value and 0s are represented as a zero value.
In Unipolar Encoding, '1' is considered as a high voltage and '0' is considered as a zero
voltage.
Unipolar encoding is simpler and inexpensive to implement.
Unipolar encoding has two problems that make this scheme less desirable:
DC Component
Synchronization
ii. Polar
Polar encoding is an encoding scheme that uses two voltage levels: one is positive, and
another is negative.
By using two voltage levels, an average voltage level is reduced, and the DC component
problem of unipolar encoding scheme is alleviated.
a) NRZ
NRZ stands for Non-return zero.
In NRZ encoding, the level of the signal can be represented either positive or negative.
The two most common methods used in NRZ are:
NRZ-L: In NRZ-L encoding, the level of the signal depends on the type of the bit that it
represents. If a bit is 0 or 1, then their voltages will be positive and negative respectively.
Therefore, we can say that the level of the signal is dependent on the state of the bit.
NRZ-I: NRZ-I is an inversion of the voltage level that represents 1 bit. In the NRZ-I
encoding scheme, a transition occurs between the positive and negative voltage that
represents 1 bit. In this scheme, 0 bit represents no change and 1 bit represents a change
in voltage level.
b) RZ
RZ stands for Return to zero.
There must be a signal change for each bit to achieve synchronization. However, to
change with every bit, we need to have three values: positive, negative and zero.
RZ is an encoding scheme that provides three values, positive voltage represents 1, the
negative voltage represents 0, and zero voltage represents none.
In the RZ scheme, halfway through each interval, the signal returns to zero.
In RZ scheme, 1 bit is represented by positive-to-zero and 0 bit is represented by
negative-to-zero.
Disadvantage of RZ:
It performs two signal changes to encode one bit that acquires more bandwidth.
c) Biphase
Biphase is an encoding scheme in which signal changes at the middle of the bit interval
but does not return to zero.
Biphase encoding is implemented in two different ways:
Manchester
It changes the signal at the middle of the bit interval but does not return to zero for
synchronization.
In Manchester encoding, a negative-to-positive transition represents binary 1, and
positive-to-negative transition represents 0.
Manchester has the same level of synchronization as RZ scheme except that it has two
levels of amplitude.
Differential Manchester
It changes the signal at the middle of the bit interval for synchronization, but the presence
or absence of the transition at the beginning of the interval determines the bit. A transition
means binary 0 and no transition means binary 1.
In Manchester Encoding scheme, two signal changes represent 0 and one signal change
represent 1.
iii. Bipolar
Bipolar encoding scheme represents three voltage levels: positive, negative, and zero.
In Bipolar encoding scheme, zero level represents binary 0, and binary 1 is represented by
alternating positive and negative voltages.
If the first 1 bit is represented by positive amplitude, then the second 1 bit is represented
by negative voltage, third 1 bit is represented by the positive amplitude and so on. This
alternation can also occur even when the 1bits are not consecutive.
Bipolar can be classified as:
a) AMI
AMI stands for alternate mark inversion where mark work comes from telegraphy, which
means 1. So, it can be redefined as alternate 1 inversion.
In Bipolar AMI encoding scheme, 0 bit is represented by zero level and 1 bit is
represented by alternating positive and negative voltages.
Advantage:
DC component is zero.
Sequence of 1s bits are synchronized.
Disadvantage:
This encoding scheme does not ensure the synchronization of a long string of 0s
bits.
b) B8ZS
B8ZS stands for Bipolar 8-Zero Substitution.
This technique is adopted in North America to provide synchronization of a long
sequence of 0s bits.
In most of the cases, the functionality of B8ZS is similar to the bipolar AMI, but the only
difference is that it provides the synchronization when a long sequence of 0s bits occur.
B8ZS ensures synchronization of a long string of 0s by providing force artificial signal
changes called violations, within 0 string pattern.
When eight 0 occurs, then B8ZS implements some changes in 0s string pattern based on
the polarity of the previous 1 bit.
If the polarity of the previous 1 bit is positive, the eight 0s will be encoded as zero, zero,
zero, positive, negative, zero, negative, positive.
If the polarity of previous 1 bit is negative, then the eight 0s will be encoded as zero,
zero, zero, negative, positive, zero, positive, negative.
c) HDB3
HDB3 stands for High-Density Bipolar 3.
HDB3 technique was first adopted in Europe and Japan.
HDB3 technique is designed to provide the synchronization of a long sequence of 0s bits.
In the HDB3 technique, the pattern of violation is based on the polarity of the previous
bit.
When four 0s occur, HDB3 looks at the number of 1s bits occurred since the last
substitution.
If the number of 1s bits is odd, then the violation is made on the fourth consecutive of 0.
If the polarity of the previous bit is positive, then the violation is positive. If the polarity
of the previous bit is negative, then the violation is negative.
If the number of 1s bits is even, then the violation is made on the place of the first and
fourth consecutive 0s. If the polarity of the previous bit is positive, then violations are
negative, and if the polarity of the previous bit is negative, then violations are positive.
i. PAM
PAM stands for pulse amplitude modulation.
PAM is a technique used in analog-to-digital conversion.
PAM technique takes an analog signal, samples it, and generates a series of digital pulses
based on the result of sampling where sampling means measuring the amplitude of a signal
at equal intervals.
PAM technique is not useful in data communication as it translates the original wave form
into pulses, but these pulses are not digital. To make them digital, PAM technique is
modified to PCM technique.
ii. PCM
PCM stands for Pulse Code Modulation.
PCM technique used to modify the pulses created by PAM to form a digital signal. To
achieve this, PCM quantizes PAM pulses. Quantization is a process of assigning integral
values in a specific range to sampled instances.
PCM is made of four separate processes: PAM, quantization, binary encoding, and digital-
to-digital encoding.
Digital to analog
To send the digital data over an analog media, it needs to be converted into analog signal. There can be two
cases according to data formatting.
Band-pass: The filters are used to filter and pass frequencies of interest. A bandpass is a
band of frequencies, which can pass the filter.
Digital-to-Analog Conversion
When data from one computer is sent to another via some analog carrier, it is first converted
into analog signals. Analog signals are modified to reflect digital data.
An analog signal is characterized by its amplitude, frequency, and phase. There are three
kinds of digital-to-analog conversions:
In this conversion technique, the frequency of the analog carrier signal is modified to reflect
binary data.
Figure 10.44: Frequency Shift Keying
This technique uses two frequencies, f1 and f2. One of them, for example f1, is chosen to
represent binary digit 1 and the other one is used to represent binary digit 0. Both amplitude
and phase of the carrier wave kept intact.
In this conversion scheme, the phase of the original carrier signal is altered to reflect the
binary data.
QPSK alters the phase to reflect two binary digits at once. This is done in two different
phases. The main stream of binary data is divided equally into two sub-streams. The serial
data is converted in to parallel in both sub-streams and then each stream is converted to
digital signal using NRZ technique. Later, both the digital signals are merged together.
Analog-to-Analog Conversion
1. Amplitude Modulation
Amplitude modulation is a process by which the wave signal is transmitted by modulating
the amplitude of the signal. It is often called as AM and is commonly used in transmitting a piece
of information through a radio carrier wave. Amplitude modulation is mostly used in the form of
electronic communication.
Currently, this technique is used in many areas of communication such as in portable two-
way radios, citizens band radio, VHF aircraft radio and in modems for computers. Amplitude
modulation is also used to mention the mediumwave AM radio broadcasting.
What is Amplitude Modulation?
Amplitude modulation or just AM is one of the earliest modulation methods that is used in
transmitting information over the radio. This technique was devised in the 20th century at a time
when Landell de Moura and Reginald Fessenden were conducting experiments using a
radiotelephone in the 1900s. After successful attempts, the modulation technique was established
and used in electronic communication.
In general, amplitude modulation definition is given as a type of modulation where the
amplitude of the carrier wave is varied in some proportion with respect to the modulating data or
the signal.
As for the mechanism, when amplitude modulation is used there is a variation in the
amplitude of the carrier. Here, the voltage or the power level of the information signal changes the
amplitude of the carrier. In AM, the carrier does not vary in amplitude. However, the modulating
data is in the form of signal components consisting of frequencies either higher or lower than that
of the carrier. The signal components are known as sidebands and the sideband power is responsible
for the variations in the overall amplitude of the signal.
The AM technique is totally different from frequency modulation and phase modulation
where the frequency of the carrier signal is varied in the first case and in the second one the phase
is varied respectively.
Types of Amplitude Modulation
There are three main types of amplitude modulation. They are;
Modulation index =
Bandwidth
Advantages of Amplitude Modulation
1. Few components needed: At the receiver side, the original signal is extracted (demodulated)
using a circuit consisting of very few components.
2. Low cost: The components used in amplitude modulation is very cheap. So the AM transmitter
and AM receiver build at low cost.
3. It is simple to implement.
4. Long distance communication: Amplitude modulated waves can travel a longer distance.
Disadvantages of Amplitude Modulation
1. Amplitude modulation is inefficient in terms of its power usage: As we know that the
message signal contains information whereas the carrier signal does not contain any information. In
amplitude modulation, most of the power is concentrated in the carrier signal which contains no
information. At the receiver side, the power consumed by the carrier wave is wasted.
2. It requires high bandwidth: The amplitude modulation is not efficient in terms of its use of
bandwidth. It requires a bandwidth equal to twice that of the highest audio signal frequency.
3. This type of transmission can be easily affected by the external radiation.
4. This type of transmission is also affected by the man-made noises or radiations like waves from
other antennas or channels.
5. Amplitude modulation (AM) cannot be used for transmitting music as done by frequency
modulation (FM).
6. Amplitude modulation cannot be used for transmission of sensitive information like in the army,
where interpretation or loss or disruption during transmission is not an option.
Applications of Amplitude Modulation
1. Air band radio: The amplitude modulation is extensively used in aerospace industry. The VHF
(Very High Frequency) transmissions made by the airborne equipment still use amplitude
modulation. The radio contact between ground to ground and also ground to air use amplitude
modulated (AM) signals.
2. Broadcast transmission: Amplitude modulation (AM) is still widely used for broadcasting
either short or medium or long wave bands.
3. Quadrature amplitude modulation: Amplitude modulation is used in the transmission of data
of almost everything, from short-range transmission such as wifi to cellular communications.
Quadrature amplitude modulation is formed by mixing two carriers that are out of phase by 90°.
4. Single sideband: The amplitude modulation (AM) in the form of single sideband is still used
for HF (High Frequency) radio links.
2. Frequency Modulation
Frequency modulation is a type of modulation where the frequency of the carrier signal
varies as per amplitude variations of the message signal.
or
Frequency modulation is a type of modulation where the information (message signal) is
transmitted over a carrier wave by varying its frequency in accordance with the amplitude
of the message signal.
or
Frequency modulation is the process of superimposing the message signal onto the carrier
signal and the resulting wave with variable frequency is called a frequency modulated
wave.
or
Frequency modulation is the process of transmitting information over a carrier wave by
varying its frequency in accordance with the amplitude of the message signal.
Where,
Fm = Frequency of the message signal
Frequency Modulation Deviation Ratio
Frequency modulation deviation ratio is defined as the ratio of the maximum carrier
frequency deviation to the highest message signal frequency.
3. Phase Modulation
Phase modulation is a type of modulation where the phase of the carrier signal varies as
per amplitude variations of the message signal.
or
Phase modulation is a type of angle modulation in which the total phase angle of the carrier
signal is varied in accordance with the amplitude of the message signal.
or
Phase modulation is the process of transmitting information over a carrier wave by varying
its phase in accordance with the amplitude of the message signal.
Phase Modulation Diagram
In phase modulation, the phase of the carrier signal is varied whereas the amplitude of the
carrier signal remains constant. Phase modulation is also referred to as PM.
The below three figures show the phase modulation.
The first figure shows the low frequency modulating signal or message signal which
contains useful information, the second figure shows the high frequency carrier wave
which does not contain any information, and the last figure shows the resultant phase
modulated signal.
The third figure shows that the phase of both the positive and negative half cycles of the
carrier signal varies as per amplitude variations of the modulating signal. During the
positive half cycle, the carrier signal phase shifts in one direction, whereas during the
negative half cycle, the carrier signal phase shifts in the opposite direction.
In phase modulation, the phase deviation is directly proportional to the amplitude of
message signal.
The noise immunity of the phase modulation is better than amplitude modulation.
However, the noise immunity of the phase modulation is not as good as frequency
modulation.
The signal-to-noise (SNR) ratio of the phase modulation is better than amplitude
modulation. However, the signal-to-noise (SNR) of the phase modulation is not as good as
frequency modulation.
The modulation index of phase modulation is directly proportional to the message signal.
Phase modulation is primarily used for some mobile radio services.
The phase modulation and frequency modulation are closely related to each other. In both
phase and frequency modulation, the total phase angle of the modulated signal varies.
In practice, the phase modulation and frequency modulation are dependent on each other.
When the phase of the carrier signal varies, the frequency of the carrier signal also varies.
Similarly, when the frequency of the carrier signal varies, the phase of the carrier signal
also varies. However, the phase modulation and frequency modulation are not directly
proportional to each other.
In frequency modulation, the total phase angle of a carrier wave changes for a short period
due to the change in frequency of the carrier wave. In phase modulation, the frequency of
a carrier wave changes for a short period due to the change in phase of a carrier wave.