You are on page 1of 23

ACTIVITY NO.

LESSON 2-7 BANDWIDTH EFFICIENCY

REY G. BERNARDINO JR. BS ELECTRONICS ENGINEERING

DIGITAL COMMUNICATION DATE: MARCH 17, 2020

ASSIGNMENT:

1. What is Bandwith Efficiency?

Answer: It can be defined as the effective and useful use of every Hertz of frequency available
for communication. In radio communication, bandwidth efficiency is essential as the available
spectrum for communication is very limited. Bandwidth efficiency can be increased through
spectral efficiency (by increasing the number of bits per hertz).

2. What is other term for Bandwith Efficiency?

Answer:Spectral efficiency, spectrum efficiency or bandwidth efficiency refers to


the information rate that can be transmitted over a given bandwidth in a specific
communication system. It is a measure of how efficiently a limited frequency spectrum is
utilized by the physical layer protocol, and sometimes by the media access control (the channel
access protocol).

3. Explain the relationship between bits per second and baud for an 8-PSK system.

Answer: The relationship between the minimum bandwidth required in a 8-PSK system is
j u s t e q u a l t o on e t h i rd of t h e b it r a t e s in c e e a c h o u t p u t in f o rm a ti on s ig n a l
transmitted already contains three bits or a tribit of information from the input of the 8-PSK
system.

4. Determine the Bandwith Efficiency for the following modulators.


a. QPSK, fb_10 Mbps
b. 8-PSK, fb_21 Mbps
c. 16-QAM, fb_20 Mbps

Answer:

a. 2bps/Hz
b. 3bps/Hz
c. 4bps/Hz

5. Determine the Bandwidth Efficiency for the following modulators.


a. QPSK, fb_20Mbps
b. 8-PSK, fb_20Mbps
c. 16-PSK, fb_40Mbps

Answer:

a. 2bps/Hz
b. 3bps/Hz
c. 4bps/ Hz
ACTIVITY NO. 2

LESSON 2-8 CARRIER RECOVERY

REY G. BERNARDINO JR. BS ELECTRONICS ENGINEERING

DIGITAL COMMUNICATION DATE: MARCH 19, 2020

ASSIGNMENT:

1. Define what is Carrier Recovery?

Answer: A carrier recovery system is a circuit used to estimate and compensate for frequency
and phase differences between a received signal's carrier wave and the receiver's local oscillator
for the purpose of coherent demodulation.

2. What is the importance of Carrier Recovery?

Answer: carrier recovery Is essential to recover the frequency and phase information of the
transmitted signal. To illustrate the importance of carrier recovery, we first show a constellation
plot of a signal in which the frequency has not been properly been estimated.

3. Define what is Costas Loop Method?

Answer: A Costas loop is a phase-locked loop (PLL) based circuit which is used for carrier
frequency recovery from suppressed-carrier modulation signals (e.g. double-sideband
suppressed carrier signals) and phase modulation signals (e.g. BPSK, QPSK). It was invented by
John P. Costas at General Electric in the 1950s.

4. Define what is Squaring Loop?

Answer: The nonlinear operation is performed by a square-law device, that is, a frequency
doubler circuit.

5. What is remodulator?

Answer: A circuit that converts amplitude modulation to audio frequencyshift modulation for 
transmission of facsimile signals over a voice-frequency radio channel. Also known as converter.
ACTIVITY NO. 3

LESSON 2-9 CLOCK RECOVERY

REY G. BERNARDINO JR. BS ELECTRONICS ENGINEERING

DIGITAL COMMUNICATION DATE: MARCH 21, 2020

ASSIGNMENT:

1. Why Digital Radio requires precise timing control?

Answer: Time division multiplex/time division multiple access (TDM/TDMA) communication


requires that signals from various subscriber units communicating with a base station must
reach the base station at appropriate times, otherwise, portions of two or more data packets
from different subscriber units might reach the base station at the same instant, and then the
base station would not be able to receive all packets correctly. 

2. relation of What is the frequency clock and receive data rate?

Answer: Bit rate does not necessarily equal frequency. They match closely for some systems; for
others, the disparity is great. What, then, is the relationship among frequency, hertz, cycles and
bits?The bit, or binary digit, is the smallest piece of information that can be processed by a
computer. In many systems, such as the American Standard Code for Information Interchange, it
can take 8 bits, or 1 byte, to make one character--a letter, numeral or symbol. A bit is either a 1
or 0, a "yes" or "no," or an "on" or "off."The frequency of a signal voltage is measured in cycles
per second. One hertz is one complete cycle per second. While higher frequency can mean a
faster system, a truer measurement of communication speed is bit rate.

3. What will happen to the data if it undergo extend period of successive 1’s and 0’s.

Answer: The recovered daTa would be lost.

4. How to prevent data loss?

Answer:

 Backup
 Practice good working habits
 Use an anti-virus software and keep it updated
 Protect against power surges with an UPS
 Keep your machine dry in a dry, shaded, dust-free and well-ventilated area
 Do not over-tweak your system
 Avoid moving your computer or notebook when it is in operation
 Safeguard your computer
 Practice disk maintenance
 Pre-empt failure
 Do not listen to tell-tale technique

5. Why do you think we need to use X-OR as the logic symbol for for this circuit design and not
other logic circuit symbol?

Answer: XOR gate is a digital logic gate that gives a true (1 or HIGH) output when the number of
true inputs is odd. An XOR gate implements an exclusive or; that is, a true output results if one,
and only one, of the inputs to the gate is true. If both inputs are false (0/LOW) or both are true,
a false output results. XOR represents the inequality function, i.e., the output is true if the inputs
are not alike otherwise the output is false. A way to remember XOR is "must have one or the
other but not both". XOR can also be viewed as addition modulo 2. As a result, XOR gates are
used to implement binary addition in computers. A half adder consists of an XOR gate and
an AND gate. Other uses include subtractors, comparators, and controlled inverters.
ACTIVITY NO. 4

LESSON 2-10 DIFFERENTIAL PHASE SHIFT KEYING

REY G. BERNARDINO JR. BS ELECTRONICS ENGINEERING

DIGITAL COMMUNICATION DATE: MARCH 23, 2020

1. How does DPSK able to know the condition of the data sent?

Answer: phase modulation used to transmit data by altering the carrier wave’s phase. In this,
the modulated signal’s phase is moved e to the element of an earlier signal. The phase of the
signal tracks the low or high state of the earlier element. This kind of phase-shift keying doesn’t
require a synchronous carrier on the demodulator.

2. What is the importance of DPSK?

Answer: The DPSK stands for “Differential phase-shift keying”. It is one type of phase
modulation used to transmit data by altering the carrier wave’s phase. In this, the modulated
signal’s phase is moved e to the element of an earlier signal. The phase of the signal tracks the
low or high state of the earlier element. This kind of phase-shift keying doesn’t require a
synchronous carrier on the demodulator.
The binary bits input series can be changed so that the next bit depends upon the earlier bit. So,
the earlier received bits in the receiver are utilized for detecting the current bit.

3. Create DBPSK logic circuit design.

Answer:
ACTIVITY NO. 5

LESSON 2-TRELLIS CODE MODULATION

REY G. BERNARDINO JR. BS ELECTRONICS ENGINEERING

DIGITAL COMMUNICATION DATE: MARCH 25, 2020

ASSIGNMENT:

1. What is Trellis code of Modulation?

Answer: Trellis coded modulation allows the achievement of significant coding gains over
conventional un-coded multilevel modulation without compromising bandwidth efficiency. TCM
schemes employ redundant non-binary modulation in combination with finite-state encoder
which controls the selection of modulation signals to generate coded signal sequences.

2. What is the relevance of QAM and PSK in Trellis code of Modulation?

Answer: In telecommunication, trellis modulation (also known as trellis coded modulation, or


simply TCM) is a modulation scheme that transmits information with high efficiency over band-
limited channels such as telephone lines. Gottfried Ungerboeck invented trellis modulation
while working for IBM in the 1970s, and first described it in a conference paper in 1976. It went
largely unnoticed, however, until he published a new, detailed exposition in 1982 that achieved
sudden and widespread recognition.

In the late 1980s, modems operating over plain old telephone service (POTS) typically achieved


9.6 kbit/s by employing four bits per symbol QAM modulation at 2,400 baud (symbols/second).
This bit rate ceiling existed despite the best efforts of many researchers, and some engineers
predicted that without a major upgrade of the public phone infrastructure, the maximum
achievable rate for a POTS modem might be 14 kbit/s for two-way communication (3,429 baud ×
4 bits/symbol, using QAM).

3. Define what is Standard encoding format and Trellis encoding format?

Answer: A character set is a list of characters whereas an encoding scheme is how they are
represented in binary. This is best seen with Unicode. The encoding schemes UTF-8, UTF-16 and
UTF-32 use the Unicode character set but encode the characters differently. TRELLIS ENCODING
in telecommunication, trellis modulation (also known as trellis coded modulation, or simply
TCM) is a modulation scheme that transmits information with high efficiency over band-limited
channels such as telephone lines.

4. What is the standard Telephone Line?


Answer: PSTN is a fixed wire line that most business use and are one of the most reliable forms
of communications available today. Through the use of volume purchasing and large buying
power we are able to provide significant cost reductions to customers on the price of their
business PSTN services.

5. Compute Data Rate of 26 kbps through 3200 Hz Bandwidth. Apply Trellis Code of Modulation.
ACTIVITY NO. 6

LESSON 2-12 PROBABILITY OF ERROR AND BIT ERROR RATE

REY G. BERNARDINO JR. BS ELECTRONICS ENGINEERING

DIGITAL COMMUNICATION DATE: MARCH 27, 2020

ASSIGNMENT:

1. What is the relation between Probability or error P(e) and Bit error rate (BER)?

Answer: In digital transmission, the number of bit errors is the number of received bits of a data
stream over a communication channel that have been altered due
to noise, interference, distortion or bit synchronization errors.The bit error rate (BER) is the
number of bit errors per unit time. The bit error ratio (also BER) is the number of bit errors
divided by the total number of transferred bits during a studied time interval. Bit error ratio is a
unitless performance measure, often expressed as a percentage.[1]The bit error probability pe is
the expectation value of the bit error ratio. The bit error ratio can be considered as an
approximate estimate of the bit error probability. This estimate is accurate for a long time
interval and a high number of bit errors.

2. What is the importance of carrier-to-noise power ratio?

Answer: In communications, the carrier-to-noise ratio, often written CNR or C/N, is a measure of


the received carrier strength relative to the strength of the received noise. High C/N ratios
provide better quality of reception, and generally higher communications accuracy and
reliability, than low C/N ratios.

3. For QPSK system and the given parameters, determine


a. Carrier power in dBm.
b. Noise power in dBm.
c. Noise power density in dbm.
d. Energy per bit in dBJ.
e. Carrier-to-noise power ratio in dB.

Given: C=10−12 W ; N=1.2∗10−14 W ;fb =75 kbps; B =135 kHz

Answer:

a. -90dBm
b. -109.2dBm
c. -130.51dBm
d. -168.75dBJ
e. 19.2dB
ACTIVITY NO. 7

LESSON 2-13 ERROR PERFORMANCE

REY G. BERNARDINO JR. BS ELECTRONICS ENGINEERING

DIGITAL COMMUNICATION DATE: MARCH 27, 2020

ASSIGNMENT:

1. What is PSK Error Performance?

Answer: the bit error performance for the various digital modulation system is directly relatred
to the distance between points on a signal state-space diagram.

2. What is the relation of the bit error performance for the various multi phase digital modulation
system is the distance between points on a signal state space diagram?

Answer: the phase relationship between signalling elements is the optimum signalling format,
reffered to as antipodal signalling, and occurs only when two binary signal levels are allowed
and when one signal is the exact negative of the other. Becasuse no other bit-by-bit signalling
scheme is any better, antipodal performance is often used as a reference for comparison.

3. What is Antipodal Signaling?

Answer: Antipodal signals it's that signal 180 degree opposite to each other. ... This signal shown
in left, telecommunication used it in digital systems like B-PSK (Binary Phase Shift Keying); the
idea from this signal in telecom receiver to know if we get 0 or we get 1!

4. What is QAM Error Performance?

Answer: For a large number of signal points QAM outperforms PSK. This is because the
ndistance between signalling points in a PSK system is smalle than the distance between points
in a comparable QAM system. The general expression for the distance between adjacent
signalling points for a QAM system with L levels on each axis is
√2
d= ∗D
L−1
5. What is FSK Error Performance?

Answer: The error probability for FSK system is evatuated in a somewhat different manner
thanPSK AND QAM. There are essentially only two types of FSK system: noncoherent and
coherent. With noncoherent FSK the transmitter and receiver are not frequency or phase
synchronized. With coherent FSK, local receiver reference signals are in frequency and phase
lock with the transmitted signals.
6. Determine the minimum bandwidth required to achieve a P(e) of 10−7 for an 8-PSK system
operating at 10 Mbps with a carrier-to-noise power ratio of 13.5 dB.
ACTIVITY NO. 8

LESSON 3-4 STANDARD ORGANIZATIONS FOR DATA COMMUNICATION

REY G. BERNARDINO JR. BS ELECTRONICS ENGINEERING

DIGITAL COMMUNICATION DATE: APRIL 1, 2020

ASSIGNMENT:

1. What is ISO?

Answer: The International Organization for Standardization (ISO; /ˈaɪsoʊ/) is an international


standard-setting body composed of representatives from various national standards
organizations. In contrast to many international organisations, which utilise the British
English form of spelling, the ISO uses English with Oxford spelling as one of its official languages
along with French and Russian.

2. Define ITU-T and how to be part of being a member of it?


Answer: a. The ITU Telecommunication Standardization Sector (ITU-T) coordinates standards
for telecommunications and Information Communication Technology such as X.509 for cyber
security, Y.3172 for machine learning, and H.264/MPEG-4 AVC for video compression, between
its Member States, Private Sector Members, and Academia Members. ITU-T is one of the three
Sectors (divisions or units) of the International Telecommunication Union (ITU)

b. How do I join? What is the process?


1. To assess the overall benefits and costs of ITU Membership for your
organization, we recommend that you start by consulting the wide range of
marketing materials available on the JOIN ITU Section of this website.
2. To determine the type of Membership that best suits the needs or your
organization, contact the  Membership Team  (membership@itu.int),
3. Then fill in and submit the online  Application Form . We will then review your
application and contact you if needed. Fax or email/scan a signed copy
to  membership@itu.int.
4. Applications from companies, organizations and Academia must be approved by
the relevant national telecommunication administration in the Member State
where your organization is located. If you are not already in contact with your
national telecommunication administration, we recommend that you inform
them directly about your intention to join the ITU. A full list is available  here.
3. Define what is IEEE and its purpose.

Answer: The Institute of Electrical and Electronic Engineers (IEEE) is a global association and
organization of professionals working toward the development, implementation and
maintenance of technology-centered products and services. IEEE is a nonprofit organization
founded in 1963.
IEEE's core purpose is to foster technological innovation and excellence for the benefit of
humanity.

4. Who are the member of ANSI and what is the purpose in the National?

Answer: ANSI's members are government agencies, organizations, academic and international
bodies, and individuals. In total, the Institute represents the interests of more than 270,000
companies and organizations and 30 million professionals worldwide.
ANSI accredits standards that are developed by representatives of other standards
organizations, government agencies, consumer groups, companies, and others. These standards
ensure that the characteristics and performance of products are consistent, that people use the
same definitions and terms, and that products are tested the same way. ANSI also accredits
organizations that carry out product or personnel certification in accordance with requirements
defined in international standards

5. What are the responsibilities of EIA?

Answer: 1. The legal one is quite straight forward to ensure that development projects such as a
housing estate, a road/bridge or some such construction project has a minimal impact on the
environment in its entire ‘lifecycle’ – i.e. during design, construction, use, maintenance, and
demolition. Many countries now have laws stipulating that unless an EIA study is carried out
particularly for large infrastructure projects, permission for construction will not be granted by
the local authority.
2. The educational role is equally important to educate everyone involved both professionals
and users. We need to look at all our daily actions as eventually and cumulatively affecting the
environment. This includes our daily choices, where a delicate balance between financial and
environmental considerations needs to be made automatically without thinking.

6. What is the new term for ARPA? and define its purpose.

Answer: A marine radar with automatic radar plotting aid (ARPA) capability can


create tracks using radar contacts. The system can calculate the tracked object's course, speed
and closest point of approach (CPA), thereby knowing if there is a danger of collision with the
other ship or landmass.
A typical ARPA function gives a presentation of the current situation and uses computer
technology to predict future situations. An ARPA assesses the risk of collision, and enables
operator to see proposed maneuvers by own ship.

7. What are IETF and IRTF? Define their purpose in the internet.

Answer: The Internet Research Task Force (IRTF) focuses on longer-term research issues related
to the Internet while the parallel organization, the Internet Engineering Task Force (IETF),
focuses on the shorter term issues of engineering and standards making. The Internet Research
Task Force (IRTF) promotes research of importance to the evolution of the Internet by creating
focused, long-term research groups working on topics related to Internet protocols,
applications, architecture and technology.
ACTIVITY NO. 9

LESSON 3-5 LAYERED NETWORK ARCHITECHURE

REY G. BERNARDINO JR. BS ELECTRONICS ENGINEERING

DIGITAL COMMUNICATION DATE: APRIL 3, 2020

ASSIGNMENT:

1. What is the responsibilities of layering network?

Answer: Responsibilities of the Network layer

1. Logical Addressing

 In the internet world, there are two kinds of addressing implemented by the data link layer,
it handles addressing problems locally.
 If the network passes through the network boundary, we need another system to
distinguish source and destination systems.
 The logical addressing at the network layer while physical addressing at the data link layer is
defined by the MAC address of a device, whereas the IP addressing is determined at the
network layer of the OSI model. This addressing is also called as logical addressing.
 The network layer adds a header to the packet which is coming from the upper layer
includes the logical addresses of the sender and receiver.

2. Routing

 When two independent networks or links are attached to create an internetwork that is the
network of networks or a large network, the connecting devices route the packets to its
destination.
 The forwarding of the data request to servers is known as routing.

3. Fragmentation and Reassembly

 The network layer must send data down to the data link layer for transmission. The data or
information that the network layer receives is in the form of a packet and the data that data
link layer forwards is called a frame.
 The network layer has the responsibility of Fragmentation and reassembly because some
data link layer technologies have limits on the length of any message that can be sent.
 If the packet of data that the network layer has to send is too large, the network layer must
break the packet up, send each packet to the data link layer, and then have pieces
reassembled once they arrive at the network layer on the destination system.

2. How important PDU in the communication?

Answer: The features or services of the network are implemented in distinct "layers". For
example, sending ones and zeros across a wire, fiber, etc. is done by the physical layer,
organizing the ones and zeros into chunks of data and getting them safely to the right place on
the wire is done by the data link layer, passing data chunks over multiple connected networks is
done by the network layer and delivery of the data to the right software application at the
destination is done by the transport layer. The significance of this is that the PDU is the
structured information that is passed to a matching protocol layer further along on the data's
journey that allows the layer to deliver its intended function or service. The matching layer, or
"peer", decodes the data to extract the original service data unit, decide if it is error-free and
where to send it next, etc. Unless we have already arrived at the lowest (physical) layer, the PDU
is passed to the peer using services of the next lower layer in the protocol "stack". When the
PDU passes over the interface from the layer that constructed it to the layer that merely delivers
it (and therefore does not understand its internal structure), it becomes a service data unit to
that layer. The addition of addressing and control information (encapsulation) to an SDU to form
a PDU and the passing of that PDU to the next lower layer as an SDU repeats until the lowest
layer is reached and the data passes over some medium as a physical signal.

3. What is PEER to PEER communication?

Answer: Peer-to-peer (P2P) computing or networking is a distributed application architecture


that partitions tasks or workloads between peers. Peers are equally privileged, equipotent
participants in the application. They are said to form a peer-to-peer network of nodes.Peers
make a portion of their resources, such as processing power, disk storage or network
bandwidth, directly available to other network participants, without the need for central
coordination by servers or stable hosts.

4. Define what is encapsulate and decapsulate?

Answer: Encapsulation is the process of adding information to the application layer data as it is
sent through each model layer. Each time the data passes a layer, a new Protocol Data Unit
(PDU)  is created. The data sent from the application layer has added a header with information
on TCP/UDP in the transport layer. Now the data is known as a segment. When that segment
reaches the internet layer, the segment is added a header with IP addresses. Now it is called a
packet. When the packet reaches the network access layer, a header with MAC addresses is
added. Now it is known as a frame. Likewise, in each layer, a corresponding Protocol Data Unit
(PDU) is created. Adding this information in each layer is known as Encapsulation. When the
encapsulation process is completed, the frame is sent to the network.
Decapsulation

As explained in the encapsulation process, the frame goes out of the host computer to the
network. Then it reaches the destination host. In the destination host, the frame is decapsulated
in the reverse order till the application layer. The frame which reaches the network access layer
contains the data, TCP/UDP header, header with IP addresses and header with MAC addresses.
ACTIVITY NO. 10

LESSON 3-6 OPEN SYSTEM INTERCONNECTION

REY G. BERNARDINO JR. BS ELECTRONICS ENGINEERING

DIGITAL COMMUNICATION DATE: APRIL 5, 2020

ASSIGNMENT:

1. What is Open System Interconnection and its purpose?

Answer: The Open Systems Interconnection model (OSI model) is a conceptual model that


characterises and standardises the communication functions of a telecommunication or
computing system without regard to its underlying internal structure and technology. Its goal is
the interoperability of diverse communication systems with standard communication protocols.
The model partitions a communication system into abstraction layers.
The purpose of the OSI reference model is to guide vendors and developers so the digital
communication products and software programs they create can interoperate, and to facilitate a
clear framework that describes the functions of a networking or telecommunication system.

2. What are the different layer of OSI and their name and its function?

Answer: 7 Layers of the OSI Model

 Physical Layer- The physical layer helps you to define the electrical and physical
specifications of the data connection. This level establishes the relationship
between a device and a physical transmission medium. The physical layer is not
concerned with protocols or other such higher-layer items.
 Data Link Layer- Data link layer corrects errors which can occur at the physical layer.
The layer allows you to define the protocol to establish and terminates a connection
between two connected network devices.

The data link layer is subdivided into two types of sublayers:

1. Media Access Control (MAC) layer- It is responsible for controlling how device in a
network gain access to medium and permits to transmit data.
2. Logical link control layer- This layer is responsible for identity and encapsulating
network-layer protocols and allows you to find the error.

Important Functions of Datalink Layer:

 Framing which divides the data from Network layer into frames.
 Allows you to add header to the frame to define the physical address of the source
and the destination machine
 Adds Logical addresses of the sender and receivers
 It is also responsible for the sourcing process to the destination process delivery of
the entire message.
 It also offers a system for error control in which it detects retransmits damage or
lost frames.
 Datalink layer also provides a mechanism to transmit data over independent
networks which are linked together.

 Transport Layer - The transport layer builds on the network layer to provide data
transport from a process on a source machine to a process on a destination
machine. It is hosted using single or multiple networks, and also maintains the
quality of service functions.

Important functions of Transport Layers:

 It divides the message received from the session layer into segments and numbers
them to make a sequence.
 Transport layer makes sure that the message is delivered to the correct process on
the destination machine.
 It also makes sure that the entire message arrives without any error else it should be
retransmitted.

 Network Layer - The network layer provides the functional and procedural means of
transferring variable length data sequences from one node to another connected in
"different networks".

Message delivery at the network layer does not give any guaranteed to be reliable
network layer protocol.

Layer-management protocols that belong to the network layer are:

1. routing protocols
2. multicast group management
3. network-layer address assignment.

 Session Layer - Session Layer

Session Layer controls the dialogues between computers. It helps you to establish
starting and terminating the connections between the local and remote application.

Important function of Session Layer:

 It establishes, maintains, and ends a session.


 Session layer enables two systems to enter into a dialog
 It also allows a process to add a checkpoint to steam of data.

 Presentation Layer - Presentation layer allows you to define the form in which the
data is to exchange between the two communicating entities. It also helps you to
handles data compression and data encryption.

This layer transforms data into the form which is accepted by the application. It also
formats and encrypts data which should be sent across all the networks. This layer is
also known as a syntax layer.

The function of Presentation Layers:

 Character code translation from ASCII to EBCDIC.


 Data compression: Allows to reduce the number of bits that needs to be transmitted
on the network.
 Data encryption: Helps you to encrypt data for security purposes — for example,
password encryption.
 It provides a user interface and support for services like email and file transfer.

 Application Layer - Application layer interacts with an application program, which is


the highest level of OSI model. The application layer is the OSI layer, which is closest
to the end-user. It means OSI application layer allows users to interact with other
software application.

Application layer interacts with software applications to implement a communicating


component. The interpretation of data by the application program is always outside the
scope of the OSI model.

Example of the application layer is an application such as file transfer, email, remote
login, etc.
The function of the Application Layers are:

 Application-layer helps you to identify communication partners, determining


resource availability, and synchronizing communication.
 It allows users to log on to a remote host
 This layer provides various e-mail services
 This application offers distributed database sources and access for global
information about various objects and services.

3. Define what is transmission medium such as simplex, duplex and full duplex?

Answer:
Simplex-In simplex transmission mode, the communication between sender and receiver occurs
in only one direction.  The sender can only send the data, and the receiver can only receive the
data.  The receiver cannot reply to the sender. Simplex transmission can be thought of as a one-
way road in which the traffic travels only in one direction—no vehicle coming from the opposite
direction is allowed to drive through.
Half Duplex-The communication between sender and receiver occurs in both directions in half
duplex transmission, but only one at a time.  The sender and receiver can both send and receive
the information, but only one is allowed to send at any given time.  Half duplex is still considered
a one-way road, in which a vehicle traveling in the opposite direction of the traffic has to wait till
the road is empty before it can pass through.
Full Duplex-In full duplex transmission mode, the communication between sender and receiver
can occur simultaneously.  The sender and receiver can both transmit and receive at the same
time. Full duplex transmission mode is like a two-way road, in which traffic can flow in both
directions at the same time.
ACTIVITY NO. 11

LESSON 3-7 DATA COMMUNICTION CIRCUIT

REY G. BERNARDINO JR. BS ELECTRONICS ENGINEERING

DIGITAL COMMUNICATION DATE:

ASSIGNMENT:

1. What is Data Communication Circuit and its uses?

Answer: The underlying purpose of a digital communications circuit is to provide a transmission


path between locations and to transfer digital information from one station (node, where
computers or other digital equipment are located) to another using electronic circuits. Data
communications circuits utilize electronic communications equipment and facilities to
interconnect digital computer equipment. Communication facilities are physical means of
interconnecting stations and are provided to data communications users through public
telephone networks (PTN), public data networks (PDN), and a multitude of private data
communications systems.

2. Define Station and Node.

Answer: a station is a device that has the capability to use the 802.11 protocol. For example, a
station may be a laptop, a desktop PC, PDA, access point or Wi-Fi phone. An STA may be fixed,
mobile or portable. Generally in wireless networking terminology, a station, wireless client
and node are often used interchangeably, with no strict distinction existing between these
terms. A station may also be referred to as a transmitter or receiver based on its transmission
characteristics. IEEE 802.11-2007 formally defines station as: Any device that contains an IEEE
802.11-conformant media access control (MAC) and physical layer (PHY) interface to the
wireless medium (WM). In telecommunications networks, a node is either a redistribution point
or a communication endpoint. The definition of a node depends on the network and protocol
layer referred to. A physical network node is an electronic device that is attached to a network,
and is capable of creating, receiving, or transmitting information over a communications
channel.[1] A passive distribution point such as a distribution frame or patch panel is
consequently not a node.
3. List and briefly describe the basic function of the five components of a data communication
circuit.

Answer:
The five components are :

1. Message - It is the information to be communicated. Popular forms of information include


text, pictures, audio, video etc. Text is converted to binary, number doesnt converted, image is
converted to pixels, etc.

2. Sender - It is the device which sends the data messages. It can be a computer, workstation,
telephone handset etc.

3. Receiver - It is the device which receives the data messages. It can be a computer,
workstation, telephone handset etc.

4. Transmission Medium - It is the physical path by which a message travels from sender to
receiver. Some examples include twisted-pair wire, coaxial cable, radio waves etc.

5. Protocol - It is a set of rules that governs the data communications. It represents an


agreement between the communicating devices. Without a protocol, two devices may be
connected but not communicating.

You might also like