Professional Documents
Culture Documents
Assignment 1 (DCN)
Assignment 1 (DCN)
Assignment 1
Course: B. Tech. (CSE + Cyber Law) Semester: IV
1. What is Attenuation?
1) Amplitude Modulation
Sujal Baweja R120219012
500077020 Btech LLB 4 th Semester
Frequency Modulation
In this modulation technique, the frequency of the carrier signal is modified to reflect
the change in the voltage levels of the modulating signal (analog data).
Sujal Baweja R120219012
500077020 Btech LLB 4 th Semester
The amplitude and phase of the carrier signal are not altered.
Phase Modulation
In the modulation technique, the phase of carrier signal is modulated in order to
reflect the change in voltage (amplitude) of analog data signal.
Sujal Baweja R120219012
500077020 Btech LLB 4 th Semester
Analog Multiplexing -:
The signals used in analog multiplexing techniques are analog in nature. The
analog signals are multiplexed according to their frequency (FDM) or wavelength
(WDM).
Digital Multiplexing -:
The term digital represents the discrete bits of information. Hence, the available
data is in the form of frames or packets, which are discrete.
In Time Division Multiplexing (TDM), the time frame is divided into slots. This
technique is used to transmit a signal over a single communication channel, by
allotting one slot for each message.
Time Division Multiplexing (TDM) can be classified into Synchronous TDM and
Asynchronous TDM.
Synchronous TDM -:
In Synchronous TDM, the input is connected to a frame. If there are ‘n’ number of
connections, then the frame is divided into ‘n’ time slots. One slot is allocated for
each input line.
In this technique, the sampling rate is common for all signals and hence the same
clock input is given. The MUX allocates the same slot to each device at all times.
Asynchronous TDM -:
In Asynchronous TDM, the sampling rate is different for each of the signals and a
common clock is not required. If the allotted device for a time slot transmits nothing
and sits idle, then that slot can be allotted to another device, unlike synchronous
This type of TDM is used in Asynchronous transfer mode networks.
De-Multiplexer -:
De-multiplexers are used to connect a single source to multiple destinations. This
process is the reverse process of multiplexing. As mentioned previously, it is used
mostly at the receivers. DEMUX has many applications. It is used in receivers in the
communication systems. It is used in arithmetic and logical unit in computers to
supply power and to pass on communication, etc.
De-multiplexers are used as serial to parallel converters. The serial data is given as
input to DEMUX at regular interval and a counter is attached to it to control the
output of the de-multiplexer.
Both the multiplexers and de-multiplexers play an important role in communication
systems, both at the transmitter and the receiver sections.
Sujal Baweja R120219012
500077020 Btech LLB 4 th Semester
There are many reasons such as noise, cross-talk etc., which may help data to get
corrupted during transmission. The upper layers work on some generalized view of
network architecture and are not aware of actual hardware data processing.Hence,
the upper layers expect error-free transmission between the systems. Most of the
applications would not function expectedly if they receive erroneous data.
Applications such as voice and video may not be that affected and with some errors
they may still function well.
Data-link layer uses some error control mechanism to ensure that frames (data bit
streams) are transmitted with certain level of accuracy. But to understand how
errors is controlled, it is essential to know what types of errors may occur.
Burst error
There are various data link protocols that are required for Wide Area Network
(WAN) and modem connections. Logical Link Control (LLC) is a data link protocol
of Local Area Network (LAN). Some of data link protocols are given below :
NCP is always available for each and every higher-layer protocol that is
supported by PPP. NCP was replaced by TCP/IP in the 1980s.
a. Firewall
Firewall is a network security device that monitors and filters incoming and outgoing
network traffic based on an organization's previously established security policies. At
its most basic, a firewall is essentially the barrier that sits between a private internal
network and the public Internet.
b. VPN
A virtual private network, or VPN, is an encrypted connection over the Internet from a
device to a network. The encrypted connection helps ensure that sensitive data is
safely transmitted. It prevents unauthorized people from eavesdropping on the traffic
and allows the user to conduct work remotely. VPN technology is widely used in
corporate environments.
c. Proxy Server
A proxy server is a computer system or router that functions as a relay between client
and server. It helps prevent an attacker from invading a private network and is one of
several tools used to build a firewall. The word proxy means "to act on behalf of
another," and a proxy server acts on behalf of the user.
d. Piggybacking
e. Web Server
It means that signals that are transmitted at the beginning of the medium are not the
same as the signals that are received at the end of the medium that is what is sent is
not what is received. ... These impairments tend to deteriorate the quality of analog
and digital signals.
In network equipment and devices, data is usually transmitted in the form of a frame. When a
frame is received, it is amplified and then transmitted to the port of the destination PC (Personal
Computer). The big difference between hub and switch is in the method in which frames are
being delivered.
In a hub, a frame is passed along or "broadcast" to every one of its ports. It doesn't matter that
the frame is only destined for one port. The hub has no way of distinguishing which port a frame
should be sent to. Additionally, a 10/100Mbps hub must share its bandwidth with each and every
one of its ports. In comparison, a switch keeps a record of the MAC (Media Access Control)
addresses of all the devices connected to it. With this information, a network switch can identify
which system is sitting on which port. So when a frame is received, it knows exactly which port to
send it to, without significantly increasing network response times. In addition, unlike a hub, a
10/100Mbps switch will allocate a full 10/100Mbps to each of its ports. So regardless of the
number of PCs transmitting, users will always have access to the maximum amount of
bandwidth.
Sujal Baweja R120219012
500077020 Btech LLB 4 th Semester
Unlike an Ethernet hub or switch that is concerned with transmitting frames, a router is to route
packets to other networks until that packet ultimately reaches its destination. One of the key
To connect a network of
Allow connections to
personal computers
multiple devices, Direct data in a
Function together, they can be
manage ports, manage network
joined through a central
VLAN security settings
hub
Data
form
multi-port, usually
Port 4/12 ports 2/4/5/8 ports
between 4 and 48
At Initial Level
First broadcast, then
Transmission Frame flooding, unicast, Broadcast then
unicast and/or multicast
type multicast or broadcast Uni-cast and
depends on the need
multicast
Used in(LAN,
LAN LAN LAN, MAN, WAN
MAN, WAN)
Transmission
Half duplex Half/Full duplex Full duplex
mode
1-
100Mbps(wireless);
Speed 10Mbps 10/100Mbps, 1Gbps
100Mbps-
1Gbps(wired)
Address used
transmission
features of a packet is that it not only contains data but the destination address of where it's
Sujal Baweja R120219012
500077020 Btech LLB 4 th Semester
going. What's more, router is the only one of these three devices that will allow you to share a
single IP (Internet Protocol) address among multiple network clients.
b. Analog vs Digital
Analog signals represent one continuous variable as the result of another continuous time-based
variable. They are capable of outputting continuous information with a theoretically infinite
number of possible values.
We have seen analog signals in use in nearly every type of signal processing and consumer
electronics application imaginable. In most cases, they have been replaced by digital versions,
though analog processes are still common in the audio recording domain alongside digital
recording equipment.
c. TCP vs UDP
TCP UDP
2) TCP reads data as streams of bytes, 2) UDP messages contain packets that
and the message is transmitted to were sent one by one. It also checks for
segment boundaries. integrity at the arrival time.
OSI model is a generic model that is based upon functionalities of each layer.
TCP/IP model is a protocol-oriented standard.
OSI model distinguishes the three concepts, namely, services, interfaces, and
protocols. TCP/IP does not have a clear distinction between these three.
OSI model gives guidelines on how communication needs to be done, while
TCP/IP protocols layout standards on which the Internet was developed. So,
TCP/IP is a more practical model.
In OSI, the model was developed first and then the protocols in each layer
were developed. In the TCP/IP suite, the protocols were developed first and
then the model was developed.
The OSI has seven layers while the TCP/IP has four layers.