Professional Documents
Culture Documents
Unit 1
INTRODUCTION TO DATA COMMUNICATIONS
AND NETWORKING
Unit Structure
1.1 Introduction
1.2 Data & Information
1.3 Data Communication
1.3.1 Characteristics of Data Communication
1.3.2 Components of Data Communication
1.4 Data Representation
1.5 Data Flow
1.5.1. Simplex
1.52. Half Duplex
1.5.3. Full Duplex
1.6 Networks,Networks Criteria,Physical Structures
1.7 Protocol
1.7.1 Elements of a Protocol
1.8 Standards in Networking
1.8.1 Concept of Standard
1.8.2 Standard Organizations in field of Networking
1.9 Review Questions
DATA COMMUNICATION
Data Communication is a process of exchanging data or information.
1. Message
Message is the information to be communicated by the sender to the receiver.
2. Sender
The sender is any device that is capable of sending the data (message).
3. Receiver
IT/CS Dept. Page 2
Unit 1 : Computer Networks
The receiver is a device that the sender wants to communicate the data
(message).
4. Transmission medium
It is the physical path by which the message travels from sender to receiver. It can
be wired or wireless. Examples of Transmission medium include twisted-pair wire,
coaxial cable, fiber optic cable and radio waves.
5. Protocol
A protocol is a set of rules that governs data communication.
DATA REPRESENTATION
There may be different forms in which data may be represented. Some of the
forms of data used in communications are as follows:
1. Text
Text includes combination of alphabets in small case as well as upper case.
It is stored as a pattern of bits. Prevalent encoding system :ASCII, Unicode
2. Numbers
Numbers include combination of digits from 0 to 9.
It is stored as a pattern of bits. Prevalent encoding system :ASCII, Unicode
3. Images
An image is worth a thousand words‖ is a very famous saying.
In computers images are digitally stored.
A Pixel is the smallest element of an image. To put it in simple terms, a
picture or image is a matrix of pixel elements.
The size of an image depends upon the number of pixels (also called
resolution) and the bit pattern used to indicate the value of each pixel.
4. Audio
Data can also be in the form of sound which can be recorded and broad
casted. Example: What we hear on the radio is a source of data or
information.
Audio data is continuous, not discrete.
5. Video
Video refers to broadcasting of data in form of picture or movie
DATA FLOW
Two devices communicate with each other by sending and receiving data. The
data can flow between the two devices in the following ways.
1. Simplex
2. Half Duplex
3. Full Duplex
1. Simplex
In Simplex, communication is
unidirectional
Only one of the devices sends
the data and the other one only
receives the data.
Example: in the above diagram:
a CPU send data while a
monitor only receives data. Simplex Mode of Communication
2. Half Duplex
In half duplex both the stations can
Transmit as well as receive but
Not at the same time.
When one device is sending other
Can only receive and vice-versa
Example: A walkie-talkie.
3. Full Duplex
In Full duplex mode, both stations
Can transmit and receive at the
Same time.
Example: Networking devices,
mobile phones
COMPUTER NETWORK
Computer Networks are used for data communications
Definition:
A network is a set of devices(often referred to as nodes) connected by
communication links. A node can be a computer,printer or any other device
capable of sending and/or receiving data generated by other nodes on the
network.
OR
A group of computers interconnected to one and each other, not only
interconnected but able to share information with each other.
A computer network can also be defined as a collection of nodes. A node can
be any device capable of transmitting or receiving data.
The communicating nodes have to be connected by communication link.
A Compute network should ensure
Reliability of the data communication process.
Security of the data.
Performance by achieving higher throughput and smallerdelay times
Distrubuted Processing :
Most networks use distributed processing, in which a task is divided among
multiple computers. Instead of one single large machine being responsible for all
aspects of a process, separate computers (usually a personal computer or
workstation) handle a subset.
Netork Criteria :
A network must be able to meet a certain number of criteria. The most
important of these are performance, reliability, and security.
Performance:-
Performance can be measured in many ways, including transit time and response
time, including the number of users, the type of transmission medium, the
capabilities of the connected hardware, and the efficiency of the software.
Performance is often evaluated by two networking metrics: throughput and delay.
We often need more throughput and less delay. However, these two criteria are often
contradictory. If we try to send more data to the network, we may increase
throughput but we increase the delay because of traffic congestion in the network.
Reliability:-
In addition to accuracy of delivery, network reliability is measured by the frequency
of failure, the time it takes a link to recover from a failure, and the network’s
robustness in a catastrophe.
Security:-
Network security issues include protecting data from unauthorized access,
protecting data from damage and development, and implementing policies and
procedures for recovery from breaches (a gap) and data losses.
Physical Structures:-
Before discussing networks, we need to define some network attributes.
Type of Connection:-
A network is two or more devices connected through links. A link is a
communications pathway that transfers data from one device to another.
Point-to-Point
A point-to-point connection provides a dedicated link between two
devices. The entire capacity of the link is reserved for transmission
between those two devices. Most point-to-point connections use an actual
length of wire or cable to connect the two ends, but other options, such as
microwave or satellite links, are also possible (see Figure 1.3a). When we
change television channels by infrared remote control, we are establishing
a point-to-point connection between the remote control and the
television’s control system.
Multipoint
A multipoint (also called multidrop) connection is one in which more
than two specific devices share a single link (see Figure 1.3b).
In a multipoint environment, the capacity of the channel is shared, either
spatially or temporally. If several devices can use the link simultaneously,
it is a spatially shared connection. If users must take turns, it is a
timeshared connection.
Physical topologies :-
The term physical topology refers to the way in which a network is laid out
physically. Two or more devices connect to a link; two or more links form a
topology. The topology of a network is the geometric representation of the
relationship of all the links and linking devices (usually called nodes) to one another.
Bus Topology
In bus topology there is a main cable and all the devices are connected to this
main cable through drop lines. There is a device called tap that connects the drop
line to the main cable. Since all the data is transmitted over the main cable, there
is a limit of drop lines and the distance a main cable can have.
2. Not scalable as there is a limit of how many nodes you can connect with
backbone cable.
Ring Topology :-
In ring topology each device is connected with the two devices on either side of it.
There are two dedicated point to point links a device has with the devices on the
either side of it. This structure forms a ring thus it is known as ring topology. If a
device wants to send data to another device then it sends the data in one direction,
each device in ring topology has a repeater, if the received data is intended for
other device then repeater forwards this data until the intended device receives it.
Star Topology
In star topology each device in the network is connected to a central device called
hub. Unlike Mesh topology, star topology doesn’t allow direct communication
between devices, a device must have to communicate through hub. If one device
wants to send data to other device, it has to first send the data to hub and then the
hub transmit that data to the designated device.
Mesh topology:-
In mesh topology each device is connected to every other device on the network
through a dedicated point-to-point link. When we say dedicated it means that the
link only carries data for the two connected devices only. Lets say we have n
devices in the network then each device must be connected with (n-1) devices of
the network. Number of links in a mesh topology of n devices would be n(n-1)/2.
Hybrid topology :-
Network
types OR Network Models:-
Networks are categorized on the basis of their size. The three basic categories of
computer networks are:
The next step was television programming and even entire channels designed
for cable only. Often these channels were highly specialized, such as all news, all
sports, all cooking, all gardening, and so on. But from their inception until the
late 1990s, they were intended for television reception only.
Recent developments in high-speed wireless Internet access resulted in another
MAN, which has been standardized as
Accessing the Internet:- The Internet today is an internetwork that allows any
user to become part of it. The user, however, needs to be physically connected to an
ISP(Internet service Provider). The physical connection is normally done through a
point-to-point WAN. We can access the internet using Telephone Network(Dial up
service and DSL Service) ,using cable network, using wireless networks and using
direct connection to the internet.
PROTOCOL
A Protocol is one of the components of a data communications system.
Without protocol communication cannot occur. The sending device cannot
just send the data and expect the receiving device to receive and further
interpret it correctly.
A Protocol is defined as a set of rules that governs data communications.
A protocol defines what is to be communicated, how it is to be
communicated and when it is to be communicated.
Elements of a Protocol
There are three key elements of a protocol:
A. Syntax
o It means the structure or format of the data.
o It is the arrangement of data in a particular order.
B. Semantics
o It tells the meaning of each section of bits and indicates the interpretation of
each section.
o It also tells what action/decision is to be taken based on the interpretation.
C. Timing
o It tells the sender about the readiness of the receiver to receive the data
o It tells the sender at what rate the data should be sent to the receiver to
avoid overwhelming the receiver.
STANDARDS IN NETWORKING
Standards are necessary in networking to ensure interconnectivity and
interoperability between various networking hardware and software
components.
Without standards we would have proprietary products creating isolated
islands of users which cannot interconnect.
Concept of Standard
Standards provide guidelines to product manufacturers and vendors to ensure
national and international interconnectivity.
Data communications standards are classified into two categories:
1.De facto Standard
These are the standards that have been traditionally used and mean by fact
or by convention
These standards are not approved by any organized body but are adopted
by widespread use.
2.De jure standard
It means by law or by regulation.
These standards are legislated and approved by any body that is officially
recognized.
NETWORK MODELS
PROTOCOL LAYERING:-
A protocol defines the rules that both the sender and receiver and all intermediate
devices need to follow to be able to communicate effectively.
When communication is simple, we may need only one simple protocol
when the communication is complex, we need to divide the task between
different layers, in which we need a protocol at each layer. So this is called
protocol layering.
2.1.1 Scenarios:-
Let us develop two simple scenarios to better understand the need for protocol
layering.
First Scenario
In the first scenario, communication is so simple that it can occur in only one layer.
Assume Maria and Ann are neighbors with a lot of common ideas. Communication
between Maria and Ann takes place in one layer, face to face, in the same language,
as shown in Figure 2.1.
But scenario is different for different situation for example a scenario between
professor and the students in a lecture hall.
Here conversation is mostly monolog; i.e professor talks most of the time
unless a student has a question, a situation in which the protocol dictates that
she should raise her hand and wait for permission to speak. In this case, the
communication is normally very formal and limited to the subject being
taught.
Second Scenario:-
In this scenario we assume that Ann and Maria are at far distance and they want to
communicate with each other. The communication goes between them as shown in
in Figure 2.2. We assume that Ann and Maria each have three machines (or
robots) that can perform the task at each layer.
At Ann’s side,
The first layer machine picks up the letter from Ann’s mail box, recognizing
the letter from Maria by the sender address. The machine takes out the
ciphertext from the envelope and delivers it to the second layer machine.
The second layer machine decrypts the message, creates the plaintext, and
passes the plaintext to the third-layer machine.
The third layer machine takes the plaintext and reads it as though Maria is
speaking.
Therefore we can conclude that Protocol layering enables us to divide a
complex task into several smaller and simpler tasks.
Second Principle
The second principle that we need to follow in protocol layering is that the two
Objects under each layer at both sites should be identical. For example, the object
under layer 3 at both sites should be a plaintext letter. The object under layer 2 at
both sites should be a cipher text letter. The object under layer 1 at both sites should
be a piece of mail.
Logical Connections
After following the above two principles, we can think about logical connection
between each layer as shown in Figure 2.3.
When we send or receive any information it means a logical connection is
established between sender and receiver. i.e a layer-to-layer communication takes
place(as shown in fig 2.3). As in the case with the above two scenario Maria and
Ann can think that there is a logical (imaginary) connection at each layer through
which they can send the object created from that layer. We will see that the concept
of logical connection will help us better understand the task of layering we
encounter in data communication and networking.
LAYERED TASKS
The task of transferring data from sender to receiver can be done by breaking it
into small sub tasks, each of which are well defined in the above scenario.
In layering, the set of tasks required for computer communication are split into
different distinct functions (layers).
All the layers combine together to achieve the desired computer communication
functionality.
It provides modularity to the whole architecture
Also, there is a hierarchy among layers, as each layer provides a set of specific
functions to the layer above it
Inter layer communication is through well-defined interfaces named as Service
Access Points (SAPs).
Some examples of layering are the OSI 7 layer model, the TCP/IP 4 layer model
and the practically used Hybrid 5 layer model.
Advantages
1. Primary advantage is less queuing. When packets are transmitted and
received, they are placed in receive and transmit queues at different levels,
as they are passed along the layers.
2. When more layers are combined in one, the exchange of data between each
layer is controlled by the application author, and thus it's easier to tune it.
Disadvantages
1. Less reusability: Harder for other applications to use the same code for the
session and/or presentation layers for example.
OSI MODEL
Introduction to OSI model and its layers
The Open Systems Interconnection (OSI) Model was developed by
International organization for Standardization(ISO)
It was developed to allow systems with different platforms to communicate
with each other.
It is a network model that defines the protocols for network
communications.
It is a hierarchical model that groups its processes into layers. It has 7 layers
as follows: (Top to Bottom)
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Layered Architecture of OSI model
The OSI model has 7 layers each with its own dedicated task.
A message sent from Device A to Device B passes has to pass through all layers at
A from top to bottom then all layers at B from bottom to top as shown in the
figure below.
At Device A, the message is sent from the top layer i.e Application Layer A then
all the layers till it reaches its physical layer and then it is transmitted through the
transmission medium.
At Device B, the message received by the physical layer passes through all its
other layers and moves upwards till it reaches its Application Layer.
PEER-TO-PEER PROCESS
A peer-to-peer network is one in which two or more PCs share files and access to
devices such as printers without requiring a separate server computer or server
software.
Interface
The Physical Layer defines the characteristics of interfaces between the
devices & transmission medium.
Representation of bits
The physical layer is concerned with transmission of signals from one
device to another which involves converting data (1‘s & 0‘s) into signals.
Data rate
The physical layer defines the data transmission rate i.e. number of bits sent
per second. It is the responsibility of the physical layer to maintain the defined
data rate.
Synchronization of bits
To interpret correct and accurate data the sender and receiver have to
maintain the same bit rate and also have synchronized clocks.
Line configuration
The physical layer defines the nature of the connection .i.e. a point to point
link, or a multi point link.
Physical Topology
The physical layer defines the type of topology in which the device is
connected to the network. In a mesh topology it uses a multipoint connection
and other topologies it uses a point to point connection to send data.
Transmission mode
The physical layer defines the direction of data transfer between the sender
and receiver. Two devices can transfer the data in simplex, half duplex or full
duplex mode
Main responsibility of the physical layer Transmission of bits from one hop to
the next.
The Data Link layer adds reliability to the physical layer by providing error
detection and correction mechanisms.
The network layer makes sure that the data is delivered to the receiver despite
multiple intermediate devices.
The network layer at the sending side accepts data from the transport layer,
divides it into packets, adds addressing information in the header and passes it
to the data link layer.
At the receiving end the network layer receives the frames sent by data link
layer, converts them back into packets, verifies the physical and the send the
packets to the transport layer.
Logical Addressing
o The network layer uses logical address commonly known as IP address
to recognize devices on the network.
o The header appended by the network layer contains the actual sender
and receiver IP address.
Routing
o The network layer divides data into units called packets of equal size
and bears a sequence number for rearranging on the receiving end.
o Hence every intermediate node which encounters a packet tries to
compute the best possible path for the packet. This is called “Routing”.
4. Transport Layer
The transport layer takes care of process to process delivery of data and makes sure
that it is intact and in order.
At the sending side, the transport layer receives data from the session layer,
divides it into units called segments and sends it to the network layer.
At the receiving side, the transport layer receives packets from the network
layer, converts and arranges into proper sequence of segments and sends it to
the session layer.
To ensure process to process delivery the transport layer makes use of port
address.
The Transport layer is responsible for segmentation and reassembly of the
message into segments which bear sequence numbers.
Flow Control & Error control: the transport layer alsocarries out flow control
and error control functions; but unlike data link layer these are end to end
rather than node to node.
5. Session Layer
The Session Layer allows users on different machines to establish active
communication sessions between them. The other functions are:
Dialog Control: This layer allows two systems to start communication with
each other in half-duplex or full-duplex.
Token Management: This layer prevents two parties from attempting the
same critical operation at the same time.
Synchronization: This layer allows a process to add checkpoints which are
considered as
synchronizatio
n points into
stream of
data.
6. Presentation Layer
It is used to present data to the application layer (layer 7) in an accurate, well-
defined and standardized format.
It checks for syntax and semantics of data that is transferred.
It works in translation of data means at sender end it receives data in sender
format and convert it to common format & at receiver end it takes data
change it from common format to receiver understandable format
7.Application Layer
It is the top most layer of OSI Model. Manipulation of data(information) in
various ways is done in this layer which enables user or software to get access
to the network.
Some services provided by this layer includes: E-Mail, transferring files,
distributing the results to user, directory services, network resources, etc.
Mail Services: This layer provides the basis for E-mail forwarding and storage.
Network Virtual Terminal: It allows a user to log on to a remote host. The
application creates software emulation of a terminal at the remote host.
User's computer talks to the software terminal which in turn talks to the host
and vice versa. Then the remote host believes it is communicating with one of
its own terminals and allows user to log on.
Directory Services: This layer provides access for global information about
various services.
File Transfer, Access and Management (FTAM): It is a standard mechanism to
access files and manages it. Users can access files in a remote computer and
manage it. They can also retrieve files from a remote computer.
TCP/IP Model
TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of
communication protocols used to interconnect network devices on the internet.
It is a collection of protocols. IT is a hierarchical model, I e. There are multiple
layers and higher layer protocols are supported by lower layer protocols.
It existed even before the OSI model was developed.
TCP/IP Originally had four layers (bottom to top):
Host to Network Layer
Internet Layer
Transport Layer
Application Layer
The figure for TCP/IP model is as follows:
The structure TCP/IP model is very similar to the structure of the OSI
reference model. The OSI model has seven layers where the TCP/IP model
has four layers.
The Application layer of TCP/IP model corresponds to the Application Layer
of Session, Presentation & Application Layer of OSI model.
The Transport layer of TCP/IP model corresponds to the Transport Layer of
OSI model
The Network layer of TCP/IP model corresponds to the Network Layer of OSI
model
The Host to network layer of TCP/IP model corresponds to the Physical and
Datalink Layer of OSI model.
B. Internet layer or IP
Also called as the Internetwork Layer (IP). It holds the IP protocol which is a
network layer protocol and is responsible for source to destination
transmission of data.
The Internetworking Protocol (IP) is a connection-less&unreliable protocol.
The Internet layer responsibilities include addressing, packaging, and routing
functions. The Internet layer is analogous to the Network layer of the OSI
model.
IP is a combination of four protocols:
1) ARP 2) RARP 3) ICMP 4) IGMP
C. Transport Layer
The Transport layer (also known as the Host-to-Host Transport layer)
provides the Application layer with session and datagram communication
services.
The Transport layer encompasses the responsibilities of the OSI Transport
layer.
TCP establishes connections, sequences and acknowledges packets sent, and
recovers packets lost during transmission.
The transport layer contains three protocols:
1) TCP 2)UDP 3)SCTP
D. Application Layer
The Application layer allows applications to access the services of the other
layers, and it defines the protocols that applications use to exchange data.
The Application layer contains many protocols, and more are always being
developed.
Addressing in TCP/IP
The TCP/IP protocol suited involves 4 different types of addressing:
1. Physical Address
2. Logical Address
3. Port Address
4. Specific Address
Physical Addresses
The physical address, also known as the link address, is the address of a node
as defined by its LAN or WAN.
The size and format of these addresses vary depending on the network. For
example, Ethernet uses a 6-byte (48-bit) physical address.
Physical addresses can be either unicast (one single recipient), multicast (a
group of recipients), or broadcast (to be received by all systems in the
network.
Logical Addresses
Logical addresses are used by networking software to allow packets to be
independent of the physical connection of the network, that is, to work with
different network topologies and types of media.
A logical address in the Internet is currently a 32-bit address that can
uniquely define a host connected to the Internet. An internet address in IPv4
in decimal numbers 132.24.75.9
The physical addresses will change from hop to hop, but the logical addresses
remain the same.
Port Addresses
There are many applications running on the computer. Each application run
with a port no.(logically) on the computer.
Application-Specific Addresses
Some applications have user-friendly addresses that are designed for that
specific application.
Examples include the e-mail address (for example,
computernetworks@cntu.edu) and the Universal Resource Locator (URL) (for
example, www.mhhe.com). The first defines the recipient of an e-mail; the
second is used to find a document on the World Wide Web.
In Figure 2.8, we show the encapsulation in the source host, decapsulation in the
destination host, and encapsulation and decapsulation in the router.
2. The transport layer takes the message as the payload, the load that the transport
layer should take care of. It adds the transport layer header to the payload, which
contains the identifiers of the source and destination application programs that
want to communicate plus some more information that is needed for the end-to-
end delivery of the message, such as information needed for flow, error control, or
congestion control. The result is the transport-layer packet, which is called the
segment (in TCP) and the user datagram (in UDP). The transport layer then passes
the packet to the network layer.
3. The network layer takes the transport-layer packet as data or payload and adds its
own header to the payload. The header contains the addresses of the source and
destination hosts and some more information used for error checking of the header,
fragmentation information, and so on. The result is the network-layer packet,
called a datagram. The network layer then passes the packet to the data-link layer.
4. The data-link layer takes the network-layer packet as data or payload and adds its
own header, which contains the link-layer addresses of the host or the next hop (the
router). The result is the link-layer packet, which is called a frame. The frame is
passed to the physical layer for transmission.
At the router, we have both decapsulation and encapsulation because the router is
connected to two or more links.
1. After the set of bits are delivered to the data-link layer, this layer decapsulates the
datagram from the frame and passes it to the network layer.
2. The network layer only inspects the source and destination addresses in the
datagram header and consults its forwarding table to find the next hop to which the
datagram is to be delivered. The contents of the datagram should not be changed by
the network layer in the router unless there is a need to fragment the datagram if it is
too big to be passed through the next link. The datagram is then passed to the data-
link layer of the next link.
3. The data-link layer of the next link encapsulates the datagram in a frame and
passes it to the physical layer for transmission.
Addressing
Since the TCP/IP protocol suite uses several protocols at some layers, we can say
that we have multiplexing at the source and demultiplexing at the destination.
Multiplexing in this case means that a protocol at a layer can encapsulate a packet
from several next-higher layer protocols (one at a time);
Demultiplexing means that a protocol can decapsulate and deliver a packet to several
next-higher layer protocols (one at a time). Figure 2.10 shows the concept of
multiplexing and demultiplexing at the three upper layers.
1. OSI is a generic, protocol independent 1. TCP/IP model is based on standard protocols around
standard, acting as a communication which the Internet has developed. It is a communication
gateway between the network and end user. protocol, which allows connection of hosts over a
network.
2. In OSI model the transport layer 2. In TCP/IP model the transport layer does not
guarantees the delivery of packets. guarantees delivery of packets. Still the TCP/IP model
is more reliable.
4. OSI model has a separate Presentation 4. TCP/IP does not have a separate Presentation layer
layer and Session layer. or Session layer.
5. Transport Layer is Connection Oriented. 5. Transport Layer is both Connection Oriented and
Connection less.
7. OSI is a reference model around which 7. TCP/IP model is, in a way implementation of the OSI
the networks are built. Generally it is used as model.
a guidance tool.
8. Network layer of OSI model provides both 8. The Network layer in TCP/IP model provides
connection oriented and connectionless connectionless service.
service.
9. OSI model has a problem of fitting the 9. TCP/IP model does not fit any protocol
protocols into the model.
10. Protocols are hidden in OSI model and 10. In TCP/IP replacing protocol is not easy.
are easily replaced as the technology
changes.
11. OSI model defines services, interfaces 11. In TCP/IP, services, interfaces and protocols are not
and protocols very clearly and makes clear clearly separated. It is also protocol dependent.
distinction between them. It is protocol
independent.
Review Questions:
1. Explain the concept of layered task.
2. What is the OSI model? List its layers and explain their responsibility in exactly
one line.
3. Explain how the communication takes place between layers of OSI model.
4. Write a short note on encapsulation of data in OSI model.
5. Differentiate between the working of Data link layer, Network layer and
Transport layer.
6. Explain the structure of TCP/IP protocol.
IT/CS Dept. Page 37
Unit 1 : Computer Networks
Unit Structure
3.1Introduction
3.2 Data & Signals
3.2.1 Data –types
3.2.2 Signal – types
3.2.3 Periodic & Non Periodic Signals
3.3 Analog Signal
IT/CS Dept. Page 38
Unit 1 : Computer Networks
Peak Amplitude
The peak amplitude of a signal is the absolute value of its highest intensity,
proportional to the energy it carries.
For electric signals, peak amplitude is normally measured in volts. Figure 3.4 shows
two signals and their peak amplitudes.
Phase
The term phase, or phase shift, describes the position of the waveform relative to
time 0. If we think of the wave as something that can be shifted backward or forward
along the time axis, phase describes the amount of that shift. It indicates the status of
the first cycle. Phase is measured in degrees or radians
Wavelength
Definition: Wavelength can be defined as the distance between two
successive crests or troughs of a wave. It is measured in the direction of the
wave.
Crest
Trough
Since period and frequency are inverses of each other, time domain analysis
and frequency domain analysis are, in a way, inversely related as well..
The time domain refers to a description of the signal with respect to time.
The basic tool for analyzing signals in the time domain is called an
oscilloscope.
While the basic use of a scope is to determine the magnitude of the signal as
time is changing, it can also be used to indirectly measure the frequency of a
signal if that signal is periodic. To do this, simply configure the scope to show
at least one period of the signal, then measure the time of that period. The
frequency of the signal is then .
When you do a measurement of the signal’s frequency, then you are said to be analyzing
the signal in the frequency domain. While some oscilloscopes can be used for analyzing a
(periodic) signal in the frequency domain (they need special functionality), a better tool for
doing this is called a spectrum analyzer. A spectrum analyzer displays a two dimensional
graph of a signal’s power in the y-axis, and the signal’s frequency in the x-axis. Such a
graph is called the frequency spectrum of a signal because it shows how strong a signal
is at all frequencies.
The simplest example of a signal in the frequency domain, is the perfectly periodic signal
the sine wave. The frequency spectrum of a 100 Hz sine wave consists of only one
frequency (100 Hz), and so the frequency spectrum will look like this:
Composite Signals
A composite signal is a combination of to or more simple sine waves with
different frequency, phase and amplitude.
When we change one or more characteristics of a single--frequency signal, it
becomes a composite signal made of many frequencies.
A composite signal can be periodic or non-periodic.
A periodic composite signal can be decomposed into a series of simple sine
waves with discrete frequencies, frequencies that have integer values (1, 2,
3, and so on).
A non-periodic composite signal can be decomposed into a combination of
an infinite number of simple sine waves with continuous frequencies,
frequencies that have real values.
Bandwidth
The range of frequencies contained in a composite signal is its bandwidth.
The bandwidth is normally a difference between two numbers. For example, if a
composite signal
contains frequencies between 1000 and 5000, its bandwidth is 5000 1000, or
4000.
DIGITAL SIGNAL
Information can also be explained in the form of a digital signal.
A digital is a signal that has discrete values.
The signal will have value that is not continuous.
Level:-
Information in a digital signal can be represented in the form of voltage
levels.
Ex. In the signal shown below, a ‗1‘is represented by a positive voltage and
a ‗0‘ is represented by a Zero voltage.
In general, if a signal has L levels then, each level need Log2L bits
Example: Consider a digital Signal with four levels, how many bits are required per
level?
Answer: Number of bits per level = Log2L= Log24=2
Hence, 2 bits are required per level for a signal with four levels.
Bit rate
It is the number of bits transmitted in one second.
It is expressed as bits per second (bps).
Relation between bit rate and bit interval can be as follows
Bit rate = 1 / Bit interval
Baud Rate
It is the rate of Signal Speed, i.e the rate at which the signal changes.
A digital signal with two levels ‗0‘& ‗1‘will have the same baud rate and bit rate
& bit rate.
The diagram below shows three signal of period (T) 1 second
a) Signal with a bit rate of 8 bits/ sec and baud rate of 8 baud/sec
b) Signal with a bit rate of 16 bits/ sec and baud rate of 8 baud/sec
c) Signal with a bit rate of 16 bits/ sec and baud rate of 4 baud/sec
TYPES OF CHANNELS:
Each composite signal has a lowest possible (minimum) frequency and a
highest possible (maximum) frequency.
From the point of view of transmission, there are two types of channels:
This channel can pass all the frequencies in the range f1 to f2.
There are two different approaches for the transmission of digital signals:
baseband transmission and broadband transmission.
1. Baseband transmission
Baseband transmission means sending a digital signal over a channel without
changing the digital signal to an analog signal.
Baseband transmission requires low pass
channel for transmission. A low pass
channel is a channel whose bandwidth
starts from zero.
2. Broadband Transmission
Broadband transmission means sending a digital signal over a channel after
changing the digital signal to analog signal i.e. it requires modulation.
Broadband transmission can use band pass channel. A band pass channel is a
channel whose bandwidth does not start from zero. A band pass channel is more
available than a low pass channel.
If the available channel is band
pass, we cannot send the digital
signal directly to the channel, it
must be converted to an analog
form before transmission
TRANSMISSION IMPAIRMENTS
Attenuation:
The strength of a signal decrease with the increase in distance travelled over
a medium.
Attenuation means loss of energy. Attenuation decides the signal to noise
ratio hence the quality of received signal. Attenuation is given in decibels as:
Attenuation (dB) = 10log10 (Pout/Pin)
Where, Pin= Power at the sending end
Pout= Power at the receiving end
Distortion (Harmonic):
Another meaning of distortion is change in shape of the signal. This type of
distortion is observed for the composite signals made by different
frequencies.
If the medium is not perfect, then all the frequency components present at
the input will not only be equally attenuated and will not be proportionally
delayed.
Noise:
When the data travels over a transmission medium, noise gets added to it.
Noise is a major limiting factor in communication system performance. Noise
can be categorized into four types as follows:
(i) Thermal noise
(ii) Intermodulation noise
(iii) Crosstalk
(iv) Impulse noise
Two theoretical formulas were developed to calculate the data rate: one by Nyquist
for a noiseless channel, another by Shannon for a noisy channel.
PERFORMANCE
Network performance refers to measures of service quality of a network.
There are many different ways to measure the performance of a network, as each
network is different in nature and design.
The following measures are often considered important:
Bandwidth commonly measured in bits/second is the maximum rate that
information can be transferred
Throughput is the actual rate that information is transferred
Latency the delay between the sender and the receiver decoding it, this is
mainly a function of the signals travel time, and processing time at any nodes
the information traverses
Jitter variation in packet delay at the receiver of the information
Error rate the number of corrupted bits expressed as a percentage or
fraction of the total sent
1. Bandwidth
The available channel bandwidth and achievable signal-to-noise ratio
determine the maximum possible throughput. It is not generally possible to send
more data than dictated by the Shannon-Hartley Theorem.
Shannon-Hartley Theorem
The Shannon–Hartley theorem states the channel capacity C, meaning the
theoretical tightest upper bound on the information rate of data that can be
communicated at an arbitrarily low error rate using an average received signal
power S through an analog communication channel subject to additive white
Gaussian noise of power N:
C is the channel capacity in bits per second, a theoretical upper bound
on the net bit rate(information rate, sometimes denoted I) excluding
error-correction codes;
B is the bandwidth of the channel in hertz (passband bandwidth in
case of a bandpass signal);
S is the average received signal power over the bandwidth (in case of a
carrier-modulated passband transmission, often denoted C), measured
in watts (or volts squared);
N is the average power of the noise and interference over the
bandwidth, measured in watts (or volts squared); and
S/N is the signal-to-noise ratio (SNR) or the carrier-to-noise ratio (CNR)
of the communication signal to the noise and interference at the
receiver (expressed as a linear power ratio, not as
logarithmic decibels).
2. Throughput
Throughput is the number of messages successfully delivered per unit time.
Throughput is controlled by available bandwidth, as well as the available
signal-to-noise ratio and hardware limitations.
The Time Window is the period over which the throughput is measured.
3. Latency
The speed of light imposes a minimum propagation time on all
electromagnetic signals.
It is not possible to reduce the latency below where s is the distance and
cm is the speed of light in the medium. This approximately means 1 extra
millisecond RTT for 100 km/62miles of distance between hosts.
4. Jitter
Jitter is the undesired deviation from true periodicity of an assumed
periodic signal in electronics and telecommunications, often in relation to a
reference clock source.
Jitter may be observed in characteristics such as the frequency of successive
pulses, the signal amplitude, or phase of periodic signals.
IT/CS Dept. Page 53
Unit 1 : Computer Networks
Jitter is a significant, and usually undesired, factor in the design of almost all
communications links. In clock recovery applications it is called timing jitter.
5. Error rate
In digital transmission, the number of bit errors is the number of
received bits of a data stream over a communication channel that have been
altered due to noise, interference, distortion or bit synchronization errors.
The bit error rate or bit error ratio (BER) is the number of bit errors divided
by the total number of transferred bits during a studied time interval. BER is
a unitless performance measure, often expressed as a percentage.
The bit error probability pe is the expectation value of the BER. The BER can
be considered as an approximate estimate of the bit error probability. This
estimate is accurate for a long time interval and a high number of bit errors.
REVIEW QUESTIONS
1. Define analog and digital signals.
2. Explain Composite analog signals.
3. Explain Time and Frequency Domain Representation of signals
4. Explain the characteristics of an Analog signal
5. Explain the characteristics of an Digital signal
6. Explain transmission of digital signals.
7. Explain the difference between
a) Lowpass and Bandpass channel
b) Narrowband and wideband channel
8. Explain why a digital signal requires to undergo a change before transmitting it
through a band pass channel
8. Write short note on maximum data rate of a channel.
9. Explain different types of Transmission impairments.
10. Explain Network performance.
11.Explain time and frequency domains.
13.Explain different forms of sine waves.
14.Explain the terms peak amplitude,frequency and phase.