Professional Documents
Culture Documents
veeraswamy
DATA MODEMS
Modulation: - Modification of one or more characteristic of a
carrier wave by an information bearing signal is called
‘Modulation’.
Categorization of Modulation: -
1. Amplitude Modulation – In Amplitude Modulation
transmission, the carrier signal is modulated so that its
amplitude varies with the changing amplitude of
modulating signal. The frequency and phase of the carrier
If the analog signal is band pass, the bandwidth value is lower than the value of the maximum
frequency.
(b) Quantization - The result of sampling is a series of pulse with amplitude values between the maximum to
minimum amplitudes of the signal. The set of amplitude can be infinite with non-integral values b/w the two
limits. These values can’t be used in the encoding
process.
Steps in Quantization: -
We assume that the original analog signal has
instantaneous amplitude between Vmin & Vmax.
We divide the range into 1 zones, each of height
(delta)
Vmax - Vmin
i.e. =
2
We assign quantized values of 0 to 1-10 to the
mid-point of each zone.
We approximate the value of the sample
amplitude to the quantized values.
For quantization & encoding, we take a sampled signal and the sample amplitude are between -20 v
and + 20 v.
We decided to have eight levels. This means that = SV
Application of FDM:-
FDM is used in AM & FM radio broadcasting with band from 530 to 1700 KHz & 88 to 108 MHz
respectively.
FDM is used in television broadcasting
FDM is used in first generation cellular telephones.
(b) Wavelength division multiplexing: - WDM is an analog technique that is designed to use the high data-rate
capability of fiber-optic cable. The optical-fiber data rate is higher than the data rate of metallic transmission cable.
Using a fiver-optic cable fox one single line wastes the available bandwidth. Multiplexing allows us to combine
several lines into one. In WDM, the multiplexing & demultiplexing involve optical signals transmitted through
fiber-optic channels.
In WDM technology, we want to
combine multiple sources light into one single
light at the multiplexer & do the reverse at the
demultiplexer. The combining & splitting of
light source are easily handled by a prism. A
prism bends a beam of light based on the angle of incidence & the frequency. Using this technique, a multiplexer
can be made to combine several input beams of light, each containing a narrow band of frequencies into one
output beam of a wider band of frequencies. A demultiplexer can also be made to reverse the process.
Dense WDM can multiplex a very
large number of channels by spacing channels
very close to one another. It achieves even
greater efficiency.
Application of WDM: -
WDM is used in SONET network
in which multiple optical fiber
lines are multiplexed & demultiplexed.
(c) Time–division multiplexing: - TDM is a digital
multiplexing technique for combining several low rate
channels into one high-rate one.
Two schemes for TDM: -
1. Synchronous TDM: - In synchronous TDM, the data
flow of each input connection is divided into units, where each input occupies one input time slot. A unit can
be 1 bit, 1charecter of 1 block of data. Each input unit becomes one output unit & occupies one output time
slot. However the duration of an output time slot is n times shorter. Than the duration of an input time slot. If
an input time slot is Ts, the output time slot is T/n & where n is the no. of connections. In other wards, a unit
in the output connection has a shorter duration;
it travels faster.
In synchronous TDM, the data rate of
the link is n times slots are grouped into frames.
A frame consists of one complete cycle of time
slots, with one slot dedicated to each sending
device. In a system with n input lines each flame
has n slot, with each slot allocated to carrying
data from a specific input line.
2. Statistical TDM: - In statistical TDM, slot are
dynamically allocated to improve bandwidth
efficiency. Only when a input line has a slot’s worth
of data to send is it given a slot in the output frame.
In statistical TDM, the no. of slots in each frame is
less than the no of input lines. The multiplexer
checks each input line in round robin fashion: it
allocates a slot for an input line if the line has data to send otherwise it skips the line & checks the next line. In
statistical TDM, no solt is left empty as long as there are data to be sent by any input line.
Difference between synchronous &statistical TDM: -
An output slot in synchronous TDM is totally occupied by data where as in statistical TDM, a slot need to
carry data as well as address of the destination.
Network fundamentals
AN OVERVIEW OF NETWORKING
A network is a group of computers connected in some fashion in order to share resources. A group of
computers in a network provide greater storage capacity and processing power than that by standalone independent
machines. In addition to computers, a network also consists of peripheral devices with carriers and data
communication devices used for the purpose of exchanging data and information.
By using computer networks, the cost of data transfer can be made cheaper than other conventional means
like telegrams etc. as computers can send data at a very fast speed. Thus, computers enable us to reduce both cost and
time in transferring data. In a network, computers of different make can be connected together and users can work
together in a group. Software packages have been developed for group working in Data Base Management (DBMS)
and graphical artworks. Also, data from different departments located at distant places can be transferred to and
stored on a central computer. This data can then be accessed by the computers located in different departments. The
data at the central computer is updated and accessed by all users. This prevents any bottlenecks in the smooth
functioning of the organization because all the users will get the latest information (for example, inventory) stored in
the central computer.
Communication Switching Techniques: - In a WAN two devices are not connected directly but a network of
switching nodes provides a transfer path between the two devices. The process of transferring data block from one
node to another is called data switching. There are following types of switching techniques: -
Circuit Switching – In Circuit Switching, there is a dedicated communication path between the sending and
receiving devices.
A circuit switched
network is made of a set of
switches connected by
physical links in which
each link is divided into n-
channels.
Circuit switching
takes place at the physical
layer. In this, data are
continuous flow sent by
Header R C S S Y I
Free
Window Size
Length G K H T N N
of four layers:-
Application Layer: - The Application Layer provides services that can be used by other applications for example
protocols have been developed for remote login, for e-mail, for file transfer etc. The application layer program run
directly over the transport layer.
Transport Layer: - Two basic services are provided by this layer: -
The first service consists of reliable connection oriented transfer of byte stream, which is provided by TCP.
The second service consists of connectionless transfer of individual package i.e. provided by UDP. UDP is used for
applications that require quick but reliable delivers.
The TCP/IP Model doesn’t require strict layering. In other words the application layer has the option of by
passing intermediate layer.
Internet Layer: - The Internet layer handles the transfer of information access multiple networks through the use of
gateways or routers. It has similar function as network layer of OSI Model. A key aspect of the Internet layer is the
definition of global unique address for the machines that are attached with the Internet. The Internet layer provides a
single service namely best effort connectionless packet transfer. For this packets are also called data grams. The
connectionless approach makes the system robust i.e. if failures occur in the network the packets are routed around
the point of failure. There is no need to setup the connection.
Network Interface Layer: - Network Interface Layer is concern with the network specific aspects of the transfer of
packets. It must deal with port of network layer and data link layer. The network interface layer is particularly
concern with the protocols that access the intermediate networks.
TCP/IP Services and Application Protocols: -
Client Server Model – In this model, transaction responsibilities are divided into two parts: client and server.
Clients rely on servers for services such as file storage, printing, and processing power. Client is a PC running
front-end software that knows how to communicate with the server. This model improves performances.
Telnet – Previously Described.
File Transfer Protocol (FTP) – Previously described.
Trivial File Transfer Protocol (TFTP) – This protocol is nofrills, unauthenticated protocol used to transfer files.
TFTP depends on UDP and often is used to boot diskless workstations.
Simple Mail Transfer Protocol (SMTP) – This protocol is a TCP/IP protocol that specifies how computers
exchange electronic mail. It works post office protocol, and is one of the reasons that Internet E-mail functions so
well.
Network File System (NFS) – This is a distributed file system protocol suite developed by Sun Microsystems that
allow to remote file access across a network. It allows all network users to access shared files stored on computers
of different types.
Simple Network Management Protocol (SNMP) – This is a network management protocol for TCP/IP networks.
SNMP provides a means to monitor and control network devices, and to manage configurations, statistics
collection, performance, and security. It specifies how nodes are managed on a network, using agents to monitor
network traffic and maintain a management information base.
Domain Name System (DNS) - Previously described.
Internet Control Message Protocol (ICMP) – This is an integral part of the IP that handles error and control
message. Specially routers and hosts use ICMP to send reports of problem about datagram, back to the original
source that sends to the datagram.
Internet Group Management Protocol (IGMP) – This protocol is mainly used with multicast network to group the
members, used by host.
Address Resolution Protocol (ARP) – This protocol is used as a device driver which accepts packets from internet
layer and converts the packet into Ethernet format.
Reverse Address Resolution Protocol (RARP) – This protocol performs the same function as ARP does but in
reverse, that is given an IP address, it determines the corresponding physical address.
segmen t.
The address resolution protocol (ARP) associates an IP address with the physical address. On a typical
physical network, such, as a LAN, each device on a link is identified by a physical or station address usually
imprinted on the network interface card (NIC). ARP maintains tables of
name-to-address mappings.
RARP (Reverse Address Resolution Protocol) performs the same
function as ARP does but in reverse, that is given an IP address, it
determines the corresponding physical address.
Data Encapsulation: - The data from the application program is encapsu-
lated into the TCP segment. This means that the data in a TCP segment is
the data from the application program. The IP datagram encapsulates this
TCP segment. Thus, means the TCP segment forms the data part of the IP
datagram. The IP datagram is sent along the physical wire, encapsulated in
the Ethernet frame (or any other LAN frame). That is, IP datagram is
transported as the data of the frame. This process is known as data
encapsulation. The same process gets reversed at the receiver side. This is
known as data decapsulation.
Data Routing: - The IP protocol in the TCP/IP suite is responsible for
routing the data packets to its destination. Routing means finding the
route (next hop) for a data-gram. If the destination node is on the same
network as the source node, the delivery is direct. In direct delivery, the
sender can compare the destination address with the addresses of the
computers to which it is connected to. If a match is found, the packet is
delivered to the same.
If the destination host is not in the same network as the sender, the delivery is indirect. In the indirect
delivery, the packet goes from router to router until it reaches the network of the destination host. In indirect delivery,
the sender uses the IP address of the destination computer and a routing table. The routing table is used to find the IP
address of the router to which the packet should be sent to.
Error Reporting Mechanism – Internet Control Message Protocol (ICMP): - This is an integral part of the IP that
handles error and control message. Specially routers and hosts use ICMP to send reports of problem about datagram,
back to the original source that sends to the datagram.
ICMP detects error conditions such as internet work congestion and downed links and notifies IP and upper-
layer protocols so packets can be routed avoiding problem areas.
ICMP does not correct errors but simply reports them. ICMP are encapsulated inside IP datagram before they
are sent over the network. Five types of errors are reported by ICMP. These are: -
(a) Destination Unreachable
ASCIIValueofCharacter
1
CHECKSUM = R[ 255 ]
in which R is the remainder of the division process. The receiver checks each part of the received block to confirm
the following:
Was first character a Start Of Header (SOH)?
Was the block number exactly one more than the previous block received?
Were exactly 128 characters of data received?
Was the locally computed checksum identical to the last character received in the block?
If the receiver is satisfied, it sends an Acknowledge (ACK) back to the transmitter, and the transmitter
sends the next block. If not, an NAK is sent, and the transmitter resents the block found in error. This process is
continued, block by block, until the entire file is sent and verified. At the end of the data, the transmitter sends an
End Of Text character. The receiver replies with an ACK, and the session is terminated.
Limitations of XMODEM Protocol - There are several points to consider about the XMODEM protocol.
It is easy to implement with a small computer, but it does require a computer at each end.
Wireless communication
Introduction: - Mobile devices such as laptop, palmtop, mobile, phones etc. are now available at affordable prices.
These devices, based on the wireless communication techniques, help us to achieve mobility. Mobility is the ability to
access information and services any-me and anywhere. Through wireless computing, one can access information, on
traffic, ticket booking, check account balance, e-mail from one's home, cafeteria, or even from a grocery store.
Wireless communication makes use of spread, spectrum radio, infrared, cellular radio and satellite
communication technologies. Since discussing each of them is out of the scope of this book, only the Cellular radio
and Satellite communication technologies are discussed in the following sub-sections.
Cellular Radio: - Cellular Radio means using a large number of low-power base stations for transmission, each
having a limited coverage area.
An area is divided into a number of smaller areas, called cells. Each of these smaller areas is served by its own
low-power radio base station. Frequency channels are allocated to these radio stations in such a way that the channels
(frequencies) used in one cell can be reused in another cell some distance away.
Principle of Operation - The principle behind cellular radio is this: Instead of using one powerful transmitter, many
low-power transmitters are placed throughout a coverage area. For example, a high power transmitter in a region can
have twelve conversations (channels).
The cellular radio equipment (base station) can communicate with mobiles as long as they are within range.
Radio energy weakens over distance, hence, mobiles must remain within a frequency range to be able to
communicate, with each other.