Professional Documents
Culture Documents
net/publication/361562784
CITATIONS
1 author:
Yekini Nureni
Yaba College of Technology
82 PUBLICATIONS 147 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Yekini Nureni on 27 June 2022.
i
Copyright
Copyright © 2022 Yekini Nureni Asafe
Typesetting @ YGF ICT & Educational Research-Publication Unit. A
division of YEKNUA GLOBAL FOUNTAIN ACADEMY 1-4 Global
Fountain Close Majoun Agala Ikire, Osun State Nigeria.
All rights reserved. No part of this publication may be reproduced, stored
in a retrieval system or transmitted in any form or by any means, electronic,
mechanical, photocopying, recording or otherwise, without the prior
permission of the copyright holder.
ISBN: 978-978-998-650-7
ii
Preface
The objective of this book is to provide adequate theoretical and practical
knowledge on Computer Networking and Data Communication System for
undergraduate students of Computer Science and Engineering, Network
Engineer and Administrators, researchers and instructors.
This book introduces the basic principle, theories and practical of Computer
Networking and Data Communication System in Nigeria polytechnics and
colleges of technology in line with 2020 National Board for Technical
Education Curriculum (NBTE).
The book will be very useful for the readers of different categories as in
undergraduate students of University, Polytechnics, Colleges of Education
and allied institutions in all fields of Computer Engineering Sciences.
Computer
iii
Foreword
Some books on computer networks and data communication are demanding
but insufficient; others cover a large amount of material but are
insufficiently thorough. Computer networking and data communication
systems are unique in their ability to combine rigor and completeness. The
purpose of this book is to introduce readers to the fundamental concepts of
computer networks and data communications systems, computer network
security, and network troubleshooting.
This book covers a wide range of data communications and networking
issues in depth while also providing introductory information on basic
electronic communications and telecommunications systems. The book is
readable, easy to understand, and packed with different ways to understand
topics such as data communications components, data representation, data
flow, resource sharing, wireless telecommunications systems, basic data
communications networks and systems, local area networks, internetworks,
and the Internet, including the TCP/IP protocol suite.
Each chapter is distinct and can be used as a standalone unit of study. The
book discusses computer network fundamental concepts such as the
advantages and security of computer networks, Internet models, protocols
and standards, network topology, network troubleshooting, transition
modes, and media. This book is intended for undergraduate computer
science and engineering students, as well as professionals, researchers,
iv
instructors, and technologists with a career or interest in data
communications and/or computer networking.
v
Table of Figures
Figure 1: Local Area Network ............................................................................ 27
Figure 2: Metropolitan area Network................................................................... 28
Figure 3: Wide Area Network .............................................................................. 30
Figure 4: Serve-based network ............................................................................ 32
Figure 5: Peer-to-Peer Network ........................................................................... 34
Figure 6: Client-based network ............................................................................ 35
Figure 7: Network Topology categories .............................................................. 62
Figure 8: Bus Topology ....................................................................................... 63
Figure 9: Bus Topology with three stations ......................................................... 65
Figure 10: Ring Topology .................................................................................... 68
Figure 11: Star Topology ..................................................................................... 70
Figure 12: Mesh Topology................................................................................... 72
Figure 13: Hybrid Network .................................................................................. 75
Figure 14. Internal Cable Structure and Color Coding ........................................ 79
Figure 15: wiring diagram and pin out for RJ45 .................................................. 80
Figure 16. Peer-to-Peer Network ........................................................................ 87
Figure 17. Ping result for 2 PCs on peer-to-peer network ................................... 91
Figure 18. Simple Wired Home Network diagram ............................................ 102
Figure 19. Physical Network Setup with D-Link's DI-604 broadband router .... 106
Figure 20: A typical home wired network ......................................................... 114
Figure 21: Command Prompt window for nslook............................................. 118
Figure 22. Simplex Transmission Mode ............................................................ 135
Figure 23. Half Duplex transmission Mode ....................................................... 135
Figure 24. Full Duplex Transmission Mode ...................................................... 136
Figure 25. Organization of Data Communication System ................................. 139
Figure 26. DTE & DCE Representation ............................................................ 142
Figure 27. Description of Analog Signal ........................................................... 145
Figure 28. Fig: A digital signal with Two levels. „1‟ represented by a positive
voltage and „0‟ represented by a negative voltage ............................................ 152
vi
Figure 29: A digital signal with four levels ....................................................... 152
Figure 30. Category of Digital Data Transmission ............................................ 157
Figure 31: A T-periodic function. ...................................................................... 167
Figure 32. Categories of Transmission Media ................................................... 184
Figure 33: Shielded and Unshielded Twisted pair cable .................................... 186
Figure 34. Coaxial Cable ................................................................................... 188
Figure 35: Optical fiber cable ............................................................................ 189
Figure 36. Step Index Mode ............................................................................... 191
Figure 37. Grade Index Mode ............................................................................ 192
Figure 38: Single Mode...................................................................................... 192
Figure 39. Grounded Wave transmission ........................................................... 194
Figure 40. Sky wave propagation ...................................................................... 194
Figure 41. Line of sight Propagation ................................................................. 195
Figure 42: Radio waves transmission ................................................................ 196
Figure 43: Microwaves transmission ................................................................. 198
Figure 44: Infrared Transmission ....................................................................... 198
Figure 45: Distortion impairment ...................................................................... 200
Figure 46: Attenuation impairment .................................................................... 201
Figure 47: Noise impairment ............................................................................. 203
Figure 48. Error in transmission ........................................................................ 205
Figure 49: Classification of Line Coding Schemes............................................ 222
Figure 50: Unipolar (NRZ) & Polar (RZ & NRZ) Encoding............................. 223
Figure 51: Polar biphase: Manchester and Differential Manchester .................. 224
Figure 52: Bipolar coding schemes – AMI and Pseudometry ........................... 225
Figure 53: Multilevel coding scheme: 2BIQ ...................................................... 227
Figure 54: Multilevel coding scheme: 8B6T ..................................................... 227
Figure 55: Block Coding .................................................................................... 229
Figure 56: Types of Modulation ........................................................................ 230
Figure 57: Waveform representation of Amplitude modulated wave ................ 231
Figure 58: Frequency Modulation...................................................................... 233
Figure 59. Basic concept of FDM ...................................................................... 250
vii
Figure 60. Synchronous versus asynchronous TDM ......................................... 257
viii
Contents
Copyright ........................................................................................................... ii
Preface............................................................................................................... iii
Table of Figures ................................................................................................ vi
About the Book ...................................................................................................xxii
C
HAPTER ONE
COMPUTER NETWORK CONCEPT
C
HAPTER TWO
PROTOCOL AND STANDARD
C
HAPTER THREE
NETWORKING DEVICES
x
3.7. Bridges .................................................................................................. 54
3.8. Switches ................................................................................................ 55
3.9. Routers .................................................................................................. 56
3.10. Brouters ................................................................................................. 58
3.11. Access Point .......................................................................................... 58
3.12. Review Questions.................................................................................. 60
C
HAPTER FOUR
NETWORK TOPOLOGY
C
HAPTER FIVE
NETWORK & DATA COMMUNICATION LAB
C
HAPTER SIX
NETWORK TROUBLESHOOTING
xiii
6.5. Using nslookup command ................................................................... 117
6.6. Review Questions................................................................................ 120
C
HAPTER SEVEN
COMPUTER NETWORK SECURITY
xiv
C
HAPTER EIGHT
DATA COMMUNICATION SYSTEM
C
HAPTER NINE
ANALOG AND DIGITAL SIGNAL TRANSMISSION
xvi
9.1.7.3. Advantages of Digital Signals ............................................................. 151
9.1.8. Digital Signal Level ............................................................................ 151
9.1.9. Bit Length or Bit Interval (Tb) ............................................................. 152
9.1.10. Bit Rate................................................................................................ 153
9.1.11. Baud Rate ............................................................................................ 153
9.1.12. Transmission Channel & Composite Signal ....................................... 153
9.1.13. Transmission of Digital Signal ............................................................ 154
9.2. Review Questions................................................................................ 155
C
HAPTER TEN
DIGITAL DATA TRANSMISSION METHODS
C
HAPTER ELEVEN
BANDWIDTH
xvii
Solution .......................................................................................................... 167
11.3. Bandwidth of Analog Signal ............................................................... 168
11.4. Bandwidth of Digital Signal ................................................................ 169
11.5. Bandwidth of Channel ......................................................................... 171
11.6. Review Questions................................................................................ 173
C
HAPTER TWELVE
OSI MODEL
C
HAPTER THIRTEEN
TRANSMISSION MEDIA
C
HAPTER FOURTEEN
ERROR DETECTION & CORRECTION
xix
14.4.3. Longitudinal Redundancy Check ........................................................ 212
14.4.4. Check Sum .......................................................................................... 213
14.5. Error Correction .................................................................................. 215
14.6. Review Questions................................................................................ 220
C
HAPTER FIFTEEN
SIGNAL CODING & ENCODING
xx
C
HAPTER SIXTEEN
MULTIPLEXING TECHNIQUES
xxi
About the Book
This book presents the basic information both theoretical and practical
teaching and learning materials required for Computer Networking & Data
Communication in Nigeria Polytechnics and Colleges of Technology for
training of National and Higher National Diploma graduates in Computer
Engineering Technology. The book is written with particular attention to
the minimum requirements as contained in the new National board for
Technical Education (NBTE) released in the year 2020 for CTE 244:
Computer Networking & CTE 432: Data Communication for National and
Higher National Diploma.
xxii
C
HAPTER ONE
COMPUTER NETWORK CONCEPT
23
networks was to assist users with sharing their increased output, especially
between computers in the same general vicinity. Networks allow users to
communicate using e-mail, newsgroups, and video conferencing etc.
1.2.2. Sharing Resources
The ability to share resources was another reason networks were created,
and it is still one of the main purposes for using networks. Some of the
resources that are commonly shared over computer networks are describe
as follows:
1.2.2.1. Hardware (Peripherals) Sharing
Computer network users can share devices such as printers, scanners, CD-
ROM drives, hard drives etc. Without computer networks, device sharing is
not possible. Many organizations start with multiple stand-alone computers.
Not too long after the initial computer purchase, however, additional
components that attach to a computer, called peripherals, like printers,
scanners, and speakers, are purchased and are connected to that computer
to expand its use
1.2.2.2. Application Sharing
Applications can be shared over the network, and this allows implementing
client/server applications. Applications, such as those used for preparing
taxes, creating text documents, playing computer games, and others in
business organizations have grown in complexity and size and often take up
considerable local storage. Installing an application once on a network and
then sharing it cuts down on the storage space required when multiple users
24
need the same application, which allow multi-users to access it from
different locations.
1.2.3. Assisting Collaboration
With digital information and the ability to share it instantly with others over
networks, network users can have multiple people working on the same
process collectively.
1.3. Network Engineer & Administrator
1.3.1. Responsibility of Network Engineer & Administrator
Network engineers are responsible for designing and setting-up of
organization's computer network. They also maintain networking devices
like switches, routers, firewalls, servers etc., and deal with organization's
internet connectivity inter-branch connectivity etc. Network engineers also
provide technical support for end users.
The basic nature of duty of a network engineer is to design computer
networks and to install, administer & troubleshoot computer networks.
Therefore, a network engineer should have thorough knowledge about
network infrastructure devices. A network engineer should have enough
knowledge in how to install, administer and troubleshoot network and
devices attached.
1.3.2. Responsibility of Network Engineer & Administrator
A network engineer has a wide range of responsibilities. Some of the
responsibilities are listed below.
i. Designing an organization's computer network.
25
ii. Managing an organization's computer network.
iii. Designing, Building and maintaining and connections between offices
(physical sites).
iv. Provisioning Internet and providing user access to internet.
v. Configuring user privileges to access the internet.
vi. Configuring user privileges in network.
vii. Determine how much bandwidth is required for smooth operation of
organization's network.
viii. Configuring Network Infrastructure Devices like switches, routers,
firewalls, servers etc.
ix. Hardening Network Infrastructure Devices like switches, routers,
firewalls, servers etc.
x. Provision the connection and internal network devices to meet those
requirements.
xi. Conduct analysis to make the computer network more reliable.
xii. Installing, configuring, managing and hardening Operating Systems.
xiii. Configure DNS servers for internal and external name resolution.
xiv. Configure DHCP servers for dynamic IP address allocation.
xv. Providing network security.
xvi. Providing technical support to end users.
1.4. Classification of Computer Network
Networks are frequently classified according to the geographical boundaries
the network covers, and on the roles the networked computers play in the
26
network’s operation, and more specifically on which computer controls that
operation.
1.4.1. Classification by Geography
1.4.1.1. Local Area Network (LAN)
LAN is generally confined to a specific location, such as floor, building or
some other small area. Traditional LANs runs at speed of 10 to 100 mbps.
A local area network (LAN) is usually privately owned and links the devices
in a single office, building, or campus. Depending on the needs of an
organization and type of technology used, a LAN can be as simple as two
desktops and a printer in someone’s home office; or it can extend
throughout a company or an organization. LANs are distinguished from
other types of networks by their transmission media and topology.
27
1.4.1.2. Metropolitan Area Network (MAN)
Metropolitan Area Network is a bigger version of LAN and normally uses
same technology. It might cover a group of nearby corporate offices or a
city and might be either private or public. On other hand, MAN is network
running through out a metropolitan area such as a backbone for a phone
service carrier. A MAN just has one or two cables and does not contain
switching elements.
A metropolitan area network (MAN) is a network with a size between a
LAN and a WAN. It normally covers the area inside a town or a city. It is
designed for customers who need a high-speed connectivity, normally to the
internet, and have endpoints spread over a city or part of city. A good
example of a MAN is part of the telephone company network that can
provide a high-speed DSL line to the customer.
30
1.4.2. Networks Classification by Component Roles
Another method used to classify networks focuses on the roles the
networked computers play in the network’s operation, and more specifically
on which computer controls that operation. There are two basic types of role
classifications for networks peer-to-peer networks and server-based
networks. The difference between the two revolves around which computer
is in charge of the network. Third classification, client-based networks, has
come into existence because of the increased capabilities of the typical
client computer.
1.4.2.1. Client Server Model
Unlike peer-to-peer networks that operate without central control and are
difficult to secure, a server-based network offers centralized control and is
designed for secured operations, as shown in Figure 1.10. While there are
still both clients and servers on a server-based network, a dedicated server
controls the network.
A dedicated server is one that, for all practical purposes, operates solely as
a server. A dedicated server on a server-based network services its network
clients by storing data, applications, and other resources, and then providing
access to those resources when called for by a client. When a client requests
a resource such as a document, the server sends the whole resource (the
document) over the network to the client, where it is processed and later
returned to the server for continued storage.
31
Dedicated servers can also control the entire network’s security from one
central location or share that control with other specially configured servers.
This central network control also contributes to the economies of scale
discussed under the “Facilitating Centralized Management” section earlier
in this chapter (using similar equipment results in cheaper equipment prices
and fewer training costs) and makes the server-based network the dominant
networking model used in networks today.
33
Figure 5: Peer-to-Peer Network
1.4.2.3. Client-based Networks
Client-based networks are a further refinement to the concept of a server
based network that relieves the heavy burden on the network’s capacity
resulting from frequent server-performed transactions. A client-based
network takes better advantage of the server’s powerful processors and of
the increasingly powerful computers used in typical workstations.
A client-based network utilizes a client workstation’s power in processing
some functions locally while requesting additional processing from a server
whenever it is needed for increased speed. Client-based network servers
process requests from clients and return just the results, rather than sending
the original resource to the client to be processed and returned after
computations are complete.
Client-based networks, therefore, take advantage of the powerful processing
capabilities of both the client and the server, as shown in Figure 6. This type
of arrangement may include application servers (where entire computer
34
programs are shared from the server) and communications servers (where
e-mail and other communications media are operated).
35
C
HAPTER TWO
PROTOCOL AND STANDARD
36
1) International Organization for Standardization (ISO): The ISO is a
multinational body whose membership is drawn mainly from the
standards creation committees of various governments throughout the
world. The ISO is active in developing cooperation in the realms of
scientific, technological, and economic activity.
2) International Telecommunications Union – Telecommunications
Standard (ITU-T): By the early 1970s, a number of countries were
defining national standards for telecommunications, but there was still
little international compatibility. The United Nations responded by
forming, as part of its International Telecommunication Union (ITU), a
committee, the Consultative Committee for International Telegraphy
and Telephony (CCITT). This committee was devoted to the research
and establishment of standards for telecommunications in general and
for phone and data systems in particular.
3) American National Standards Institute (ANSI): Despite its name, the
American National Standards Institute is a completely private, non-
profit corporation not affiliated with the U.S. federal government.
However, all ANSI activities are undertaken with the welfare of the
United States and its citizens occupying primary importance.
4) Institute of Electrical & Electronics Engineers (IEEE): The Institute of
Electrical and Electronics Engineers is the largest professional
engineering society in the world. International in scope, it aims to
advance theory, creativity, and product quality in the fields of electrical
37
engineering, electronics, and radio as well as in all related branches of
engineering. As one of its goals, the IEEE oversees the development and
adoption of international standards for computing and communications.
5) Electronic Industries Associates (EIA): Aligned with ANSI, the
Electronic Industries Association is a non-profit organization devoted
to the promotion of electronics manufacturing concerns
Example of Government Regulatory Agencies
1. The Nigerian Communications Commission (NCC): NCC is the
independent National Regulatory Authority for the telecommunications
industry in Nigeria. The Commission is responsible for creating an
enabling environment for competition among operators in the industry
as well as ensuring the provision of qualitative and efficient
telecommunications services throughout the country. Function of NCC
includes but not limited to the following: NCC Entrenches Standards,
Monitors Compliance, NCC’s Increased Collaboration on Equipment
Standardization, Deepening Wireless Connectivity in Era of Emerging
Technologies, and Focusing on Pervasive Digital Future.
2. National Information Technology Development Agency (NITDA)
3. Nigerian Communications Satellite Limited (NIGCOMSAT)
Example of Forums in Networking and IT
Internet forums: An Internet forum, or message board, is an online
discussion site where people can hold conversations in the form of posted
messages.
38
2.2. Protocol Types and Components
2.2.1. Protocol and Its Types
A network protocol is an established set of rules that determine how data is
transmitted between different devices in the same network. Essentially, it
allows connected devices to communicate with each other, regardless of any
differences in their internal processes, structure or design. A network
protocol can be viewed as a common network communication standard,
which is used to define a method of exchanging data over a computer
network. Network protocols define rules and conventions for
communication between different devices, participating in a computer
network, if computers (or computer like devices) want to communicate each
other, they must follow certain set of predefined communication rules.
A network protocol is that set of rules that should be followed by different
computers or computer-like devices when they participate in network
communication. Almost all protocols used in the Internet are common
standards defined by RFC (Request for Comments). Examples/types of
standard network protocols are:
39
TCP works with the Internet Protocol (IP), which defines how
computers send packets of data to each other. Together, TCP and IP
are the basic rules that define the internet. The Internet Engineering
Task Force (IETF) defines TCP in the Request for Comment (RFC)
standards document number 793. TCP is a connection-oriented
protocol, which means a connection is established and maintained
until the applications at each end have finished exchanging
messages.
UDP provides two services not provided by the IP layer. It provides port
numbers to help distinguish different user requests. It also provides an
optional checksum capability to verify that the data arrived intact.
User Datagram Protocol features
User Datagram Protocol has attributes that make it beneficial for use with
applications that can tolerate lost data. Below are some examples:
i. It allows packets to be dropped and received in a different order than
they were transmitted, making it suitable for real-time applications
where latency might be a concern.
ii. It can be used for transaction-based protocols, such as DNS or
Network Time Protocol (NTP).
iii. It can be used where a large number of clients are connected and
where real-time error correction isn't necessary, such as gaming, voice
or video conferencing, and streaming media.
45
as a host on the internet has at least one IP address that uniquely
identifies it from all other computers on the internet.
46
An IP packet is like a physical parcel or a letter with an envelope indicating
address information and the data contained within.
An IP packet's envelope is called the header. The packet header provides
the information needed to route the packet to its destination. An IP packet
header is up to 24 bytes long and includes the source IP address, the
destination IP address and information about the size of the whole packet.
The other key part of an IP packet is the data component, which can vary in
size. Data inside an IP packet is the content that is being transmitted.
IP address
IP provides mechanisms that enable different systems to connect to each
other to transfer data. Identifying each machine in an IP network is enabled
with an IP address.
Similar to the way a street address identifies the location of a home or
business, an IP address provides an address that identifies a specific system
so data can be sent to it or received from it.
An IP address is typically assigned via the DHCP (Dynamic Host
Configuration Protocol). DHCP can be run at an internet service provider,
which will assign a public IP address to a particular device. A public IP
address is one that is accessible via the public internet.
A local IP address can be generated via DHCP running on a local network
router, providing an address that can only be accessed by users on the same
local area network.
Differences between IPv4 and IPv6
47
The most widely used version of IP for most of the internet's existence has
been Internet Protocol Version 4 (IPv4).
IPv4 provides a 32-bit IP addressing system that has four sections. For
example, a sample IPv4 address might look like 192.168.0.1, which
coincidentally is also commonly the default IPv4 address for a consumer
router. IPv4 supports a total of 4,294,967,296 addresses.
A key benefit of IPv4 is its ease of deployment and its ubiquity, so it is the
default protocol. A drawback of IPv4 is the limited address space and a
problem commonly referred to as IPv4 address exhaustion. There aren't
enough IPv4 addresses available for all IP use cases. Since 2011, IANA
(Internet Assigned Numbers Authority) hasn't had any new IPv4 address
blocks to allocate. As such, Regional Internet Registries (RIRs) have had
limited ability to provide new public IPv4 addresses.
In contrast, IPv6 defines a 128-bit address space, which provides
substantially more space than IPv4, with 340 trillion IP addresses. An IPv6
address has eight sections. The text form of the IPv6 address is
xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx, where each x is a
hexadecimal digit, representing 4 bits.
The massive availability of address space is the primary benefit of IPv6 and
its most obvious impact. The challenges of IPv6, however, are that it is
complex due to its large address space and is often challenging for network
administrators to monitor and manage.
IP network protocols
48
IP is a connectionless protocol, which means that there is no continuing
connection between the end points that are communicating. Each packet
that travels through the internet is treated as an independent unit of data
without any relation to any other unit of data. The reason the packets are
reassembled in the right order is because of TCP, the connection-oriented
protocol that keeps track of the packet sequence in a message.
In the OSI model (Open Systems Interconnection), IP is in layer 3, the
networking layer.
At the core of what is commonly referred to as IP are additional transport
protocols that enable the actual communication between different hosts.
One of the core protocols that runs on top of IP is the Transmission Control
Protocol (TCP), which is often why IP is also referred to as TCP/IP.
However, TCP isn't the only protocol that is part of IP.
2.2.2. Components of Protocol
There are three key components of a protocol: Syntax, Semantics, and
Timing.
i. Syntax: It means the structure or format of the data. It is the
arrangement of data in a particular order.
ii. Semantics: It tells the meaning of each section of bits and indicates the
interpretation of each section. It also tells what action/decision is to be
taken based on the interpretation.
49
iii. Timing: It tells the sender about the readiness of the receiver to receive
the data. It tells the sender at what rate the data should be sent to the
receiver to avoid overwhelming the receiver.
2.3. Review Question
1. Define three key elements of protocol.
2. Justify the need for standards in computer networking.
3. Highlights five (5) International Standard Creation Committees
4. Give three examples of Nigeria Government Regulatory Agencies
directly or indirectly responsible for maintain standard in Computer
Networking and communication.
5. Explain briefly network protocol
6. Justify the statement “TCP is a connection-oriented protocol”?
Hence highlights five (5) major actions TCP performs.
7. Which layers of OSI model does TCP function.
8. Describe the role of TCP when a web server sends an HTML file to
a client.
9. Define two types of standards.
10. Describe the role of the following standards creation committee.
i. International Organization for Standardization (ISO).
ii. International Telecommunication Union
iii. American National Standards Institute (ANSI).
iv. Institute of Electrical and Electronics Engineers (IEEE).
50
C
HAPTER THREE
NETWORKING DEVICES
51
3.3. Gateway
Gateways normally work at the Transport and Session layers of the OSI
model. At the Transport layer and above, there are numerous protocols and
standards from different vendors; gateways are used to deal with them.
Gateways provide translation between networking technologies such as
Open System Interconnection (OSI) and Transmission Control
Protocol/Internet Protocol (TCP/IP). Because of this, gateways connect two
or more autonomous networks, each with its own routing algorithms,
protocols, topology, domain name service, and network administration
procedures and policies.
Gateways perform all of the functions of routers and more. In fact, a router
with added translation functionality is a gateway. The function that does the
translation between different network technologies is called a protocol
converter.
3.4. Network Interface Card
A network interface controller (NIC, also known as a network interface
card, network adapter, LAN adapter or physical network interface and by
similar terms) is a computer hardware component that connects a computer
to a computer network. Early network interface controllers were commonly
implemented on expansion cards that plugged into a computer bus.
The low cost and ubiquity of the Ethernet standard means that most newer
computers have a network interface built into the motherboard. NIC allows
both wired and wireless communications. NIC allows communications
52
between computers connected via local area network (LAN) as well as
communications over large-scale network through Internet Protocol (IP).
3.5. Repeaters
A repeater is an electronic device that amplifies the signal it receives. You
can think of repeater as a device which receives a signal and retransmits it
at a higher level or higher power so that the signal can cover longer
distances, more than 100 meters for standard LAN cables. Repeaters work
on the Physical layer.
3.6. Hubs
Hubs connect multiple computer networking devices together. A hub also
acts as a repeater in that it amplifies signals that deteriorate after traveling
long distances over connecting cables. A hub is the simplest in the family
of network connecting devices because it connects LAN components with
identical protocols.
A hub can be used with both digital and analog data, provided its settings
have been configured to prepare for the formatting of the incoming data.
For example, if the incoming data is in digital format, the hub must pass it
on as packets; however, if the incoming data is analog, then the hub passes
it on in signal form.
Hubs do not perform packet filtering or addressing functions; they just send
data packets to all connected devices. Hubs operate at the Physical layer of
the Open Systems Interconnection (OSI) model.
53
3.7. Bridges
Bridges are used to connect two or more hosts or network segments
together. The basic role of bridges in network architecture is storing and
forwarding frames between the different segments that the bridge connects.
They use hardware Media Access Control (MAC) addresses for transferring
frames. By looking at the MAC address of the devices connected to each
segment, bridges can forward the data or block it from crossing. Bridges
can also be used to connect two physical LANs into a larger logical LAN.
Bridges work only at the Physical and Data Link layers of the OSI model.
Bridges are used to divide larger networks into smaller sections by sitting
between two physical network segments and managing the flow of data
between the two.
Bridges are like hubs in many respects, including the fact that they connect
LAN components with identical protocols. However, bridges filter
incoming data packets, known as frames, for addresses before they are
forwarded. As it filters the data packets, the bridge makes no modifications
to the format or content of the incoming data. The bridge filters and
forwards frames on the network with the help of a dynamic bridge table.
The bridge table, which is initially empty, maintains the LAN addresses for
each computer in the LAN and the addresses of each bridge interface that
connects the LAN to other LANs. Bridges, like hubs, can be either simple
or multiple ports.
54
Bridges have mostly fallen out of favor in recent years and have been
replaced by switches, which offer more functionality. In fact, switches are
sometimes referred to as “multiport bridges” because of how they operate.
3.8. Switches
Switches generally have a more intelligent role than hubs. A switch is a
multiport device that improves network efficiency. The switch maintains
limited routing information about nodes in the internal network, and it
allows connections to systems like hubs or routers. Strands of LANs are
usually connected using switches. Generally, switches can read the
hardware addresses of incoming packets to transmit them to the appropriate
destination.
Using switches improves network efficiency over hubs or routers because
of the virtual circuit capability and it also improve network security.
A switch can work at either the Data Link layer or the Network layer of the
OSI model. A multilayer switch is one that can operate at both layers, which
means that it can operate as both a switch and a router. A multilayer switch
is a high-performance device that supports the same routing protocols as
routers.
Switches can be subject to distributed denial of service (DDoS) attacks;
flood guards are used to prevent malicious traffic from bringing the switch
to a halt. Switch port security is important so be sure to secure switches:
Disable all unused ports and use DHCP snooping, ARP inspection and
MAC address filtering.
55
3.9. Routers
Routers help transmit packets to their destinations by charting a path
through the sea of interconnected networking devices using different
network topologies. Routers are intelligent devices, and they store
information about the networks they’re connected to. Most routers can be
configured to operate as packet-filtering firewalls and use access control
lists (ACLs). Routers, in conjunction with a channel service unit/data
service unit (CSU/DSU), are also used to translate from LAN framing to
WAN framing. This is needed because LANs and WANs use different
network protocols. Such routers are known as border routers. They serve as
the outside connection of a LAN to a WAN, and they operate at the border
of your network.
Routers are also used to divide internal networks into two or more
subnetworks. Routers can also be connected internally to other routers,
creating zones that operate independently. Routers establish communication
by maintaining tables about destinations and local connections. A router
contains information about the systems connected to it and where to send
requests if the destination isn’t known. Routers usually communicate
routing and other information using one of three standard protocols:
Routing Information Protocol (RIP), Border Gateway Protocol (BGP) or
Open Shortest Path First (OSPF).
Routers are your first line of defense, and they must be configured to pass
only traffic that is authorized by network administrators. The routes
56
themselves can be configured as static or dynamic. If they are static, they
can only be configured manually and stay that way until changed. If they
are dynamic, they learn of other routers around them and use information
about those routers to build their routing tables.
Routers are general-purpose devices that interconnect two or more
heterogeneous networks. They are usually dedicated to special-purpose
computers, with separate input and output network interfaces for each
connected network. Because routers and gateways are the backbone of large
computer networks like the internet, they have special features that give
them the flexibility and the ability to cope with varying network addressing
schemes and frame sizes through segmentation of big packets into smaller
sizes that fit the new network components. Each router interface has its own
Address Resolution Protocol (ARP) module, its own LAN address (network
card address) and its own Internet Protocol (IP) address.
The router, with the help of a routing table, has knowledge of routes a packet
could take from its source to its destination. The routing table, like in the
bridge and switch, grows dynamically. Upon receipt of a packet, the router
removes the packet headers and trailers and analyzes the IP header by
determining the source and destination addresses and data type, and noting
the arrival time. It also updates the router table with new addresses not
already in the table. The IP header and arrival time information is entered
in the routing table. Routers normally work at the Network layer of the OSI
model.
57
3.10. Brouters
A bridge router or brouter is a network device that works as a bridge and as
a router. The brouter routes packets for known protocols and simply
forwards all other packets as a bridge would. Brouters operate at both the
network layer for routable protocols and at the data link layer for non-
routable protocols. As networks continue to become more complex, a mix
of routable and non-routable protocols has led to the need for the combined
features of bridges and routers.
Brouters handle both routable and non-routable features by acting as routers
for routable protocols and bridges for non-routable protocols. Bridged
protocols might propagate throughout the network, but techniques such as
filtering and learning might be used to reduce potential congestion. Brouters
are used as connecting devices in the networking system, so it acts as a
bridge in a network and as a router in an internet
3.11. Access Point
While an access point (AP) can technically involve either a wired or
wireless connection, it commonly means a wireless device. An AP works at
the second OSI layer, the Data Link layer, and it can operate either as a
bridge connecting a standard wired network to wireless devices or as a
router passing data transmissions from one access point to another.
Wireless access points (WAPs) consist of a transmitter and receiver
(transceiver) device used to create a wireless LAN (WLAN). Access points
58
typically are separate network devices with a built-in antenna, transmitter
and adapter.
APs use the wireless infrastructure network mode to provide a connection
point between WLANs and a wired Ethernet LAN. They also have several
ports, giving you a way to expand the network to support additional clients.
Depending on the size of the network, one or more APs might be required
to provide full coverage. Additional APs are used to allow access to more
wireless clients and to expand the range of the wireless network. Each AP
is limited by its transmission range the distance a client can be from an AP
and still obtain a usable signal and data process speed. The actual distance
depends on the wireless standard, the obstructions and environmental
conditions between the client and the AP. Higher end APs have high-
powered antennas, enabling them to extend how far the wireless signal can
travel.
APs might also provide many ports that can be used to increase the
network’s size, firewall capabilities and Dynamic Host Configuration
Protocol (DHCP) service. Therefore, we get APs that are a switch, DHCP
server, router and firewall.
To connect to a wireless AP, you need a service set identifier (SSID) name.
802.11 wireless networks use the SSID to identify all systems belonging to
the same network, and client stations must be configured with the SSID to
be authenticated to the AP. The AP might broadcast the SSID, allowing all
wireless clients in the area to see the AP’s SSID. However, for security
59
reasons, APs can be configured not to broadcast the SSID, which means that
an administrator needs to give client systems the SSID instead of allowing
it to be discovered automatically. Wireless devices ship with default SSIDs,
security settings, channels, passwords and usernames. For security reasons,
it is strongly recommended that you change these default settings as soon
as possible because many internet sites list the default settings used by
manufacturers.
Access points can be fat or thin. Fat APs, sometimes still referred to as
autonomous APs, need to be manually configured with network and
security settings; then they are essentially left alone to serve clients until
they can no longer function. Thin APs allow remote configuration using a
controller. Since thin clients do not need to be manually configured, they
can be easily reconfigured and monitored. Access points can also be
controller-based or stand-alone.
3.12. Review Questions
1) Explain briefly Computer Networking Devices
2) Highlights and gives function of any five Computer Networking
Devices
3) At what layer(s) does the following NETWORK DEVICEs function (a)
Modem (b) Gateway (c) Hub (d) Bridge (e) Switch
4) Describe how a hub can be used with both digital and analog data when
its settings have been configured to prepare for the formatting of the
incoming data.
60
5) Compare Hub and Switch
61
C
HAPTER FOUR
NETWORK TOPOLOGY
Terminator
Terminator
Backbone
66
4.3. Ring Topology
4.3.1. What is Ring Topology?
In ring topology each device is connected with the two devices on either
side of it. There are two dedicated point to point links a device has with the
devices on the either side of it. This structure forms a ring thus it is known
as ring topology. If a device wants to send data to another device then it
sends the data in one direction, each device in ring topology has a repeater,
if the received data is intended for other device then repeater forwards this
data until the intended device receives it.
There are two types of the Ring Topology based on the data flow:
Unidirectional and Bidirectional. A Unidirectional ring topology handles
data traffic in either clockwise or anticlockwise direction. This data
network, thus, can also be called as a half-duplex network. A Unidirectional
ring topology is thus easy to maintain compared to the bidirectional ring
topology.
A ring topology connects one host to the next and the last host to the first.
The signal travels around the loop in one direction and pass through each
computer. Unlike the passive bus topology, each computer acts like a
repeater to boost the signal and send it on to the next computer. Because the
signal passes through each computer, the failure of one computer can impact
the entire network.
67
Figure 10: Ring Topology
4.3.2. Advantages of Ring Topology
i. This type of network topology is very organized. Each node gets to
send the data when it receives an empty token. This helps to reduces
chances of collision. Also in ring topology all the traffic flows in
only one direction at very high speed.
ii. Even when the load on the network increases, its performance is
better than that of Bus topology.
iii. There is no need for network server to control the connectivity
between workstations.
iv. Additional components do not affect the performance of network.
v. Each computer has equal access to resources.
4.3.3. Disadvantages of Ring Topology
i. A link failure can fail the entire network as the signal will not travel
forward due to failure.
68
ii. Data traffic issues, since all the data is circulating in a ring.
iii. Each packet of data must pass through all the computers between
source and destination. This makes it slower than Star topology.
iv. If one workstation or port goes down, the entire network gets affected.
v. Network is highly dependent on the wire which connects different
components.
vi. MAU’s and network cards are expensive as compared to Ethernet
cards and hubs.
4.4. Star Topology
4.4.1. What is Star Topology
In star topology each device in the network is connected to a central device
called hub. Unlike Mesh topology, star topology doesn’t allow direct
communication between devices; a device must have to communicate
through hub. If one device wants to send data to other device, it has to first
send the data to hub and then the hub transmit that data to the designated
device. In the star topology, computers are connected by cable segments to
centralized component, called a hub or switch. Signals are transmitted from
the sending computer through the hub or switch to all computers on the
network.
This topology originated in the early days of computing with computers
connected to a centralized mainframe computer. It is now a common
topology in microcomputer networking. Each device has a dedicated point-
to-point link only to a central controller, usually called a hub. The devices
69
are not directly linked to one another. Unlike a mesh topology, a star
topology does not allow direct traffic between devices. The controller acts
as an exchange: If one device wants to send data to another, it sends the data
to the controller, which then relays the data to the other connected device.
The star network offers centralized resources and management. However,
because each computer is connected to a central point, this topology
requires a great deal of cable in a large network installation. Also, if the
central point fails, the entire network goes down.
72
ii. Data can be transmitted from different devices simultaneously. This
topology can withstand high traffic.
iii. Even if one of the components fails there is always an alternative
present. So data transfer doesn’t get affected.
iv. Expansion and modification in topology can be done without
disrupting other nodes.
4.5.3. Disadvantages of Mesh topology
i. Amount of wires required to connected each system is tedious and
headache.
ii. Since each device needs to be connected with other devices, number
of I/O ports required must be huge.
iii. Scalability issues because a device cannot be connected with large
number of devices with a dedicated point to point link.
iv. There are high chances of redundancy in many of the network
connections.
v. Overall cost of this network is way too high as compared to other
network topologies.
vi. Set-up and maintenance of this topology is very difficult. Even
administration of the network is tough.
73
4.6. Hybrid Topology
4.6.1. What is Hybrid Topology
Before starting about Hybrid topology, we saw that a network topology is a
connection of various links and nodes, communicating with each other for
transfer of data.
We also identified various advantages and disadvantages
of Star, Bus, Ring, and Mesh. Hybrid, as the name suggests, is mixture of
two different things. Similarly in this type of topology we integrate two or
more different topologies to form a resultant topology which has good
points (as well as weaknesses) of all the constituent basic topologies rather
than having characteristics of one specific topology.
This combination of topologies is done according to the requirements of the
organization. For example, if there is an existing ring topology in one office
department while a bus topology in another department, connecting these
two will result in Hybrid topology. Remember connecting two similar
topologies cannot be termed as Hybrid topology. Star-Ring and Star-Bus
networks are most common examples of hybrid network. (See figure 13).
74
Backbone
76
3) Apart from number of computer on network, identify any five
factors that may contribute to network go-slow.
4) Compare security in Bus, Ring, and Star Network Topologies.
5) Why is Ring network topology is been refer to as very organized
6) For n devices in a network, what is the number of cable links
required for a mesh, ring, bus, and star topology?
7) What are some of the factors that determine whether a
communication system is a LAN or WAN?
8) Assuming you get a job as a network engineer in a multinational
company that has five (5) regional station that must be
interconnected with others for smooth operation of the organization.
The company is about to network the regional offices together. Each
physical link must allow communication in both directions. Use the
knowledge acquired in this course to advice the management of the
company based on the following:
a) Recommend the most suitable Network topology for the
organization.
b) Give detail explanation of the recommended Topology.
c) Illustrate the explanation in (b) with a diagram to show the
interconnectivity of the five (5) regional offices.
d) Explain four (4) major advantages of the topology named in (a)
over other network topology.
77
C
HAPTER FIVE
NETWORK & DATA COMMUNICATION LAB
78
the bandwidth, the cable can support for data transfer. CAT6 cables are
designed for operating frequencies up to 250 MHz, compared to 100 Mhz
for CAT5e. This means that a CAT6 cable can process more data at the
same time.
80
Step 2: Unwind and pair the similar colors. Pinch the wires between your
fingers and straighten them out in a sequence of color as u want to make
cable (Straight cable or cross over cable). The color order is important to
get correct.
Step 3: A straight cut across the 8 wires to shorten them to 1/2 Inch (1.3
cm) from the cut sleeve to the end of the wires by crimping tool. Carefully
push all 8 unstrapped colored wires into the connector. Plastic sleeve should
be inserted proper in connector.
Step 4: Crimping the cable: Carefully place the connector into the Ethernet
Crimper and cinch down on the handles tightly. The copper splicing tabs on
the connector will pierce into each of the eight wires. There is also a locking
tab that holds the plastic sleeve in place for a tight compression fit. When
you remove the cable from the crimper, that end is ready to use.
81
Step 5: Test the cable: Check the continuity of both connectors each other.
Check the cable threw a cable tester or ping from a computer. To check the
cable through computer connects both connector in two computers for cross
cable and straight cable connect through a switch then ping the computer.
5.1.2.3. Testing Network Cable
There are three primary types of network cable issues.
i. Performance issue
ii. Continuity issue
iii. Connectivity issue
The issues i-iii, can be identify using any of the following methods.
a) Using Switches or a switch with computer: we can confirm
whether a network cable is good or not by plugging the cable into
two working switches or a switch and a nearby autonomous
computer network port. The LINK light at the computer and the link
light at the switch will light up otherwise there is problem with the
cable.
b) Using Ethernet Cable Tester: Ethernet cable tester is invaluable at
identifying and highlighting issues related to network cable. When
sizing Ethernet cables remember that an end to end connection
should not extend more than 100m (~328ft). Try to minimize the
Ethernet cable length, the longer the cable becomes, the more it may
affect performance. This is usually noticeable as a gradual decrease
in speed and increase in latency.
82
5.1.3. Punch Down Tools
5.1.3.1. Description Punch down Tool
A punch down tool, also called a krone tool, is a hand tool used to connect
telecommunications and network wires to a patch panel, punch down block,
keystone module, or surface mount box. The "punch down" part of the name
comes from punching a wire into place using an impact action. Punch down
tool is commonly used for the termination works in the copper network. It
is used to terminate the Ethernet cables (Cat5/5e/6/6a) by inserting the
cables wires into the insulation-displacement connectors (IDC) on the
punch down blocks, patch panels, keystone modules, and surface mount of
boxes.
Network performance and reliability are the foundation of a robust and
sound communication system. Therefore, to ensure a successful connection
between the computers and the data center, network technicians need the
right assistance tools, punch down tool among which, is extremely essential
for the smooth networks running.
5.1.3.2. RJ-45 Jack Punch Down
Objective
i. Learn the correct process for terminating or punching down an RJ-
45 jack
ii. Learn the correct procedure for installing the jack in a wall plate
Equipment Required
83
In this lab, the student will learn to wire an RJ-45 data jack for installation
in a wall plate using a punch-down tool. These skills are useful when it is
necessary to install a small amount of cabling in an office or residence. A
punch tool is a device that uses spring-loaded action to push wires between
metal pins, while at the same time skinning the sheath away from the wire.
This ensures that the wire makes a good electrical connection with the pins
inside the jack. The punch tool also cuts off any extra wire.
Category 5 or Category 5e cabling and Category 5 or 5e rated T568B jacks
will be used. A Category 5/5e straight-through patch cable with an RJ-45
connector will normally plug into this data jack or outlet to connect a PC in
a work area to the network. It is important to use Category 5 or 5e rated
jacks and patch panels with Category 5 or 5e cabling in order to support
Fast Ethernet (100 Mbps) and Gigabit Ethernet (1000 Mbps). The process
of punching down wires into a data jack in an office area is the same as
punching them down in a patch panel in a wiring closet. The following
resources are required:
1) 60 - 90 cm (2 - 3 feet) length of Category 5/5e cabling, which can be
one per person or one per team
2) Two Category 5/5e RJ-45 data jacks (one extra for spare) – If RJ-45
data jacks are installed on both ends of the cable, the installation can
be tested by inserting cable with RJ-45 connectors and a simple cable
continuity tester.
3) Category 5/5e wall plate
84
4) 110 type punch-down tool
5) Wire cutters
Procedure
Use the following procedure and diagram to punch down the wires into the
RJ-45 jack and install the jack into the wall plate:
Step 1
Remove the jacket 2.54 cm (1 inch) from the end of the cable.
Step 2
Position wires in the proper channels on the jack maintaining the twists as
closely as possible. The diagram below shows an example of how to place
the wires on one type of jack. Most jacks will have the channels color-coded
to indicate where the wires go. The photo of the jack on the next page shows
one variety of jack. Jacks are typically stamped to indicate whether they are
T568A or B as shown in the photo.
Step 3
Use the 110 punch-down tool shown below to push conductors into the
channels. Make sure to position the cut side of the punch-down tool so that
it faces the outside of the jack. If this is not done, it will cut the wire being
punched down. Try tilting the handle of the punch tool a little to the outside,
so it will cut better. If any wire remains attached after using the punch tool,
simply twist the ends gently to remove them. Then place the clips on the
jack, and tighten them. Make sure that no more than 1.27 cm (one half inch)
85
of untwisted wire is between the end of the cable jacket and the channels on
the jack.
Step 4
Snap the jack into its faceplate by pushing it in from the back side. Make
sure when this is done, that the jack is right-side up so the clip faces down
when the wall plate is mounted.
Step 5
Use the screws to attach the faceplate to either the box or to the bracket. If
there is a surface mounted box, keep in mind that it might hold 30 - 60 cm
(1 - 2 feet) of excess cable. Then it will be necessary to either slide the cable
through its tie-wraps or pull back the raceway that covers it in order to push
the rest of the excess cable back into the wall. If there is a flush-mounted
jack, all that is needed is to push the excess cable back into the wall.
Hold the jack with the 8-pin jack receptacle, which is the part that the RJ-
45 connector goes into, facing up or away from the body while looking at
the wire channels or slots. There should be four wire channels on each side.
Match the wiring colors to the codes on the jack.
5.2. Building a Peer-to-Peer Network
Objective
Create a simple peer-to-peer network between two PCs as shown in figure
15.
i. Identify the proper cable to connect the two PCs
ii. Configure workstation IP address information
86
iii. Test connectivity using the ping command
Network Cable
COMPUTER A COMPUTER B
Figure 16. Peer-to-Peer Network
Equipment Required
The following resources will be required
• Two workstations with an Ethernet 10/100 NIC installed
• Several Ethernet cables, which are both straight-through and crossover, to
choose from for connecting the two workstations.
Procedure
This lab focuses on the ability to connect two PCs to create a simple peer-
to-peer Ethernet LAN between two workstations. The workstations will be
directly connected to each other without using a hub or switch. In addition
to the Layer 1 physical and Layer 2 data link connections, the computers
must also be configured with the correct IP network settings, which is Layer
3, so that they can communicate. A basic Category 5/5e UTP crossover
cable is all that is needed. A crossover cable is the same type that would be
used as backbone or vertical cabling to connect switches together.
Connecting the PCs in this manner can be very useful for transferring files
at high speed and for troubleshooting interconnecting devices between PCs.
If the two PCs can be connected with a single cable and are able to
87
communicate, then any networking problems are not with the PCs
themselves. Start this lab with the equipment turned off and with cabling
disconnected. Work in teams of two with one person per PC.
Step 1 Identify the proper Ethernet cable and connect the two PCs
The connection between the two PCs will be accomplished using a Category
5 or 5e crossover cable. Locate a cable that is long enough to reach from
one PC to the other.
Quiz
i. What kind of cable is required to connect from NIC to NIC?
ii. What is the category rating of the cable?
iii. What is the AWG wire size designation of the cable?
Step 2 Verify the physical connection
Plug in and turn on the computers. To verify the computer connections,
insure that the link lights on both NICs are lit.
Quiz: Are both link lights lit?
Step 3 Access the IP settings window
Note: Be sure to write down the existing IP settings, so that they can be
restored at the end of the lab. These include IP address, subnet mask, default
gateway, and DNS servers. If the workstation is a DHCP client, it is not
necessary to record this information.
88
i. Click on Start > Settings > Control Panel and then click the
Network Connection icon.
ii. Select the Local Area Network Connection and click on Change
settings of this connection.
iii. Select the TCP/IP protocol icon that is associated with the NIC in
this PC.
iv. Click on Properties and click on Use the following IP address.
Step 4 Access the Command or MS-DOS prompt
Step 5 Configure TCP/IP settings for the two PCs
i. Set the IP address information for each PC according to the
information in the table.
89
ii. IP address is not required because the two computers are directly
connected. The default gateway is only required on local area
networks that are connected to a router.
PC IP SUBNET DEFAULT
ADDRESS NASK GATEWAY
A 192.168.1.1 255.255.255.0 N/A
B 192.168.1.1 255.255.255.0 N/A
Step 6 Verify that the PCs can communicate
Test connectivity from one PC to the other by pinging the IP address of the
opposite computer. Use the following command at the command prompt.
C:>ping 192.168.1.1 (or 192.168.1.2)
Look for results similar to screen print in fig 16. If not, check the PC
connections and TCP/IP settings for both PCs. What was the ping result?
90
Figure 17. Ping result for 2 PCs on peer-to-peer network
Step 7 Confirm the TCP/IP network settings
i. Type the winipcfg command from the MS-DOS Prompt. Record the
results.
ii. Type the ipconfig command from the Command Prompt. Record the
results
Step 8 Restore the PCs to their original IP settings, disconnect the
equipment, and store the cables
5.2.1. Direct Connection of 2-Computers to share internet
Step 1: Connect two Computers using an ethernet cable.
Step 2: Click on Start->Control Panel->Network and Internet->Network
and Sharing Center.
91
Step 3: Click on option Change Adapter Setting in the upper-left side of the
window.
Step 4: Select both the Wi-Fi connection and the Ethernet connection and
Right-click the Wi-Fi connections.
Step 5: Click on Bridge Connections. After some time your computer’s Wi-
Fi will be shared with the other computer.
92
5.2.2.Share files from Windows to Windows
Follow these steps to connect two computers having a Windows Operating
system to share the files between them:
Step 1: Connect two Computers using an ethernet cable.
Step 2: Click on Start->Control Panel->Network and Internet->Network
and Sharing Center.
Step 3: Click on option Change Advanced Sharing Settings in the upper-
left side of the window.
93
Step 4: Turn on file sharing. Check the Turn on file and printer sharing.
95
Step 8: Copy the shared folder onto your second computer.
5.2.3. Sharing Internet from Mac
Following steps to connect two MAC to share the internet
Step 1: Connect two Computers using an ethernet cable.
Step 2: Click on Apple Menu->System Preferences->Sharing->Internet
Sharing box.
96
Step 3: Click the Share your connection from the drop-down box. It’s in the
middle of the window. A drop-down menu will appear.
97
5.2.4. Sharing Files from One MAC system to Another MAC
System
Follow these steps to connect two MAC to share files.
Step 1: Connect two Computers using an ethernet cable.
Step 2: Click on Go->Connect to Server->Browse.
Step 3: Double Click on the Second MAC’s name.
Step 4: A dialogue box will appear. Enter the second computer’s password
to connect to the second computer.
Step 5: Click Connect. It’s in the lower-right side of the pop-up window.
98
Step 6: Open Finder.
Step 7: Move files onto the other MAC. Find a file that you want to move
onto the second MAC, copy it by clicking it and pressing Command+C,
click the other MAC’s name in the lower-left side of the Finder window,
open your preferred folder, and press Command+V.
5.2.5. Sharing Files from Mac to Windows
Follow these steps to connect MAC to Windows to share files.
Step 1: Connect two Computers using an ethernet cable.
Step 2: Enable file sharing on windows computer. Click on Start->Control
Panel->Network and Internet->Network and Sharing Center. Click
99
Advanced Share Settings and Check the Turn on file and printer sharing
box.
Step 3: Share a folder. Click on Start-> Select the folder to share->Click on
Share tab->Click Specific people->Select Everyone->Click Share and then
Done.
Step 4: Enable file sharing on the MAC computer. Click on Apple Menu-
>System Prefrences->Sharing->File Sharing box->Change the Everyone
permissions from Read Only to Read and Write.
100
Step 5: Share a folder from your MAC. Click the icon below the list of
shared folders, then double-click the folder that you want to share.
Step 6: Access MAC’s files from the Windows computer.Click on Start-
>File Explorer->MAC name on left below Network. Open shared folder-
>Select files->Press Ctrl+C->Go to the folder on your computer then press
Ctrl+V.
Step 7: Access the Windows computer’s files from the MAC. Open Finder-
>Click your Windows computer’s name in the lower-left side of the window.
Open shared folder->Select files then press Command+C->Go to the folder
on your MAC then press Command+V.
5.3. Building Home Network
5.3.1. Wired or Wireless Home Network
Wired networks use Ethernet over UTP cable and tend to be faster than
wireless networks, which is an important consideration if you are a gamer.
The simple wired home network diagram below shows a minimum setup
with a switch and broadband router.
101
Figure 18. Simple Wired Home Network diagram
Wired Network Advantages
Fast typically 100 Mbps to 10Gbps
Secure and reliable.
Wired Network Dis-Advantages
Doesn’t work with devices that don’t have an Ethernet port e.g.
tablets and smart phones.
Not so easy and fast to setup as it requires running cables.
However Homeplug or powerline adapters can be used instead.
Not so easy for visitors and mobile devices (laptops) to connect
to.
Home Wireless Networks
Wireless networks use Wi-Fi. and are quick and easy to install, but are
generally slower than wired networks. See Wi-Fi and Wireless networks for
more details.
Wireless Network Advantages
Easy to setup from an end user perspective.
Allows easy access to smart phones, Tablets and mobile devices.
102
No cables to run.
Wireless Network Dis-Advantages
Not as Secure as wired networks without proper configuration,
and easy to setup insecurely.
Not as fast as wired networks.
Not as reliable as wired networks.
5.3.2. Setting up a Home Network
Today however most home and small home office networks will use a
wireless network or mixed network, as most people use Smart phones, and
tablets which don’t have Ethernet support.
The main components required to build a typical home/small office network
are:
1. Router or Wireless router – Connects the network to the Internet.
2. Wireless Access Point – Used to Connect Wi-Fi equipped devices
to the network.
3. Ethernet HUB or Switch -Used to Connect Ethernet equipped
devices.
4. Cable cat 5, cat5e or cat 6 with RJ45 connectors.
5. Telephone Cable with RJ 10 connectors.
6. Broadband Filters.
5.4. Configuring IP Address
IP address must be configured on computer in order to communicate with
other computers, because this IP address. is the standard address understood
103
by computers and other networking devices in networking world. We can
configure IP address, subnet mask, gateway and DNS servers manually on
computer, we can also configure computer to obtain IP address and other
network information from DHCP server (most of the time is configured on
router).
5.5. Physical Network Set-up
We will use D-Link's DI-604 broadband router as an example see figure 80.
We can use other type of router according to your needs. Make available
some straight network cable as well. Connect the WAN port on router to
your cable/DSL modem using straight cable, then connect computers‟
network card to router’s LAN ports using straight cable also. You can
connect up to 4 computers to this router. Power on the router after finish
connecting, you should be able to see the WAN and LAN lights on the
router. Also you need to ensure that your DSL/Cable modem is configured
in bridge mode, so that it can work well after connecting to router. Here is
how to configure DSL/Cable modem in bridge mode.
This is very common setup after you have subscribed new DSL broadband
service, you just need to configure the modem as a bridge, and after that
configure PPPoE dialer in microsoft Windows by providing
username/password or other network information for accessing Internet.
If you plan to connect the modem to router and set up a home network, you
must set bridge mode on modem too.
Procedure
104
i. Connect DSL modem’s LAN port to computer’s network card by
using straight through network cable.
ii. Read the modem manual, find out the default modem IP address, after
that you need to set computer with the IP address in same network
with modem, so you can access and configure it. As an example, if the
modem IP is 192.168.1.1, I set computer IP as 192.168.1.10 (you can
set 192.168.1.X, X= number between 2 and 254), netmask as
255.255.255.0 and gateway as 192.168.1.1.
iii. Open a web browser and key in http://DSL-modem-default-
IP(example: http://192.168.1.1) into the address bar, after that hit
Enter key.
iv. The modem logon screen will appear, type in default username and
password you found in modem manual. You will then log on to the
modem management page.
v. Go to the correct configuration page by referring to modem manual,
and then set the operation mode to Bridge mode. Here is an example:
vi. The other important info for modem to work well is Virtual Path
Identifier (VPI) and Virtual Circuit Identifier (VCI), you need to set
these numbers correctly. If you get the modem from ISP, most likely
it’s been pre-configured correctly.
vii. Ok, at this stage you have done the modem configuration, you can
then proceed to configure PPPoE dialer on connected computer. If you
need help, here is PPPoE dialer setup in Windows 7, Vista and XP. If
105
this modem is connected to router (wireless or wired), you can then
proceed to configure that wireless router or Ethernet wired route.
108
11. Why is it important to configure modem in bridge mode when
setting up network? Hence describe the procedure to configure
modem in bridge mode.
12. Why is it advisable to minimize the Ethernet cable length for
computer network?
13. Identify three primary types of network cable issues
109
C
HAPTER SIX
NETWORK TROUBLESHOOTING
113
Figure 20: A typical home wired network
i. First thing you need to do is to make sure there is light on network
card with cable connected. Sometimes network down is due to
disconnected network cable or loose cable connection. If you notice
no light on your network card after connecting with network cable,
make sure the network cable is working and router that connected
by this computer is up and active. If you see the light, then proceed
to step 2.
Note: You need to make sure the network cable is connected to
router's LAN port
ii. Go to Start and click on Run. Run window will appear. Type in cmd
on Run window and click OK.
iii. Key in ping 127.0.0.1 in Command Prompt window. This is network
card loopback address. If you receive Reply from 127.0.0.1, it
114
works. If you receive Request timed out, it means network card
doesn’t work properly. Unplug and re-seat the network card,
connect with network cable then ping loopback address again. If still
fails, check the network card driver status in Windows 7, Vista or
XP to troubleshoot network card and make sure the card works well.
If still fails, most probably the network card cannot be used
anymore. Try again by using other network cards. However if you
just cannot install network card driver correctly on this computer but
it works on other computer, then maybe there is problem on
Microsoft Windows OS or its TCP/IP function.
iv. Ok, now you can proceed to ping your computer IP address. If you
are not sure about computer IP, use ipconfig to find out. If you fail
to ping this IP or no IP is configured on computer, check network
configuration such as IP address (assigned manually or
115
automatically?), subnet mask, gateway on network card to make
sure it's configured correctly.
v. If you able to ping loopback address and your computer IP, proceed
to ping router LAN IP address. If you receive Request timed out,
make sure router is up and configured properly with correct IP,
subnet mask, DHCP and other network settings.
Note: Ensure that your DSL/Cable modem is configured in bridge
mode (not routing mode), so that it can work well after connecting
to router. Even if router is up and it's configured properly, you need
to check and ensure the computer is connected to correct and
working router LAN port too, sometimes it might be connected to
faulty port or incorrect port (such as uplink port). If you have
enabled firewall on router, make sure firewall is configured
correctly without dropping legitimate network packets.
vi. If you can ping the router IP, then you should be able to ping the
other computers or notebook in your network. If you still fail to ping
the router IP or other computers, then you can take a look on this
wired home network setup tutorial in order to get more helps.
vii. If you have successfully done above steps and all are working
properly, but you still fail to connect to Internet, then check your
DSL, cable or wireless modem and router to make sure all cables are
connected correctly. Reboot your DSL, cable or wireless modem
and router and try internet access after that.
116
viii. If still no Internet connection after that, connect computer to modem
directly with network cable and test Internet connection. If this
works, then I think the problem is on wired router configuration. If
this fails too, contact your ISP for getting more helps to troubleshoot
this network problem. This might due to some problems at your ISP
side sometimes or the modem is broken.
118
If you enter invalid domain name, the Non-existent domain message will be
shown.
If you receive DNS request timed out messages which are shown as below,
that means the domain name is failed to be resolved at the time being. The
DNS server might be down or not valid, in this case you should try to
119
resolve the domain name by configuring other DNS servers on your
computer. If you are not sure which DNS servers to configure, feel free to
use these free DNS servers from OpenDNS or Google to resolve domain
names.
If you wish to check address translation by other DNS servers, such as your
secondary DNS server, just enter this command server new-DNS-server-IP.
I changed to DNS server 216.28.158.11.
120
1. What are Steps towards Networking Troubleshooting
2. Describe Troubleshooting with Ping Commands
3. Describe the procedure for Troubleshoot Network Problem With “ping”
Command.
4. On which condition can we require the use of nslookup command in
network problem troubleshooting?
121
C
HAPTER SEVEN
COMPUTER NETWORK SECURITY
123
again, perhaps not even noticing that the attacker is still logged in and
doing things.
7.2.2.2. Denial-of-Service (DoS)
The premise of a DoS attack is simple: send more requests to the machine
than it can handle. There are toolkits available in the underground
community that make this a simple matter of running a program and telling
it which host to blast with requests. The attacker's program simply makes a
connection on some service port, perhaps forging the packet's header
information that says where the packet came from, and then dropping the
connection. Some things that can be done to reduce the risk of being stung
by a denial of service attack include
i. Not running your visible-to-the-world servers at a level too close to
capacity
ii. Using packet filtering to prevent obviously forged packets from
entering into your network address space.
iii. Keeping up-to-date on security-related patches for your hosts'
operating systems.
7.2.2.3. Unauthorized Access
Unauthorized access is a very high-level term that can refer to a number of
different sorts of attacks. The goal of these attacks is to access some
resource that your machine should not provide the attacker. For example, a
host might be a web server, and should provide anyone with requested web
pages. However, that host should not provide command shell access without
124
being sure that the person making such a request is someone who should
get it, such as a local administrator.
7.2.2.4. Executing Commands Illicitly
It's obviously undesirable for an unknown and untrusted person to be able
to execute commands on your server machines. There are two main
classifications of the severity of this problem.
i. Normal user access
ii. Administrator access
A normal user can do a number of things on a system (such as read files,
mail them to other people, etc.) that an attacker should not be able to do.
This might, then, be all the access that an attacker needs. On the other hand,
an attacker might wish to make configuration changes to a host (perhaps
changing its IP address, putting a start-up script in place to cause the
machine to shut down every time it's started, or something similar). In this
case, the attacker will need to gain administrator privileges on the host.
7.2.2.5. Destructive Behavior
Among the destructive sorts of break-ins and attacks, there are two major
categories.
i. Data Diddling: The data diddler is likely the worst sort, since the
fact of a break-in might not be immediately obvious. Perhaps he's
toying with the numbers in your spreadsheets, or changing the dates
in your projections and plans. Maybe he's changing the account
numbers for the auto-deposit of certain paychecks.
125
ii. Data Destruction: Some of those perpetrate attacks are simply
twisted jerks who like to delete things. In these cases, the impact on
your computing capability and consequently your business can be
nothing less than if a fire or other disaster caused your computing
equipment to be completely destroyed.
126
v. Decryption algorithm: This is essentially the encryption algorithm
run in reverse. It takes the cipher text and the secret key and
produces the original plaintext.
There are several ways of classifying cryptographic algorithms, in this book
algorithm will be categorized based on the number of keys that are
employed for encryption and decryption, and further defined by their
application and use.
i. Secret Key Cryptography (SKC): Uses a single key for both
encryption and decryption.
ii. Public Key Cryptography (PKC): Uses one key for encryption and
another for decryption.
iii. Hash Functions: Uses a mathematical transformation to irreversibly
"encrypt" information
So, why are there so many different types of cryptographic schemes? Why
can't we do everything we need with just one? The answer is that each
scheme is optimized for some specific application(s).
i. Hash functions, for example, are well-suited for ensuring data
integrity because any change made to the contents of a message will
result in the receiver calculating a different hash value than the one
placed in the transmission by the sender. Since it is highly unlikely
that two different messages will yield the same hash value, data
integrity is ensured to a high degree of confidence.
127
ii. Secret key cryptography, on the other hand, is ideally suited to
encrypting messages, thus providing privacy and confidentiality.
The sender can generate a session key on a per-message basis to
encrypt the message; the receiver, of course, needs the same session
key to decrypt the message.
iii. Public-key cryptography asymmetric schemes can also be used for
non-repudiation and user authentication; if the receiver can obtain
the session key encrypted with the sender's private key, then only
this sender could have sent the message.
7.3.2. Firewall
A firewall is simply a group of components that collectively form a barrier
between two networks. A firewall is a hardware or software system that
prevents unauthorized access to or from a network. They can be
implemented in both hardware and software, or a combination of both.
Firewalls are frequently used to prevent unauthorized Internet users from
accessing private networks connected to the Internet. All data entering or
leaving the Intranet pass through the firewall, which examines each packet
and blocks those that do not meet the specified security criteria.
7.3.2.1. Types of Firewall
Firewalls can be divided into five basic types: Stateful Inspection, Proxys,
Packet filters, Dynamic, Kernel firewall. The divisions however are not
quite well defined as most modern firewalls have a mix of abilities that place
them in more than one of the categories listed. To simplify the most
128
commonly used firewalls, expert breaks them down into three categories:
Application firewalls, Network layer firewalls, and Proxy firewall.
7.3.2.1.1. Network Layer Firewalls
Network layer firewalls generally make their decisions based on the source
address, destination address and ports in individual IP packets. A simple
router is the traditional network layer firewall, since it is not able to make
particularly complicated decisions about what a packet is actually talking to
or where it actually came from. Modern network layer firewalls have
become increasingly more sophisticated, and now maintain internal
information about the state of connections passing through them at any time.
7.3.2.1.2. Application Layer Firewalls
Application layer firewalls defined, are hosts running proxy servers, which
permit no traffic directly between networks, and they perform elaborate
logging and examination of traffic passing through them. Since proxy
applications are simply software running on the firewall, it is a good place
to do lots of logging and access control.
Application layer firewalls can be used as network address translators, since
traffic goes in one side and out the other, after having passed through an
application that effectively masks the origin of the initiating connection.
7.3.2.1.3. Proxy Firewalls
Proxy firewalls offer more security than other types of firewalls, but this is
at the expense of speed and functionality, as they can limit which
applications your network can support. Why are they more secure? Unlike
129
other firewalls, which allow or block network packets from passing to and
from a protected network, traffic does not flow through a proxy. Instead,
computers establish a connection to the proxy, which serves as an
intermediary, and initiate a new network connection on behalf of the
request.
7.4. Review Questions
1. Describe briefly any 5 network security threats you know
2. What are the precautions to reduce the risk of being stung by a denial
of service in computer Network?
3. Describe briefly the term cryptograph
4. Describe briefly firewall and it 3 major types
5. What are the major security requirements in network environment?
6. What are the basic rules use to generate public and private keys in RSA
algorithm.
7. For RSA algorithm we have p = 5, q=11, n = 55 and (p-q) (q-1) = 40.
Find the public and private key, resulting ciphertext and verify the
decryption.
8. Describe with diagram the use of hybrid cryptograph algorithm that
combines secret, public, and harsh function for Mr. A to send
information to B.
9. Compare the strength of secret, public, and harsh function cryptograph
algorithm.
130
C
HAPTER EIGHT
DATA COMMUNICATION SYSTEM
133
sweep rates. The pixels are organized into many rows and columns on the
screen.
8.3. Data Flow or Transmission Modes
8.3.1. Description of Data flow or Transmission modes
This describes the way in which data moves from one point to another in a
data communication system. There are two basic movement directions; it is
either from source system to destination system or both. These could be
simple or duplex. Duplex can further be divided into either half duplex or
full duplex. General data moves from sender to receiver, but in a special
situation data can also move from receiver to the sender, for example there
may be needs for acknowledge from the receiver that data has been received
in other for it to prepare to send another data. In data communication we
call that handshaking. The types of data communication we have are as
follows.
8.3.2. Types of Transmission modes
8.3.2.1. Simplex Data Flow
In simplex mode, the communication is unidirectional, as on a one-way
street. Only one of the two devices on a link can transmit; the other can only
receive. Keyboards and traditional monitors are examples of simplex
devices. The keyboard can only introduce input; the monitor can only accept
output. The simplex mode can use the entire capacity of the channel to send
data in one direction. Examples are Radio and Television broadcasts. They
go from the TV station to your home television.
134
Figure 22. Simplex Transmission Mode
8.3.2.2.Half Duplex Data Flow
In half-duplex mode, each station can both transmit and receive, but not at
the same time. When one device is sending, the other can only receive, and
vice versa.
The half-duplex mode is like a one-lane road with traffic allowed in both
directions. When cars are traveling in one direction, cars going the other
way must wait. In a half-duplex transmission, the entire capacity of a
channel is taken over by whichever of the two devices is transmitting at the
time.
136
- Data communication can be seen as the movement of encoded
information from one point to another by means of electronic
transmission system.
- It can also be defined as the exchange of data between two devices
via some form of transmission medium which can be wired or
wireless.
- In digital world, data communications simply mean the transferring
of digital information (usually in binary form) between two or more
points (terminals). In this case at both the source and destination,
data are in digital form. However, during transmission data can be
in digital or analog form.
8.4.2. Purpose of Data Communication
The fundamental purpose of data communication is to exchange
information which is done by adhering to certain rules and regulations
called protocols and standards. However communications between devices
are justified for the following reasons:
i. Reduces time and effort required to perform business task
ii. Captures business data at its source
iii. Centralizes control over business data
iv. Effect rapid dissemination of information
v. Reduces current and future cost of doing business
vi. Supports expansion of business capacity at reasonably incremental
cost as the organization
137
vii. Supports organization’s objective in centralizing computer system
viii. Supports improved management control of an organization.
8.4.3. Data Communication Components
Basic Components of data communication are:
i. Source System: It is the data source and transmitter of data, which
includes but not limited to the followings Terminal equipment’s like
computers.
ii. Medium: The communications stream through which the data is
being transmitted from one point to another. Examples are: Cabling,
Microwave, Fiber optics, Radio Frequencies (RF), Infrared Wireless
etc.
iii. Destination system: Destination system is made up of two
components, the receiver of the data transmitted and it destination.
Sometimes the receiver can also be destination devices.
The diagram below depicts the organization of data communication system
and it components.
138
Figure 25. Organization of Data Communication System
8.4.4. Data Communication Criteria
The major criteria that a Data Communication Network must meet are:
Performance, Consistency, Reliability, Recovery and Security.
8.4.4.1. Performance
Performance is the defined as the rate of transferring error free data. It is
measured by the Response Time. Response Time is the elapsed time
between the end of an inquiry and the beginning of a response. Request a
file transfer and start the file transfer. Factors that affect Response Time are:
i. Number of Users: More users on a network - slower the network
will run
ii. Transmission Speed: speed that data will be transmitted measured
in bits per second (bps)
iii. Media Type: Type of physical connection used to connect nodes
together
139
iv. Hardware Type: Slow computers such as XT or fast such as
Pentiums
v. Software Program: How well is the network operating system
(NOS) written
8.4.4.2. Consistency
Consistency is the predictability of response time and accuracy of data.
Users prefer to have consistent response times; they develop a feel for
normal operating conditions. For example: if the "normal" response time is
3 sec. for printing to a Network Printer and a response time of over 30 sec
happens, we know that there is a problem in the system. Accuracy of Data
determines if the network is reliable! If a system loses data, then the users
will not have confidence in the information and will often not use the
system.
8.4.4.3. Reliability
Reliability is the measure of how often a network is useable. This involves
measure of the average time a component is expected to operate between
failures (MTBF Mean Time Between Failures).
8.4.4.4. Recovery
Recovery is the ability to return to a prescribed level of operation after a
failure. This level is where the amount of lost data is nonexistent or at a
minimum. Recovery is based on having Back-up Files.
140
8.4.4.5. Security
Security is the protection of Hardware, Software and Data from
unauthorized access and attacks. This includes restricted physical access to
data communication systems.
8.4.5. Data Communication Equipment (DCE) & Data Terminal
Equipment (DTE)
8.4.5.1. Data Communication Equipment (DCE)
Data communications equipment (DCE) refers to computer hardware
devices used to establish maintain and terminate communication network
sessions between a data source and its destination. DCE is connected to the
data terminal equipment (DTE) and data transmission circuit (DTC) to
convert transmission signals.
Data communication Equipment (DCE) is the interface between the Source
& the Medium, and the Medium & the Receiver is called the DCE (Data
Communication Equipment) and is a physical piece of equipment. Data
Communications Equipment (DCE) can be classified as equipment that
transmits or receives analogue or digital signals through a network.
DCE works at the physical layer of the OSI model taking data generated by
Data Terminal Equipment (DTE) and converting it into a signal that can
then be transmitted over a communications link. A common DCE example
is a modem which works as a translator of digital and analog signal other
examples are ISDN adapters, satellites, microwave stations, base station,
and network interface cards.
141
8.4.5.2. Data Terminal Equipment (DTE)
Data Terminal Equipment (DTE) Data Terminal Equipment is the
Telecommunication name given to the Source and Receiver's equipment.
Data Terminal Equipment is equipment which acts as source or destinations
in digital communication and which is capable of converting information to
signals and also reconverting received signals.
143
C
HAPTER NINE
ANALOG AND DIGITAL SIGNAL TRANSMISSION
144
Figure 27. Description of Analog Signal
9.1.2. Characteristics of Analog Signal
Characteristics of Analog Signal are listed but not limited to the following.
i. These type of electronic signals are time-varying
ii. Minimum and maximum values which is either positive or negative.
iii. It can be either periodic or non-periodic.
iv. Analog Signal works on continuous data.
v. The accuracy of the analog signal is not high when compared to the
digital signal.
vi. It helps you to measure natural or physical values.
vii. Analog signal output form is like Curve, Line, or Graph, so it may not
be meaningful to all.
9.1.3. Advantages of Analog Signals
Here, are pros/benefits of Analog Signals
i. Easier in processing
ii. Best suited for audio and video transmission.
145
iii. It has a low cost and is portable.
iv. It has a much higher density so that it can present more refined
information.
v. Not necessary to buy a new graphics board.
vi. Uses less bandwidth than digital sounds
vii. Provide more accurate representation of a sound
viii. It is the natural form of a sound.
9.1.4. Disadvantages of Analog Signals
Here is cons/drawback of Analog Signals:
i. Analog tends to have a lower quality signal than digital.
ii. The cables are sensitive to external influences.
iii. The cost of the Analog wire is high and not easily portable.
iv. Low availability of models with digital interfaces.
v. Recording analog sound on tape is quite expensive if the tape is
damaged
vi. It offers limitations in editing
vii. Offers poor multi-user interfaces
9.1.5. Fundamental Components of Analog Signals
Both analog and digital signals can be periodic or non-periodic. A periodic
signal is one that repeats the sequence of values exactly after a fixed length
of time (period).
146
Non-periodic signals are also known as aperiodic signal, this type of signal
does not have just one particular frequency, and the signals are spread out
over a continuous range of frequencies.
In data communications, we frequently use periodic analog signals because
it requires less bandwidth and nonperiodic digital signals because it can
represent variation in data.
Periodic analog signals can be classified as simple or composite. A simple
periodic analog signal cannot be decomposed into simpler signals. A
composite periodic analog signal is composed of multiple sine waves.
There are three fundamental components of analog signal representation
which are:
i. Frequency
ii. Amplitude
iii. Phase
9.1.5.1.Frequency
The frequency (f) of a sine wave is the number of complete cycles that
happen every second. A cycle is the same as the period.
Mathematically
f = 1/T
f = c/λ
9.1.5.2. Amplitude
The amplitude of a sine wave is the maximum distance it ever reaches from
zero. Since the sine function varies from +1 to -1, the amplitude is one.
147
9.1.5.3. Phase
The phase involves the relationship between the position of the amplitude
crests and troughs of two waveforms. Phase can be measured in distance,
time, or degrees. If the peaks of two signals with the same frequency are in
exact alignment at the same time, they are said to be in phase.
Given that a circle has 360°, one cycle of a sine wave has 360°, Using
degrees, you can refer to the phase angle of a sine wave when you want to
describe how much of the period has elapsed. Phase shift describes the
difference in timing between two otherwise similar signals.
- A sine wave with a phase of 0° is not shifted.
- A sine wave with a phase of 90° is shifted to the left by 1/4 cycle.
However, note that the signal does not really exist before time O.
- A sine wave with a phase of 180° is shifted to the left by 1/2 cycle.
However, note that the signal does not really exist before time O.
Example
A sine wave is offset 1/4 cycle with respect to time O. What is its phase in
degrees and radians?
Solution
We know that 1 complete cycle is 360°. Therefore, 1/4 cycle is
1/4 x 360 = 90° =90 x 2π
360rad = (2π/4)rad = 1.57rad
148
9.1.6. Composite Signal
A composite signal can be periodic or nonperiodic. A periodic composite
signal can be decomposed into a series of simple sine waves with discrete
frequencies that have integer values (1, 2, 3, and so on). Composite signal
can be decomposed into a combination of an infinite number of simple sine
waves with continuous frequencies, frequencies that have real values.
- If the composite signal is periodic, the decomposition gives a series
of signals with discrete frequencies
- If the composite signal is nonperiodic, the decomposition gives a
combination of sine waves with continuous frequencies.
If we had only one single sine wave to convey a conversation over the
phone, it would make no sense and carry no information. We would just
hear a buzz.
We send a composite signal to communicate data. A composite signal is
made of many simple sine waves. French mathematician Jean-Baptiste
Fourier shows that any composite signal is actually a combination of simple
sine waves with different frequencies, amplitudes, and phases. Fourier
analysis will be discuss in chapter 11 of this book.
Example: A nonperiodic composite signal has a bandwidth of 200 kHz, with
a middle frequency of 140 kHz and peak amplitude of 20v. The two extreme
frequencies have amplitude of 0. Calculate the highest frequency and draw
the frequency domain of the signal.
Solution
149
Let F1 = lowest frequency, and F2 = highest frequency.
Therefore
F1 - F2 = 200 kHz ---- eqn1
F1 + F2 = 140 kHz ---- eqn2
Solve for f1 and f2 from eqn1 and eqn2
Then the lowest frequency is 40 kHz and the highest is 240 kHz.
150
ii. This type of signals can be processed and transmitted better
compared to analog signal.
iii. Digital signals are versatile, so it is widely used.
iv. The accuracy of the digital signal is better than that of the analog
signal.
9.1.7.3. Advantages of Digital Signals
Here, are pros/advantages of Digital Signals:
i. Digital data can be easily compressed.
ii. Any information in the digital form can be encrypted.
iii. Equipment that uses digital signals is more common and less
expensive.
iv. Digital signal makes running instruments free from observation
errors like parallax and approximation errors.
v. A lot of editing tools are available
vi. You can edit the sound without altering the original copy
vii. Easy to transmit the data over networks
9.1.8. Digital Signal Level
Information in a digital signal can be represented in the form of voltage
levels. In the signal shown below, a ‘1‘ is represented by a positive voltage
and a ‘0‘ is represented by a Zero voltage.
151
Figure 28. Fig: A digital signal with Two levels. „1‟ represented by a
positive voltage and „0‟ represented by a negative voltage
152
9.1.10. Bit Rate
It is the number of bits transmitted in one second. It is expressed as bits per
second (bps). Relation between bit rate and bit interval can be as follows
Bit rate = 1 / Bit interval
9.1.11. Baud Rate
The baud rate is the rate at which information is transferred in a
communication channel. Baud rate is commonly used when discussing
electronics that use serial communication. The higher a baud rate goes, the
faster data is sent/received, but there are limits to how fast data can be
transferred.
9.1.12. Transmission Channel & Composite Signal
Each composite signal has a lowest possible (minimum) frequency and a
highest possible (maximum) frequency. From the point of view of
transmission, there are two types of channels:
Lowpass Channel: This channel has the lowest frequency as ‘0‘ and highest
frequency as some non-zero frequency f1‘. This channel can pass all the
frequencies in the range 0 to f1.
Bandpass Channel: This channel has the lowest frequency as some non-zero
frequency f1‘and highest frequency as some non-zero frequency f2‘. This
channel can pass all the frequencies in the range f1 to f2.
153
Fig: Lowpass Channel & Bandpass Channel
9.1.13. Transmission of Digital Signal
Digital signal can be transmitted in two ways:
Baseband Transmission
The signal is transmitted without making any change to it (ie. without
modulation). In baseband transmission, the bandwidth of the signal to be
transmitted has to be less than the bandwidth of the channel.
Consider a Baseband channel with lower frequency 0Hz and higher
frequency 100Hz; hence its bandwidth is 100. We can easily transmit a
signal with frequency below 100Hz, such a channel whose bandwidth is
more than the bandwidth of the signal is called Wideband channel.
Logically a signal with frequency say 110Hz will be blocked resulting in
loss of information, such a channel whose bandwidth is less than the
bandwidth of the signal is called Narrowband channel
Broadband Transmission
154
Given a bandpass channel, a digital signal cannot be transmitted directly
through it. In broadband transmission we use modulation, i.e we change the
signal to analog signal before transmitting it. The digital signal is first
converted to an analog signal, since we have a bandpass channel we cannot
directly send this signal through the available channel.
Ex. Consider the bandpass channel with lower frequency 50Hz and higher
frequency 80Hz, and the signal to be transmitted has frequency 10Hz.
To pass the analog signal through the bandpass channel, the signal is
modulated using a carrier frequency. Ex. The analog signal (10Hz) is
modulated by a carrier frequency of 50Hz resulting in an signal of frequency
60Hz which can pass through our bandpass channel. The signal is
demodulated and again converted into an digital signal at the other end as
shown in the figure below.
9.2. Review Questions
1. Define analog and digital signals
2. Explain Composite analog signals.
3. Explain Time and Frequency Domain Representation of signals
4. Explain the characteristics of an Analog signal
5. Explain the characteristics of an Digital signal
6. Explain the difference between Lowpass and Bandpass channel
7. Explain why a digital signal requires undergoing a change before
transmitting it through a bandpass channel.
155
C
HAPTER TEN
DIGITAL DATA TRANSMISSION METHODS
156
Figure 30. Category of Digital Data Transmission
10.2.1. Serial Transmission
When a single bit is transmitted in unit time the transmission mode used is
Serial Transmission. In Serial Transmission, as the name suggests data is
transmitted serially, i.e. bit by bit, one bit at a time. Since only one bit has
to be sent in unit time only a single channel is required. Depending upon
the timing of transmission of data there are two types of serial transmission.
10.2.1.1. Synchronous Transmission
In Synchronous Serial Transmission, the sender and receiver are highly
synchronized. No start, stop bits are used. Instead a common master clock
is used for reference. In this transmission method data is sent block (chunks
or frames) by block from one device to another with even time interval
between two block transfers.
Data is stored in memory before sending to divide it into several blocks.
Then it is transmitted block by block with regular interval. A block consist
of several characters (Normally 128, 256, 512, 1024 characters) having
157
header information (16 bits) at the beginning and trailer information (16
bits) at the end.
Advantages-
i. Efficiency is comparatively very high.
ii. Speed of data transmission is very high.
iii. No need to transmit start and stop bit.
iv. In case of transmitting a lot of data, this method is suitable.
Disadvantages-
i. Primary storage device is required.
ii. Comparatively expensive.
iii. Synchronization between the source and target is required.
It is applicable in Computer to Computer data transmission
158
Overhead = header information (16bits), trailer information (16bits)
Solution:
Actual data = 20KB=20×8Kb=160Kb=1000×160b=160000 bit
Suppose, a block having 80 characters, So block size = 80×8 bit = 640 bit
Overhead data bit required for each block of 640 bit group = 32 bit
So Total overhead data bits required for 160000 bit data transmission =
(32/640)× 160000 = 8000 bit
Total bits = Actual data bit + overhead data bits = 160000 bit + 8000 bit =
168000 bit
Therefore, Efficiency = (160000/168000) × 100% = 95%
10.2.1.2. Asynchronous Transmission
In asynchronous serial transmission the sender and receiver are not
synchronized. In this transmission method one byte data or a character is
sent from one device to another with uneven time interval between two
character transfers.
Whenever data is propagated it is sent at once. Thus no memory is required
for storing data. Normally a start bit and a stop bit is added with the data
and total 10 bit data is sent. Sometimes a parity bit is added before stop bit
for error checking. Data bits can be sent at any time. Stop bits and start bits
159
are used between data bytes to synchronize the transmitter and receiver and
to ensure that the data is transmitted correctly. The time between sending
and receiving data bits is not constant, so gaps are used to provide time
between transmissions.
Advantages
i. No synchronization is required between the transmitter and receiver
devices. Sender can directly transmit data and the receiver can
receive that data.
ii. The sender does not require any primary storage device.
iii. Cost is very low to implement this method.
iv. It is convenient while transmitting a little amount of data.
Disadvantages
i. Data transmission speed is very low.
ii. Efficiency is comparatively less.
Uses-
160
i. Computer to Printer
ii. Card reader to computer
iii. Computer to card reader
iv. Keyboard to computer
Solution:
Actual data = 20KB=20×8Kb=160Kb=1000×160b=160000 bit
Overhead data bit required for each group of 8 bit = 3 bit
So Total overhead data bits required for 160000 bit data transmission
=(3/8)× 160000 = 60000 bit
Total bits = Actual data bit + overhead data bits = 160000 bit + 60000 bit =
220000 bit
161
So, Efficiency = (160000/220000) × 100% = 73%
10.2.1.3. Isochronous
Isochronous Transmission is a form of synchronous transmission designed
to accept and send data at a fixed rate. Isochronous transmission is similar
to synchronous transmission but the time interval between blocks is almost
zero.
In this transmission synchronous and asynchronous data is collected from
several devices within a time slot (125 micro-second) and then passed those
collected data as time frame through a synchronous data link one after
another.
Advantages-
i. Transmission speed is much higher.
ii. There is no need to pause between each character.
iii. Start bit at the beginning of each character and Stop bit at the end is
not required.
Disadvantages-
i. A primary storage device is required at the sender station.
ii. It is not possible to check whether the data block has received the
correct recipient and there is no error correction.
iii. Relatively expensive.
Uses
162
i. This method is usually used for data transfer in real time
applications.
ii. This method is used for data transmission for various multimedia
communications such as audio or video calls.
10.2.2. Parallel Transmission
When multiple bits are sent in unit time the transmission mode used is called
Parallel transmission. It involves simultaneous transmission of N bits over
N different channels Parallel Transmission increases transmission speed by
a factor of N over serial transmission. Disadvantage of parallel transmission
is the cost involved.
164
C
HAPTER ELEVEN
BANDWIDTH
(2.1-1)
Any piecewise smooth function defined on a finite interval has a Fourier
series expansion.
For a Periodic Functions, A function satisfying the identity f(x) = f(x + T)
for all x, where T > 0, is called periodic or T-periodic as shown in Figure
29.
y
T
166
Figure 31: A T-periodic function.
For a T-periodic function
f(x) = f(x + T) = f(x + 2T) = f(x + 3T) = … = f(x + nT)
If T is a period then nT is also a period for any integer n > 0. T is called a
fundamental period. The definite integral of a T-periodic function is the
same over any interval of length T. Example 2.1-1 will use this property to
integrate a 2-periodic function shown in Figure 2.1-2.
Example Let f be the 2-periodic function and N is a positive integer.
N
y
1
-3 -2 -1 1 2 3
-1
A 2-periodic function.
Solution
N N 2 N 4 N
++
2 2 2 2
f ( x ) dx = f ( x ) dx + f ( x ) dx f ( x ) dx
N N N 2 N 2
2
N N 2 1 3
= N = N ( x 1 ) dx = N ( x 1)
2 2 2
f ( x ) dx f ( x ) dx
N N 2 0
3 0
167
N
= N
[ 1 1] = 2
2
f ( x ) dx N
N
3 3
NB: The most important periodic functions are those in the (2-period)
trigonometric system
1, cos x, cos 2x, cos 3x, , cos mx, ,
sin x, sin 2x, sin 3x, , sin nx, ,
11.3. Bandwidth of Analog Signal
Bandwidth of an analog signal is expressed in terms of its frequencies. It is
defined as the range of frequencies that the composite analog signal carries.
It is calculated by the difference between the maximum frequency and the
minimum frequency. Consider the signal shown in the diagram below:
168
The signal shown in the diagram is a composite analog signal with many
component signals.
It has a minimum frequency of F1 = 30Hz and maximum frequency of F2
= 90Hz.
Hence the bandwidth is given by F2 – F1 = 90 – 30 = 60 Hz
The definition of bandwidth (B) for a scope. Here f0 is the center frequency,
fH is the higher cut-off frequency, and fL is the lower cut-off frequency. The
0 dB level is the level of the peak of the scope response.
11.4. Bandwidth of Digital Signal
It is defined as the maximum bit rate of the signal to be transmitted. It is
measured in bits per second.
169
In digital systems, bandwidth is the same as the digitization rate of the
signal. What is sometimes called the dwell time (td) is the interval between
digitized samples. Dwell time, in turn, is defined by the sampling time (ts)
and the number of samples (ns).
A band of a given width can carry a specific maximum amount of
information regardless of where it sits in the frequency spectrum.
Modulating the band at a high frequency does not affect this inherent
limitation, which is not based on the frequency of the carrier.
Data rate or bit rate (and the related concept of bit error rate) is the number
of bits that are conveyed or processed over a unit of time, usually one
second. One byte per second (1 B/sec) is equivalent to 8 bit/sec.
170
11.5. Bandwidth of Channel
A channel is the medium through which the signal carrying information will
be passed. In terms of analog signal, bandwidth of the channel is the range
of frequencies that the channel can carry.
In terms of digital signal, bandwidth of the channel is the maximum bit rate
supported by the channel i.e. the maximum amount of data that the channel
can carry per second.
The bandwidth of the medium should always be greater than the bandwidth
of the signal to be transmitted else the transmitted signal will be either
attenuated or distorted or both leading in loss of information.
The channel bandwidth determines the type of signal to be transmitted i.e.
analog or digital. Data rate depends on three factors: The bandwidth
available; The level of the signals we use; The quality of the channel (the
level of noise) The quality of the channel indicates two types:
a) A Noiseless or Perfect Channel
An ideal channel with no noise. The Nyquist Bit rate derived by Henry
Nyquist gives the bit rate for a Noiseless Channel.
It defines the theoretical maximum bit rate for a noiseless channel:
Bitrate = 2 x Bandwidth x Log2 L.
The Nyquist formula gives the upper bound for the data rate of a
transmission system by calculating the bit rate directly from the number of
signal levels and the bandwidth of the system.
171
Unambiguously, in a noise-free channel, Nyquist tells us that we can
transmit data at a rate of up to.
C = 2*Blog2L
Where,
Bitrate is the bitrate of the channel in bits per second
Bandwidth is the bandwidth of the channel
L is the number of signal levels.
Example: What is the maximum bit rate of a noiseless channel with a
bandwidth of 5000 Hz transmitting a signal with two signal levels?
Solution:
The bit rate for a noiseless channel according to Nyquist Bit rate can be
calculated as follows: BitRate = 2 x Bandwidth x Log2 L = 2 x 5000 x log2
2 =10000 bps
b) A Noisy Channel
The Shannon Capacity formulated by Claude Shannon gives the bit rate for
a Noisy Channel.
R = BLog2(1+SNR)bps,
where SNR is the received signal-to-noise power ratio.
The Shannon capacity is a theoretical limit that cannot be achieved in
practice, but as link level design techniques improve, data rates for this
additive white noise channel approach this theoretical bound
Where,
Capacity is the capacity of the channel in bits per second
172
Bandwidth is the bandwidth of the channel
SNR is the Signal to Noise Ratio
Shannon Capacity for calculating the maximum bit rate for a noisy channel
does not consider the number of levels of the signals being transmitted as
done in the Nyquist bit rate.
The Shannon capacity theorem defines the maximum amount of
information, or data capacity, which can be sent over any channel or
medium (wireless, coax, twister pair, fiber etc.). What this says is that higher
the signal-to-noise (SNR) ratio and more the channel bandwidth, the higher
the possible data rate.
Example: Calculate the bit rate for a noisy channel with SNR 300 and
bandwidth of 3000Hz Solution: The bit rate for a noisy channel according
to Shannon Capacity can be calculated as follows:
R = B X log2 (1 +SNR)
= 3000 x log2 (1 + 300)
= 3000 x log2 (301) = 3000 x 8.23
= 24,690bps
11.6. Review Questions
1. What is Shannon capacity formula explain it?
2. How is bandwidth related to Shannon channel capacity?
3. Compare Bandwidth of Signal and Channel.
4. Compare bandwidth of Analog and Digital Signal.
5. Explain briefly Nyquist formula?
173
174
C
HAPTER TWELVE
OSI MODEL
175
12.3. Physical Layer
The physical layer, the lowest layer of the OSI model, is concerned with the
transmission and reception of the unstructured raw bit stream over a
physical medium. It describes the electrical/optical, mechanical, and
functional interfaces to the physical medium, and carries the signals for all
of the higher layers. It provides:
1. Data encoding: modifies the simple digital signal pattern (1s and 0s)
used by the PC to better accommodate the characteristics of the physical
medium, and to aid in bit and frame synchronization. It determines:
- What signal state represents a binary 1
- How the receiving station knows when a "bit-time" starts
- How the receiving station delimits a frame
2. Physical medium attachment, accommodating various possibilities in
the medium:
- Will an external transceiver (MAU) be used to connect to the
medium?
- How many pins do the connectors have and what is each pin
used for?
3. Transmission technique: determines whether the encoded bits will be
transmitted by baseband (digital) or broadband (analog) signaling.
4. Physical medium transmission: transmits bits as electrical or optical
signals appropriate for the physical medium, and determines:
- What physical medium options can be used
176
- How many volts/db should be used to represent a given signal
state, using a given physical medium
12.4. Data Link Layer
The data link layer provides error-free transfer of data frames from one node
to another over the physical layer, allowing layers above it to assume
virtually error-free transmission over the link. To do this, the data link layer
provides:
1. Link establishment and termination: establishes and terminates the
logical link between two nodes.
2. Frame traffic control: tells the transmitting node to "back-off" when no
frame buffers are available.
3. Frame sequencing: transmits/receives frames sequentially.
4. Frame acknowledgment: provides/expects frame acknowledgments.
Detects and recovers from errors that occur in the physical layer by
retransmitting non-acknowledged frames and handling duplicate frame
receipt.
5. Frame delimiting: creates and recognizes frame boundaries.
6. Frame error checking: checks received frames for integrity.
7. Media access management: determines when the node "has the right" to
use the physical medium.
177
12.5. Network Layer
The network layer controls the operation of the subnet, deciding which
physical path the data should take based on network conditions, priority of
service, and other factors. It provides:
1. Routing: routes frames among networks.
2. Subnet traffic control: routers (network layer intermediate systems) can
instruct a sending station to "throttle back" its frame transmission when
the router's buffer fills up.
3. Frame fragmentation: if it determines that a downstream router's
maximum transmission unit (MTU) size is less than the frame size, a
router can fragment a frame for transmission and re-assembly at the
destination station.
4. Logical-physical address mapping: translates logical addresses, or
names, into physical addresses.
5. Subnet usage accounting: has accounting functions to keep track of
frames forwarded by subnet intermediate systems, to produce billing
information.
12.6. Transport Layer
The transport layer ensures that messages are delivered error-free, in
sequence, and with no losses or duplications. It relieves the higher layer
protocols from any concern with the transfer of data between them and their
peers. The size and complexity of a transport protocol depends on the type
of service it can get from the network layer. For a reliable network layer
178
with virtual circuit capability, a minimal transport layer is required. If the
network layer is unreliable and/or only supports datagrams, the transport
protocol should include extensive error detection and recovery.
The transport layer provides:
1. Message segmentation: accepts a message from the (session) layer
above it, splits the message into smaller units (if not already small
enough), and passes the smaller units down to the network layer. The
transport layer at the destination station reassembles the message.
2. Message acknowledgment: provides reliable end-to-end message
delivery with acknowledgments.
3. Message traffic control: tells the transmitting station to "back-off" when
no message buffers are available.
4. Session multiplexing: multiplexes several message streams, or sessions
onto one logical link and keeps track of which messages belong to which
sessions.
12.7. Session Layer
The session layer allows session establishment between processes running
on different stations. It provides:
1. Session establishment, maintenance and termination: allows two
application processes on different machines to establish, use and
terminate a connection, called a session.
179
2. Session support: performs the functions that allow these processes to
communicate over the network, performing security, name recognition,
logging, and so on.
12.8. Presentation Layer
The presentation layer formats the data to be presented to the application
layer. It can be viewed as the translator for the network. This layer may
translate data from a format used by the application layer into a common
format at the sending station, then translate the common format to a format
known to the application layer at the receiving station.
The presentation layer provides:
1. Character code translation: for example, ASCII to EBCDIC.
2. Data conversion: bit order, CR-CR/LF, integer-floating point, and so on.
3. Data compression: reduces the number of bits that need to be transmitted
on the network.
4. Data encryption: encrypt data for security purposes. For example,
password encryption.
12.9. Application Layer
The application layer serves as the window for users and application
processes to access network services. This layer contains a variety of
commonly needed functions:
1. Resource sharing and device redirection
2. Remote file access
3. Remote printer access
180
4. Inter-process communication
5. Network management
6. Directory services
7. Electronic messaging (such as mail)
8. Network virtual terminals
12.10. Review Questions
1. What is the difference between a port address, a logical address, and a
physical address?
2. Name some services provided by the application layer in the Internet
model.
3. How do the layers of the Internet model correlate to the layers of the
OSI model?
4. How are OSI and ISO related to each other?
5. Match the following to one or more layers of the OSI model:
a) Route determination
b) Flow control
c) Interface to transmission media
d) Provides access for the end user
9. Match the following to one or more layers of the OSI model:
a) Reliable process-to-process message delivery
b) Route selection
c) Defines frames
d) Provides user services such as e-mail and file transfer
181
e) Transmission of bit stream across physical medium
10. Match the following to one or more layers of the OSl model
a) Communicates directly with user's application program
b) Error correction and retransmission
c) Mechanical, electrical, and functional interface
d) Responsibility for carrying frames between adjacent nodes
182
C
HAPTER THIRTEEN
TRANSMISSION MEDIA
183
Figure 32. Categories of Transmission Media
13.2. Guided (Wired) Transmission Media
Guided Transmission media uses a cabling system that guides the data
signals along a specific path. Guided media also known as bounded media,
which are those that provide a conduit from one device to another. It is also
referred to as Wired or Bounded transmission media. Signals being
transmitted are directed and confined in a narrow pathway by using physical
links. Features of guided transmission media are: High Speed; Secure;
and Used for comparatively shorter distances.
Examples of guided transmission media are:
- Open wire medium
- Twisted-pair cable
- Coaxial cable
- Fiber-optic cable
13.3. Open Wire medium
Open wire is by tradition used to describe the electrical wire strung along
power poles. There is a single wire strung between poles. No shielding or
protection from noise interference is used.
In data communication system open wire include any data signal path
without shielding or protection from noise interference.
This can include multiconductor cables or single wires. This media category
is susceptible to a large degree of noise and interference and consequently
not acceptable for data transmission.
184
13.3.1. Twisted Pair Medium
The wires is twisted together in pairs, each pair consist of wire used for the
+ve data signal and a wire used for the -ve data signal. Any noise that
appears on +ve/-ve wire of the pair would occur on the other wire. Since the
wires are opposite polarities, they are 180 degrees out of phase (180 degree
phases or definition of opposite polarity) when the noise appears on both
wires, it cancels or nulls itself out at the receiver ends.
Twisted pair cables are most effectively used in a system that uses a
balanced line method of transmission.
Cables with the shield are called shielded twisted pair and commonly
abbreviated STP while cables without a shield are called unshielded twisted
pair or UTP. Twisting the wires together results in characteristics
impedance for the cable.
Twisted-pair cables are used in telephone lines to provide voice and data
channels.
It consists of 2 separately insulated conductor wires wound about each
other. Generally, several such pairs are bundled together in a protective
sheath. They are the most widely used Transmission Media. Twisted Pair is
of two types:
185
Figure 33: Shielded and Unshielded Twisted pair cable
1. Unshielded Twisted Pair (UTP)
UTP consists of two insulated copper wires twisted around one another.
This type of cable has the ability to block interference and does not depend
on a physical shield for this purpose. It is used for telephonic applications.
Advantages of UTP
i. Least expensive
ii. Easy to install
iii. High-speed capacity
iv. Susceptible to external interference
v. Lower capacity and performance in comparison to STP
vi. Short distance transmission due to attenuation
187
Figure 34. Coaxial Cable
Advantages of coaxial cable
i. High Bandwidth
ii. Better noise Immunity
iii. Easy to install and expand
iv. Inexpensive
Disadvantage coaxial cable
Single cable failure can disrupt the entire network
13.3.3. Optical Fiber
13.3.3.1. What is Optical Fiber
Optical fiber consists of thin glass fiber that can carry information at
frequencies in the visible light spectrum. The typical optical fiber consists
of a very narrow strand of glass called cladding with a typical core diameter
of 62.5 microns and diameter of 125 minors.
188
It uses the concept of reflection of light through a core made up of glass or
plastic. The core is surrounded by a less dense glass or plastic covering
called the cladding. It is used for the transmission of large volumes of data.
191
Figure 37. Grade Index Mode
Note: Both Step Index and Graded Index allow more than one light
source to be used (different colors simultaneously). Multiple
channels of data can be run simultaneously.
3. Single Mode: Single Mode has separate distinct Refractive Indexes
for the cladding and core. The light ray passes through the core with
relatively few reflections off the cladding. Single Mode is used for
a single source of light (one color) operation. It requires a laser and
the core is very small: 9 microns.
192
13.4. Unguided (Wireless) Transmission Media
13.4.1. What is Wireless Media
Unguided media transport data without using a physical conductor. This
type of communication is often referred to as wireless communication. It
uses wireless electromagnetic signals to send data. It features are Features:
i. The signal is broadcasted through air
ii. Less Secure
iii. Used for larger distances
There are three types of Unguided Media
i. Radio waves
ii. Micro waves
iii. Infrared
13.4.2. Wireless Signal Propagation
Before understanding the different types of wireless transmission medium,
let us first understand the ways in which wireless signals travel. These
signals can be sent or propagated in the following three ways:
1. Ground-wave propagation: Ground-wave propagation: Ground Wave
Propagation follows the curvature of the Earth. Ground Waves have
carrier frequencies up to 2MHz. AM radio is an example of Ground
Wave Propagation.
193
Figure 39. Grounded Wave transmission
2. Sky-wave or Ionospheric propagation: Propagation bounces off of the
earth’s ionospheric layer in the upper atmosphere. It is sometimes called
Double Hop Propagation.
It operates in the frequency range of 30 - 85MHz. Because it depends
on the Earth's ionosphere, it changes with weather and time of day. The
signal bounces off of the ionosphere and back to earth. Ham radios
operate in this range. Characteristics of Sky Propagation are as follows:
Signal reflected from ionized layer of atmosphere back down to earth;
Signal can travel a number of hops, back and forth between ionosphere
and earth‘s surface; Reflection effect caused by refraction.
194
3. Line-of-sight propagation: Line-of-sight propagation: Line of Sight
Propagation transmits exactly in the line of sight. The receive station
must be in the view of the transmit station. It is sometimes called Space
Waves or Tropospheric Propagation. It is limited by the curvature of the
Earth for ground based stations (100 km: horizon to horizon). Reflected
waves can cause problems. Examples of Line of Sight Propagation are:
FM Radio, Microwave and Satellite. Transmitting and receiving
antennas must be within line of sight.
195
This means that sending and receiving antenna do not have to be aligned. A
sending antenna can send waves that can be received by any receiving
antenna.
Radio waves particularly those waves that propagate in sky mode, can travel
long distances.
This makes radio waves a good choice for long-distance broadcasting such
as AM radio. Radio waves particularly those of low and medium
frequencies can penetrate walls. It is an advantage because; an AM radio
can receive signals inside a building. It is the disadvantage because we
cannot isolate a communication to first inside or outside a building.
196
13.4.4. Microwave
Electromagnetic waves having frequencies between 1 and 300 GHz are
called microwaves.
Microwaves are unidirectional; when an antenna transmits microwaves they
can be narrowly focused. This means that the sending and receiving
antennas need to be aligned. The unidirectional property has an obvious
advantage. A pair of antennas can be aligned without interfering with
another pair of aligned antennas.
Microwaves propagation is line-of-sight. Since the towers with the mounted
antennas needs to be in direct sight of each other, towers that are far apart
need to be very tall, the curvature of the earth as well as other blocking
obstacles do not allow two short towers to communicate using microwaves,
Repeaters are often needed for long distance communication very high
frequency microwaves cannot penetrate walls. Parabolic dish antenna and
horn antenna are used for this means of transmission.
197
Figure 43: Microwaves transmission
13.4.5. Infra-Red
Infrared signals with frequencies ranges from 300 GHz to 400 GHz can be
used for short range communication. Infrared signals, having high
frequencies, cannot penetrate walls. This helps to prevent interference
between one system and another. Infrared Transmission in one room cannot
be affected by the infrared transmission in another room.
Infrared band, has an excellent potential for data transmission and transfer
digital data with a high speed and frequency. There are number of computer
devices which are used to send the data through infrared medium e.g.
keyboard mice, PCs and printers. There are some manufacturers provide a
special part called the IrDA port that allows a wireless keyboard to
communicate with a PC. Infrared waves are used for very short distance
communication. They cannot penetrate through obstacles. This prevents
interference between systems. Frequency Range:300GHz – 400THz. It is
used in TV remotes, wireless mouse, keyboard, printer, etc.
199
from the distance between transmitter and receiver etc.
200
Figure 46: Attenuation impairment
13.5.3. Crosstalk
Crosstalk is when one line induces a signal into another line. In voice
communications, we often hear this as another conversation going on in the
background. In digital communication, this can cause severe disruption of
the data transfer. Cross talk can be caused by overlapping of bands in a
multiplexed system or by poor shielding of cables running close to one
another. There are no specific communications standards applied to the
measurement of crosstalk.
201
All media have a preferred termination condition for perfect transfer of
signal power. The signal arriving at the end of a transmission line should be
fully absorbed otherwise it will be reflected back down the line to the sender
and appear as an Echo. Echo Suppressors are often fitted to transmission
lines to reduce this effect. Normally during data transmission, these
suppressors must be disabled or they will prevent return communication in
full duplex mode. Echo suppressors are disabled on the phone line if they
hear carrier for 400ms or more. If the carrier is absent for 100 mSec, the
echo suppressor is re-enabled. Echo Cancellers are currently used in
Modems to replicate the echo path response and then combine the results to
eliminate the echo. Thus no signal interruption is necessary.
13.5.5. Noise
Noise is any unwanted signal that is mixed or combined with the original
signal during transmission. Due to noise the original signal is altered and
signal received is not same as the one sent. Noise is sharp quick spikes on
the signal caused from electromagnetic interference, lightning, sudden
power switching, electromechanical switching, etc. These appear on the
telephone line as clicks and pops which are not a problem for voice
communication but can appear as a loss of data or even as wrong data bits
during data transfers. Impulse noise has duration of less than 1 mSec and
their effect is dissipated within 4mSec. Noise is the major factor for the
transmission distortion as any unwanted signal gets added to the transmitted
signal by which the resulting transmitted signal gets modified and at the
202
receiver side it is difficult to remove the unwanted noise signal. These
noises are various kinds like shot noise, impulse noise, thermal noise etc.
204
C
HAPTER FOURTEEN
ERROR DETECTION & CORRECTION
205
14.2. Types of Errors
In a data sequence, if 1 is changed to zero or 0 is changed to 1, it is called
“Bit error”. There are generally 3 types of errors in data transmission from
transmitter to receiver.
14.2.1. Single bit errors
The change in one bit in the whole data sequence is called “Single bit error”.
Occurrence of single bit error is very rare in serial communication system.
This type of error occurs only in parallel communication system, as data is
transferred bit wise in single line, there is chance that single line to be noisy.
206
14.2.3. Burst Errors
The change of set of bits in data sequence is called “Burst error”. The burst
error is calculated in from the first bit change to last bit change.
Here we identify the error form fourth bit to 6th bit. The numbers between
4th and 6th bits are also considered as error. These set of bits are called
“Burst error”. These burst bits changes from transmitter to receiver, which
may cause a major error in data sequence. This type of errors occurs in serial
communication and they are difficult to solve.
14.3. Errors Detection and Correction
In information theory and coding theory with applications in computer
science and telecommunication, error detection and correction or error
207
control are techniques that enable reliable delivery of digital data over
unreliable communication channels.
Many communication channels are subject to channel noise, and thus errors
may be introduced during transmission from the source to a receiver. Error
detection techniques allow detecting such errors, while error correction
enables reconstruction of the original data in many cases.
The basic idea in performing error detection is that the information
produced by an application is encoded so that the stream that is input into
the communication channel satisfied a specific condition. The receiver
checks the stream coming out of the communication channel to see whether
the pattern is certified. If not the receiver can be certain that an error has
occur and then set alarm to alert the user
14.4. Types of Detection
14.4.1. Parity Checking
Parity bit means nothing but an additional bit added to the data at the
transmitter before transmitting the data. Before adding the parity bit,
number of 1’s or 0s is calculated in the data. Based on this calculation of
data an extra bit is added to the actual information/data. The addition of
parity bit to the data will result in the change of data string size.
This means if we have an 8 bit data, then after adding a parity bit to the data
binary string it will become a 9 bit binary data string.
Parity check is also called as Vertical Redundancy Check (VRC).
There is two types of parity bits in error detection, they are
208
Even parity
Odd parity
Even Parity
If the data has even number of 1’s, the parity bit is 0. Ex: data is
10000001 then parity bit 0
Odd number of 1’s, the parity bit is 1. Ex: data is 10010001 it parity bit
is 1
Odd Parity
If the data has odd number of 1’s, the parity bit is 0. Ex: data is 10011101
is parity bit 0
Even number of 1’s, the parity bit is 1. Ex: data is 10010101 it parity bit
is 1
Note: The counting of data bits will include the parity bit also.
The circuit which adds a parity bit to the data at transmitter is called “Parity
generator”. The parity bits are transmitted and they are checked at the
receiver. If the parity bits sent at the transmitter and the parity bits received
at receiver are not equal then an error is detected. The circuit which checks
the parity at receiver is called “Parity checker”. Messages with even parity
and odd parity.
209
14.4.2. Cyclic Redundancy Check (CRC)
A cyclic code is a linear (n, k) block code with the property that every cyclic
shift of a codeword results in another code word.
Here k indicates the length of the message at transmitter (the number of
information bits), n is the total length of the message after adding check bits
(actual data and the check bits). n,k is the number of check bits. The codes
used for cyclic redundancy check there by error detection are known as
CRC codes (Cyclic redundancy check codes).
Cyclic redundancy-check codes are shortened cyclic codes. These types of
codes are used for error detection and encoding. They are easily
implemented using shift-registers with feedback connections. That is why
they are widely used for error detection on digital communication. CRC
codes will provide effective and high level of protection.
210
CRC Code Generation
Based on the desired number of bit checks, we will add some zeros (0) to
the actual data. This new binary data sequence is divided by a new word of
length n + 1, where n is the number of check bits to be added.
The reminder obtained as a result of this modulo 2- division is added to the
dividend bit sequence to form the cyclic code. The generated code word is
completely divisible by the divisor that is used in generation of code. This
is transmitted through the transmitter.
Example
At the receiver side, we divide the received code word with the same divisor
to get the actual code word. For an error free reception of data, the reminder
is 0. If the reminder is a not 0, that means there is an error in the received
code/data sequence. The probability of error detection depends upon the
211
number of check bits (n) used to construct the cyclic code. For single bit
and two bit errors, the probability is 100%.
For a burst error of length n – 1, the probability of error detecting is 100%.
A burst error of length equal to n + 1, the probability of error detecting
reduces to 1 – (1/2) n-1.
A burst error of length greater than n – 1, the probability of error detecting
is 1 – (1/2) n.
14.4.3. Longitudinal Redundancy Check
In longitudinal redundancy method, a BLOCK of bits are arranged in a table
format (in rows and columns) and we will calculate the parity bit for each
column separately. The set of these parity bits are also sent along with our
original data bits.
Longitudinal redundancy check is a bit by bit parity computation, as we
calculate the parity of each column individually.
This method can easily detect burst errors and single bit errors and it fails
to detect the 2 bit errors occurred in same vertical slice.
212
14.4.4. Check Sum
Checksums are similar to parity bits except, the number of bits in the sums
is larger than parity and the result is always constrained to be zero. That
means if the checksum is zero, error is detected. A checksum of a message
is an arithmetic sum of code words of certain length. The sum is stated by
means of 1’s compliment and stored or transferred as a code extension of
actual code word. At receiver a new checksum is calculated by receiving
the bit sequence from transmitter.
The checksum method includes parity bits, check digits and longitudinal
redundancy check (LRC). For example, if we have to transfer and detect
errors for a long data sequence (also called as Data string) then we divide
that into shorter words and we can store the data with a word of same width.
For each another incoming bit we will add them to the already stored data.
At every instance, the newly added word is called “Checksum”.
213
At receiver side, the received bits checksum is same as that of transmitter’s,
there is no error found.
We can also find the checksum by adding all data bits. For example, if we
have 4 bytes of data as 25h, 62h, 3fh, 52h.
Then, adding all bytes we get 118H
Dropping the carry Nibble, we get 18H
Find the 2’s complement of the nibble, i.e. E8H
This is the checksum of the transmitted 4 bits of data.
At receiver side, to check whether the data is received without error or not,
just add the checksum to the actual data bits (we will get 200H). By
dropping the carry nibble we get 00H. This means the checksum is
constrained to zero. So there is no error in the data. In general, there are 5
types of checksum methods like
i. Integer addition checksum
ii. One’s complement checksum
iii. Fletcher Checksum
iv. Adler Checksum
v. ATN Checksum (AN/466)
214
Example
As of now we discussed about the error detection codes. But to receive the
exact and perfect data sequence without any errors, is not done enough only
by detecting the errors occurred in the data. But also we need to correct the
data by eliminating the presence of errors, if any. To do this we use some
other codes.
14.5. Error Correction
The codes which are used for both error detecting and error correction are
called “Error Correction Codes”. The error correction techniques are of two
types. They are,
i. Single bit error correction
ii. Burst error correction
215
The process or method of correcting single bit errors is called “single bit
error correction”. The method of detecting and correcting burst errors in the
data sequence is called “Burst error correction”.
Hamming code or Hamming Distance Code is the best error correcting code
we use in most of the communication network and digital systems.
Hamming Code
This error detecting and correcting code technique is developed by R.W.
Hamming. This code not only identifies the error bit, in the whole data
sequence and it also corrects it. This code uses a number of parity bits
located at certain positions in the codeword. The number of parity bits
depends upon the number of information bits. The hamming code uses the
relation between redundancy bits and the data bits and this code can be
applied to any number of data bits.
What is a Redundancy Bit?
Redundancy means “The difference between number of bits of the actual
data sequence and the transmitted bits”. These redundancy bits are used in
communication system to detect and correct the errors, if any.
How the Hamming code actually corrects the errors?
In Hamming code, the redundancy bits are placed at certain calculated
positions in order to eliminate errors. The distance between the two
redundancy bits is called “Hamming distance”.
To understand the working and the data error correction and detection
mechanism of the hamming code, let’s see to the following stages.
216
Number of parity bits
As we learned earlier, the number of parity bits to be added to a data string
depends upon the number of information bits of the data string which is to
be transmitted. Number of parity bits will be calculated by using the data
bits. This relation is given below.
2P >= n + P +1
Here, n represents the number of bits in the data string.
P represents number of parity bits.
For example, if we have 4 bit data string, i.e. n = 4, then the number of parity
bits to be added can be found by using trial and error method. Let’s take P
= 2, then
2P = 22 = 4 and n + P + 1 = 4 + 2 + 1 = 7
This violates the actual expression.
So let’s try P = 3, then
2P = 23 = 8 and n + P + 1 = 4 + 3 + 1 = 8
So we can say that 3 parity bits are required to transfer the 4 bit data with
single bit error correction.
Where to Place these Parity Bits?
After calculating the number of parity bits required, we should know the
appropriate positions to place them in the information string, to provide
single bit error correction.
217
In the above considered example, we have 4 data bits and 3 parity bits. So
the total codeword to be transmitted is of 7 bits (4 + 3). We generally
represent the data sequence from right to left, as shown below.
bit 7, bit 6, bit 5, bit 4, bit 3, bit 2, bit 1, bit 0
The parity bits have to be located at the positions of powers of 2. I.e. at 1,
2, 4, 8 and 16 etc. Therefore the codeword after including the parity bits will
be like this
D7, D6, D5, P4, D3, P2, P1
Here P1, P2 and P3 are parity bits. D1 —- D7 are data bits.
Constructing a Bit Location Table
In Hamming code, each parity bit checks and helps in finding the errors in
the whole code word. So we must find the value of the parity bits to assign
them a bit value.
By calculating and inserting the parity bits in to the data bits, we can achieve
error correction through Hamming code.
Let’s understand this clearly, by looking into an example.
Ex: Encode the data 1101 in even parity, by using Hamming code.
218
Step 1: Calculate the required number of parity bits.
Let P = 2, then
2P = 22 = 4 and n + P + 1 = 4 + 2 + 1 = 7.
2 parity bits are not sufficient for 4 bit data.
So let’s try P = 3, then
2P = 23 = 8 and n + P + 1 = 4 + 3 + 1 = 8
Therefore 3 parity bits are sufficient for 4 bit data.
The total bits in the code word are 4 + 3 = 7
Step 2: Constructing bit location table
219
To represent the binary data in alphabets and numbers, we use alphanumeric
codes.
14.6. Review Questions
1. Explain briefly with diagram error in digital data transmission
2. Compare Single bit error, Burst errors, and Multiple errors
3. Which is more efficient for error detection technique? Give reason
for your answer.
4. Itemize four 4 different types of error detection techniques?
5. What is the difference between error prevention error detection
and error control?
6. How is CRC used in error detection?
7. Why is error detection and correction required?
8. Which error detection method uses one's complement arithmetic?
9. Which error detection method can detect a burst error?
10. What is the implication of probability of error of 0.5 during
transmission?
11. Can an error detecting code be used to ensure message integrity?
12. Can CRC correct errors?
13. What is error Detection Technique?
14. How many errors can Hamming code detect?
15. Which error detection method consists of a parity bit for each data
unit?
220
C
HAPTER FIFTEEN
SIGNAL CODING & ENCODING
221
Figure 49: Classification of Line Coding Schemes
15.1.2.1. Unipolar NRZ
All signal levels are either above or below the time axis. NRZ - Non Return
to Zero scheme is an example of this code. The signal level does not return
to zero during a symbol transmission.
15.1.2.2. Polar
NRZ-voltages are on both sides of the time axis.
Polar NRZ scheme can be implemented with two voltages. E.g. +V for 1
and -V for 0. There are two variations:
i. NZR - Level (NRZ-L) - positive voltage for one symbol and
negative for the other
222
ii. NRZ - Inversion (NRZ-I) - the change or lack of change in polarity
determines the value of a symbol. E.g. a ―1‖ symbol inverts the
polarity a ―0‖ does not.
Polar – RZ
The Return to Zero (RZ) scheme uses three voltage values. +, 0, -. Each
symbol has a transition in the middle. Either from high to zero or from low
to zero
More complex as it uses three voltage level. It has no error detection
capability
Figure 50: Unipolar (NRZ) & Polar (RZ & NRZ) Encoding
223
Polar - Biphase: Manchester and Differential Manchester
Manchester coding is a combination of NRZ-L and RZ schemes.
Every symbol has a level transition in the middle: from high to low or low
to high.
It uses only two voltage levels.
Differential Manchester coding consists of combining the NRZ-I and RZ
schemes.
Every symbol has a level transition in the middle. But the level at the
beginning of the symbol is determined by the symbol value. One symbol
causes a level change the other does not.
224
Each symbol has a transition in the middle. Either from high to zero or from
low to zero. More complex as it uses three voltage level. It has no error
detection capability
15.1.2.3. Bipolar - AMI and Pseudoternary
This coding scheme uses 3 voltage levels: - +, 0, -, to represent the symbols
Voltage level for one symbol is at ―0‖ and the other alternates between +
& -.
Bipolar Alternate Mark Inversion (AMI) - the ―0‖ symbol is represented
by zero voltage and the ―1‖ symbol alternates between +V and -V.
Pseudoternary is the reverse of AMI
225
Using L signal levels we can have n signal elements to create Ln signal
elements. The following possibilities can occur:
With 2m symbols and Ln signals:
If 2m > Ln then we cannot represent the data elements, we don‘t have enough
signals.
If 2m = Ln then we have an exact mapping of one symbol on one signal.
If 2m < Ln then we have more signals than symbols and we can choose the
signals that are more distinct to represent the symbols and therefore have
better noise immunity and error detection as some signals are not valid
These types of codings are classified as mBnL schemes. In mBnL schemes,
a pattern of m data elements is encoded as a pattern of n signal elements in
which 2m≤ Ln.
2B1Q (two binary, one quaternary)
Here m = 2; n = 1 ; Q = 4. It uses data patterns of size 2 and encodes the 2-
bit patterns as one signal element belonging to a four-level signal.
226
Figure 53: Multilevel coding scheme: 2BIQ
8B6T (eight binary, six ternary)
Here a pattern of 8 bits is encoded a pattern of 6 signal elements, where the
signal has three levels
Here m = 8; n = 6 ; T = 3
So we can have 28 =256 different data patterns and 36 =478 different signal
patterns.
227
Codes can be created that are differential at the bit level forcing transitions
at bit boundaries. This results in a bandwidth requirement that is equivalent
to the bit rate.
In some instances, the bandwidth requirement may even be lower, due to
repetitive patterns resulting in a periodic signal.
MLT-3
o Signal rate is same as NRZ-I
o Uses three levels (+v, 0, and - V) and three transition rules to move
between the levels.
If the next bit is 0, there is no transition.
If the next bit is 1 and the current level is not 0, the next level is 0.
If the next bit is 1 and the current level is 0, the next level is the opposite of
the last nonzero level.
15.1.2.6. Block Coding
Block coding adds redundancy to line coding so that error detection can be
implemented. Block coding changes a block of m bits into a block of n bits,
where n is larger than m. Block coding is referred to as an mB/nB encoding
technique.
The additional bits added to the original m bits are called parity bits or
check bits
228
Figure 55: Block Coding
15.2. Analog Data to Analog Signal Conversion
15.2.1. Modulation
The Process of converting analog data to analog signal is called Modulation.
Modulation is used to send an information bearing signal over long
distances. Modulation is the process of varying some characteristic of a
periodic wave with an external signal called carrier signal. These carrier
signals are high frequency signals and can be transmitted over the air easily
and are capable of traveling long distances. The characteristics (amplitude,
frequency, or phase) of the carrier signal are varied in accordance with the
information bearing signal (analog data). Modulation is required to achieve:
High range transmission; Quality of transmission; and to avoid the
overlapping of signals. Practically speaking, modulation is required for;
i. High range transmission
ii. Quality of transmission
iii. To avoid the overlapping of signals.
229
Figure 56: Types of Modulation
15.2.2. Analog Modulation
If analog audio data is modulated onto a carrier sine wave, then this is
referred to as analog modulation. Analog Modulation can be accomplished
in three ways: Amplitude modulation (AM), Frequency modulation (FM),
and Phase modulation (PM).
15.2.2.1. Amplitude Modulation
Amplitude modulation is a type of modulation where the amplitude of the
carrier signal is varied in accordance with modulating signal. The envelope,
or boundary, of the amplitude modulated signal embeds modulating signal.
Amplitude Modulation is abbreviated AM. Amplitude modulation is a
process by which the wave signal is transmitted by modulating the
amplitude of the signal. It is often called AM and is commonly used in
230
transmitting a piece of information through a radio carrier wave. Amplitude
modulation is mostly used in the form of electronic communication. There
are three main types of amplitude modulation. Double sideband-suppressed
carrier modulation (DSB-SC); Single Sideband Modulation (SSB);
Vestigial Sideband Modulation (VSB).
231
i. Broadcast Transmissions: AM is used in broadcasting
transmission over the short, medium and long wavebands.
Since AM is easy to demodulate radio receivers for
amplitude modulation are therefore easier and cheaper to
manufacture.
ii. Air-band radio: AM is used in the VHF transmissions for
many airborne applications such as ground-to-air radio
communications or two-way radio links for ground staff
personnel.
iii. HF radio links or point-to-point HF links: Single sideband:
Amplitude modulation in this form is used for HF radio links
or point-to-point HF links. AM uses a lower bandwidth and
provides more effective use of the transmitted power.
iv. Quadrature amplitude modulation: AM is used extensively
in transmitting data in several ways including short-range
wireless links such as Wi-Fi to cellular telecommunications
and others.
15.2.2.2. Frequency Modulation
Frequency modulation is a type of modulation where the frequency of the
carrier is varied in accordance with the modulating signal. The amplitude of
the carrier remains constant. The information-bearing signal (the
modulating signal) changes the instantaneous frequency of the carrier. Since
the amplitude is kept constant, FM modulation is a low-noise process and
232
provides a high quality modulation technique which is used for music and
speech in hi-fidelity broadcasts.
233
IN view of the many advantages of frequency modulation it has been widely
used for high quality audio broadcasting as well as two way radio
communications as well as a number of other applications.
i. Resilience to noise: One particular advantage of frequency
modulation is its resilience to signal level variations. The
modulation is carried only as variations in frequency. This means
that any signal level variations will not affect the audio output,
provided that the signal does not fall to a level where the receiver
cannot cope. As a result this makes FM ideal for mobile radio
communication applications including more general two-way radio
communication or portable applications where signal levels are
likely to vary considerably. The other advantage of FM is its
resilience to noise and interference. It is for this reason that FM is
used for high quality broadcast transmissions.
ii. Easy to apply modulation at a low power stage of the
transmitter: Another advantage of frequency modulation is
associated with the transmitters. It is possible to apply the
modulation to a low power stage of the transmitter, and it is not
necessary to use a linear form of amplification to increase the power
level of the signal to its final value.
iii. It is possible to use efficient RF amplifiers with frequency
modulated signals: It is possible to use non-linear RF amplifiers
to amplify FM signals in a transmitter and these are more efficient
234
than the linear ones required for signals with any amplitude
variations (e.g. AM and SSB). This means that for a given power
output, less battery power is required and this makes the use of FM
more viable for portable two-way radio applications.
Disadvantages of frequency modulation
i. FM has poorer spectral efficiency than some other modulation
formats: Some phase modulation and quadrature amplitude
modulation formats have a higher spectral efficiency for data
transmission than frequency shift keying, a form of frequency
modulation. As a result, most data transmission system use PSK and
QAM.
ii. Requires more complicated demodulator: One of the minor
disadvantages of frequency modulation is that the demodulator is a
little more complicated, and hence slightly more expensive than the
very simple diode detectors used for AM. However this is much less
of an issue these days because many radio integrated circuits
incorporate a built in frequency demodulator .
iii. Some other modes have higher data spectral efficiency: Some
phase modulation and quadrature amplitude modulation formats
have a higher spectral efficiency for data transmission that
frequency shift keying, a form of frequency modulation. As a result,
most data transmission system use PSK and QAM.
235
iv. Sidebands extend to infinity either side: The sidebands for an FM
transmission theoretically extend out to infinity. They are normally
significant for wideband frequency modulation transmissions,
although small for narrow band FM. To limit the bandwidth of the
transmission, filters are often used, and these introduce some
distortion of the signal. Normally this is not too much of an issue
although care has to be taken to include these filters for wideband
FM and to ensure they are properly designed.
Frequency modulation index
The frequency modulation index is the equivalent of the modulation index
for AM, but obviously related to FM. In view of the differences between
the two forms of modulation, the FM modulation index is measured in a
different way.
The FM modulation index is equal to the ratio of the frequency deviation to
the modulating frequency.
From the formula and definition of the modulation index, it can be seen that
there is no term that includes the carrier frequency and this means that it is
totally independent of the carrier frequency.
To give an example of the FM modulation index, take the example where a
signal has a deviation of ±5kHz, and the modulating frequency is 1kHz,
then the modulation index for this particular instance is 5 / 1 = 5.
Similarly, if the deviation is ±10 kHz and the modulating frequency is s
kHz, then this also has a deviation ratio of 5.
236
As normal audio has a variety of different frequencies contained within the
audio sound, the deviation ratio is normally calculated using the maximum
audio frequency and maximum deviation. This figure will then be used to
determine the bandwidth and other characteristics of the signal.
Where:
Δf = deviation
BT = total bandwidth (for 98% power)
fm = modulating frequency
237
To take the example of a typical broadcast FM signal that has a deviation
of ±75kHz and a maximum modulation frequency of 15 kHz, the bandwidth
of 98% of the power approximates to 2 (75 + 15) = 180kHz. To provide
conveniently spaced channels 200 kHz is allowed for each station.
The rule is also very useful when determining the bandwidth of many two
way radio communications systems. These use narrow band FM, and it is
particularly important that the sidebands do not cause interference to
adjacent channels that may be occupied by other users.
15.2.2.3. Pulse Modulation
In phase modulation, the instantaneous phase of a carrier wave is varied
from its reference value by an amount proportional to the instantaneous
amplitude of the modulating signal. Phase Modulation is abbreviated PM.
Pulse modulation is a type of modulation in which the signal is transmitted
in the form of pulses. It can be used to transmit analogue information. In
pulse modulation, continuous signals are sampled at regular intervals.
Pulse modulation can be classified into two major types.
i. Analogue: Indication of sample amplitude is infinitely variable
ii. Digital: Indicates sample amplitude at the nearest predetermined
level.
Types of Pulse modulation
Pulse Amplitude Modulation (PAM)
It is the simplest form of Pulse Modulation. In this type of modulation, each
sample is made proportional to the amplitude of the signal at the instant of
238
sampling. The PAM signal follows the amplitude of the original signal, as
the signal traces out the path of the whole wave. Here a signal which is
sampled at Nyquist rate can be reconstructed by passing it through an
efficient Low Pass Filter (LPF) with exact cutoff frequency. It is very easy
to generate and demodulate PAM. This technique transmits the data by
encoding in the amplitude of a series of signal pulses.
There are two types of PAM.
1. Single Polarity PAM: A fixed DC level is added to the signal so
that the signal is always positive.
2. Double Polarity PAM: Here the pulses are both positive and
negative.
PAM is illustrated in the figure below.
Advantages of PAM
Both Modulation and demodulation are simple.
239
Easy construction of transmitter and receiver circuits.
Disadvantages of PAM
Large bandwidth is required for transmission.
More noise.
Here the amplitude is varying. Therefore, the power required will
be more.
Applications of PAM
Mainly used in Ethernet communication.
Many microcontrollers use this technique in order to generate
control signals.
It is used in Photo-biology.
It acts as an electronic driver for LED circuits.
241
Applications of PTM
Used in encoding purposes in the telecommunication system.
Used to control brightness in a smart lighting system.
Helps to prevent overheating in LED’s while maintaining it’s
brightness.
Used in audio and video amplifiers.
Pulse Position Modulation
In this type of modulation, both the amplitude and width of the pulse are
kept constant. We vary the position of each pulse with reference to a
particular pulse. Here a single pulse is transmitted with the required number
of phase shifts. So we can say that pulse position modulation is an analogue
modulation scheme where the amplitude and width of the pulse are kept
constant, while the position of the pulse with respect to the position of a
reference pulse is varied according to the instantaneous value of message
signal.
PPM can be obtained from PWM. This is done by getting rid of leading-
edge and bodies of PWM pulses. The main advantage of pulse position
modulation is that it requires constant transmitter power output while the
major disadvantage is that it depends upon transmitter-receiver
synchronization.
The waveforms of PPM are given below:
242
However, the third type, pulse-frequency modulation is not used.
Advantages of PPM
i. As it has constant amplitude noise interference is less.
ii. We can easily separate signal from a noisy signal.
iii. Among all three types, it has the most power efficiency.
iv. Requires less power when compared to pulse amplitude
modulation.
Disadvantages of PPM
i. The system is highly complex.
ii. The system requires more bandwidth.
Applications of PPM
i. It is used in the air traffic control system and telecommunication
systems.
243
ii. Remote controlled cars, planes, trains use pulse code modulations.
iii. It is used to compress data and hence it is used for storage.
244
Advantages of PCM
i. It is mainly used in long distant communication.
ii. Transmitter efficiency is more.
iii. It has higher noise immunity when compared to other methods.
Disadvantages of PCM
i. More bandwidth is required when compared to analogue systems.
ii. In this method encoding, decoding and quantisation of the circuit
have to be done. This makes it more complex.
Applications of PCM
i. It is used in the satellite transmission system.
ii. It is also used in space communication.
iii. Used in Telephony.
iv. One of the recent applications is the compact disc.
Delta Modulation
In this type of modulation, the sampling rate is very high. Here, stepsize
after quantisation is of the smaller value. In this method, the quantisation
design is very simple. Here the bit rate can be designed by the user.
Block diagram of a delta modulator is given below:
245
15.3. Review Question
1. Carrier wave of frequency f = 1mHz with pack voltage of 20V
used to modulate a signal of frequency 1kHz with pack voltage of
10v. Find out the following
(i) μ?
(ii) Frequencies of modulated wave?
(iii) Bandwidth
2. If y = 10cos(1800 πt) + 20 cos 2000 πt + 10 cos 2200 πt. Find the
modulation index (μ) of the given wave.
3. Why carrier waves are of higher frequency compared to modulating
signal?
4. Define modulation index and what happen if modulation index is
greater than 1?
246
5. Highlights four importance of modulation.
6. Why carrier waves are of higher frequency compared to modulating
signal?
247
C
HAPTER SIXTEEN
MULTIPLEXING TECHNIQUES
250
If the channels are very close to one other, it leads to inter-channel cross
talk. Channels must be separated by strips of unused bandwidth to prevent
inter-channel cross talk. These unused channels between each successive
channel are known as guard bands as shown in Fig. below.
FDM are commonly used in radio broadcasts and TV networks. Since, the
frequency band used for voice transmission in a telephone network is 4000
251
Hz, for a particular cable of 48 KHz bandwidth, in the 70 to 108 KHz range,
twelve separate 4 KHz sub channels could be used for transmitting twelve
different messages simultaneously. Each radio and TV station, in a certain
broadcast area, is allotted a specific broadcast frequency, so that
independent channels can be sent simultaneously in different broadcast
area. For example, the AM radio uses 540 to 1600 KHz frequency bands
while the FM radio uses 88 to 108 MHz frequency bands.
16.2.2. Wavelength-Division Multiplexing
Wavelength-division multiplexing (WDM) is conceptually same as the
FDM, except that the multiplexing and demultiplexing involves light
signals transmitted through fibre-optic channels. The idea is the same: we
are combining different frequency signals. However, the difference is that
the frequencies are very high. It is designed to utilize the high data rate
capability of fibre-optic cable. Very narrow band of light signal from
different source are combined to make a wider band of light. At the receiver
the signals are separated with the help of a demultiplexer as shown in Fig.
below.
252
Multiplexing and demultiplexing of light signals can be done with the help
of a prism as shown in Figure that follows. From the basic knowledge of
physics we know that light signal is bent by different amount based on the
angle of incidence and wavelength of light as shown by different colours in
the figure. One prism performs the role of a multiplexer by combining lights
having different frequencies from different sources. The composite signal
can be transmitted through an optical fibre cable over long distances, if
253
required. At the other end of the optical fibre cable the composite signal is
applied to another prism to do the reverse operation, the function of a
demultiplexer.
254
As shown in the Fig 2.7.7 the composite signal has some dead space
between the successive sampled pulses, which is essential to prevent
interchannel cross talks. Along with the sampled pulses, one synchronizing
pulse is sent in each cycle. These data pulses along with the control
information form a frame. Each of these frames contain a cycle of time slots
and in each frame, one or more slots are dedicated to each data source. The
maximum bandwidth (data rate) of a TDM system should be at least equal
to the same data rate of the sources.
Synchronous TDM is called synchronous mainly because each time slot is
preassigned to a fixed source. The time slots are transmitted irrespective of
whether the sources have any data to send or not. Hence, for the sake of
simplicity of implementation, channel capacity is wasted. Although fixed
assignment is used TDM, devices can handle sources of different data rates.
This is done by assigning fewer slots per cycle to the slower input devices
than the faster devices. Both multiplexing and demultiplexing operation for
synchronous TDM are shown in Fig. 2.7.8.
255
16.2.4. Statistical Time-Division Multiplexing (STDM)
One drawback of the TDM approach, as discussed earlier, is that m
in the frame are wasted. It is because, if a particular terminal has no data to
transmit at particular instant of time, an empty time slot will be transmitted.
An efficient alternative to this synchronous TDM is statistical TDM, also
known as asynchronous TDM or Intelligent TDM. It dynamically
allocates the time slots on demand to separate input channels, thus saving
the channel capacity. As with Synchronous TDM, statistical multiplexers
also have many I/O lines with a buffer associated to each of them. During
the input, the multiplexer scans the input buffers, collecting data until the
frame is filled and send the frame. At the receiving end, the demultiplexer
receives the frame and distributes the data to the appropriate buffers. The
256
difference between synchronous TDM and asynchronous TDM is illustrated
with the help of Fig. 2.7.9. It may be noted that many slots remain unutilised
in case synchronous TDM, but the slots are fully utilized leading to smaller
time for transmission and better utilization of bandwidth of the medium. In
case of statistical TDM, the data in each slot must have an address part,
which identifies the source of data. Since data arrive from and are
distributed to I/O lines unpredictably, address information is required to
assure proper delivery as shown in Fig below. This leads to more overhead
per slot. Relative addressing can be used to reduce overloading.
257
16.2.5. Orthogonal Frequency Division Multiplexing
Orthogonal FDM's (OFDM) spread spectrum technique distributes the data
over a large number of carriers that are spaced apart t precise frequencies.
This spacing provides the “othorgonality” in this technique, which prevents
the demodulators from seeing frequencies other than their own.
The benefits of OFDM are high spectral efficiency, resiliency to RF
interference, and lower multi-path distortion. This is useful because in a
typical terrestrial broadcasting scenario there are multipath-channels (i.e.
the transmitted signal arrives at the receiver using various paths of different
length). Since multiple versions of the signal interfere with each other, it
becomes difficult to extract the original information. OFDM is sometimes
called multi-carrier or discrete multi-tone modulation.
258
16.3. Review Questions
1. Explain briefly the term multiplexing
2. With the aid of diagram describe briefly;
i. Wavelength Division multiplexing (WDM)
ii. Time Division Multiplexing (TDM)
iii. Frequency Division Multiplexing (FDM)
3. Suppose that a frequency band W Hz wide into M channels of equal
bandwidth.
a) What bit rate is achievable in each channel? Assume all channels
have the same SNR.
b) What bit rate is available to each M users if the entire frequency
band is used as a single channel and TDM is applied?
c) How does the comparison of (a) and (b) change if we suppose that
FDM require a guard band between adjacent channels? Assume
the guard band is 10%of channel bandwidth
4. Suppose Ray Power FM 100.5, has a large band of available bandwidth,
say 1GHz, which is to be used by central office to transmit and receive
from large number of users. Describe how the following approach can
be use to organizing the system:
a) A single TDM
b) A hybrid TDM/FDM system in which the frequency band is
divided into multiple channel and time division multiplexing is
used within each channel.
259
5. What limitation of TDM is overcome in ATM and how?
6. Outline the four major benefits of Orthogonal Frequency Division
Multiplexing.
7. What is the difference between Frequency Division Multiplexing and
Wave Division Multiplexing?
8. How is the wastage of bandwidth in TDM overcome by S-TDM
9. Why sync pulse is required in TDM?
10. Why guard bands are used in FDM?
260
Bibliography
Shu Lin; Daniel J. Costello, Jr. (1983). Error Control Coding:
Fundamentals and Applications. Prentice Hall. ISBN 0-13-283796-
X.
Alberto Leon-Garcial and Indra Widjaja. Communication Networks,
Fundmental Concepts and Key Architecture. Second Edition,
McGraw-Hill Publishing Company, New dehlhi 2004
Bertsekas, D. and R. Gallager, Data Networks, Prentice-Hall, Englewood
Cliffs, 1992
Clack, M. P., Network and Telecommunication: Design and Operation,
John Willey and Sons, New York, 1997.
Jain, B. N. and A.K. Agrawala. Open System Interconnection: Its
architecture and Protocol. McGraw-Hill. New York 1993
William Buchanan, Distributed Systems and Networks, McGraw-Hill
Publishing Company, 2000.
Yekini and Lawal 2010, Introduction to ICT and data Processing, Hasfem
Publication Nigeria.
Yekini et al, 2020. Fundamental of Computing, Hasfem Publication
Nigeria.
261
Index
Denial-of-Service, 124
A Digital Signal, 150, 151, 154, 169, 173, 221
Domain Name System (DNS, 112
Access Point, 58, 103
Amplitude, 147, 227, 230 E
Analog Signal, 145, 168, 229
Application Layer, 129, 180 Encryption, 126
Asynchronous Transmission, 159
Attenuation Distortion, 200
F
B Firewall, 128
Fourier series, 166
Bandpass Channel, 153, 154 Frequency, 147, 155, 230, 232, 249, 258, 259, 260
Bandwidth, 165, 168, 169, 171, 172, 173, 190 Full Duplex Data Flow, 136
Baseband Transmission, 154
Baud Rate, 153
Bit Rate, 153
G
Bridges, 54, 55 Gateway, 52, 56, 60, 110, 111
Broadband Transmission, 154
Brouters, 58
Burst errors, 207 H
Bus Topology, 62, 63, 65, 66
Half Duplex Data Flow, 135
Hardware (Peripherals) Sharing, 24
C Henry Nyquist, 171
Hubs, 53, 78
Client Server Model, 31 Hybrid Topology, 74, 75, 76
Client-based network, 34, 35
Client-based Networks, 34
Composite Signal, 149, 153 I
Computer Network, 23, 26, 35
Information Sharing, 23
Crosstalk, 201, 203
Infra-Red, 198
Cyclic Redundancy Check, 210
Internet, 111
Internetwork, 30
D IP Session Hijacking, 123
IP Spoofing, 123
Data Communication Equipment, 141
Data Destruction, 126
Data Diddling, 125 L
Data Link Layer, 177
Line Encoding, 221
Data Terminal Equipment, 141, 142, 143
Local Area Network, 27, 89
De facto Standard, 36
De jure standard, 36
262
M Ping, 110, 111, 112, 121
Presentation Layer, 180
Mesh Topology, 71, 72 Proxies, 113
Metropolitan Area Network, 28 Proxy, 113
Microwave, 138, 195, 197
Modem, 51, 60
R
Multiple bit errors, 206
Multiplexing, 259 Radio Wave, 195
MULTIPLEXING TECHNIQUES, 248 Repeaters, 53, 197
Ring Topology, 67, 68, 76
N Routers, 56, 57
263