DC-Module 1
DC-Module 1
DC-Module 1
MODULE 1: INTRODUCTION
Data Communications
• Data Communication is defined as exchange of data between 2 devices over a transmission-medium.
• A communication-system is made up of
→ Hardware (physical equipment) and
→ Software (programs)
• For data-communication, the communicating-devices must be part of a communication-system.
• Four attributes of a communication-system:
1) Delivery
The system must deliver data to the correct destination.
2) Accuracy
The system must deliver the data accurately.
Normally, the corrupted-data are unusable.
3) Timeliness
The system must deliver audio/video data in a timely manner.
This kind of delivery is called real-time transmission.
Data delivered late are useless.
4) Jitter
Jitter refers to the variation in the packet arrival-time.
In other words, jitter is the uneven delay in the delivery of audio/video packets.
Fig 1.1
1) Message
Message is the information (or data) to be communicated.
Message may consist of
→ Number/text
→ Picture or
→ Audio/Video
2) Sender
Sender is the device that sends the data-message.
Sender can be
→ Computer and
→ Mobile phone
3) Receiver
Receiver is the device that receives the message.
Receiver can be
→ Computer and
→ Mobile phone
4) Transmission Medium
Transmission-medium is physical-path by which a message travels from sender to receiver.
Transmission-medium can be wired or wireless.
Examples of wired medium:
→ Twisted-pair wire (used in landline telephone)
→ Coaxial cable (used in cable TV network)
→ Fiber-optic cable
Examples of wireless medium:
→ Radio waves
→ Microwaves
→ Infrared waves (ex: operating TV using remote control)
5) Protocol
A protocol is a set of rules that govern data-communications.
In other words, a protocol represents an agreement between the communicating-devices.
Without a protocol, 2 devices may be connected but not communicating.
Data Representation
• Five different forms of information:
1) Text
Text is represented as a bit-pattern. (Bit- bits: 0s or 1s).
Different sets of bit-patterns are used to represent symbols (or characters).
Each set is called a code.
The process of representing symbols is called encoding.
Popular encoding system: ASCII, Unicode.
2) Number
Number is also represented as a bit-pattern.
Dept. of CSE, CEC Page 2
Data Communication (17CS46)
ASCII is not used to represent number. Instead, number is directly converted to binary-form.
3) Image
Image is also represented as a bit-pattern.
An image is divided into a matrix of pixels (picture-elements).
A pixel is the smallest ele
The size of an image depends upon number of pixels (also called resolution).
For example: An image can be divided into 1000 pixels or 10,000 pixels.
Two types of images:
i) Black & White Image
¤ If an image is black & white, each pixel can be represented by a value either 0 or 1.
¤ For example: Chessboard
ii) Color Image
¤ There are many methods to represent color images.
¤ RGB is one of the methods to represent color images.
¤ RGB is called so called ‘.’ each color is combination of 3 colors: red, green & blue.
4) Audio
Audio is a representation of sound.
By nature, audio is different from text, numbers, or images. Audio is continuous, not discrete.
5) Video
Video is a representation of movie.
Video can either
→ be produced as a continuous entity (e.g., by a TV camera), or
→ be a combination of images arranged to convey the idea of motion.
Fig 1.2
1) Simplex
The communication is unidirectional
(For ex: The simplex mode is like a one-way street).
On a link, out of 2 devices:
i) Only one device can transmit.
ii) Another device can only receive.
For example (Figure 1.2a):
The monitor can only accept output.
Entire-capacity of channel is used to send the data in one direction.
2) Half-Duplex
Both the stations can transmit as well as receive but not at the same time.
(For ex: The half-duplex mode is like a one-lane road with 2 directional traffic).
When one station is sending, the other can only receive and vice-versa.
For example (Figure 1.2b): Walkie-talkies
Entire-capacity of a channel is used by one of the 2 stations that are transmitting the data.
3) Full-Duplex
Both stations can transmit and receive at the same time.
(For ex: The full-duplex is like a 2-way street with traffic flowing in both directions at the same
time).
For example (Figure 1.2c):
Mobile phones (When 2 people are communicating by a telephone line, both can listen and talk at the
same time)
Entire-capacity of a channel is shared by both the stations that are transmitting the data.
Networks
• A network is defined as a set of devices interconnected by communication-links.
• This interconnection among computers facilitates information sharing among them.
• Computers may connect to each other by either wired or wireless media.
• Often, devices are referred to as nodes.
• A node can be any device capable of sending/receiving data in the network.
• For example: Computer & Printer
• The best-known computer network is the Internet.
Network Criteria
• A network must meet following 3 criteria’s:
1) Performance
Performance can be measured using i) Transit-time or ii) Response-time.
i) Transit Time is defined as time taken to travel a message from one device to another.
ii) Response Time is defined as the time elapsed between enquiry and response.
The network-performance depends on following factors:
i) Number of users
ii) Type of transmission-medium
iii) Efficiency of software
Performance is evaluated by 2 networking-metrics: i) throughput and ii) delay.
Good performance can be obtained by achieving higher throughput and smaller delay times
2) Reliability
Reliability is measured by
→ Frequency of network-failure
→ Time taken to recover from a network-failure
→ Network's robustness in a disaster
More the failures are, less is the network's reliability.
3) Security
Security refers to the protection of data from the unauthorized access or damage.
It also involves implementing policies for recovery from data-losses.
Physical Structures
Type of Connection
• Two types of connections (Figure 1.3):
1) Point-to-Point
Only two devices are connected by a dedicated-link (Figure 1.3a).
Entire-capacity of the link is reserved for transmission between those two devices.
For example: Point-to-Point connection b/w remote-control & TV for changing the channels.
2) Multipoint (Multi-drop)
Three or more devices share a single link.
The capacity of the channel is shared, either spatially or temporally (Figure 1.3b).
i) If link is used simultaneously by many devices, then it is spatially shared connection.
ii) If user takes turns while using the link, then it is time shared (temporal) connection.
(spatiallyspace or temporallytime)
Physical Topology
• The physical-topology defines how devices are connected to make a network.
• Four basic topologies are:
1) Mesh
2) Star
3) Bus and
4) Ring
Mesh Topology
• All the devices are connected to each other (Figure 1.7).
• There exists a dedicated point-to-point link between all devices.
• There are n(n-1) physical channels to link n devices.
• Every device not only sends its own data but also relays data from other nodes.
• For ‘n’ nodes,
→ There are n(n-1) physical-links
→ There are n(n-1)/2 duplex-mode links
• Every device must have (n–1) I/O ports to be connected to the other (n-1) devices.
• Advantages:
1) Congestion reduced: Each connection can carry its own data load.
2) Robustness: If one link fails, it does not affect the entire system.
3) Security: When a data travels on a dedicated-line, only intended-receiver can see the data.
4) Easy fault identification & fault isolation: Traffic can be re-routed to avoid problematic links.
• Disadvantages:
1) Difficult installation and reconfiguration.
2) Bulk of wiring occupies more space than available space.
3) Very expensive: as there are many redundant connections.
4) Not mostly used in computer networks. It is commonly used in wireless networks.
5) High redundancy of the network-connections.
Bus Topology
• All the devices are connected to the single cable called bus (Figure 1.4).
• Every device communicates with the other device through this bus.
• A data from the source is broadcasted to all devices connected to the bus.
• Only the intended-receiver, whose physical-address matches, accepts the data.
Star Topology
• All the devices are connected to a central controller called a hub (Figure 1.5).
• There exists a dedicated point-to-point link between a device & a hub.
• The devices are not directly linked to one another. Thus, there is no direct traffic between devices.
• The hub acts as a junction:
If device-1 wants to send data to device-2, the device-1 sends the data to the hub, then the hub relays the data
to the device-2.
• Advantages:
1) Less expensive: Each device needs only one link & one I/O port to connect it to any devices.
2) Easy installation & reconfiguration: Nodes can be added/removed w/o affecting the network.
3) Robustness: If one link fails, it does not affect the entire system.
4) Easy to detect and troubleshoot fault.
5) Centralized management: The hub manages and controls the whole network.
• Disadvantages:
1) Single point of failure: If the hub goes down, the whole network is dead.
2) Cable length required is the more compared to bus/ring topologies.
3) Number of nodes in network depends on capacity of hub.
Ring Topology
• Each device is connected to the next, forming a ring (Figure 1.6).
• There are only two neighbors for each device.
• Data travels around the network in one direction till the destination is reached.
• Sending and receiving of data takes place by the help of token.
• Each device has a repeater.
• A repeater
→ Receives a signal on transmission-medium &
→ Regenerates & passes the signal to next device.
• Advantages:
1) Easy installation and reconfiguration.
2) To add/delete a device, requires changing only 2 connections.
3) Fault isolation is simplified. If one device does not receive a signal within a specified period, it can
issue an alarm. The alarm alerts the network-operator to the problem and its location.
4) Congestion reduced: Because all the traffic flows in only one direction.
• Disadvantages:
1) Unidirectional traffic.
2) A fault in the ring/device stops all transmission.
The above 2 drawbacks can be overcome by using dual ring.
3) There is a limit on
i) Cable length &
ii) Number of nodes that can be connected.
4) Slower: Each data must pass through all the devices between source and destination.
Network Types
• Two popular types of networks:
1) LAN (Local Area Network) &
2) WAN (Wide Area Network)
LAN
• LAN is used to connect computers in a single office, building or campus (Figure 1.8).
• LAN is usually privately owned network.
• A LAN can be simple or complex.
1) Simple: LAN may contain 2 PCs and a printer.
2) Complex: LAN can extend throughout a company.
• Each host in a LAN has an address that uniquely defines the host in the LAN.
• A packet sent by a host to another host carries both source host’s and destination host’s addresses.
• LANs use a smart connecting switch.
• The switch is able to
→ Recognize the destination address of the packet &
→ Guide the packet to its destination.
• The switch
Dept. of CSE, CEC Page 9
Data Communication (17CS46)
WAN
• WAN is used to connect computers anywhere in the world.
• WAN can cover larger geographical area. It can cover cities, countries and even continents.
• WAN interconnects connecting devices such as switches, routers, or modems.
• Normally, WAN is
→ Created & run by communication companies (Ex: BSNL, Airtel)
→ Leased by an organization that uses it.
• A WAN can be of 2 types:
1) Point-to-point WAN
A point-to-point WAN is a network that connects 2 communicating devices through a transmission
media (Figure 1.9).
Switched WAN
A switched WAN is a network with more than two ends.
The switched WAN can be the backbones that connect the Internet.
A switched WAN is a combination of several point-to-point WANs that are connected by switches
(Figure 1.10).
Internetwork
-network) (Figure 1.12).
• For example (Figure 1.11):
Assume that an organization has two offices,
i) First office is on the east coast &
ii) Second office is on the west coast.
Each office has a LAN that allows all employees in the office to communicate with each other.
To allow communication between employees at different offices, the management leases a point-to-point
dedicated WAN from a ISP and connects the two LANs.(ISP(Internet Service Provider) such as a telephone
company ex: BSNL).
When a host in the west coast office sends a message to another host in the same office, the router blocks the
message, but the switch directs the message to the destination.
On the other hand, when a host on the west coast sends a message to a host on the east coast, router R1
routes the packet to router R2, and the packet reaches the destination.
Switching
• An internet is a switched network in which a switch connects at least two links together.
• A switch needs to forward data from a network to another network when required.
• Two types of switched networks are 1)Circuit-switched and 2) Packet-switched networks.
Circuit-Switched Network
A dedicated connection, called a circuit, is always available between the two end systems. The switch can
only make it active or inactive.
¤ As shown in Figure 1.13, the 4 telephones at each side are connected to a switch.
¤ The switch connects a telephone at one side to a telephone at the other side.
¤ A high-capacity line can handle 4 voice communications at the same time.
¤ The capacity of high line can be shared between all pairs of telephones.
¤ The switch is used for only forwarding.
Advantage:
A circuit-switched network is efficient only when it is working at its full capacity.
Disadvantage:
Most of the time, the network is inefficient because it is working at partial capacity.
Packet-Switched Network
In a computer network, the communication between the 2 ends is done in blocks of data called packets. The
switch is used for both storing and forwarding because a packet is an independent entity that can be stored
and sent later.
¤ As shown in Figure 1.14, the 4 computers at each side are connected to a router.
¤ A router has a queue that can store and forward the packet.
¤ The high-capacity line has twice the capacity of the low-capacity line.
¤ If only 2 computers (one at each site) need to communicate with each other, there is no waiting for the
packets.
¤ However, if packets arrive at one router when high-capacity line is at its full capacity, the packets should
be stored and forwarded.
Advantages:
A packet-switched network is more efficient than a circuit switched network.
Disadvantage:
The packets may encounter some delays.
Internet Standards
• An Internet standard is a thoroughly tested specification useful to those who work with the Internet.
• The Internet standard is a formalized-regulation that must be followed.
• There is a strict procedure by which a specification attains Internet standard status.
• A specification begins as an Internet draft.
• An Internet draft is a working document with no official status and a 6-month lifetime.
• Upon recommendation from the Internet authorities, a draft may be published as a RFC.
• Each RFC is edited, assigned a number, and made available to all interested parties.
• RFCs go through maturity levels and are categorized according to their requirement level. (working
document a work in progress RFC(Request for Comment)
Dept. of CSE, CEC Page 15
Data Communication (17CS46)
Maturity Levels
• An RFC, during its lifetime, falls into one of 6 maturity levels (Figure 1.16):
1) Proposed Standard
Proposed standard is specification that is stable, well-understood & of interest to Internet community.
Specification is usually tested and implemented by several different groups.
2) Draft Standard
A proposed standard is elevated to draft standard status after at least 2 successful independent and
interoperable implementations.
3) Internet Standard
A draft standard reaches Internet standard status after demonstrations of successful implementation.
4) Historic
The historic RFCs are significant from a historical perspective.
They either
→ Have been superseded by later specifications or
→ Have never passed the necessary maturity levels to become an Internet standard.
5) Experimental
An RFC classified as experimental describes work related to an experimental situation.
Such an RFC should not be implemented in any functional Internet service.
6) Informational
An RFC classified as informational contains general, historical, or tutorial information related to the
Internet.
Usually, it is written by a vendor.
ISOC (Internet Society)
IAB (Internet Architecture Board)
IETF (Internet Engineering Task Force)
IRTF (Internet Research Task Force)
IESG (Internet Engineering Steering Group)
IRSG (Internet Research Steering Group)
Requirement Levels
Dept. of CSE, CEC Page 16
Data Communication (17CS46)
Internet Administration
1) ISOC
• ISOC is a nonprofit organization formed to provide support for Internet standards process (Fig 1.17).
• ISOC maintains and supports other Internet administrative bodies such as IAB, IETF, IRTF, and IANA.
2) IAB
• IAB is the technical advisor to the ISOC.
• Two main purposes of IAB:
i) To oversee the continuing development of the TCP/IP Protocol Suite
ii) To serve in a technical advisory capacity to research members of the Internet community.
• Another responsibility of the IAB is the editorial management of the RFCs.
• IAB is also the external liaison between the Internet and other standards organizations and forums.
• IAB has 2 primary components: i) IETF and ii) IRTF.
i) IETF
IETF is a forum of working groups managed by the IESG.
IETF is responsible for identifying operational problems & proposing solutions to the
problems
IETF also develops and reviews specifications intended as Internet standards.
The working groups are collected into areas, and each area concentrates on a specific topic.
Currently 9 areas have been defined. The areas include applications, protocols, routing,
network management next generation (IPng), and security.
ii) IRTF
IRTF is a forum of working groups managed by the IRSG.
IRTF focuses on long-term research topics related to Internet protocols, applications,
architecture, and technology.
NETWORK MODELS
Protocol Layering
• A protocol defines the rules that both the sender and receiver and all intermediate devices need to follow to
be able to communicate effectively.
• When communication is simple, we may need only one simple protocol.
When communication is complex, we need to divide the task b/w different layers. We need a protocol at
each layer, or protocol layering.
Scenarios
First Scenario
• In the first scenario, communication is so simple that it can occur in only one layer (Figure 2.1).
• Assume Maria and Ann are neighbours with a lot of common ideas.
• Communication between Maria and Ann takes place in one layer, face to face, in the same language
Second Scenario
• Maria and Ann communicate using regular mail through the post office (Figure 2.2).
• However, they do not want their ideas to be revealed by other people if the letters are intercepted.
• They agree on an encryption/decryption technique.
• The sender of the letter encrypts it to make it unreadable by an intruder; the receiver of the letter decrypts it
to get the original letter.
Protocol Layering
• Protocol layering enables us to divide a complex task into several smaller and simpler tasks.
• Modularity means independent layers.
• A layer (module) can be defined as a black box with inputs and outputs, without concern about how inputs
are changed to outputs.
• If two machines provide the same outputs when given the same inputs, they can replace each other.
• Advantages:
1) It allows us to separate the services from the implementation.
2) There are intermediate systems that need only some layers, but not all layers.
• Disadvantage:
1) Having a single layer makes the job easier. There is no need for each layer to provide a service to
the upper layer and give service to the lower layer.
Logical Connections
• We have layer-to-layer communication (Figure 2.3).
• There is a logical connection at each layer through which 2 end systems can send the object created from
that layer.
• The term hierarchical means that each upper level protocol is supported by the services provided by one or
more lower level protocols.
• The router is involved in only three layers; there is no transport or application layer.
• A router is involved in n combinations of link and physical layers. where n = number of links the router is
connected to.
• The reason is that each link may use its own data-link or physical protocol.
• A link-layer switch is involved only in two layers: i) data-link and ii) physical.
• As shown in the figure 2.6, the duty of the application, transport, and network layers is end-to-end.
• However, the duty of the data-link and physical layers is hop-to-hop. A hop is a host or router.
• The domain of duty of the top three layers is the internet.
The domain of duty of the two lower layers is the link.
• In top 3 layers, the data unit should not be changed by any router or link-layer switch.
In bottom 2 layers, the data unit is changed only by the routers, not by the link-layer switches.
• Identical objects exist between two hops. Because router may fragment the packet at the network layer and
send more packets than received (Figure 2.7).
• The link between two hops does not change the object.
Network Layer
• The network layer is responsible for source-to-destination transmission of data.
• The network layer is also responsible for routing the packet.
• The routers choose the best route for each packet.
• Why we need the separate network layer?
1) The separation of different tasks between different layers.
2) The routers do not need the application and transport layers.
• TCP/IP model defines 5 protocols:
1) IP (Internetworking Protocol) 2) ARP (Address Resolution Protocol)
3) ICMP (Internet Control Message Protocol) 4) IGMP (Internet Group Message Protocol)
1) IP
IP is the main protocol of the network layer.
IP defines the format and the structure of addresses.
IP is also responsible for routing a packet from its source to its destination.
It is a connection-less & unreliable protocol.
i) Connection-less means there is no connection setup b/w the sender and the receiver.
ii) Unreliable protocol means
2) ARP
ARP is used to find the physical-address of the node when its Internet-address is known.
Physical address is the 48-bit address that is imprinted on the NIC or LAN card.
Internet address (IP address) is used to uniquely & universally identify a device in the internet.
3) ICMP
ICMP is used to inform the sender about datagram-problems that occur during transit.
4) IGMP
IGMP is used to send the same message to a group of recipients.
Transport Layer
• TL protocols are responsible for delivery of a message from a process to another process.
• The transport layer
→ gets the message from the application layer
→ encapsulates the message in a packet called a segment and
→ sends the segment to network layer.
• TCP/IP model defines 3 protocols:
1) TCP (Transmission Control Protocol)
2) UDP (User Datagram Protocol) &
3) SCTP (Stream Control Transmission Protocol)
1) TCP
TCP is a reliable connection-oriented protocol.
A connection is established b/w the sender and receiver before the data can be transmitted.
TCP provides
→ flow control
→ error control and
→ congestion control
2) UDP
UDP is the simplest of the 3 transport protocols.
It is an unreliable, connectionless protocol.
It does not provide flow, error, or congestion control.
Each datagram is transported separately & independently.
Dept. of CSE, CEC Page 24
Data Communication (17CS46)
Application Layer
• The two application layers exchange messages between each other.
• Communication at the application layer is between two processes (two programs running at this layer).
• To communicate, a process sends a request to the other process and receives a response.
• Process-to-process communication is the duty of the application layer.
• TCP/IP model defines following protocols:
1) SMTP (Simple Mail Transfer Protocol) is used to transport email between a source and
destination.
2) TELNET (Terminal Network) is used for accessing a site remotely.
3) FTP(File Transfer Protocol) is used for transferring files from one host to another.
4) DNS (Domain Name System) is used to find the IP address of a computer.
5) SNMP(Simple Network Management Protocol) is used to manage the Internet at global and local
levels.
6) HTTP(Hyper Text Transfer Protocol) is used for accessing the World Wide Web (WWW).
Addressing
• We have logical communication between pairs of layers.
• Any communication that involves 2 parties needs 2 addresses: source address and destination address.
Dept. of CSE, CEC Page 26
Data Communication (17CS46)
OSI Model
• OSI model was developed by ISO.
• ISO is the organization, OSI is the model.
• Purpose: OSI was developed to allow systems with diff. platforms to communicate with each other.
• Platform means hardware, software or operating system.
• OSI is a network-model that defines the protocols for network communications.
• OSI has 7 layers as follows (Figure 2.11):
1) Application Layer
2) Presentation Layer
3) Session Layer
4) Transport Layer
5) Network Layer
6) Data Link Layer
7) Physical Layer
• Each layer has specific duties to perform and has to co-operate with the layers above & below it.
DIGITAL SIGNALS
• Information can be represented by a digital signal.
• For example:
1) 1 can be encoded as a positive voltage.0 can be encoded as a zero voltage (Figure 3.17a).
2) A digital signal can have more than 2 levels (Figure 3.17b).
Qn 1. A digital signal has eight levels. How many bits are needed per level? We calculate the number of bits
from the following formula. Each signal level is represented by 3 bits.
Bit Rate
• The bit rate is the number of bits sent in 1s.
• The bit rate is expressed in bits per second (bps).
Qn 2. Assume we need to download text documents at the rate of 100 pages per second. What is the required
bit rate of the channel?
Solution:
A page is an average of 24 lines with 80 characters in each line. If we assume that one character requires 8
bits, the bit rate is
Qn 3. A digitized voice channel, as we will see in Chapter 4, is made by digitizing a 4-kHz bandwidth
analog voice signal. We need to sample the signal at twice the highest frequency (two samples per hertz).
We assume that each sample requires 8 bits. What is the required bit rate?
Bit Length
• The bit length is the distance one bit occupies on the transmission medium.
Bit length = propagation speed × bit duration
Baseband Transmission
• Baseband transmission means sending a digital signal over a channel without changing the digital
signal to an analog signal (Figure 3.19).
A) Rough Approximation
¤ Assume that we have a digital signal of bit rate N (Figure 3.22).
¤ If we want to send analog signals to roughly simulate this signal, we need to consider the worst case, a
maximum number of changes in the digital signal.
¤ This happens when the signal carries the sequence 01010101 . . or 10101010. . . .
¤ To simulate these two cases, we need an analog signal of frequency f = N/2.
¤ Let 1 be the positive peak value and 0 be the negative peak value.
¤ We send 2 bits in each cycle; the frequency of the analog signal is one-half of the bit rate, or N/2.
¤ This rough approximation is referred to as using the first harmonic (N/2) frequency.
The required bandwidth is
B) Better Approximation
¤ To make the shape of the analog signal look more like that of a digital signal, we need to add more
harmonics of the frequencies (Figure 3.23).
¤ We can increase the bandwidth to 3N/2, 5N/2, 7N/2, and so on.
¤ In baseband transmission, the required bandwidth is proportional to the bit rate;
If we need to send bits faster, we need more bandwidth.
Qn.4. What is the required bandwidth of a low-pass channel if we need to send 1 Mbps by using baseband
transmission?
Qn.5. We have a low-pass channel with bandwidth 100 kHz. What is the maximum bit rate of this channel?
Solution
The maximum bit rate can be achieved if we use the first harmonic. The bit rate is 2 times the available
bandwidth, or 200 kbps.
TRANSMISSION IMPAIRMENT
• Signals travel through transmission media, which are not perfect.
• The imperfection causes signal-impairment.
• This means that signal at beginning of the medium is not the same as the signal at end of medium.
• What is sent is not what is received.
• Three causes of impairment are (Figure 3.26):
1) Attenuation
2) Distortion &
3) Noise.
Attenuation
• As signal travels through the medium, its strength decreases as distance increases. This is called attenuation
(Figure 3.27).
• As the distance increases, attenuation also increases.
• For example:
Voice-data becomes weak over the distance & loses its contents beyond a certain distance.
• To compensate for this loss, amplifiers are used to amplify the signal.
Decibel
• The decibel (dB) measures the relative strengths of
→ 2 signals or
→ one signal at 2 different points.
• The decibel is negative if a signal is attenuated.
The decibel is positive if a signal is amplified.
Qn. 6.
Qn. 7. A signal travels through an amplifier, and its power is increased 10 times. Calculate power gained in
dB
Qn.8.
Qn. 9.
Distortion
• Distortion means that the signal changes its form or shape (Figure 3.29).
• Distortion can occur in a composite signal made of different frequencies.
• Different signal-components
→ have different propagation speed through a medium.
→ have different delays in arriving at the final destination.
• Differences in delay create a difference in phase if delay is not same as the period-duration.
• Signal-components at the receiver have phases different from what they had at the sender.
Dept. of CSE, CEC Page 38
Data Communication (17CS46)
Noise
• Noise is defined as an unwanted data (Figure 3.30).
• In other words, noise is the external energy that corrupts a signal.
• Due to noise, it is difficult to retrieve the original data/information.
• Four types of noise:
i) Thermal Noise
It is random motion of electrons in wire which creates extra signal not originally sent by transmitter.
ii) Induced Noise
Induced noise comes from sources such as motors & appliances.
These devices act as a sending-antenna. The transmission-medium acts as the receiving-antenna.
iii) Crosstalk
Crosstalk is the effect of one wire on the other.
One wire acts as a sending-antenna and the other as the receiving-antenna.
iv) Impulse Noise
Impulse Noise is a spike that comes from power-lines, lightning, and so on. (spike - a signal with high
energy in a very short time)
• SNR is actually the ratio of what is wanted (signal) to what is not wanted (noise).
Dept. of CSE, CEC Page 39
Data Communication (17CS46)
¤ If no. of levels in a signal is 2, the receiver can easily distinguish b/w 0 and 1.
¤ If no. of levels is 64, the receiver must be very sophisticated to distinguish b/w 64 different levels.
¤ In other words, increasing the levels of a signal reduces the reliability of the system.
This formula does not consider the no. of levels of signals being transmitted (as done in the Nyquist
bit rate).
This means that no matter how many levels we have, we cannot achieve a data-rate higher than the
capacity of the channel.
In other words, the formula defines a characteristic of the channel, not the method of transmission.
Example 3.41
We have a channel with a 1-MHz bandwidth. The SNR for this channel is 63. What are the appropriate bit
rate and signal level?
Solution
First, we use the Shannon formula to find the upper limit.
The Shannon formula gives us 6 Mbps, the upper limit. For better performance we choose something lower,
4 Mbps, for example. Then we use the Nyquist formula to find the number of signal levels.
The Shannon capacity gives us the upper limit; the Nyquist formula tells us how many signal
levels we need.
PERFORMANCE
Bandwidth
• One characteristic that measures network-performance is bandwidth.
• Bandwidth of analog and digital signals is calculated in separate ways:
(1) Bandwidth of an Analog Signal (in hz)
Bandwidth of an analog signal is expressed in terms of its frequencies.
Bandwidth is defined as the range of frequencies that the channel can carry.
It is calculated by the difference b/w the maximum frequency and the minimum frequency.
In figure 3.13, the signal has a minimum frequency of F1 = 1000Hz and maximum frequency of F2 =
5000Hz.
Hence, the bandwidth is given by F2 – F1= 5000 - 1000 = 4000 Hz
Throughput
• The throughput is a measure of how fast we can actually send data through a network.
• Although, bandwidth in bits per second and throughput seem the same, they are actually different.
• A link may have a bandwidth of B bps, but we can only send T bps through this link with T always less
than B.
• In other words,
1) The bandwidth is a potential measurement of a link.
2) The throughput is an actual measurement of how fast we can send data.
For example:
¤ We may have a link with a bandwidth of 1 Mbps, but the devices connected to the end of the link may
handle only 200 kbps.
¤ This means that we cannot send more than 200 kbps through this link.
Latency (Delay)
The latency or delay defines how long it takes for an entire message to completely arrive at the destination
from the time the first bit is sent out from the source. We can say that latency is made of four components:
propagation time, transmission time, queuing time and processing delay.
Propagation Time
Propagation time measures the time required for a bit to travel from the source to the destination. The
propagation time is calculated by dividing the distance by the propagation speed.
The propagation speed of electromagnetic signals depends on the medium and on the frequency of the
signal. For example, in a vacuum, light is propagated with a speed of 3×108 m/s. It is lower in air; it is much
lower in cable.
Transmission Time
The time required for transmission of a message depends on
→ size of the message and
→ bandwidth of the channel.
The transmission time is given by
Note that in this case, because the message is very long and the bandwidth is not very high, the dominant
factor is the transmission time, not the propagation time. The propagation time can be ignored.
Queuing Time
Queuing-time is the time needed for each intermediate-device to hold the message before it can be
processed.
(Intermediate device may be a router or a switch)
The queuing-time is not a fixed factor. This is because
i) Queuing-time changes with the load imposed on the network.
Dept. of CSE, CEC Page 45
Data Communication (17CS46)
ii) When there is heavy traffic on the network, the queuing-time increases.
An intermediate-device
→ queues the arrived messages and
→ processes the messages one by one.
If there are many messages, each message will have to wait.
Processing Delay
Processing delay is the time taken by the routers to process the packet header.
Let us assume,
Bandwidth of the link = 1 bps Delay of the link = 5s.
From the figure 3.32, bandwidth-delay product is 1 x 5 = 5. Thus, there can be maximum 5 bits on the line.
There can be no more than 5 bits at any time on the link.
Let us assume,
Bandwidth of the link = 4 bps Delay of the link = 5s.
From the figure 3.33, bandwidth-delay product is 5 x 5 = 25. Thus, there can be maximum 25 bits on the
line.
At each second, there are 5 bits on the line, thus the duration of each bit is 0.20s.
• The above 2 cases show that the (bandwidth X delay) is the number of bits that can fill the link.
• This measurement is important if we need to
→ send data in bursts and
→ wait for the acknowledgment of each burst.
• To use the maximum capability of the link
→ We need to make the burst-size as (2 x bandwidth x delay).
→ We need to fill up the full-duplex channel (two directions).
• Amount (2x bandwidth x delay) is the number of bits that can be in transition at any time (Fig 3.34).
Jitter
• Another performance issue that is related to delay is jitter.
• We can say that jitter is a problem
→ if different packets of data encounter different delays and
→ if the application using the data at the receiver site is time-sensitive (for ex: audio/video).
• For example:
If the delay for the first packet is 20ms the delay for the second is 45ms and the delay for the third is 40ms
then the real-time application that uses the packets suffers from jitter.
DIGITAL TRANSMISSION
LINE CODING
• Line-coding is the process of converting digital-data to digital-signals (Figure 4.1).
• The data may be in the form of text, numbers, graphical images, audio, or video
• The data are stored in computer memory as sequences of bits (0s or 1s).
• Line-coding converts a sequence of bits to a digital-signal.
• At the sender, digital-data is encoded into a digital-signal.
At the receiver, digital-signal is decoded into a digital-data.
Characteristics
• Different characteristics of digital signal are
1) Signal Element vs Data Element
2) Data Rate vs Signal Rate
3) Bandwidth
4) Baseline Wandering
5) DC Components
6) Built-in Error Detection
7) Self-synchronization
8) Immunity to Noise and Interference
9) Complexity
Bandwidth
Digital signal that carries information is non-periodic.
The bandwidth of a non-periodic signal is continuous with an infinite range. However, most digital-
signals we encounter in real life have a bandwidth with finite values.
The effective bandwidth is finite.
The baud rate, not the bit-rate, determines the required bandwidth for a digital-signal.
More changes in the signal mean injecting more frequencies into the signal. (Frequency means
change and change means frequency.)
The bandwidth refers to range of frequencies used for transmitting a signal.
Relationship b/w baud rate (signal-rate) and the bandwidth (range of frequencies) is given as
Baseline Wandering
While decoding, the receiver calculates a running-average of the received signal-power. This average
is called the baseline.
The incoming signal-power is estimated against this baseline to determine the value of the data-
element.
A long string of 0s or 1s can cause a drift in the baseline (baseline wandering). Thus, make it difficult
for the receiver to decode correctly.
A good line-coding scheme needs to prevent baseline wandering.
DC Components
When the voltage-level in a digital-signal is constant for a while, the spectrum creates very low
frequencies.
These frequencies around zero are called DC (direct-current) components.
DC components present problems for a system that cannot pass low frequencies.
For example: Telephone line cannot pass frequencies below 200 Hz.
For Telephone systems, we need a scheme with no DC component.
Self Synchronization
To correctly interpret the signals received from the sender, the receiver's bit intervals must
correspond exactly to the sender's bit intervals.
If the receiver clock is faster or slower, the bit intervals are not matched and the receiver might
misinterpret the signals.
As shown in figure 4.3, we have a situation where the receiver has shorter bit duration. The sender
sends 10110001, while the receiver receives 110111000011.
A self-synchronizing digital-signal includes timing-information in the data being transmitted.
¤ This can be achieved if there are transitions in the signal that alert the receiver to the beginning,
middle, or end of the pulse.
¤ If the receiver’s clock is out-of-synchronization, these points can reset the clock.
Complexity
A complex scheme is more costly to implement than a simple one. For ex: A scheme that uses 4
signal-levels is more difficult to interpret than one that uses only 2 levels.
Unipolar Scheme
• All signal levels are either above or below the time axis.
NRZ (Non-Return-to-Zero)
The positive voltage defines bit 1 and the zero voltage defines bit 0 (Figure 4.5).
It is called NRZ because the signal does not return to 0 at the middle of the bit.
Disadvantages:
1) Compared to polar scheme, this scheme is very costly.
2) Also, the normalized power is double that for polar NRZ.
3) Not suitable for transmission over channels with poor performance around zero frequency.
(Normalized power -power needed to send 1 bit per unit line resistance)
Polar Schemes
• The voltages are on the both sides of the time axis.
• Polar NRZ scheme can be implemented with two voltages (V).
For example: -V for bit 1
+V for bit 0.
Non-Return-to-Zero (NRZ)
We use 2 levels of voltage amplitude.
Two versions of polar NRZ (Figure 4.6):
i) NRZ-L (NRZ-Level)
¤ The level of the voltage determines the value of the bit.
¤ For example: i) Voltage-level for 0 can be positive and
ii) Voltage-level for 1 can be negative.
ii) NRZ-I (NRZ-Invert)
¤ The change or lack of change in the level of the voltage determines the value of the bit.
¤ If there is no change, the bit is 0;
If there is a change, the bit is 1.
Disadvantages:
1) Baseline wandering is a problem for both variations (NRZ-L NRZ-I).
i) In NRZ-L, if there is a long sequence of 0s or 1s, the average signal-power becomes skewed.
The receiver might have difficulty discerning the bit value.
ii) In NRZ-I, this problem occurs only for a long sequence of 0s.
If we eliminate the long sequence of 0s, we can avoid baseline wandering.
3) In NRZ-L, problem occurs when there is a sudden change of polarity in the system.
For example:
In twisted-pair cable, a change in the polarity of the wire results in
→ all 0s interpreted as 1s and
→ all 1s interpreted as 0s.
¤ NRZ-I does not have this problem.
¤ Both schemes have an average signal-rate of N/2 Bd.
4) NRZ-L and NRZ-I both have a DC component problem.
Return-to-Zero (RZ)
In NRZ encoding, problem occurs when the sender-clock and receiver-clock are not synchronized.
Solution: Use return-to-zero (RZ) scheme (Figure 4.7).
RZ scheme uses 3 voltages: positive, negative, and zero.
There is always a transition at the middle of the bit. Either
i) from high to zero (for 1) or
ii) from low to zero (for 0)
Disadvantages:
1) RZ encoding requires 2 signal-changes to encode a bit and occupies greater bandwidth.
2) Complexity: RZ uses 3 levels of voltage, which is more complex to create and detect.
3) Problem occurs when there is a sudden change of polarity in the system. This result in
→ all 0s interpreted as 1s &
→ all 1s interpreted as 0s.
Advantages:
1) The Manchester scheme overcomes problems associated with NRZ-L.
Differential Manchester overcomes problems associated with NRZ-I.
2) There is no baseline wandering.
3) There is no DC component ‘.’ each bit has a positive & negative voltage contribution.
Disadvantage:
1) Signal-rate: Signal-rate for Manchester & diff. Manchester is double that for NRZ.
ii) Pseudoternary
Binary 1 is represented by a neutral 0 voltage.
Binary 0s are represented by alternating positive and negative voltages.
Advantages:
1) The bipolar scheme has the same signal-rate as NRZ.
2) There is no DC component ‘.’ each bit has a positive & negative voltage contribution.
3) The concentration of the energy is around frequency N/2.
Disadvantage:
1) AMI has a synchronization problem when a long sequence of 0s is present in the data.