Between
individuals, local communication usually occurs face to face, while remote communication takes place
over distance.
The word data refers to information presented in whatever form is agreed upon by the parties creating
and using the data.
Data communications are the exchange of data between two devices via some form oftransmission
medium such as a wire cable.
I. Delivery: The system must deliver data to the correct destination. Data must be received by the
intended device or user and only by that device or user.
II. Accuracy: The system must deliver the data accurately. Data that have been altered in
transmission and left uncorrected are unusable.
III. Timeliness: The system must deliver data in a timely manner. Data delivered late are useless. In
the case of video and audio, timely delivery means delivering data as they are produced, in the
same order that they are produced, and without significant delay. This kind ofdelivery is called
real-time transmission.
IV. Jitter: Jitter refers to the variation in the packet arrival time. It is the uneven delay in the
delivery ofaudio or video packets. For example, let us assume that video packets are sent every
3D ms.Ifsome ofthe packets arrive with 3D-ms delay and others with 4D-ms delay, an uneven
quality in the video is the result.
Data Representation
Information today comes in different forms such as text, numbers, images, audio, and video.
Text
In data communications, text is represented as a bit pattern, a sequence of bits (Os or Is). Different sets
of bit patterns have been designed to represent text symbols. Each set is called a code, and the process
of representing symbols is called coding.
Today, the prevalent coding system is called Unicode, which uses 32 bits to represent a symbol or
character used in any language in the world. The American Standard Code for Information Interchange
(ASCII), developed some decades ago in the United States, now constitutes the first 127 characters in
Unicode and is also referred to as Basic Latin. Appendix A includes part of the Unicode.
Numbers
Numbers are also represented by bit patterns. However, a code such as ASCII is not used to represent
numbers; the number is directly converted to a binary number to simplify mathematical operations.
Appendix B discusses several different numbering systems.
Images
Images are also represented by bit patterns. In its simplest form, an image is composed of a matrix of
pixels (picture elements), where each pixel is a small dot. The size of the pixel depends on the
resolution. For example, an image can be divided into 1000 pixels or 10,000 pixels. In the second case,
there is a better representation of the image (better resolution), but more memory is needed to store
the image.
Audio
Video
Video refers to the recording or broadcasting ofa picture or movie. Video can either be produced as a
continuous entity (e.g., by a TV camera), or it can be a combination of images, each a discrete entity,
arranged to convey the idea of motion.
Data Flow
Communication between two devices can be simplex, half-duplex, or full-duplex as shown in Figure
Simplex
In simplex mode, the communication is unidirectional, as on a one-way street. Only one of the two
devices on a link can transmit; the other can only receive Keyboards and traditional monitors are
examples of simplex devices.
The key- board can only introduce input; the monitor can only accept output.
The simplex mode can use the entire capacity of the channel to send data in one direction.
Half-Duplex
In half-duplex mode, each station can both transmit and receive, but not at the same time. : When one
device is sending, the other can only receive, and vice versa
The half-duplex mode is used in cases where there is no need for communication in both directions at
the same time; the entire capacity ofthe channel can be utilized for each direction.
Full-Duplex
The capacity of the channel, however, must be divided between the two directions.
One common example of full-duplex communication is the telephone network. When two people are
communicating by a telephone line, both can talk and listen at the same time.
A network is a set ofdevices (often referred to as nodes) connected by communication links. A node can
be a computer, printer, or any other device capable of sending and/or receiving data generated by other
nodes on the network.
Network Criteria
A network must be able to meet a certain number of criteria. The most important of these are
performance, reliability, and security.
Performance
• Performance can be measured in many ways, including transit time and response time.
• Transit time is the amount of time required for a message to travel from one device to another.
Response time is the elapsed time between an inquiry and a response.
• The performance of a network depends on a number of factors, including the number ofusers,
the type of transmission medium, the capabilities of the connected hardware, and the efficiency
ofthe software.
• Performance is often evaluated by two networking metrics: throughput and delay.
• We often need more throughput and less delay. However, these two criteria are often
contradictory. Ifwe try to send more data to the network, we may increase throughput but we
increase the delay because oftraffic congestion in the network.
Reliability
Security
• Network security issues include protecting data from unauthorized access, protecting data from
damage and development, and implementing policies and procedures for recovery from
breaches and data losses.
What are the different types of connections available?
Type of Connection
• A network is two or more devices connected through links. A link is a communications pathway
that transfers data from one device to another.
• For visualization purposes, it is simplest to imagine any link as a line drawn between two points.
• For communication to occur, two devices must be connected in some way to the same link at
the same time. There are two possible types of connections: point-to-point and multipoint.
Point-to-Point
• A point-to-point connection provides a dedicated link between two devices. The entire capacity
of the link is reserved for transmission between those two devices.
• Most point-to-point connections use an actual length of wire or cable to connect the two ends,
but other options, such as microwave or satellite links, are also possible
• When you change television channels by infrared remote control, you are establishing a point-
to-point connection between the remote control and the television's control system.
Multipoint
• A multipoint (also called multidrop) connection is one in which more than two specific devices
share a single link).
• In a multipoint environment, the capacity of the channel is shared, either spatially or temporally.
• If several devices can use the link simultaneously, it is a spatially shared connection. If users
must take turns, it is a timeshared connection.
•
Write a short note on network topology?
The Network Topology defines the way in which computers, printers, and other devices are connected.
A network topology describes the layout of the wire and devices as well as the paths used by data
transmissions.
Mesh, Star, Tree, Bus, Hybrid are the different types of topologies
Mesh Topology
• The mesh topology connects all devices (nodes) to each other for redundancy and fault
tolerance.
• It is used in WANs to interconnect LANs and for mission critical networks like those used by
banks and financial institutions.
Advantages:-
• A dedicated link guarantee that each communication can carry its own data load, thus
eliminating traffic problems.
• Mesh topology is robust i.e. if link becomes unusable it does not incapacitate the entire
system.
• Privacy or security is more because every message send travels along a dedicated line & only
the intended recipient see it.
Disadvantages:-
• Commonly referred to as a linear bus, all the devices on a bus topology are connected by
one single cable.
• Multipoint configuration.
• One long cable acts like a backbone to link all the devices.
• Nodes are connected to the bus cable by drop line is a connection running between a device
and a main cable.
• A tap is a connector that either splices into the main cable or punctures the of a cable to
create a contact with a Metallic core.
• There is a limit to the no. of taps a bus can support & the distance between the taps.
Advantages:-
1) Easy to install.
Disadvantages:-
Star Topology
• The star topology is the most commonly used architecture in Ethernet LANs.
• When installed, the star topology resembles spokes in a bicycle wheel.
• Each device has a dedicated point-to-point link only to the central controllers HUB.
• Devices are not directly linked to each other.
• If one device wants to send data to another it sends the data to the controller which then relays
the data to the other communicating devices.
•
Advantages:-
and deletion involves only one connection i.e. between that device and HUB.
Disadvantages:-
Tree Topology
Ring Topology
• Each device has a dedicated point-to-point line configuration only with 2 devices on the either
side of it.
• Each device in the ring incorporates the repeater.
• A frame travels around the ring, stopping at each node. If a node wants to transmit data, it adds
the data as well as the destination address to the frame.
• The frame then continues around the ring until it finds the destination node, which takes the
data out of the frame.
o Single ring – All the devices on the network share a single cable
o Dual ring – The dual ring topology allows data to be sent in both directions.
o
Advantages:-
1) Each device is linked only to its immediate neighbours. Through to add or delete a device require two
connections.
Disadvantages:-
2) In a simple ring, a break in a ring can disable the entire network. this weakness can be solved using
dual ring.
Syntax
• The term syntax refers to the structure or format ofthe data, meaning the order in which they
are presented.
• For example, a simple protocol might expectthe first 8 bits ofdata to be the address ofthe
sender, the second 8 bits to be the address ofthe receiver, and the rest of the stream to be the
message itself.
Semantics
Timing
• The term timing refers to two characteristics: when data should be sent and how fast they can
be sent. For example, if a sender produces data at 100 Mbps but the receiver can process data
at only 1Mbps, the transmission will overload the receiver and some data will be lost.
• We use the concept of layers in our daily life. As an example, let us consider two friends who
communicate through postal mail. The process of sending a letter to a friend would be complex
if there were no services available from the post office.
• Network model - A method of describing and analyzing data communications networks by
breaking the entire set of communications process into a number of layers
• Each layer has a specific function
• Established in 1947, the International Standards Organization (ISO) is a multinational body
dedicated to worldwide agreement on international standards. An ISO standard that covers all
aspects of network communications is the Open Systems Interconnection (OSI) model. It was
first introduced in the late 1970s.
• A Model of How Protocols and Networking Components Could be Made
• “Open” means the concepts are non-proprietary; can be used by anyone.
• OSI is not a protocol. It is a model for understanding and designing a network architecture that
is flexible and robust.
• The OSI model describes how data flows from one computer, through a network to another
computer
• The OSI model divides the tasks involved with moving information between networked
computers into 7 smaller, more manageable sub-task .
• A task is then assigned to each of the seven OSI layers.
• Each layer is reasonably self-contained so that the tasks assigned to each layer can be
implemented independently.
• A set of layers and protocols is called a network architecture
• It refers to the physical and logical design of a network
Q.1
◼ The OSI model describes how data flows from one computer, through a network to
another computer
◼ The OSI model divides the tasks involved with moving information between networked
computers into 7 smaller, more manageable sub-task .
◼ A task is then assigned to each of the seven OSI layers.
◼ Each layer is reasonably self-contained so that the tasks assigned to each layer can be
implemented independently.
Ans TCP/IP is a suite of protocols, also known as the Internet Protocol Suite.
It is an application of The Standard OSI Model. The transmission control protocol and the
internet protocol are fundamental to the suite, hence the TCP/IP title.
Layer 5 : Application Layer
➢ This layer is broadly equivalent to the application, presentation and session layers of
the OSI model. It gives an application access to the communication environment.
➢ Examples of protocols found at this layer are Telnet, FTP (File Transfer Protocol), SNMP
(Simple Network Management Protocol), HTTP (Hyper Text Transfer Protocol) and
SMTP (Simple Mail Transfer Protocol).
Layer 4 : Transport Layer
➢ The transport layer is similar to the OSI transport model, but with elements of the
➢ OSI session layer functionality. This layer provides an application layer delivery service.
➢ The two protocols found at the transport layer are TCP (Transmission Control Protocol)
and UDP (User Datagram Protocol). Either of these two protocols are used by the
application layer process, the choice depends on the application's transmission
reliability requirements.
➢ TCP is a reliable, connection-oriented protocol that provides error checking and flow
control through a virtual link that it establishes and finally terminates. This gives a
reliable service, therefore TCP would be utilized by FTP and SNMP - file transfer and
email delivery have to be accurate and error free.
➢ UDP is an unreliable, connectionless protocol that provides data transport with lower
network traffic overheads than TCP - UDP does not error check or offer any flow
control, this is left to the application process. SNMP uses UDP - SNMP is used to
monitor network performance, so its operation must not contribute to congestion.
Layer 3 : Internet Layer
➢ This layer is responsible for the routing and delivery of data across networks.
➢ It allows communication across networks of the same and different types and carries
out translations to deal with dissimilar data addressing schemes. IP (Internet Protocol)
and ARP (Address Resolution Protocol) are both to be found at the Internet layer.
Peak Amplitude:
The peak amplitude of a signal is the absolute value of its highest intensity, proportional to the
energy it carries. For electric signals, peak amplitude is normally measured in volts.
The curve representing the analog signal passes through an infinite number of points. The
vertical lines of the digital signal, however, demonstrate the sudden jump that the signal
makes from value to value.
Ans Data rate determines how fast we can send data, in bits per second, over a channel.
Data rate depends on three factors:
1. The bandwidth available
2. The level of the signals we use
3. The quality of the channel (the level of noise)
Digital
Analog
Distortion
• Distortion means that the signal changes its form or shape. Distortion can
occur in a composite signal made of different frequencies.
• Each signal component has its own propagation speed through a medium
and, therefore, its own delay in arriving at the final destination.
• Differences in delay may create a difference in phase if the delay is not
exactly the same as the period duration.
Noise
Noise is another cause of impairment. Several types of noise, such as thermal noise, induced
noise, crosstalk, and impulse noise, may corrupt the signal.
Thermal noise is the random motion of electrons in a wire which creates an extra signal not
originally sent by the transmitter.
Induced noise comes from sources such as motors and appliances. These devices act as a
sending antenna, and the transmission medium acts as the receiving antenna.
Crosstalk is the effect of one wire on the other. One wire acts as a sending antenna and the
other as the receiving antenna. Impulse noise is a spike (a signal with high energy in a very
short time) that comes from power lines, lightning, and so on.
Figure shows the effect of noise on a signal.
line coding is Converting a string of 1’s and 0’s (digital data) into a sequence of signals that
denote the 1’s and 0’s.
For example a high voltage level (+V) could represent a “1” and a low voltage level (0 or -V)
could represent a “0”.
• The data rate defines the number of bits sent per sec - bps. It is often referred
to the bit rate.
• The signal rate is the number of signal elements sent in a second and is
measured in bauds. It is also referred to as the modulation rate.
• Goal is to increase the data rate whilst reducing the baud rate
Baseline wandering
• a receiver will evaluate the average power of the received signal (called the
baseline) and use that to determine the value of the incoming data elements. If
the incoming signal does not vary over a long period of time, the baseline will
drift and thus cause errors in detection of incoming data elements.
• A good line encoding scheme will prevent long runs of fixed amplitude.
DC components
• when the voltage level remains constant for long periods of time, there is an
increase in the low frequencies of the signal. Most channels are bandpass and
may not support the low frequencies.
• This will require the removal of the dc component of a transmitted signal
Self synchronization
• the clocks at the sender and the receiver must have the same bit interval.
• If the receiver clock is faster or slower it will misinterpret the incoming bit stream
Error detection
Unipolar Scheme
In a unipolar scheme, all the signal levels are on one side of the time axis either above
or below.
Polar :
In polar schemes, ,the voltages are on the both sides of the time axis.
For example, the voltage level for 0 can be positive and the voltage level for 1 can be negative.
Polar – NRZ
◼ The voltages are on both sides of the time axis.
◼ Polar NRZ scheme can be implemented with two voltages. E.g. +V for 1 and -V for 0.
◼ There are two versions:
NRZ - Level (NRZ-L) - positive voltage for one symbol and negative for the
other.
NRZ - Inversion (NRZ-I) - the change or lack of change in polarity determines
the value of a symbol. E.g. a “1” inverts the polarity a “0” does not.
Polar – RZ
◼ The Return to Zero (RZ) scheme uses three voltage values. +, 0, -.
◼ Each symbol has a transition in the middle. Either from high to zero or from low to
zero.
◼ This scheme has more signal transitions (two per symbol) and therefore requires
awider bandwidth.
◼ No DC components or baseline wandering.
◼ Self synchronization - transition indicates symbol value.
◼ More complex as it uses three voltage level. It has no error detection capability.
• In Manchester encoding, the duration of the bit is divided into two halves. The voltage
remains at one level during the first half and moves to the other level in the second
half. The transition at the middle of the bit provides synchronization.
• Differential Manchester, In this there is always a transition at the middle of the bit, but
the bit values are determined at the beginning of the bit. If the next bit is 0, there is a
transition; if the next bit is 1, there is none.
Manchester and differential Manchester schemes are also called biphase schemes.
Bipolar Schemes:
In bipolar encoding (sometimes called multilevel binary), there are three voltage levels:
positive, negative, and zero. The voltage level for one data element is at zero, while the voltage
level for the other element alternates between positive and negative.
In bipolar encoding, we use three levels: positive, zero, and negative.
Bipolar Schemes
In bipolar encoding (sometimes called multilevel binary), there are three voltage levels:
positive, negative, and zero. The voltage level for one data element is at zero, while the voltage
level for the other element alternates between positive and negative.
AMI and Pseudoternary
A common bipolar encoding scheme is called bipolar alternate mark inversion (AMI).
In the term alternate mark inversion, the word mark comes from telegraphy and means 1.
So AMI means alternate I inversion. A neutral zero volt- age represents binary O. Binary Is are
represented by alternating positive and negative voltages.
A variation ofAMI encoding is called pseudoternary in which the 1 bit is encoded as a zero
voltage and the 0 bit is encoded as alternating positive and negative voltages.
• Block coding can give us this redundancy and improve the performance of line coding.
In general, block coding changes a block of m bits into a block of n bits, where n is
larger than m.
• The slash in block encoding (for example, 4B/5B) distinguishes block encoding
from multilevel encoding (for example, 8B6T), which is written without a slash.
• Block coding normally involves three steps: division, substitution, and combination.
• In the division step, a sequence of bits is divided into groups of m bits. For example, in
4B/5B encoding, the original bit sequence is divided into 4-bit groups.
• The heart of block coding is the substitution step. In this step, we substitute an m-bit
group for an n-bit group. For example, in 4B/5B encoding we substitute a 4-bit code for
a 5-bit group. Finally, the n-bit groups are combined together to form a stream. The
new stream has more bits than the original bits.
Ans PAM:
➢ It is a sampling process.
➢ Sampling is the process of converting contineous time analog signal into descrete time
signal.
➢ Sampling can be achived by taking the sample values of the signal at the regular time
intervals.
➢ There are three types of sampling
➢ In ideal sampling all the values are plotted from the contineous analog signal.ideal
sampling is not practical approch for sampling
➢ In natural sampling, a high-speed switch is turned on for only the small period of time
when the sampling occurs. The result is a sequence of samples that retains the shape
of the analog signal.
➢ In flat top sampling the top of the curved voltage graph is flattened.
Q.9 Explain Pulse Code Modulation.(PCM)
Ans It is the most common technique to change an analog signal to digital data (digitization).
A PCM encoder has three processes, as shown in Figure 4.21.
1. The analog signal is sampled.
2. The sampled signal is quantized.
3. The quantized values are encoded as streams of bits.
• Quantization refers to the process of approximating the continuous set of values in the
image data with a finite (preferably small) set of values.
• The input to a quantizer is the original data, and the output is always one among a
finite number of levels
• The quantizer is a function whose set of output values are discrete, and usually finite.
• The result of sampling is a series of pulses with amplitude values between the maxi-
mum and minimum amplitudes of the signal. The set ofamplitudes can be infinite with
non-integral values between the two limits. These values cannot be used in the
encoding process. The following are the steps in quantization:
• 1. We assume that the original analog signal has instantaneous amplitudes between
Vmin and Vmax' 2. We divide the range into L zones, each ofheight delta where
delta=Vmax-Vmin/2
• We assign quantized values of0 to L - I to the midpoint ofeach zone. 4. We approximate
the value of the sample amplitude to the quantized values.
• As a simple example, assume that we have a sampled signal and the sample ampli-
tudes are between -20 and +20 V. We decide to have eight levels (L = 8). This means
that delta=5
\
Quantization Levels
• In the previous example, we showed eight quantization levels. The choice ofL, the
number of levels, depends on the range of the amplitudes of the analog signal and how
accurately we need to recover the signal.
• Ifthe amplitude of a signal fluctuates between two values only, we need only two
levels; if the signal, like voice, has many amplitude values, we need more quantization
levels.
• In audio digitizing, L is normally chosen to be 256; in video it is normally thousands.
• Choosing lower values ofL increases the quantization error if there is a lot of
fluctuation in the signal.
4.encoding
• Sampled values are then encoded using binary encoding scheme
In parallel mode, multiple bits are sent with each clock tick. In serial mode, 1 bit is sent with
each clock tick.
While there is only one way to send parallel data, there are three subclasses of serial
transmission: asynchronous, synchronous, and isochronous
Parallel Transmission:
➢ In parallel mode, multiple bits are sent with each clock tick.
➢ Binary data, consisting of 1s and 0s, may be organized into groups of n bits each.
➢ Computers produce and consume data in groups of bits. By
grouping, we can send data n bits at a time instead. This is
called parallel transmission.
➢ The advantage of parallel transmission is speed. Parallel transmission can increase the
transfer speed by a factor of n over serial transmission.
Parallel transmission
Disadvantage: cost Parallel transmission requires ncommunication lines just to transmit the
data stream. Because this is expensive, parallel transmission is usually limited to short
distances.
Serial Transmission:
• In serial mode, 1 bit is sent with each clock tick.
• In serial transmission one bit follows another, so we need only one communication
channel rather than n to transmit data between two communicating devices
Serial transmission
• The advantage of serial over parallel transmission is that with only one communication
channel, serial transmission reduces the cost of transmission over parallel by roughly a
factor of n.
• Since communication within devices is parallel, conversion devices are required at the
interface between the sender and the line (parallel-to-serial) and between the line and
the receiver (serial-to-parallel).
Serial transmission occurs in one of three ways:
➢ asynchronous
➢ synchronous,
➢ isochronous
Q.11 Compare the Synchronous transmission and Asynchronous transmission.
Ans Asynchronous Transmission:
• The addition of stop and start bits and the insertion of gaps into the bit stream make
asynchronous transmission slower than forms of transmission that can operate
without the addition of control information.
Synchronous Transmission:
• In synchronous transmission, the bit stream is combined into longer "frames," which
may contain multiple bytes, Each byte, however, is introduced onto the transmission
link without a gap between it and the next one.
• It is left to the receiver to separate the bit stream into bytes for decoding purposes.
• In this, we send bits one after another without start or stop bits. It is the responsibility
of the receiver to group the bits.
Advantage:
• For this type of application, synchronization between characters is not enough; the
entire stream of bits must be synchronized. The isochronous transmission guarantees
that the data arrive at a fixed rate.
asynchronous transmission
synchronous transmission
Q.12 Give different types of Keying methods and explain each of them.
Ans A sine wave is defined by three characteristics: amplitude, frequency, and phase. When we
vary anyone of these characteristics, we create a different version of that wave.
So, by changing one characteristic of a simple electric signal, we can use it to represent digital
data. Any of the three characteristics can be altered in this way, giving you at least three
mechanisms for modulating digital data into an analog signal:
➢ amplitude shift keying (ASK),
➢ frequency shift keying (FSK), and
➢ phase shift keying (PSK).
➢ quadrature amplitude modulation (QAM) that combines changing both the
amplitude and phase.It is the most efficient option and is the mechanism
commonly used today .
Amplitude Shift Keying:
• In amplitude shift keying, the amplitude of the carrier signal is varied to create signal
elements.
• Both frequency and phase remain constant while the amplitude changes.
• In frequency shift keying, the frequency of the carrier signal is varied to represent data.
The frequency of the modulated signal is constant for the duration of one signal ele-
ment, but changes for the next signal element if the data element changes.
• Both peak amplitude and phase remain constant for all signal elements.
• Both peak amplitude and frequency remain constant as the phase changes. Today, PSK
is more common than ASK or FSK.
QAM :Itcombines ASK and PSK, is the dominant method of digital to-analog modulation.
• The frequency and phase of the carrier remain the same: only the amplitude changes
to follow variations in the information.
Amplitude modulation
• The peak amplitude and phase of the carrier signal remain constant, but as the
amplitude of the information signal changes, the frequency of the carrier changes
correspondingly.
• The peak amplitude and frequency of the carrier signal remain constant, but as the
amplitude of the information signal changes, the phase of the carrier changes
correspondingly.
• The lines on the left direct their transmission streams to a multiplexer (MUX), which
combines them into a single stream (many-to-one).
• At the receiving end, that stream is fed into a demultiplexer (DEMUX), which separates
the stream back into its component transmissions (one-to-many) and directs them to
their corresponding lines.
• In the figure, the word link refers to the physical path. The word channel refers to the
portion of a link that carries a transmission between a given pair of lines. One link can
have many (n) channels.
There are threebasic multiplexing techniques:
➢ frequency-division multiplexing,
➢ wavelength-division multiplexing,
➢ time-division multiplexing.
The first two are techniques designed for analog signals, the third, for digital signals.
Frequency-Division Multiplexing:
➢ Frequency-division multiplexing (FDM) is an analog technique that can be applied
when the bandwidth of a link (in hertz) is greater than the combined bandwidths of the
signals to be transmitted.
➢ In FDM, signals generated by each sending device modulate different carrier
frequencies. These modulated signals are then combined into a single composite signal
that can be transported by the link.
➢ Carrier frequencies are separated by sufficient bandwidth to accommodate the
modulated signal. These bandwidth ranges are the channels through which the various
signals travel.
➢ Channels can be separated by strips of unused bandwidth-guard bands-to prevent
signals from overlapping.
➢ In addition, carrier frequencies must not interfere with the original data frequencies.
Figure 6.3 gives a conceptual view of FDM. In this illustration, the transmission path is divided
into three parts, each representing a channel that carries one transmission.
Wavelength-Division Multiplexing:
➢ WDM is an analog multiplexing technique to combine optital signals.
➢ It is designed to use the high-data-rate capabjlity of fiber-optic cable. The optical fiber
data rate is higher than the data rate of metallic transmission cable. Using a fiber-optic
cable for one single line wastes the available bandwidth. Multiplexing allows us to
combine several lines into one.
➢ WDM is conceptually the same as FDM, except that the multiplexing and
demultiplexing involve optical signals transmitted through fiber-optic channels.
➢ Very narrow bands of light from different sources are combined to make a wider band
of light. At the receiver, the signals are separated by the demultiplexer.
Time-Division Multiplexing:
➢ Time-division multiplexing (TDM) is a digital process that allows several connections to
share the high bandwidth of a link. Instead of sharing a portion of the bandwidth as in
FDM, time is shared. Each connection occupies a portion of time in the link.
➢ In the figure, portions of signals 1,2,3, and 4 occupy the link sequentially.
➢ TDM is, in principle, a digital multiplexing technique. Digital data from different
sources are combined into one timeshared link.
➢ TDM is a digital multiplexing technique for combining several low-rate channels
into one high-rate channel.
TDM can be divided into two different schemes:
➢ synchronous
➢ statistical
Synchronous TDM:
➢ In this each input connection has an allotment in the output even if it is not sending
data.
➢ In synchronous TDM, a round of data units from each input connection is collected into
a frame. If we have n connections, a frame is divided into ntime slots and one slot is
allocated for each unit, one for each input line. If the duration of the input unit is T, the
duration of each slot is TInand the duration of each frame is T .
InterleavingTDM:
• TDM can be visualized as two fast-rotating switches, one on the multiplexing side and
the other on the demultiplexing side.
• The switches are synchronized and rotate at the same speed, but in opposite
directions. On the multiplexing side, as the switch opens in front of a connection, that
connection has the opportunity to send a unit onto the path.
• This process is called interleaving. On the demultiplexing side, as the switch opens in
front of a connection, that connection has the opportunity to receive a unit from the
path.
Figure 6.15 shows the interleaving process for the connection shown in Figure 6.13.
Interleaving
Ans: Guided media include twisted-pair cable, coaxial cable, a! fiber-optic cable.
Unguided medium is free space.
Classes of transmission media
GUIDED MEDIA:
➢ One of the wires is used to carry signals to the receiver, and the other is used only as a
ground reference. The receiver uses the difference between the two.
➢ In addition to the signal sent by the sender on one of the wires, interference (noise)
and crosstalk may affect both wires and create unwanted signals.
➢ Twisting makes it probable that both wires are equally affected by external influences
(noise or crosstalk).
The number of twists per unit of length (e.g., inch) has some effect on the quality of the cable.
Coaxial Cable (coax)
◼ Coaxial cable carries signals of higher frequency ranges than twisted pair cable.
◼ It has a central core conductor of solid or standard wire enclosed in an insulating
sheath which is in turn encased in an outer conductor of metal foil.
◼ The outer metal wrapping serves both as a shield against noise & as a second
conductor which completes the circuit.
◼ This outer conductor is enclosed in a insulating sheath & the whole cable is protected
by a plastic cover
Applications of coaxial Cable
◼ Analog Telephone Networks.
◼ Digital Telephone Networks. (up to 600 Mbps)
◼ Cable TV Networks. (RG-59 coax)
◼ Traditional Ethernet LANs.
◼ (10 Base 2 or thin Ethernet uses RG-58 coax.
◼ 10 Base 5 or thick Ethernet uses RG-11 coax.)
Q.17 Write a short note on unguided media? Explain its one type.
Ans Unguided media: wireless
➢ Unguided media transports electromagnetic waves without using a physical conductor.
This type of communication is often referred to as wireless communication.
➢ Signals are normally broadcast through free space and thus are available to anyone
who has a device capable of receiving them.
Figure Electromagnetic spectrum for wireless communication
Radio Waves:
Q.18 Which are the several ways in which unguided signals can travel from the source to
destination ?
Ans Unguided signals can travel from the source to destination in several ways: ground
propagation, sky propagation, and line-of-sight propagation.
In ground propagation, radio waves travel through the lowest portion of the atmosphere,
hugging the earth. These low-frequency signals emanate in all directions from the transmitting
antenna and follow the curvature of the planet. Distance depends on the amount of power in
the signal: The greater the power, the greater the distance.
In sky propagation, higher-frequency radio waves radiate upward into the ionosphere (the
layer of atmosphere where particles exist as ions) where they are reflected back to earth. This
type of transmission allows for greater distances with lower output power.
In line-of-sight propagation, very high-frequency signals are transmitted in straight lines
directly ftom antenna to antenna.
Q.19 List and explain three broad groups in which wireless transmission/unguided media can be
divided into .
Ans We can divide wireless transmission into three broad groups:
➢ radio waves,
➢ micro waves, and
➢ infrared waves.
Radio Waves:
➢ Electromagnetic waves ranging in frequencies between 3 kHz and I GHz are
normally called radio waves.
➢ Radio waves, for the most part, are omnidirectional. When an antenna transmits radio
waves, they are propagated in all directions. The omnidirectional property has a
disadvantage, too. The radio waves transmitted by one antenna are susceptible to
interference by another antenna that may send signals using the same frequency or
band.
➢ Radio waves, particularly those waves that propagate in the sky mode, can travel long
distances. This makes radio waves a good candidate for long-distance broadcasting
such as AM radio.
➢ Radio waves, particularly those of low and medium frequencies, can penetrate walls.
This characteristic can be both an advantage and a disadvantage. It is an advantage
because, for example, an AM radio can receive signals inside a building. It is a disadvan-
tage because we cannot isolate a communication to just inside or outside a building.
➢ Radio waves are used for multicast communications, such as radio and television, and
paging systems.
Microwaves:
.
Q.20 List the characteristics of microwave propagation.
Infra Red
◼ Frequency Range 300GHz to 400 THz.
◼ Used for short range communication
◼ Line of sight propagation
◼ Cannot penetrate walls
◼ No Interference
Application of Infrared
◼ Transmitting digital data with a very high data rate
◼ IrDA (Infra Red Data Association) Standards
◼ Communication between keyboards, mice, PCs and printers.
Fiber-optic cable has several advantages over metallic cable (twisted pair or coaxial).
1.Higher bandwidth. Fiber-optic cable can support dramatically higher bandwidths (and hence
data rates) than either twisted-pair or coaxial cable.
2.Less signal attenuation. Fiber-optic transmission distance is significantly greater than that of
other guided media. A signal can run for 50 km without requiring regeneration. We need
repeaters every 5 km for coaxial or twisted-pair cable.
3. Immunity to electromagnetic interference. Electromagnetic noise cannot affect fiber- optic
cables.
4. Resistance to corrosive materials. Glass is more resistant to corrosive materials
than copper.
5. Light weight. Fiber-optic cables are much lighter than copper cables.
6. Greater immunity to tapping. Fiber-optic cables are more immune to tapping than
copper cables. Copper cables create antenna effects that can easily be tapped.
Disadvantages :
1.Installation and maintenance. Fiber-optic cable is a relatively new technology. Its
Installation & maintenance require expertise that is not yet available everywhere.
2. Unidirectional light propagation. Propagation of light is unidirectional. If we need
bidirectional communication, two fibers are needed.
3. Cost. The cable and the interfaces are relatively more expensive than those of other guided
media. If the demand for bandwidth is not high, often the use of optical fiber cannot be
justified.
Q.22 List and explain three methodsof switching .
Ans: Three methods of switching are:
➢ circuit switching
➢ packet switching
➢ message switching.
Circuit Switching:
➢ It takes place at physical layer.
➢ In circuit switching,the resources need to be reserved during the setup phase;the
resources remain dedicated for the entire duration of data transfer until the teardown
phase.
➢ Switching at th physical layer in the traditional telephone network uses the circuit-
switching approach.
Packet Switching:
➢ In a packet switching there is no resource allocation for a packet. This means that there
is no reserved bandwidth on the links, and there is no scheduled processing time for
each packet. Resources are allocated on demand.
➢ The allocation is done on a firstcome, first-served basis. When a switch receives a
packet, no matter what is the source or destination, the packet must wait if there are
other packets being processed.
➢ Packet switching is used in datagram networks,virtual circuit networks.
Message Switching:
➢ In message switching, each switch stores the whole message and forwards it to
the next switch.
➢ Although, we don't see message switching at lower layers, it is still used in some
applications like electronic mail (e-mail).
Q.23 Write a short note on a switched network? List and explain three types of it.
Ans: A switched network consists of a series of interlinked nodes, called switches. Switches are
devices capable of creating temporary connections between two or more devices linked to the
switch.
In a switched network, some of these nodes are connected to the end systems (computers
or telephones, for example). Others are used only for routing.
Figure Switched network
The end systems (communicating devices) are labeled A, B, C, D, and so on, and the switches
are labeled I, II, III, IV, and V. Each switch is connected to multiple links.
Based on three methods of switching we can divide networks into three broad categories:
➢ circuit-switched networks
➢ packet-switched networks
➢ message-switched networks
Packet-switched networks can further be divided into two subcategories
➢ virtual-circuit networks and
➢ datagram networks .
Circuit-switched networks:
➢ A circuit-switched network consists of a set of switches connected by physical links.
➢ A connection between two stations is a dedicated path made of one or more links.
However, each connection uses only one dedicated channel on each link.
➢ Each link is normally divided into n channels by using FDM or TDM .
➢ A circuit-switched network is made of a set of switches connected by physical links in
which each link is divided into n channels.
Message Switced Network: In message switching, each switch stores the whole
message and forwards it to the next switch.It is used in applications like e-mail.
Q.24 Explain the working of a circuit-switched network.
Ans: ➢ Circuit switching takes place at the physical layer.
➢ Before starting communication, the stations must make a reservation for the resources
to be used during the communication. These resources, such as channels (bandwidth in
FDM and time slots in TDM), switch buffers, switch processing time, and switch
input/output ports, must remain dedicated during the entire duration of data transfer
until the teardown phase.
➢ Data transferred between the two stations are not packetized . The data are a
continuous flow sent by the source station and received by the destination station,
although there may be periods of silence.
➢ There is no addressing involved during data transfer. The switches route the data
based on their occupied band (FDM) or time slot (TDM).
➢ In circuit switching, the resources need to be reserved during the setup phase; the
resources remain dedicated for the entire duration of data transfer .
Q.25 List and explain the three phases of communication in a circuit-switched network.
Ans: Three Phases:
The actual communication in a circuit-switched network requires three phases:
➢ connection setup
➢ data transfer
➢ connection teardown
Setup Phase:
Before the two parties (or multiple parties in a conference call) can communicate, a dedicated
circuit (combination of channels in links) needs to be established. The end systems are
normally connected through dedicated lines to the switches, so connection setup means
creating dedicated channels between the switches.
➢ In the next step to making a connection, an acknowledgment from one system needs
to be sent to the other system in reply to its request for connection. Only after system
receives this acknowledgment is the connection established.
Data Transfer Phase
After the establishment of the dedicated circuit (channels), the two parties can transfer data.
Teardown Phase
When one of the parties needs to disconnect, a signal is sent to each switch to release
the resources.
Q.26 Write a short note on Delay in a circuit-switched network.
Ans Delay in a circuit-switched network:
➢ Although a circuit-switched network normally has low efficiency, the delay in this type
of network is minimal. During data transfer the data are not delayed at each switch;
the resources are allocated for the duration of the connection.
➢ There is no waiting time at each switch. The total delay is due to the time needed to
create the connection, transfer data, and disconnect the circuit.
➢ The delay caused by the setup is the sum of four parts: the propagation time of the
source computer request , the request signal transfer time , the propagation time of
the acknowledgment from the destination computer , and the signal transfer time of
the acknowledgment .
➢ The delay due to data transfer is the sum of two parts: the propagation time and data
transfer time , which can be very long.
Q.27 Explain the advantage of Time- and Space-Division Switch Combinations
with the help of a diagram.:
Ans Advantages:
➢ It is that it is instantaneous. Its disadvantage is the number of cross points
required to make space-division switching acceptable in terms of blocking.
➢ The advantage of time-division switching is that it needs no crosspoints. Its
disadvantage, in the case of TSI, is that processing each connection creates
delays. Each time slot must be stored by the RAM, then retrieved and passed on.
➢ We combine space-division and time-division technologies to take advantage of the
best of both. Combining the two results in switches that are optimized both physically
(the number of crosspoints) and temporally (the amount of delay). Multistage switches
of this sort can be designed as time-space-time (TST) switch.
➢ Following Figure shows a simple TST switch that consists of two time stages and one
space stage and has 12 inputs and 12 outputs.
➢ Instead of one time-division switch, it divides the inputs into three groups (of four
inputs each) and directs them to three timeslot interchanges.
➢ The result is that the average delay is one-third of what would result from using one
time-slot interchange to handle all 12 inputs.
➢ The last stage is a mirror image of the first stage. The middle stage is a spacedivision
switch (crossbar) that connects the TSI groups to allow connectivity between all
possible input and output pairs (e.g., to connect input 3 of the first group to output 7
of the second group).
Figure Time-space-time switch