BCT2305 DataCommPrinc Class Notes
BCT2305 DataCommPrinc Class Notes
In Data Communications, data generally are defined as information that is stored in digital
form. Data communications is the process of transferring digital information between two or
more points.
Information is defined as the knowledge or intelligence. Data communications can be
summarized as the transmission, reception, and processing of digital information. For data
communications to occur, the communicating devices must be part of a communication
systemmade up of a combination of hardware (physical equipment) and software (programs).
The effectiveness of a data communications system depends on four fundamental
characteristics: delivery, accuracy, timeliness, and jitter.
1
transmission over public digital networks, email and directory services; the I and Q series
for Integrated Services Digital Network (ISDN) and its extension Broadband ISDN. ITU-T
membership consists of government authorities and representatives from many
countries and it is the present standards organization for the United Nations.
3. Institute of Electrical and Electronics Engineers (IEEE)
IEEE is an international professional organization founded in United States and is
compromised of electronics, computer and communications engineers. It is currently the
world‘s largest professional society with over 200,000 members. It develops
communication and information processing standards with the underlying goal of
advancing theory, creativity, and product quality in any field related to electrical
engineering.
4. American National Standards Institute (ANSI)
ANSI is the official standards agency for the United States and is the U.S voting
representative for the ISO. ANSI is a completely private, non-profit organization
comprised of equipment manufacturers and users of data processing equipment and
services. ANSI membership is comprised of people form professional societies, industry
associations, governmental and regulatory bodies, and consumer goods.
5. Electronics Industry Association (EIA)
EIA is a non-profit U.S. trade association that establishes and recommends industrial
standards. EIA activities include standards development, increasing public awareness,
and lobbying and it is responsible for developing the RS (recommended standard) series of
standards for data and communications.
6. Telecommunications Industry Association (TIA)
TIA is the leading trade association in the communications and information technology
industry. It facilitates business development opportunities through market
development, trade promotion, trade shows, and standards development. It represents
manufacturers of communications and information technology products and also
facilitates the convergence of new communications networks.
7. Internet Architecture Board (IAB)
IAB earlier known as Internet Activities Board is a committee created by ARPA
(Advanced Research Projects Agency) so as to analyze the activities of ARPANET whose
purpose is to accelerate the advancement of technologies useful for U.S military. IAB is a
technical advisory group of the Internet Society and its responsibilities are:
I. Oversees the architecture protocols and procedures used by the Internet.
II. Manages the processes used to create Internet Standards and also serves as an
appeal board for complaints regarding improper execution of standardization
process.
III. Responsible for administration of the various Internet assigned numbers
IV. Acts as a representative for Internet Society interest in liaison relationships with
other organizations.
V. Acts as a source of advice and guidance to the board of trustees and officers of
Internet Society concerning various aspects of internet and its technologies.
8. Internet Engineering Task Force (IETF)
The IETF is a large international community of network designers, operators, vendors
and researchers concerned with the evolution of the Internet architecture and smooth
operation of the Internet.
9. Internet Research Task Force (IRTF)
The IRTF promotes research of importance to the evolution of the future Internet by
creating focused, long-term and small research groups working on topics related to
Internet protocols, applications, architecture and technology.
2
1.2: A Communication Model
The underlying purpose of a digital communications circuit is to provide a transmission path
between locations and to transfer digital information from one station (node, where computers
or other digital equipment are located) to another using electronic circuits. Data
communications circuits utilize electronic communications equipment and facilities to
interconnect digital computer equipment. Communication facilities are physical means of
interconnecting stations and are provided to data communications users through public
telephone networks (PTN), public data networks (PDN), and a multitude of private data
communications systems.
The following figure shows a simple two-station data communications circuit. The
main components are:
Source: - This device generates the data to be transmitted; examples are mainframe
computer, personal computer, workstation etc. The source equipment provides a means for
humans to enter data into system.
Transmitter: - A transmitter transforms and encodes the information in such a way as to
produce electromagnetic signals that can be transmitted across some sort of transmission
system. For example, a modem takes a digital bit stream from an attached device such as a
personal computer and transforms that bit stream into an analog signal that can be handled by
the telephone network.
Transmission medium: - The transmission medium carries the encoded signals from the
transmitter to the receiver. Different types of transmission media include free-space radio
transmission (i.e. all forms of wireless transmission) and physical facilities such as metallic
and optical fiber cables.
Receiver: - The receiver accepts the signal from the transmission medium and converts it
into a form that can be handled by the destination device. For example, a modem will
accept an analog signal coming from a network or transmission line and convert it into a
digital bit stream.
Destination: - Takes the incoming data from the receiver and can be any kind of digital
equipment like the source
3
Data Communication Circuit Arrangements
A data communications circuit can be described in terms of circuit configuration and
transmission mode.
Circuit Configurations
Data communications networks can be generally categorized as either two point or
multipoint. A two-point configuration involves only two locations or stations, whereas a
multipoint configuration involves three or more stations.
4
half-duplex mode is used in cases where there is no need for communication in both
directions at the same time; the entire capacity of the channel can be utilized for each
direction. Citizens band (CB) radio is an example where push to talk (PTT) is to be pressed or
depressed while sending and transmitting.
In full-duplex mode(FDX) (called duplex), both stations can transmit and receive
simultaneously. One common example of full-duplex communication is the telephone
network. The full-duplex mode is used when communication in both directions is required all
the time. The capacity of the channel must be divided between the two directions.
In full/full duplex (F/FDX) mode, transmission is possible in both directions at the
same time but not between the same two stations (i.e. station 1 transmitting to station 2,
while receiving from station 3). F/FDX is possible only on multipoint circuits. Postal system
can be given as a person can be sending a letter to one address and receive a letter from
another address at the same time.
Data Communications Networks
Any group of computers connected together can be called a data communications network,
and the process of sharing resources between computers over a data communications
network is called networking. The most important considerations of a data communications
network are performance, transmission rate, reliability and security.
Network Components, Functions, and Features
The major components of a network are end stations, applications and a network that will
support traffic between the end stations. Computer networks all share common devices,
functions, and features, including servers, clients, transmission media, shared data, shared
printers and other peripherals, hardware and software resources, network interface card
(NIC), local operating system (LOS) and the network operating system (NOS).
Servers: Servers are computers that hold shared files, programs and the network operating
system. Servers provide access to network resources to all the users of the network and
different kinds of servers are present. Examples include file servers, print servers, mail
servers, communication servers etc.
Clients: Clients are computers that access and use the network and shared network
resources. Client computers are basically the customers (users) of the network, as they
request and receive service from the servers.
Shared Data: Shared data are data that file servers provide to clients, such as data files,
printer access programs, and e-mail.
Shared Printers and other peripherals: these are hardware resources provided to the users
of the network by servers. Resources provided include data files, printers, software, or any
other items used by the clients on the network.
Network interface card: Every computer in the network has a special expansion card called
network interface card (NIS), which prepares and sends data, receives data, and controls
data flow between the computer and the network. While transmitting, NIC passes frames of
data on to the physical layer and on the receiver side, the NIC processes bits received from the
physical layer and processes the message based on its contents.
Local operating system: A local operating system allows personal computers to access files,
print to a local printer, and have and use one or more disk and CD drives that are located on
the computer. Examples are MS-DOS, PC-DOS, UNIX, Macintosh, OS/2, Windows 95, 98,
XP and Linux.
Network operating system: the NOS is a program that runs on computers and servers that
allows the computers to communicate over a network. The NOS provides services to clients
such as log-in features, password authentication, printer access, network administration
functions and data file sharing.
5
2.1: Signals, Noise, Modulation and Demodulation
Computers transmit data using digital signals, sequences of specified voltage levels.
Computers sometimes communicate over telephone lines using analog signals, which are
formed by continuously varying voltage levels. Electrical signals can be in analog or digital
form. With analog signals, the amplitude changes continuously with respect to time with no
breaks or discontinuities. A sine wave is the most basic analog signal.
Digital signals are described as discrete; their amplitude maintains a constant level for
a prescribed period of time and then it changes to another level. If only two levels are
possible, it is called a binary signal. All binary signals are digital, but all digital signals are not
necessarily binary. Converting information signals to a different form is called modulation
and the reverse process is called demodulation. The modulating signal is the information and
the signal being modulated is the carrier.
Two basic types of electronic communications systems are analog and digital. An
analog digital communications system is a communications system in which energy is
transmitted and received in analog form and are also propagated through the system in
analog form. Digital communications covers a broad range of communications techniques
including digital transmission and digital modulation.
Signal Analysis
Mathematical signal analysis is used to analyze and predict the performance of the circuit on
the basis of the voltage distribution and frequency composition of the information signal.
Amplitude, Frequency and Phase
A cycle is one complete variation in the signal, and the period is the time the waveform
takes to complete on cycle. One cycle constitutes 360 degrees (or 2π radians). Sine waves can
be described in terms of three parameters: amplitude, frequency and phase.
Amplitude (A): It is analogous to magnitude or displacement. The amplitude of a signal is the
magnitude of the signal at any point on the waveform. The amplitude of electrical signal is
generally measured in voltage. The maximum voltage of a signal in respect to its average
value is called its peak amplitude or peak voltage.
Frequency (f):
The time of one cycle of a waveform is its period, which is measured in
seconds. Frequency is the number of cycles completed per second. The measurement unit
for frequency is the hertz, Hz. 1 Hz = 1 cycle per second. The frequency of the signal can be
calculated fromT=1/f
6
Phase (Ø): The phase of the signal is measured in degrees or radians with respect to a
reference point. A phase shift of 180 degrees corresponds to a shift of half a cycle.
A phase shift of 360 degrees corresponds to a shift of one complete cycle. If two sine
waves have the same frequency and occur at the same time, they are said to be in phase,
or they are said to out of phase. The difference in phase can be measured in degrees, and is
called the phase angle,Ɵ
Periodic Signals
A signal is periodic if it completes a pattern within a measurable time and is characterized by
amplitude, frequency and phase. Mathematically, a single frequency voltage waveform is
v(t) = V sin(2πft + θ), where
v(t) is time-varying voltage sine wave
V is peak amplitude in volts
f is frequency in hertz
t is time in seconds
θ is phase in degrees or radians
7
It is called a periodic wave because, it repeats at a uniform rate. A series of sine, cosine or
square waves constitute an example of periodic waves, which can be analyzed in either the
time domain or the frequency domain.
Time domain: Time domain is a term used to describe the analysis of mathematical
functions, or physical signals, with respect to time. In the time domain, the signal or
function's value is known for all real numbers, for the case of continuous time, or at various
separate instants in the case of discrete time. An oscilloscope is a time-domain tool
commonly used to visualize real-world signals in the time domain. A time domain graph
shows how a signal changes over time.
Frequency Domain: frequency domain is a term used to describe the analysis of mathematical
functions or signals with respect to frequency, rather than time. A spectrum analyser is a
frequencydomain instrument which displays amplitude-versus frequency plot (called a frequency
spectrum). The horizontal axis represents frequency and the vertical axis amplitude showing a
vertical deflection for each frequency present in the waveform, which is proportional to the
amplitude of the frequency it represents.
Fourier series:
The Fourier series is used in signal analysis to represent the sinusoidal
components of nonsinusoidal periodic waveforms. A Fourier series decomposes a periodic
function or periodic signal into a sum of simple oscillating functions, namely sines and cosines. It can
be
expressed as:
f(t) = A0 + A1 cosα + A2 cos2α + A3 cos3α + ... .... .An cos nα
+ A0 + B1 sinβ + B2 sin2β + B3 sin3β +... .... ...Bn sin nβ
Where α=β
8
Any periodic waveform is comprised of an average dc component and a series of
harmonically related sines or cosine waves. A harmonic is an integral multiple of the
fundamental frequency.
frequency (repetition rate) of the waveform. Second multiple is called second harmonic,
third multiple is called third harmonic and so forth.
Wave symmetry: It describes the symmetry of a waveform in the time domain, i.e., its
relative position with respect to the horizontal (time) and vertical (amplitude) axes.
Even symmetry:
If a periodic voltage waveform is symmetric about the vertical axis, it is said to
have axes, or mirror, symmetry and is called an even function. For all even functions, the β
coefficients are zero. Even function satisfy the condition f(t) = f(-t)
Odd symmetry: If a periodic voltage waveform is symmetric about a line midway between
the vertical axis and the negative horizontal axis and passing through the coordinate origin, it
is said to have to point or skew, symmetry and is called an odd function. For all odd
functions, the α coefficients are zero. Odd function satisfies f(t) = -f(-t)
Half-wave symmetry: If a periodic voltage waveform is such that the waveform for the first
half cycle repeats itself except with the opposite sign for the second half cycle, it is called to
have half-wave symmetry. Half-wave symmetry implies that the second half of the wave is
exactly opposite to the first half. A function with half-wave symmetry does not have to be
even or odd, as this property requires only that the shifted signal is opposite. Half-wave
functions satisfy the condition f(t) = -f(T+t)/2
9
Frequency Spectrum and Bandwidth
The frequency spectrum of a waveform consists of all the frequencies contained in the
waveform and their respective amplitudes plotted in the frequency domain.
Bandwidth of an information signal is simply the difference between the highest and lowest
frequencies contained in the information and the bandwidth of a communication channel is
the difference between the highest and lowest frequencies that the channel will allow to
pass through it.
Electrical Noise and Signal-To-Noise Ratio
Noise is any disturbance or distortion that comes in the process of communication . Electrical
noise is defined as any undesirable electrical energy that falls within the passband of the
signal. A noise signal consists of a mixture of frequencies with random amplitudes. Noise
can originate in various ways. The most prevalent and most interfering to data
communication signals are man-made noise, thermal noise, correlated noise, and
impulse noise.
Man-made noise: It is the kind of noise produced by mankind. The main sources are
sparkproducing mechanisms like commutators in electric motors, automobile ignition
systems,
ac power-generating and switching equipment, and fluorescent lights. It is impulsive in
nature
and contains a wide range of frequencies propagated in the free space like the radio waves.
Man-made noise is most intense in more densely populated areas and sometimes is
referred to as industrial noise.
Thermal noise: This is the noise generated by thermal agitation of electrons in a
conductor. It is also referred to as white noise because of its uniform distribution across the
entire electromagnetic frequency spectrum. Noise power density is the thermal noise power
present in a 1-Hz bandwidth and is given by No = KT.
Thermal noise is independent of frequency and thus thermal noise present in any
bandwidth is N = KTB where N is thermal noise power in watts, K is Boltzmann's
constant in joules per Kelvin, T is the conductor temperature in kelvin (0K = -273oC), and B is
the bandwidth in hertz. Noise power is often measured in dBm. From the equation above,
noise power in a resistor at room temperature, in dBm, is: NdBm = -174 dBm + 10 log B
Correlated noise: this noise is correlated to the signal and cannot be present in a circuit
unless there is a signal. Correlated noise is produced by nonlinear amplification and includes
harmonic distortion and intermodulation distortion. Harmonic distortion occurs when
unwanted harmonics of a signal are produced through nonlinear amplification and is also
called amplitude distortion. Intermodulation distortion is the generation of unwanted sum
and difference frequencies produced when two or more signals are amplified in a nonlinear
device.
Impulse noise: This noise is characterized by high-amplitude peaks of short duration in the
total noise spectrum. It consists of sudden bursts of irregularly shaped pulses that generally
last between a few microseconds and several milliseconds, depending on their amplitude
and origin. In case of voice communications, impulse noise is very annoying as it generates a
sharp popping or crackling sound where as it is devastating in data circuits.
Signal-to-noise power ratio: Signal-to-noise ratio (often abbreviated SNR or S/N) is
defined as the ratio of signal power to the noise power corrupting the signal. A ratio higher
than 1:1 indicates more signal than noise. Signal-to-noise ratio is defined as the power ratio
between signal (meaningful information) and the background noise (unwanted signal)
10
where P is average power in watts. The ratio often expressed in
decibels as S/N (dBm) = 10 log(PS/PN)
Attenuation:
The strength of a signal falls off with diatance over any transmission medium.For
guided medium , this reduction in strength is exponential ; V2= V1-
where = loss per unit length , and x= distance
Delay Distortion :
Caused when velocity of propagation of a signal in a medium varies with frequency.
For a band limited signal, the velocity tends to be highest near the centre frequency
and falls off towards the edges of the band. Thus various frequency components of a
signal will arrive at the receiver at different times- resulting in phase shifts between
the different frequencies.
11
Analog Modulation Systems
A sine wave has three main components: amplitude, frequency and phase and can be
expressed as v(t) = V sin(2πft + θ). If the information signal is analog and the amplitude
(V) of the carrier is varied proportional to the informational signal, amplitude modulation
(AM) is produced. If the frequency (f) is varied proportional to the information signal,
frequency modulation (FM) is produced and if the phase (θ) is varied proportional to the
information signal, phase modulation (PM) is produced. Frequency and phase modulation
are similar and often combined and are simply called angle modulation.
Amplitude Modulation
Amplitude modulation is the process of changing the amplitude of a relatively high
frequency carrier signal in proportion to the instantaneous value of the modulating signal
(information). AM modulators are two-input devices, one of them is a single, relatively high
frequency carrier signal of constant amplitude and the second is the relatively
lowfrequency information signal. The following figure shows generation of AM waveform
when a single-frequency modulating signal acts on a high frequency carrier signal.
12
Advantages of AM are simple to implement, needs a circuit with very few components and
inexpensive. The disadvantages include inefficient power usage and use of bandwidth and
also prone to noise. The total bandwidth required for AM can be determined from the
bandwidth of the audio signal: B AM = 2B
Angle Modulation
Angle modulation results whenever the phase angle of a sinusoidal signal is varied with
respect to time and includes both FM and PM. Whenever the frequency of a carrier signal is
varied, the phase is also varied and vice versa. If the frequency of the carrier is varied
directly in accordance with the information signal, FM results, whereas if the phase is varied
directly, PM results.
The above figure shows the FM and PM of a sinusoidal carrier by a single-frequency
modulating signal. Both FM and PM waveforms are identical except for their time
relationship (phase). With FM, the maximum frequency deviation occurs during the
maximum positive and negative peaks of the modulating signal. With FM, the maximum
frequency deviation occurs during the zero crossings in the modulating signal.
An important feature of FM and PM is that they can provide much better protection to the
message against channel noise when compared to AM. Also because of their constant
amplitude nature, they can withstand nonlinear distortion and amplitude fading.
Information Capacity, Bits, Bit Rate, Baud, and M-ARY Encoding
Information capacity is a measure of how much information can be propagated
through a communication system and a function of bandwidth and transmission time. It
represents the number of independent symbols that can be carried through a system in a
13
given unit of time. The most basic digital symbol used to represent information is the binary
digit, or bit. Bit rate is simply the number of bits transmitted during 1 second and is
expressed as bits per second (bps).
R.Hartley developed a useful relationship among bandwidth, transmission time and
information capacity called Hartley’s law given by:
I α B × t Where, I is the information capacity in bps, B is bandwidth in hertz and t is
transmission time in sec’s
Relation between information capacity of a communication channel to a bandwidth
and signal-to-noise ratio is given by Claude E. Shannon. The higher the signal-to-noise ratio,
the
better the performance and also information capacity is higher. The Shannon limit of
information capacity is
I = B log2 (1 + S/N ) or I = 3.32 B log10 (1 + S/N )
Where I is information capacity in bps, B is bandwidth in hertz and S/N is signal to noise
ratio.
M-ary Encoding
M-ary is a term derived from the word binary. M simply represents a digit that
corresponds to the number of conditions, levels, or combinations possible for a given
number of binary variables. For example, a digital signal with four possible conditions is an
Mary
system where M= 4 and if there are eight possible conditions, then M= 8. The number of bits
necessary to produce a given number of conditions is expressed mathematically as:
N = log2 M or it can be written as M = 2N, where N is no of bits necessary and M is number
of
conditions, levels or combinations possible with N bits. From the equation, it can be said that
if there is one bit, only 21 or two conditions are possible. For two bits 22 or four
conditions are possible.
Baud and Minimum Bandwidth
Baud, like bit rate is a rate of change. Baud refers to the rate of change of the signal on
the transmission medium after encoding and modulation have occurred. Baud is the
reciprocal of the time of one output signalling element, and a signalling element may
represent several information bits. Baud is also transmitted one at a time and a baud may
represent more than one information bit. So, the baud of the data communications system
may be considerably less than the bit rate.
According to H.Nyquist, binary digital signals can be propagated through an ideal
noiseless medium at a rate equal to twice the bandwidth of the medium. The minimum
theoretical bandwidth necessary to propagate a signal is called the minimum Nyquist
bandwidth or sometimes the Nyquist bandwidth. Using multilevel signalling, the Nyquist
formulation for channel capacity is fb = B log2 M where, fb is channel capacity in bps, B is
minimum Nyquist bandwidth in hertz and M is no of discrete signal or voltage levels . If N is
substituted, we get
B = baud = fb/N, where N is number of bits encoded into each signalling element.
Digital Modulation
Digital modulation is the transmission of digitally modulated analog signals between
two or more points in a communications system. Analog and Digital modulation systems use
analog carriers to transport information through the system, but digital modulation uses
digital modulating (information) signal. Analog systems use analog signal only. In, v(t) = V
14
sin(2πft + θ), if the information signal is digital and amplitude (V) of the carrier is varied
proportional to the information signal, a digitally modulated signal called amplitude -shift
keying (ASK) is produced. If the frequency (f) is varied proportional to the information signal,
frequency-shift keying (FSK) is produced and if the phase is varied proportional to the
information signal, phase-shift keying (PSK) is produced. If both amplitude and phase are
varied proportional to the information signal, quadrature amplitude modulation (QAM)
results.
15
Amplitude-Shift Keying
It is the simplest digital modulation technique where a binary information signal directly
modulates the amplitude of an analog carrier. Only two output amplitudes are possible and
ASK is sometimes called as digital amplitude modulation (DAM). Amplitude shift keying is
given in mathematical terms as:
vask(t) = [ 1 + vm(t) ][ A/2 cos(ωct)]
Where vask(t) is amplitude-shift keying wave, vm(t) is digital modulation (modulating) signal
in volts, A/2 is unmodulated carrier amplitude in volts and ωc is analog carrier radian
frequency in radians per second.
In the above equation, for the modulating signal vm(t), logic 1 is represented by +1V
and logic 0 is represented by -1V. So the modulated wave vask(t) is either Acos(ωct) or 0
i.e., the carrier is either on or off. ASK is sometimes referred as on-off keying (OOK). The rate
of change of the ASK waveform (baud) is the same as the rate of change of the binary input
making bit rate equal to baud. With ASK, the bit rate is also equal to the minimum Nyquist
bandwidth.
16
BW=(1+d ) x Nbaud
Where:
BW is the bandwidth;
Nbaud is the baud rate
fc=carrier frequency
d is a factor related to the modulation process
Example
Find the minimum bandwidth for an ASK signal
transmitting at 2000 bps.
The transmission mode is half-duplex.
17
Solution
In ASK the baud rate and bit rate are the same.
The baud rate is therefore 2000. An ASK signal requires
a minimum bandwidth equal to its baud rate.
Therefore, the minimum bandwidth is 2000 Hz.
Example
Given a bandwidth of 5000 Hz for an ASK signal, what
are the baud rate and bit rate?
Solution
In ASK the baud rate is the same as the bandwidth,
which means the baud rate is 5000.
But because the baud rate and the bit rate are also the
same for ASK, the bit rate is 5000 bps.
Example
Given a bandwidth of 10,000 Hz (1000 to 11,000 Hz), draw the full-duplex ASK
diagram of the system. Find the carriers and the bandwidths in each direction.
Assume there is no gap between the bands in the two directions.
For full-duplex ASK, the bandwidth for each direction is
BW = 10000 / 2 = 5000 Hz
The carrier frequencies can be chosen at the middle of each band
fc (forward) = 1000 + 5000/2 = 3500 Hz
fc (backward) = 11000 – 5000/2 = 8500 Hz
18
space frequency and the center frequency or half the difference between the mark and
space frequencies. Frequency deviation can be expressed as Δf = |fm - fs| / 2
The baud for BFSK is determined by placing N = 1, i.e., baud = fb/1 = fb
The minimum bandwidth for FSK is determined from;
B = |(fs - fb) - (fm - fb)| = |fs - fm| + 2fb . But |fs - fm| = 2Δf,
Therefore, B= 2(Δf + fb), where B is minimum Nyquist bandwidth in hertz and Δf is
frequency deviation and fb is input bit rate.
Relationship between baud rate and bandwidth in FSK
The bandwidth for FSK is equal to the baud rate Nbaud of the signal plus
the frequency shift (difference between the two carrier frequencies)
BW=Nbaud + fc1-fc0
Example
Find the minimum bandwidth for an FSK signal
transmitting at 2000 bps. Transmission is in half-duplex
mode, and the carriers are separated by 3000 Hz.
Solution
For FSK
BW = baud rate + fc1 fc0
BW = bit rate + fc1 fc0 = 2000 + 3000 = 5000 Hz
Example
Find the maximum bit rates for an FSK signal if the
bandwidth of the medium is 12,000 Hz and the difference
between the two carriers is 2000 Hz. Transmission is in
full-duplex mode.
Solution
Because the transmission is full duplex, only 6000 Hz is
allocated for each direction.
BW = baud rate + fc1 fc0
Baud rate = BW (fc1 fc0 ) = 6000 2000 = 4000
But because the baud rate is the same as the bit rate, the
bit rate is 4000 bps.
Phase-Shift Keying
19
Phase-shift keying (PSK) is a digital modulation scheme that conveys data by changing,
or modulating, the phase of a reference signal (the carrier wave). PSK uses a finite number of
phases; each assigned a unique pattern of binary digits. Usually, each phase encodes an
equal number of bits. PSK is not susceptible to the noise degradation that affects ASK or to
the bandwidth limitations of FSK.
Binary phase-shift keying: The simplest PSK technique is called binary phase-shift keying
(BPSK), where N = 1 and M = 2. Therefore, with BPSK two phases are possible for the carrier.
It uses two opposite signal phases (0 and 180 degrees). The digital signal is broken up
timewise into individual bits (binary digits). The state of each bit is determined according to
the state of the preceding bit. If the phase of the wave does not change, then the signal
state stays the same (0 or 1). If the phase of the wave changes by 180 degrees -- that is, if
the phase reverses -- then the signal state changes (from 0 to 1 or from 1 to 0). Because
there are two possible wave phases, BPSK is sometimes called biphase modulation or
phasereversal keying (PRK).
More sophisticated forms of PSK exist. In M-ary or multiple phase-shift keying (MPSK), there
are more than two phases, usually four (0, +90, -90, and 180 degrees) or eight (0, +45, -45,
+90, -90, +135, -135, and 180 degrees). If there are four phases (m = 4), the MPSK mode is
called quadrature phase-shift keying or quaternary phase-shift keying (QPSK), and each
phase shift represents two signal elements. If there are eight phases (m = 8), the MPSK mode
is known as octal phase-shift keying (OPSK), and each phase shift represents three
signal elements. In MPSK, data can be transmitted at a faster rate, relative to the number of
phase changes per unit time, than is the case in BPSK.
QPSK is an M-ary encoding scheme where N = 2 and M = 4, which has four output phases are
possible for a single carrier frequency needing four different input conditions. With two bits,
there are four possible conditions: 00, 01, 10, and 11. With QPSK, the binary input data are
combined into groups of two bits called dibits.
The above figure shows the output phase-versus-time relationship, truth table, and
20
constellation diagram for QPSK. A phase of 00 now represents 00; 900 represents 01; 1800
represents 10; and 2700 represents 11. Data can be transmitted twice as efficiently using
4PSK than 2-PSK. With 8-PSK, three bits are encoded forming tribits and producing eight
different output phases. With 8-PSK, N = 3, M = 8, and the minimum bandwidth and baud
equal one third the bit rate (fb /3). 8-PSK is 3 times as efficient as 2-PSK.
21
Example
Find the bandwidth for a 4-PSK signal transmitting at 2000 bps. Transmission is half-duplex
mode.
Solution
For 4-PSK the baud rate is one-half of the bit rate. The baud rate is therefore 1000.
A PSK require a bandwidth equal to its baud rate.
Therefore , the bandwidth is 1000 Hz.
Example
Given a bandwidth of 5000 Hz for an 8-PSK signal, what
are the baud rate and bit rate?
Solution
For PSK the baud rate is the same as the bandwidth,
which means the baud rate is 5000.
But in 8-PSK the bit rate is 3 times the baud rate,
So the bit rate is 15,000 bps.
QAM Modulator
22
QAM Demodulator
23
16-QAM constellations
24
it
Example
A constellation diagram consists of eight equally spaced points on a circle. If the bit rate is
4800 bps, what is the baud rate?
Solution
The constellation indicates 8-PSK with the points 45 degrees apart.
Since 23 = 8, 3 bits are transmitted with each signal unit.
Therefore, the baud rate is: 4800 / 3 = 1600 baud
Example
Compute the bit rate for a 1000-baud 16-QAM signal.
Solution
A 16-QAM signal has 4 bits per signal unit since log216 = 4.
Thus,
(1000)*(4) = 4000 bps
Example 12
Compute the baud rate for a 72,000-bps 64-QAM signal.
Solution
A 64-QAM signal has 6 bits per signal unit since log2 64 = 6.
Thus,
72000 / 6 = 12,000 baud
25
4. Analysis and Synthesis of Waveforms
Fourier series and alternative representation of periodic signals
Periodic functions can be represented in an alternative way other than plotting it as a function of
time. For example, for a signal
2
g (t ) cos t,
T
Alternatively, we can plot the amplitude of this sinusoid as a function of frequency. This plot of
amplitude vs frequency is called the spectrum of g(t).
Amplitude
1
2
T
2 2
Now, if g (t ) cos t 0.5 cos 2 t , the time domain plot and the spectrum are show n as
T T
follows.
26
Amplitude
1
0.5
2 2
2
T T
We are leading towards something much more general. Actually, a periodic function g(t) of period T
can be expressed as an infinite sum of sinusoidal waveforms. This summation is called Fourier series.
Fourier series can be written in several forms. One such form is the trigonometric Fourier series:
a0 2n t
2n t
g (t ) an cos( ) bn sin( )
2 n 1 T n 1 T
where
2n t
T /2
2
an
T T / 2
g (t ) cos(
T
)dt , n 0, 1, 2,
2n t
T /2
2
bn
T T / 2
g (t ) sin(
T
)dt , n 1, 2,
2 2
If g(t) has period T, the term a1 cos t b1 sin t referred to as the fundamental frequency and the
T T
other terms are known as the harmonics of g(t).
Example
g (t )
27
In this case, the Fourier coefficients of g(t) is given by
2 T /2 2nt 2 /2 2nt
bn
T
T / 2
g (t ) sin
T
dt
T
/2
sin
T
dt 0
2 sin(n / T ) 2
g (t ) cos n t
T n 1 n T
In practice, we cannot sum an infinite number of sinusoids, so summing a finite number of sinusoids
will always be an approximation to the original function g(t). In other words,
a0 N 2
g (t ) an cos n t
2 n 1 T
Where N is finite.
28
The following figures show how g(t) compares with its Fourier representation as a function of N.
From the figure, we can see that as N , the Fourier series summation approach the original function g(t)
The sinc function
2 sin(n / T )
If we write an and define a function
T n / T
sin(x)
sin c( x) ,
x
we can re-write the Fourier coefficients as
2
an sin c(n / T ) .
T
The sinc function is shown in the following figure as a function of x. It has zero crossings at
x 1,2,3,... and we define sin c(0) 1 . It is an important function that we will use in this
course.
29
Exponential Fourier series
2
Defining 0 as the fundamental frequency of g(t), we can write
T
a0 2 2
g (t ) an cos n t bn sin n t
2 n 1 T n 1 T
0 an cosn0t bn sinn0t
a
2 n 1 n 1
1 j0t
cos 0t (e e j0t )
2
1 j0t j0t
sin 0t (e e )
2j
We can re-write
a0 2n t
2n t a
g (t ) an cos( ) bn sin( ) 0 an cos( n 0t ) bn sin( n 0t )
2 n 1 T n 1 T 2 n 1 n 1
where c0 = a0 / 2, cn = (an – jbn) / 2 and c-n = (an + jbn) / 2, n0 is the frequency of exponential Fourier
series. The formula can be written in the compact form
g (t ) ce
n
n
jn 0t
where
T /2
1
T T/ 2
cn g (t )e jn0t dt , n 0, 1, 2,
The exponential Fourier series find extensive applications in communication theory. It is equivalent
to resolving the function in terms of harmonically related frequency components of a fundamental
frequency. A weighting factor c n is assigned to each frequency component. cn is called spectral
amplitude and represents the amplitude of nth harmonic. Graphic representation of spectral
30
amplitude along with the spectral phase is called complex frequency spectrum. If cn is purely real or
purely imaginary, we can disregard the phase spectrum.
Any of the above two representations uniquely specifies the function, i.e., if the signal is specified
in time domain, we can determine its spectrum. Conversely, if the spectrum is specified, we can
determine the corresponding time domain function of a signal.
Signals can be observed in the frequency domain by the use of a Spectrum Analyzer.
31
2
an sin c(n / T )
T
There is an inverse relationship between the pulse width , and the frequency spread of the
spectrum. As the period becomes larger, the fundamental frequency 0 becomes smaller, generate
more frequency components in a given range of frequency; and therefore the spectrum becomes
denser. However, the amplitudes of the frequency components become smaller.
If the period T goes to infinity, we are left with a single pulse of width in the time domain. The
fundamental frequency 0, of this waveform, approaches zero, i.e., no spacing is left between two
line-components. The spectrum becomes continuous and exists at all frequencies rather than only at
the discrete frequencies. However, there is no change in the shape of the envelope of the spectrum.
32
The continuous spectrum described above corresponds to a single non-repetitive pulse; i.e., a non-
periodic function existing over the entire interval (- < t < ). Thus, we have arrived at the spectrum
of a non-periodic function, taking it as a special case of periodic function with period T approaching
infinity. The transformation of an non-periodic function to its spectral or frequency domain
representation is known as the Fourier transform.
33
34
35
36
Pulse modulaton
Digital Transmission is the transmittal of digital signals between two or more points in a communications
system. The signals can be binary or any other form of discrete-level digital pulses. Digital pulses can not be
propagated through a wireless transmission system such as earth’s atmosphere or free space.
Alex H. Reeves developed the first digital transmission system in 1937 at the Paris Laboratories of AT & T for
the purpose of carrying digitally encoded analog signals, such as the human voice, over metallic wire cables between
telephone offices.
Advantages
--Noise immunity
--Multiplexing(Time domain)
--Regeneration
Disadvantages
Pulse Modulation
-- Pulse modulation consists essentially of sampling analog information signals and then converting those
samples into discrete pulses and transporting the pulses from a source to a destination over a physical transmission
medium.
37
Pulse Width Modulation
--PWM is sometimes called pulse duration modulation (PDM) or pulse length modulation (PLM), as the width (active
portion of the duty cycle) of a constant amplitude pulse is varied proportional to the amplitude of the analog signal at
the time the signal is sampled.
--The maximum analog signal amplitude produces the widest pulse, and the minimum analog signal amplitude
produces the narrowest pulse. Note, however, that all pulses have the same amplitude.
--With PPM, the position of a constant-width pulse within a prescribed time slot is varied according to the amplitude of
the sample of the analog signal.
--The higher the amplitude of the sample, the farther to the right the pulse is positioned within the prescribed time
slot. The highest amplitude sample produces a pulse to the far right, and the lowest amplitude sample produces a
pulse to the far left.
--With PAM, the amplitude of a constant width, constant-position pulse is varied according to the amplitude of the
sample of the analog signal.
-The amplitude of a pulse coincides with the amplitude of the analog signal.
38
--PAM waveforms resemble the original analog signal more than the waveforms for PWM or PPM.
--With PCM, the analog signal is sampled and then converted to a serial n-bit binary code for transmission.
--Each code has the same number of bits and requires the same length of time for transmission
Pulse Modulation
--PAM is used as an intermediate form of modulation with PSK, QAM, and PCM, although it is seldom used by itself.
--PWM and PPM are used in special-purpose communications systems mainly for the military but are seldom used for
commercial digital transmission systems.
--PCM is by far the most prevalent form of pulse modulation and will be discussed in more detail.
--PCM is the preferred method of communications within the public switched telephone network because with PCM it
is easy to combine digitized voice and digital data into a single, high-speed digital signal and propagate it over either
metallic or optical fiber cables.
--With PCM, the pulses are of fixed length and fixed amplitude.
--PCM is a binary system where a pulse or lack of a pulse within a prescribed time slot represents either a logic 1 or a
logic 0 condition.
-PWM, PPM, and PAM are digital but seldom binary, as a pulse does not represent a single binary digit (bit).
--The band pass filter limits the frequency of the analog input signal to the standard voice-band frequency range of 300
Hz to 3000 Hz.
--The sample- and- hold circuit periodically samples the analog input signal and converts those samples to a multilevel
PAM signal.
--The analog-to-digital converter (ADC) converts the PAM samples to parallel PCM codes, which are converted to serial
binary data in the parallel-to-serial converter and then outputted onto the transmission linear serial digital pulses.
--The transmission line repeaters are placed at prescribed distances to regenerate the digital pulses.
--In the receiver, the serial-to-parallel converter converts serial pulses received from the transmission line to parallel
PCM codes.
--The digital-to-analog converter (DAC) converts the parallel PCM codes to multilevel PAM signals.
--The hold circuit is basically a low pass filter that converts the PAM signals back to its original analog form.
39
The block diagram of a single-channel, simplex (one-way only) PCM system.
PCM Sampling:
--The function of a sampling circuit in a PCM transmitter is to periodically sample the continually changing analog input
voltage and convert those samples to a series of constant- amplitude pulses that can more easily be converted to
binary PCM code.
--A sample-and-hold circuit is a nonlinear device (mixer) with two inputs: the sampling pulse and the analog input
signal.
--For the ADC to accurately convert a voltage to a binary code, the voltage must be relatively constant so that the ADC
can complete the conversion before the voltage level changes. If not, the ADC would be continually attempting to
follow the changes and may never stabilize on any PCM code.
--Essentially, there are two basic techniques used to perform the sampling function
1) natural sampling
2) flat-top sampling
40
--Natural sampling is when tops of the sample pulses retain their natural shape during the sample interval, making it
difficult for an ADC to convert the sample to a PCM code.
--The most common method used for sampling voice signals in PCM systems is flat- top sampling, which is
accomplished in a sample-and-hold circuit.
-- The purpose of a sample-and-hold circuit is to periodically sample the continually changing analog input voltage and
convert those samples to a series of constant-amplitude PAM voltage levels.
Sampling Rate
--The Nyquist sampling theorem establishes the minimum Nyquist sampling rate (fs) that can be used for a given PCM
system.
--For a sample to be reproduced accurately in a PCM receiver, each cycle of the analog input signal (fa) must be
sampled at least twice.
--Consequently, the minimum sampling rate is equal to twice the highest audio input frequency.
fs ≥ 2fa
--If fs is less than two times fa an impairment called alias or foldover distortion occurs.
41
Quantization and the Folded Binary Code:
Quantization
--Quantization is the process of converting an infinite number of possibilities to a finite number of conditions.
--Converting an analog signal to a PCM code with a limited number of combinations requires quantization.
--With quantization, the total voltage range is subdivided into a smaller number of sub-ranges.
--The PCM code shown in Table 10-2 is a three-bit sign- magnitude code with eight possible combinations (four positive
and four negative).
--The leftmost bit is the sign bit (1 = + and 0 = -), and the two rightmost bits represent magnitude.
-- This type of code is called a folded binary code because the codes on the bottom half of the table are a mirror image
of the codes on the top half, except for the sign bit.
Quantization
--With a folded binary code, each voltage level has one code assigned to it except zero volts, which has two codes, 100
(+0) and 000 (-0).
--The magnitude difference between adjacent steps is called the quantization interval or quantum.
--If the magnitude of the sample exceeds the highest quantization interval, overload distortion (also called peak
limiting) occurs.
42
--The resolution is equal to the voltage of the minimum step size, which is equal to the voltage of the least significant
bit (Vlsb) of the PCM code.
--The smaller the magnitude of a quantum, the better (smaller) the resolution and the more accurately the quantized
signal will resemble the original analog sample.
--For a sample, the voltage at t3 is approximately +2.6 V. The folded PCM code is
resolution 1
--There is no PCM code for +2.6; therefore, the magnitude of the sample is rounded off to the nearest valid code,
which is 111, or +3 V.
--The likelihood of a sample voltage being equal to one of the eight quantization levels is remote.
--Therefore, as shown in the figure, each sample voltage is rounded off (quantized) to the closest available level and
then converted to its corresponding PCM code.
--The rounded off error is called the called the quantization error (Qe).
--To determine the PCM code for a particular sample voltage, simply divide the voltage by the resolution, convert the
quotient to an n-bit binary code, and then add the sign bit.
43
Linear input-versus-output transfer curve
resolution
Qe
2
1) For the PCM coding scheme shown in Figure 10-8, determine the quantized voltage, quantization error (Qe) and
PCM code for the analog sample voltage of + 1.07 V.
A) To determine the quantized level, simply divide the sample voltage by resolution and then round the answer off to
the nearest quantization level:
+1.07V = 1.07 = 1
1V
The quantization error is the difference between the original sample voltage and the quantized level, or Qe = 1.07 -1 =
0.07
44
From Table 10-2, the PCM code for + 1 is 101.
Dynamic Range (DR): It determines the number of PCM bits transmitted per sample.
-- Dynamic range is the ratio of the largest possible magnitude to the smallest possible magnitude (other than zero)
that can be decoded by the digital-to-analog converter in the receiver. Mathematically,
DR
Vmax
Vmax
2n 1
DR dB 20log 2n 1
Vmin resolution =20 log Vmax
Vmin
For n > 4
DR 2n 1 2n
DR dB 20log 2n 1 20n log 2 6n
--For linear codes, the magnitude change between any two successive codes is the same.
The maximum quantization noise is half the resolution. Therefore, the worst possible signal voltage- to-quantization
noise voltage ratio (SQR) occurs when the input signal is at its minimum amplitude (101 or 001). Mathematically, the
worst-case voltage SQR is
resolution
Qe
SQR = resolution = Vlsb =2 2
Qe V lsb /2
45
For input signal minimum amplitude
Vmin resolution
SQR min 2
Qe Qe
Vmax
SQR max
Qe
Linear Nonlinear
Companding
--High amplitude analog signals are compressed prior to txn. and then expanded in the receiver
--Higher amplitude analog signals are compressed and Dynamic range is improved
46
--Early PCM systems used analog companding, where as modern systems use digital companding.
Analog companding
--In the transmitter, the dynamic range of the analog signal is compressed, and then converted o a linear PCM code.
--In the receiver, the PCM code is converted to a PAM signal, filtered, and then expanded back to its original dynamic
range.
47
-- There are two methods of analog companding currently being used that closely approximate a logarithmic function
and are often called log-PCM codes.
2) A-law
-law companding
Vmax ln 1 in
V
Vout Vmax
ln 1
A-law companding
A| x| where
1 y = Vout
1 log A , 0 | x |
A
y x = Vin / Vmax
1 log( A | x |) 1
, | x | 1
1 log A A
48
Digital Companding: Block diagram refer in text book.
--With digital companding, the analog signal is first sampled and converted to a linear PCM code, and then the linear
code is digitally compressed.
-- In the receiver, the compressed PCM code is expanded and then decoded back to analog.
-- The most recent digitally compressed PCM systems use a 12- bit linear PCM code and an 8-bit compressed PCM
code.
--Line speed is the data rate at which serial PCM bits are clocked out of the PCM encoder onto the transmission line.
Mathematicaly,
second sample
Delta Modulation
--Delta modulation uses a single-bit PCM code to achieve digital transmission of analog signals.
--With conventional PCM, each code is a binary representation of both the sign and the magnitude of a particular
sample. Therefore, multiple-bit codes are required to represent the many values that the sample can be.
--With delta modulation, rather than transmit a coded representation of the sample, only a single bit is transmitted,
which simply indicates whether that sample is larger or smaller than the previous sample.
--If the current sample is smaller than the previous sample, a logic 0 is transmitted.
--If the current sample is larger than the previous sample, a logic 1 is transmitted.
49
Differential DM
--With Differential Pulse Code Modulation (DPCM), the difference in the amplitude of two successive samples is
transmitted rather than the actual sample. Because the range of sample differences is typically less than the range of
individual samples, fewer bits are required for DPCM than conventional PCM.
50
5.0 Transmission Media
5.1 Introduction
Transmission media can be defined as physical path between transmitter and receiver in a data
transmission system. And it may be classified into two types as shown in Fig. 5.1.
Guided: Transmission capacity depends critically on the medium, the length, and whether
the medium is point-to-point or multipoint (e.g. LAN). Examples are co-axial cable, twisted pair,
and optical fiber.
Unguided: provides a means for transmitting electro-magnetic signals but do not guide
them. Example wireless transmission.
Characteristics and quality of data transmission are determined by medium and signal
characteristics. For guided media, the medium is more important in determining the limitations of
transmission. While in case of unguided media, the bandwidth of the signal produced by the
transmitting antenna and the size of the antenna is more important than the medium. Signals at
lower frequencies are omni-directional (propagate in all directions). For higher frequencies,
focusing the signals into a directional beam is possible. These properties determine what kind of
media one should use in a particular application. In this lesson we shall discuss the characteristics
of various transmission media, both guided and unguied.
51
5.2 Guided transmission media
In this section we shall discuss about the most commonly used guided transmission media such as
twisted-pair of cable, coaxial cable and optical fiber.
5.2.1 Twisted Pair
In twisted pair technology, two copper wires are strung between two points:
• The two wires are typically ``twisted'' together in a helix to reduce interference between the two
conductors as shown in Fig.5.2. Twisting decreases the cross-talk interference between adjacent
pairs in a cable. Typically, a number of pairs are bundled together into a cable by wrapping them
in a tough protective sheath.
Can carry both analog and digital signals. Actually, they carry only analog signals.
However, the ``analog'' signals can very closely correspond to the square waves representing bits,
so we often think of them as carrying digital data.
Data rate determined by wire thickness and length. In addition, shielding to eliminate
interference from other wires impacts signal-to-noise ratio, and ultimately, the data rate.
Good, low-cost communication. Indeed, many sites already have twisted pair installed in
offices -- existing phone lines!
Typical characteristics: Twisted-pair can be used for both analog and digital communication.
The data rate that can be supported over a twisted-pair is inversely proportional to the square of
the line length. Maximum transmission distance of 1 Km can be achieved for data rates up to 1
Mb/s. For analog voice signals, amplifiers are required about every 6 Km and for digital signals,
repeaters are needed for about 2 Km. To reduce interference, the twisted pair can be shielded with
metallic braid. This type of wire is known as Shielded Twisted-Pair (STP) and the other form is
known as Unshielded Twisted-Pair (UTP).
Use: The oldest and the most popular use of twisted pair are in telephony. In LAN it is commonly
used for point-to-point short distance communication (say, 100m) within a building or a room.
52
Figure 5.3 Co-axial cable
Physical connection consists of metal pin touching the copper core. There are two common ways
to connect to a coaxial cable:
. With vampire taps, a metal pin is inserted into the copper core. A special tool drills a
hole into the cable, removing a small section of the insulation, and a special connector is screwed
into the hole. The tap makes contact with the copper core.
With a T-junction, the cable is cut in half, and both halves connect to the T-junction. A T-
connector is analogous to the signal splitters used to hook up multiple TVs to the same cable wire.
53
Requires amplifiers to boost signal strength; because amplifiers are one way, data flows in
only one direction.
Which is better, broadband or base band? There is rarely a simple answer to such questions. Base
band is simple to install, interfaces are inexpensive, but doesn't have the same range. Broadband is
more complicated, more expensive, and requires regular adjustment by a trained technician, but
offers more services (e.g., it carries audio and video too).
The core, innermost section consists of a single solid dielectric cylinder of diameter d 1 and of
refractive index n1. The core is surrounded by a solid dielectric cladding of refractive index n2 that
is less than n1. As a consequence, the light is propagated through multiple total internal reflection.
The core material is usually made of ultra pure fused silica or glass and the cladding is either
made of glass or plastic. The cladding is surrounded by a jacket made of plastic. The jacket is
used to protect against moisture, abrasion, crushing and other environmental hazards.
54
Three components are required:
1. Fiber medium: Current technology carries light pulses for tremendous distances (e.g., 100s of
kilometers) with virtually no signal loss.
2. Light source: typically a Light Emitting Diode (LED) or laser diode. Running current through
the material generates a pulse of light.
3. A photo diode light detector, which converts light pulses into electrical signals.
Advantages:
1. Very high data rate, low error rate. 1000 Mbps (1 Gbps) over distances of kilometers
common. Error rates are so low they are almost negligible.
2. Difficult to tap, which makes it hard for unauthorized taps as well. This is responsible for
higher reliability of this medium.
How difficult is it to prevent coax taps? Very difficult indeed, unless one can keep the
entire cable in a locked room!
1. Much thinner (per logical phone line) than existing copper circuits. Because of its thinness,
phone companies can replace thick copper wiring with fibers having much more capacity for
same volume. This is important because it means that aggregate phone capacity can be
upgraded without the need for finding more physical space to hire the new cables.
2. Not susceptible to electrical interference (lightning) or corrosion (rust).
3. Greater repeater distance than coax.
Disadvantages:
. Difficult to tap. It really is point-to-point technology. In contrast, tapping into coax is
trivial. No special training or expensive tools or parts are required.
. One-way channel. Two fibers needed to get full duplex (both ways) communication.
Optical Fiber works in three different types of modes (or we can say that we have 3 types of
communication using Optical fiber). Optical fibers are available in two varieties; Multi-Mode
Fiber (MMF) and Single-Mode Fiber (SMF). For multi-mode fiber the core and cladding diameter
lies in the range 50-200μm and 125-400μm, respectively. Whereas in single-mode fiber, the core
and cladding diameters lie in the range 8-12μm and 125μm, respectively. Single-mode fibers are
also known as Mono-Mode Fiber. Moreover, both single-mode and multi-mode fibers can have
two types; step index and graded index. In the former case the refractive index of the core is
uniform throughout and at the core cladding boundary there is an abrupt change in refractive
index. In the later case, the refractive index of the core varies radially from the centre to the core-
cladding boundary from n1 to n2 in a linear manner. Fig. 5.5 shows the optical fiber transmission
modes.
55
Figure 5.5 Schematics of three optical fiber types, (a) Single-mode step-index, (b) Multi-mode
step-index, and (c) Multi-mode graded-index
Characteristics: Optical fiber acts as a dielectric waveguide that operates at optical frequencies
(1014 to 1015 Hz). Three frequency bands centered around 850,1300 and 1500 nanometers are
used for best results. When light is applied at one end of the optical fiber core, it reaches the
other end by means of total internal reflection because of the choice of refractive index of core
and cladding material (n1 > n2). The light source can be either light emitting diode (LED) or
injection laser diode (ILD). These semiconductor devices emit a beam of light when a voltage is
applied across the device. At the receiving end, a photodiode can be used to detect the signal-
encoded light. Either PIN detector or APD (Avalanche photodiode) detector can be used as the
light detector.
In a multi-mode fiber, the quality of signal-encoded light deteriorates more rapidly than single-
mode fiber, because of interference of many light rays. As a consequence, single-mode fiber
allows longer distances without repeater. For multi-mode fiber, the typical maximum length of
the cable without a repeater is 2km, whereas for single-mode fiber it is 20km.
Fiber Uses: Because of greater bandwidth (2Gbps), smaller diameter, lighter weight, low
attenuation, immunity to electromagnetic interference and longer repeater spacing, optical fiber
cables are finding widespread use in long-distance telecommunications. Especially, the single
mode fiber is suitable for this purpose. Fiber optic cables are also used in high-speed LAN
applications. Multi-mode fiber is commonly used in LAN.
56
5.2.5 Unguided Transmission
Unguided transmission is used when running a physical cable (either fiber or copper) between
two end points is not possible. For example, running wires between buildings is probably not
legal if the building is separated by a public street.
Infrared signals typically used for short distances (across the street or within same room),
Microwave signals commonly used for longer distances (10's of km). Sender and receiver use
some sort of dish antenna as shown in Fig. 5.6.
Difficulties:
. Weather interferes with signals. For instance, clouds, rain, lightning, etc. may adversely
affect communication.
Radio transmissions easy to tap. A big concern for companies worried about competitors
stealing plans.
Signals bouncing off of structures may lead to out-of-phase signals that the receiver must
filter out.
57
Figure 5.7 Satellite Microwave Communication: point –to- point
Characteristics: Optimum frequency range for satellite communication is 1 to 10 GHz. The most
popular frequency band is referred to as 4/6 band, which uses 3.7 to 4.2 GHz for down link and
5.925 to 6.425 for uplink transmissions. The 500 MHz bandwidth is usually split over a dozen
transponders, each with 36 MHz bandwidth. Each 36 MHz bandwidth is shared by time division
multiplexing. As this preferred band is already saturated, the next highest band available is
referred to as 12/14 GHz. It uses 14 to 14.5GHz for upward transmission and 11.7 to 12.2 GHz for
downward transmissions. Communication satellites have several unique properties. The most
important is the long communication delay for the round trip (about 270 ms) because of the long
distance (about 72,000 km) the signal has to travel between two earth stations. This poses a
number of problems, which are to be tackled for successful and reliable communication.
58
Another interesting property of satellite communication is its broadcast capability. All stations
under the downward beam can receive the transmission. It may be necessary to send encrypted
data to protect against piracy.
Use: Now-a-days communication satellites are not only used to handle telephone, telex and
television traffic over long distances, but are used to support various internet based services such
as e-mail, FTP, World Wide Web (WWW), etc. New types of services, based on communication
satellites, are emerging.
Comparison/contrast with other technologies:
1. Propagation delay very high. On LANs, for example, propagation time is in nanoseconds --
essentially negligible.
2. One of few alternatives to phone companies for long distances.
3. Uses broadcast technology over a wide area - everyone on earth could receive a message at
the same time!
4. Easy to place unauthorized taps into signal.
59
8.0 MULTIPLEXING
Multiplexing is the name given to techniques, which allow more than one message to be transferred
via the same communication channel. The channel in this context could be a transmission line, e.g. a
twisted pair or co-axial cable, a radio system or a fibre optic system etc.
A channel will offer a specified bandwidth, which is available for a time t, where t may . Thus,
with reference to the channel there are 2 ‘degrees of freedom’, i.e. bandwidth or frequency and
time.
CHANNEL
BL BH freq
BH
BL
Frequency
Time t
Now consider a signal v s (t ) Amp cos(t ) . The signal is characterised by amplitude, frequency,
phase and time.
Various multiplexing methods are possible in terms of the channel bandwidth and time, and the
signal, in particular the frequency, phase or time. The two basic methods are:
FDM is derived from AM techniques in which the signals occupy the same physical ‘line’ but
in different frequency bands. Each signal occupies its own specific band of frequencies all the
time, i.e. the messages share the channel bandwidth.
60
2) Time Division Multiplexing TDM
TDM is derived from sampling techniques in which messages occupy all the channel
bandwidth but for short time intervals of time, i.e. the messages share the channel time.
time
time
M1
M2 BL
BL M3 M5
M4 M3 M4
B M5 M1 M2
BH t
BH
freq freq
t
BH
BL
M1
M2
B M3 M1 M2 M3 M4 M5
M4
M5
BH BL
t t
FDM TDM
FDM is widely used in radio and television systems (e.g. broadcast radio and TV) and was widely used
in multichannel telephony (now being superseded by digital techniques and TDM). The multichannel
telephone system illustrates some important aspects and is considered below. For speech, a
bandwidth of 3kHz is satisfactory. The physical line, e.g. a co-axial cable will have a bandwidth
compared to speech as shown below.
61
3kHz
freq
GHz
freq
m(t) DSBSC
B
carrier DSBSC
cos( c t ) freq
fc
SSB
m(t) Filter
SSBSC
carrier
cos( c t ) freq
fc
We have also noted that the message signal m(t) is usually band limited, i.e.
62
Speech Band m(t) SSB SSBSC
Limiting Filter
Filter
300Hz – 3400Hz
cos( c t )
The Band Limiting Filter (BLF) is usually a band pass filter with a pass band 300Hz to 3400Hz for
speech. This is to allow guard bands between adjacent channels.
f f f
300Hz 3400Hz 300Hz 3400Hz
10kHz
For telephony, the physical line is divided (notionally) into 4kHz bands or channels, i.e. the channel
spacing is 4kHz. Thus we now have:
Guard Bands
Bandlimited
Speech
f
4kHz
Note, the BLF does not have an ideal cut-off – the guard bands allow for filter ‘roll off’ in order to
reduce adjacent channel crosstalk.
63
m(t) DSBSC SSB SSBSC
BLF Filter
fc
300Hz 3400Hz
m(t)
freq
DSBSC
freq
fc
freq
fc
m1(t)
SSB
f BLF
Filter
fc1 f1
FDM
m2(t) Signal
SSB
BLF
Filter M(t)
f
fc2 f2
SSB
BLF
m3(t) Filter
fc3 f3
f
FDM Transmitter
Bandlimited
or Encoder
64
Each carrier frequency, fc1, fc2 and fc3 are separated by the channel spacing frequency, in this case 4
kHz, i.e. fc2 = fc1 + 4kHz, fc3 = fc2 + 4kHz.
f1 f2 f3
freq
fc1 fc2 fc3
Note that the baseband signals m1(t), m2(t), m3(t) have been multiplexed into adjacent channels, the
channel spacing is 4kHz. Note also that the SSB filters are set to select the USB, tuned to f1, f2 and f3
respectively.
SSB
LPF m1(t)
Filter
f1
fc1 Band
Limited
SSB
M(t) LPF m2(t)
Filter
FDM Back to
Signal f2 baseband
fc2
SSB
LPF m3(t)
Filter
f3
fc3
The SSB filters are the same as in the encoder, i.e. each one centred on f1, f2 and f3 to select the
appropriate sideband and reject the others. These are then followed by a synchronous demodulator,
each fed with a synchronous LO, fc1, fc2 and fc3 respectively.
65
For the 3 channel system shown there is 1 design for the BLF (used 3 times), 3 designs for the SSB
filters (each used twice) and 1 design for the LPF (used 3 times).
A co-axial cable could accommodate several thousand 4 kHz channels, for example 3600 channels is
typical. The bandwidth used is thus 3600 x 4kHz = 14.4Mhz. Potentially therefore there are 3600
different SSB filter designs. Not only this, but the designs must range from kHz to MHz.
centre frequency
Consider also the ‘Q’ of the filter, where Q is defined as Q .
bandwidth
60kHz
For ‘designs’ around say 60kHz, Q = 15 which is reasonable. However, for designs to have a
4 kHz
10,000kHz
centre frequency at around say 10Mhz, Q gives a Q = 2500 which is difficult to
4 kHz
achieve.
To overcome these problems, a hierarchical system for telephony used the FDM principle to form
groups, supergroups, master groups and supermaster groups.
The diagram below illustrates the FDM principle for 12 channels (similar to 3 channels) to a form a
basic group.
m1(t)
m2(t)
m3(t) Multiplexer
freq
12kHz 60kHz
m12(t)
i.e. 12 telephone channels are multiplexed in the frequency band 12kHz 60 kHz in 4kHz channels
basic group. A design for a basic 12 channel group is shown below:
66
Band Limiting Filters
SSB Filter
DSBSC
4kHz
CH1 8.6 15.4kHz 12.3 15.4kHz
m1(t)
300Hz 3400kHz
f1 = 12kHz
4kHz
f1 = 16kHz
Increase in 4kHz steps
FDM OUT
12 – 60kHz
4kHz
f12 = 56kHz
Super Group
BASIC
12 SSB
GROUP
Inputs FILTER
12 – 60kHz
420kHz
BASIC
12 SSB
GROUP
Inputs FILTER
12 – 60kHz
468kHz
BASIC
SSB
12
GROUP
Inputs FILTER
12 – 60kHz
516kHz
BASIC
SSB
12 GROUP
FILTER
Inputs 12 – 60kHz
564kHz
BASIC
SSB
12 GROUP
FILTER
Inputs 12 – 60kHz
612kHz
67
5 basic groups multiplexed to form a super group, i.e. 60 channels in one super group.
Note – the channel spacing in the super group in the above is 48kHz, i.e. each carrier frequency is
separated by 48kHz. There are 12 designs (low frequency) for one basic group and 5 designs for the
super group.
612 kHz
The Q for the super group SSB filters is Q 12 - which is reasonable. Hence, a total of 17
48kHz
designs are required for 60 channels. In a similar way, super groups may be multiplexed to form a
master group, and master groups to form super master groups…
TDM is widely used in digital communications, for example in the form of pulse code modulation in
digital telephony (TDM/PCM). In TDM, each message signal occupies the channel (e.g. a transmission
line) for a short period of time. The principle is illustrated below:
1
m1(t) 1
m1(t)
2
m2(t) 2
m2(t)
3
m3(t) 3
Tx Rx m3(t)
4 SW1 SW2
m4(t) 4
m4(t)
5 Transmission
m5(t) 5
Line m5(t)
Switches SW1 and SW2 rotate in synchronism, and in effect sample each message input in a
sequence m1(t), m2(t), m3(t), m4(t), m5(t), m1(t), m2(t),…
The sampled value (usually in digital form) is transmitted and recovered at the ‘far end’ to produce
output m1(t)…m5(t). For ease of illustration consider such a system with 3 messages, m1(t), m2(t) and
m3(t), each a different DC level as shown below.
68
m1(t) V1
0 t
m2(t) V2
0 t
m3(t) V3
0 t
SW1
‗Sample‘
t
Position 1 2 3 1 2 3
V3
V2
V1
t
m1(t) m2(t) m3(t) m1(t) m2(t) m3(t) m1(t)
Channel
Time
Slots
1 2 3 1 2 3 1
Time slot
In this illustration the samples are shown as levels, i.e. V1, V2 or V3. Normally, these voltages would be
converted to a binary code before transmission as discussed below.
Note that the channel is divided into time slots and in this example, 3 messages are time-division
multiplexed on to the channel. The sampling process requires that the message signals are a sampled
at a rate fs 2B, where fs is the sample rate, samples per second, and B is the maximum frequency in
the message signal, m(t) (i.e. Sampling Theorem applies). This sampling process effectively produces
a pulse train, which requires a bandwidth much greater than B.
Thus in TDM, the message signals occupy a wide bandwidth for short intervals of time. In the
illustration above, the signals are shown as PAM (Pulse Amplitude Modulation) signals. In practice
these are normally converted to digital signals before time division multiplexing.
69
Data Rate Management
One problem with TDM is how to handle a disparity in the input data rates. If data rates are
not the same, three strategies, or a combination of them, can be used. These strategies are
multilevel multiplexing, multiple-slot allocation, and pulse stuffing.
Multilevel Multiplexing : - Multilevel multiplexing is a technique used when the data rate of an input
line is a multiple of others. For example, we have two inputs of 20 kbps and three inputs of 40
kbps. The first two input lines can be multiplexed together to provide a data rate equal to the
last three. A second level of multiplexing can create an output of 160 kbps.
Multiple-Slot Allocation :- Sometimes it is more efficient to allot more than one slot in a
frame to a single input line. For example, we might have an input line with a 50-kbps data rate
can be given two slots in the output. We insert a serial-to-parallel converter in the line to
make two inputs out of one.
70
Frame Synchronizing
The implementation of TDM is not as simple as that of FDM. Synchronization between the
multiplexer and demultiplexer is a major issue. If the multiplexer and the demultiplexer are
not synchronized, a bit belonging to one channel may be received by the wrong channel. For
this reason, one or more synchronization bits are usually added to the beginning of each
frame. These bits, called framing bits, follow a pattern, frame to frame, that allows the
demultiplexer to synchronize with the incoming stream so that it can separate the time slots
accurately. In most cases, this synchronization information consists of 1 bit per frame,
alternating between 0 and 1.
Statistical Time-Division Multiplexing
In synchronous TDM, each input has a reserved slot in the output frame. This can be
inefficient if some input lines have no data to send. In statistical time-division multiplexing,
slots are dynamically allocated to improve bandwidth efficiency. Only when an input line has
a slot's worth of data to send is it given a slot in the output frame. In statistical multiplexing,
the number of slots in each frame is less than the number of input lines. The multiplexer
checks each input line in round-robin fashion; it allocates a slot for an input line if the line has
71
data to send; otherwise, it skips the line and checks the next line.
Slot Size
Since a slot carries both data and an address in statistical TDM, the ratio of the data size to
address size must be reasonable to make transmission efficient. For example, it would be
inefficient to send 1 bit per slot as data when the address is 3 bits. This would mean an
overhead of 300 percent. In statistical TDM, a block of data is usually many bytes while the
address is just a few bytes.
No Synchronization Bit
There is another difference between synchronous and statistical TDM, but this time it is at the
frame level. The frames in statistical TDM need not be synchronized, so we do not need
synchronization bits.
Bandwidth
In statistical TDM, the capacity of the link is normally less than the sum of the capacities of
each channel.
72
9.0 Error Control Techniques.
9.1. INTRODUCTION
A transmission channel is the physical medium through which the information is transmitted, such as telephone
lines, or atmosphere in the case of wireless communication. Undesirable disturbances (noise) can occur across
the communication channel, causing the received information to be different from the original information sent.
Coding theory deals with detection and correction of the transmission errors caused by the noise in the channel.
The primary goal of coding theory is efficient encoding of information, easy transmission of encoded messages,
fast decoding of received information and correction of errors introduced in the channel. Coding Theory is used
all the time: in reading CDs, receiving transmissions from satellites, or in cell phones . The key challenge coding
theorists face is to construct "good" codes and efficient algorithms for encoding and decoding them. Encoding
introduces redundancy into a stream of data, and decoding uses the redundancy to correct errors and extract the
original data. This paper will focus on the analysis, design, and applications of the important class of codes.
Error-correcting codes are more sophisticated than error detecting codes and require more redundant bits.The
number of bits required correcting multiple bits or burst error is so high that in most of the cases it is inefficient
to do so. For this reason, most error correction is limited to one, two or at the most three-bit errors. Different
error coding schemes are chosen depending on the types of errors expected, the communication medium's
expected error rate, and whether or not data retransmission is possible. In section second and third two basic
strategies for dealing with errors are described. One way is to include enough redundant information along with
each block of data sent to enable the receiver to deduce what the transmitted character must have been. The other
way is to include only enough redundancy to allow the receiver to deduce that error has occurred, but not which
error has occurred and the receiver asks for a retransmission. The former strategy uses Error-Correcting Codes
and latter uses Error-detecting Codes. Further in section four error control technique ARQ is explained and in
section five some forward error correction codes are discussed along with their uses in day to day technology.
Finally, in section five we provide summary of various codes and discuss scope of future extensions.
73
C. Checksum
A checksum or hash sum is a fixed size datum computed from an arbitrary block of digital data for the purpose
of detecting accidental errors that may have been introduced during its transmission or storage. Check digits and
parity are special cases of checksums, appropriate for small blocks of data (such as social Security bank account
numbers, social security no., computer words, single bytes, etc.). The simplest checksum algorithm is the so
called longitudinal parity check, which breaks the data into "words" with a fixed number n of bits, and then
computes the exclusive or of all those words. The result is appended to the message as an extra word. To check
the integrity of a message, the receiver computes the XOR of all its words, including the checksum; if the
result is not a word with n zeros; the receiver knows that a transmission error occurred.
D. Cyclic Redundancy Check (CRC)
Cyclic codes have favorable properties in that they are well suited for detecting burst errors. CRCs are
particularly easy to implement in hardware, and are therefore commonly used in digital networks and storage
devices such as hard disk drives. A CRCenabled device calculates a short, fixed-length binary sequence, known
as the check value or improperly the CRC, for each block of data to be sent or stored and appends it to the data,
forming a codeword. The idea behind CRC calculation is to look at the data as one large binary number. This
number is divided by a certain value and the remainder of the calculation is called the CRC. When a codeword is
received or read, the device either compares its check value with one freshly calculated from the data block, or
equivalently, performs a CRC on the whole codeword and compares the resulting check value with an expected
residue constant. If the check values do not match, then the block contains a data error and the device may seize
corrective action such as rereading or requesting the block is sent again, otherwise the data is assumed to be
error-free. CRCs are so called because the check (data verification) code is a redundancy (adds zero information
to the message) and the algorithm is based on cyclic codes. CRCs are popular because they are simple to
implement in binary hardware, are easy to analyze mathematically, and are particularly good at detecting
common errors caused by noise in transmission channels.
III. ERROR CORRECTION SCHEMES
The techniques that we have discussed so far can detect errors, but do not correct them. Error Correction
can be handled in two ways:
A. Backward Error Correction: In this scheme, when an error is discovered; the receiver has a back
channel to request the sender to retransmit the entire data unit, also known as ARQ.
B. Forward error correction: In this, receiver can use an error-correcting code, which automatically corrects
certain errors. Applications that require low latency (such as telephone conversations) cannot use Automatic
Repeat request (ARQ) ; they must use Forward Error Correction (FEC). By the time an ARQ system discovers
an error and re-transmits it, the re-sent data will arrive too late to be any good. Applications where the
transmitter immediately forgets the information as soon as it is sent (such as most television cameras) cannot use
ARQ; they must use FEC because when an error occurs, the original data is no longer available . This is also
why FEC is used in data storage systems such as RAID and distributed data store.
IV. AUTOMATIC REPEAT REQUEST
Automatic Repeat reQuest (ARQ) is an error control method for data transmission that makes use of
errordetection codes, acknowledgment and/or negative acknowledgment messages, and timeouts to achieve
reliable data transmission. An acknowledgment is a message sent by the receiver to indicate that it has
correctly received a data frame. Usually, when the transmitter does not receive the acknowledgment before
the timeout occurs (i.e., within a reasonable amount of time after sending the data frame), it retransmits the
frame until it is either correctly received. Three types of ARQ protocols are Stop-and-wait ARQ, Go-Back-N
ARQ, and Selective Repeat ARQ. ARQ is appropriate if the communication channel has varying or unknown
capacity, such as is the case on the Internet. However, ARQ requires the availability of a back channel, results in
possibly increased latency due to retransmissions, and requires the maintenance of buffers and timers for
retransmissions, which in the case of network congestion can put a strain on the server and overall network
capacity.
V. FORWARD ERROR CORRECTION
An error-correcting code (ECC) or forward error correction (FEC) code is a system of adding redundant data, or
parity data, to a message, such that it can be recovered by a receiver even when a number of errors (up to the
capability of the code being used) were introduced, either during the process of transmission, or on storage.
Since the receiver does not have to ask the sender for retransmission of the data, a back-channel is not required
in forward error correction, and it is therefore suitable for simplex communication such as broadcasting. Error-
correcting codes are frequently used in lower layer communication, as well as for reliable storage in media such
as CDs, DVDs, hard disks, and RAM. Error-correcting codes are usually distinguished between convolutional
codes and block codes: Convolutional codes are processed on a bit-by-bit basis. They are particularly suitable for
implementation in hardware, and the Viterbi decoder allows optimal decoding. Block codes are processed on a
block-byblock
74
basis. They were followed by a number of efficient codes, RS codes , Turbo codes [13] and low density parity
check code (LDPC) are relatively new constructions that can provide almost optimal efficiency. Shannon's
theorem is an important theorem in forward error correction and describes the maximum information rate at
which reliable communication is possible over a channel. This strict upper limit is expressed in terms of the
channel capacity. More specifically, the theorem says that there exist codes such that with increasing encoding
length the probability of error on a discrete memoryless channel can be made arbitrarily small, provided that
the code rate is smaller than the channel capacity.
A. BCH Codes
BCH codes were invented in 1959 by Hocquenghem, and independently in 1960 by Bose and Ray-Chaudhuri.
The codewords are formed by taking the remainder after dividing a polynomial representing our info bits by a
generator polynomial. The generator polynomial is selected to give the code its characteristics all codewords are
multiple of generator polynomial. The principal advantage of BCH codes is the ease with which they can be
decoded, via an elegant algebraic method known as syndrome decoding . This class of codes, is also highly
flexible, allowing control over block length and acceptable error thresholds, thus a custom code can be designed
to a given specification (subject to mathematical constraints). They have been widely used in communications
and data storage systems, including satellite communications, cellular networks, CD Rom, Mass Storage
Systems, wireless broadband, etc.
B. Hamming code
In telecommunication, a Hamming code is a linear error-correcting code named after its inventor, Richard
Hamming. Hamming codes can detect up to two simultaneous bit errors, and correct single-bit errors; thus,
reliable communication is possible when the Hamming distance between the transmitted and received bit
patterns is less than or equal to one. This means it is suitable for transmission medium situations where burst
errors do not occur. In particular, a singleerror-correcting and double-error-detecting variant commonly referred
to as SECDED.
C. Walsh-Hadamard code
In the field of mathematics, the Walsh-Hadamard code is an error correcting code over a binary alphabet that
allows reconstruction of any codeword if less than half its bits are corrupted. Furthermore, the Walsh-Hadamard
code is a locally decodable code which provides a way to recover the original message with high probability.
This gives rise to applications in complexity theory. It can also be shown that using list decoding; the original
message can be recovered as long as less than 1/2 of the bits in the received word have been corrupted. In coding
theory, the WH code is an example of a linear code over a binary alphabet that maps messages of length n to
codewords of length 2n. WH codes are mathematically orthogonal codes. As a result, a Walshencoded signal
appears as random noise to a CDMA capable mobile terminal, unless that terminal uses the same code as the one
used to encode the incoming signal. Walsh codes are used in direct sequence spread spectrum (DSSS) systems
such as QUALCOMM's CDMA, IS-95 and in frequency hopping spread spectrum (FHSS) systems to select the
target frequency for the next hop. Beside this, they are also used in power spectrum analysis, filtering,
processing speech and medical signals, multiplexing and coding in communications, characterizing non-linear
signals, solving non-linear differential equations, and logical design and analysis.
D. Reed–Solomon Codes
In coding theory, Reed–Solomon (RS) codes are non binary cyclic error correcting codes invented by Irving
S. Reed and Gustave Solomon in 1960. They described a systematic way of building codes that could detect and
correct multiple random symbol errors. RS codes work by adding t check symbols to the data, an RS code can
detect any combination of up to t erroneous symbols, and correct up to t/2 symbols. The choice of t is up to
the designer of the code. RS codes are usually constructed as systematic codes. Instead of sending s(x)
= p(x)g(x), the encoder will construct the transmitted polynomial s(x) such that it is evenly divisible
by g(x) and p(x) is apparent in the codeword. Ordinarily, the construction is done by multiplying p(x) by xt to
make room for the t check symbols, dividing that product by g(x) to find the remainder, and then
compensating for that remainder. The above properties of RS codes make them especially well-suited to
applications where errors occur in bursts . RS codes prominently used in consumer electronics such as CDs,
DVDs, Blue-ray Discs, in data transmission technologies such as DSL & WiMAX, in broadcast systems such as
DVB and ATSC, and in computer applications such as RAID 6 systems.
E. Low Density Parity Check Code (LDPC)
LDPC codes provide performance very close to the channel capacity (the theoretical maximum) using an iterated
soft-decision decoding approach, at linear time complexity in terms of their block length. Practical
implementations can draw heavily from the use of parallelism [10].The construction of a specific LDPC code
after this optimization falls into two main types of techniques:
a) Pseudo-random approaches
b) Combinatorial approaches
Construction by a pseudo-random approach builds on theoretical results that, for large block size, a
75
random construction gives good decoding performance. In general, pseudo-random codes have complex ncoders;
however pseudo-random codes with the best decoders can have simple encoders .Combinatorial approaches can
be used to optimize properties of small block-size LDPC codes or to create codes with simple encoders.
LDPC codes are now used in many recent high-speed communication standards, such as DVB-S2 (Digital video
broadcasting), WiMAX, High-Speed Wireless LAN (IEEE 802.11n), 10GBase-T Ethernet (802.3an) and
G.hn/G.9960 (ITU-T Standard for networking over power lines, phone lines and coaxial cable). Since 2009,
LDPC codes are also part of the Wi-Fi 802.11 standard as an optional part of 802.11n, in the High Throughput
(HT) PHY specification.
F. Turbo Codes
Turbo coding is an iterated soft-decoding scheme that combines two or more relatively simple convolutional
codes and an interleaver to produce a block code that can perform to within a fraction of a decibel of the
Shannon limit. The first turbo code, based on convolutional encoding, was introduced in 1993 by Berrou et al.
Predating LDPC codes in terms of practical application, they now provide similar performance. One of the
earliest commercial applications of turbo coding was the CDMA2000 1x digital cellular technology
specifically for Internet access, 1xEV-DO (TIA IS-856). Turbo codes find their major applications in field of
telecommunications:
Turbo codes are used extensively in 3G and 4G mobile telephony standards e.g. in HSPA, EV-DO and LTE.
MediaFLO, terrestrial mobile television system from Qualcomm. The interaction channel of satellite
communication systems, such as DVB-RCS. New NASA missions such as Mars Reconnaissance Orbiter now
use turbo codes, as an alternative to RS-Viterbi codes. Turbo coding such as block turbo coding and
convolutional turbo coding are used in IEEE 802.16 (WiMAX), a wireless metropolitan network standard.
Turbo codes are used for pictures, video, and mail transmissions. For voice transmission, however, convolutional
codes are used, because the decoding delay, the time it takes to decode the data, is a major drawback to turbo
codes. The several iterations required by turbo decoding make the delay unacceptable for realtime voice
communications and other applications that require instant data processing, like hard disk storage and optical
transmission.
76
10.0:Internet Protocols
Background
The Internet protocols are the world‘s most popular open-system (nonproprietary) protocol suite
because they can be used to communicate across any set of interconnected networks and are equally
well suited for LAN and WAN communications. The Internet protocols consist of a suite of
communication protocols, of which the two best known are the Transmission Control Protocol (TCP)
and the Internet Protocol (IP). The Internet protocol suite not only includes lower-layer protocols
(such as TCP and IP), but it also specifies common applications such as electronic mail, terminal
emulation, and file transfer. This chapter provides a broad introduction to specifications that comprise
the Internet protocols. Discussions include IP addressing and key upper-layer protocols used in the
Internet. Specific routing protocols are addressed individually in Part 6, Routing Protocols.
Internet protocols were first developed in the mid-1970s, when the Defense Advanced Research
Projects Agency (DARPA) became interested in establishing a packet-switched network that would
facilitate communication between dissimilar computer systems at research institutions. With the goal
of heterogeneous connectivity in mind, DARPA funded research by Stanford University and Bolt,
Beranek, and Newman (BBN). The result of this development effort was the Internet protocol suite,
completed in the late 1970s.
TCP/IP later was included with Berkeley Software Distribution (BSD) UNIX and has since become
the foundation on which the Internet and the World Wide Web (WWW) are based.
Documentation of the Internet protocols (including new or revised protocols) and policies are
specified in technical reports called Request For Comments (RFCs), which are published and then
reviewed and analyzed by the Internet community. Protocol refinements are published in the new
RFCs. To illustrate the scope of the Internet protocols, Figure 30-1 maps many of the protocols of the
Internet protocol suite and their corresponding OSI layers. This chapter addresses the basic elements
and operations of these and other key Internet protocols
Figure 10-1 Internet protocols span the complete range of OSI model layers.
77
Internet Protocol (IP)
The Internet Protocol (IP) is a network-layer (Layer 3) protocol that contains addressing information
and some control information that enables packets to be routed. IP is documented in RFC 791 and
is the primary network-layer protocol in the Internet protocol suite. Along with the Transmission
Control Protocol (TCP), IP represents the heart of the Internet protocols. IP has two primary
responsibilities: providing connectionless, best-effort delivery of datagrams through an
internetwork; and providing fragmentation and reassembly of datagrams to support data links with
different maximum-transmission unit (MTU) sizes.
IP Packet Format
An IP packet contains several types of information, as illustrated in Figure 10-2.
The following discussion describes the IP packet fields illustrated in Figure 10-2:
• Version—Indicates the version of IP currently used.
• IP Header Length (IHL)—Indicates the datagram header length in 32-bit words.
• Type-of-Service—Specifies how an upper-layer protocol would like a current datagram to be
handled, and assigns datagrams various levels of importance.
• Total Length—Specifies the length, in bytes, of the entire IP packet, including the data and
header.
• Identification—Contains an integer that identifies the current datagram. This field is used to help
piece together datagram fragments.
• Flags—Consists of a 3-bit field of which the two low-order (least-significant) bits control
fragmentation. The low-order bit specifies whether the packet can be fragmented. The middle bit
specifies whether the packet is the last fragment in a series of fragmented packets. The third or
high-order bit is not used.
• Fragment Offset—Indicates the position of the fragment‘s data relative to the beginning of the
data in the original datagram, which allows the destination IP process to properly reconstruct the
original datagram.
• Time-to-Live—Maintains a counter that gradually decrements down to zero, at which point the
datagram is discarded. This keeps packets from looping endlessly.
• Protocol—Indicates which upper-layer protocol receives incoming packets after IP processing is
78
complete.
• Header Checksum—Helps ensure IP header integrity.
• Source Address—Specifies the sending node.
• Destination Address—Specifies the receiving node
• Options—Allows IP to support various options, such as security.
• Data—Contains upper-layer information.
IP Addressing
As with any other network-layer protocol, the IP addressing scheme is integral to the process of
routing IP datagrams through an internetwork. Each IP address has specific components and follows
a basic format. These IP addresses can be subdivided and used to create addresses for subnetworks,
as discussed in more detail later in this chapter.
Each host on a TCP/IP network is assigned a unique 32-bit logical address that is divided into two
main parts: the network number and the host number. The network number identifies a network and
must be assigned by the Internet Network Information Center (InterNIC) if the network is to be part
of the Internet. An Internet Service Provider (ISP) can obtain blocks of network addresses from the
InterNIC and can itself assign address space as necessary. The host number identifies a host on a
network and is assigned by the local network administrator.
IP Address Format
The 32-bit IP address is grouped eight bits at a time, separated by dots, and represented in decimal
format (known as dotted decimal notation). Each bit in the octet has a binary weight (128, 64, 32,
16, 8, 4, 2, 1). The minimum value for an octet is 0, and the maximum value for an octet is 255.
Figure 10-3 illustrates the basic format of an IP address.
IP Address Classes
IP addressing supports five different address classes: A, B,C, D, and E. Only classes A, B, and C are
available for commercial use. The left-most (high-order) bits indicate the network class. Table 10-1
provides reference information about the five IP address classes.
79
Table 10-1 Reference Information About the Five IP Address Classes
Figure 10-4 illustrates the format of the commercial IP address classes. (Note the high-order bits in
each class.)
Figure 10-4 IP address formats A, B, and C are available for commercial use.
80
Figure 10-5 A range of possible values exists for the first octet of each address class.
IP Subnet Addressing
IP networks can be divided into smaller networks called subnetworks (or subnets). Subnetting provides the
network administrator with several benefits, including extra flexibility, more efficient use of network addresses,
and the capability to contain broadcast traffic (a broadcast will not cross a router).
Subnets are under local administration. As such, the outside world sees an organization as a single network and
has no detailed knowledge of the organization‘s internal structure.
A given network address can be broken up into many subnetworks. For example, 172.16.1.0,
172.16.2.0, 172.16.3.0, and 172.16.4.0 are all subnets within network 171.16.0.0. (All 0s in the host portion of an
address specifies the entire network.)
IP Subnet Mask
A subnet address is created by ―borrowing‖ bits from the host field and designating them as the subnet field. The
number of borrowed bits varies and is specified by the subnet mask. Figure 10-6 shows how bits are borrowed
from the host address field to create the subnet address field.
Figure 10-6 Bits are borrowed from the host address field to create the subnet address
field.
81
Figure 10-7 A sample subnet mask consists of all binary 1s and 0s.
Subnet mask bits should come from the high-order (left-most) bits of the host field, as Figure 10-8 illustrates.
Details of Class B and C subnet mask types follow. Class A addresses are not discussed in this chapter because
they generally are subnetted on an 8-bit boundary.
Figure 10-8 Subnet mask bits come from the high-order bits of the host field.
Various types of subnet masks exist for Class B and C subnets. The default subnet mask for a Class B address
that has no subnetting is 255.255.0.0, while the subnet mask for a Class B address 171.16.0.0 that specifies eight
bits of subnetting is 255.255.255.0. The reason for this is that eight bits of subnetting or 2 8 – 2 (1 for the network
address and 1 for the broadcast address) = 254 subnets possible, with 28 – 2 = 254 hosts per subnet.
The subnet mask for a Class C address 192.168.2.0 that specifies five bits of subnetting is 255.255.255.248.With
five bits available for subnetting, 25 – 2 = 30 subnets possible, with 23 – 2 = 6 hosts per subnet. The reference
charts shown in table 30–2 and table 30–3 can be used when planning Class B and C networks to determine the
required number of subnets and hosts, and the appropriate subnet mask.
82
Table 10-2 Class B Subnetting Reference Chart
Two simple guidelines exist for remembering logical AND operations: Logically ―ANDing‖ a 1 with
a 1 yields the original value, and logically ―ANDing‖ a 0 with any number yields 0.
83
Figure 10-9 illustrates that when a logical AND of the destination IP address and the subnet mask is performed,
the subnetwork number remains, which the router uses to forward the packet.
Figure 10-9 Applying a logical AND the destination IP address and the subnet mask
produces the subnetwork number.
84
Internet Control Message Protocol (ICMP)
The Internet Control Message Protocol (ICMP) is a network-layer Internet protocol that provides message
packets to report errors and other information regarding IP packet processing back to the source. ICMP is
documented in RFC 792.
ICMP Messages
ICMPs generate several kinds of useful messages, including Destination Unreachable, Echo Request and Reply,
Redirect, Time Exceeded, and Router Advertisement and Router Solicitation. If an ICMP message cannot be
delivered, no second one is generated. This is to avoid an endless flood of ICMP messages. When an ICMP
destination-unreachable message is sent by a router, it means that the router is unable to send the package to its
final destination. The router then discards the original packet. Two reasons exist for why a destination might be
unreachable. Most commonly, the source host has specified a nonexistent address. Less frequently, the router
does not have a route to the destination.
Destination-unreachable messages include four basic types: network unreachable, host unreachable, protocol
unreachable, and port unreachable. Network-unreachable messages usually mean that a failure has occurred in
the routing or addressing of a packet. Host-unreachable messages usually indicates delivery failure, such as a
wrong subnet mask. Protocol-unreachable messages generally mean that the destination does not support the
upper-layer protocol specified in the packet.
Port-unreachable messages imply that the TCP socket or port is not available. An ICMP echo-request message,
which is generated by the ping command, is sent by any host to test node reachability across an internetwork.
The ICMP echo-reply message indicates that the node can be successfully reached.
An ICMP Redirect message is sent by the router to the source host to stimulate more efficient routing. The router
still forwards the original packet to the destination. ICMP redirects allow host routing tables to remain small
because it is necessary to know the address of only one router, even if that router does not provide the best path.
Even after receiving an ICMP Redirect message, some devices might continue using the less-efficient route.
An ICMP Time-exceeded message is sent by the router if an IP packet‘s Time-to-Live field (expressed in hops
or seconds) reaches zero. The Time-to-Live field prevents packets from continuously circulating the
internetwork if the internetwork contains a routing loop. The router then discards the original packet.
ICMP Router-Discovery Protocol (IDRP)
IDRP uses Router-Advertisement and Router-Solicitation messages to discover the addresses of routers on
directly attached subnets. Each router periodically multicasts Router-Advertisement messages from each of its
interfaces. Hosts then discover addresses of routers on directly attached subnets by listening for these messages.
Hosts can use Router-Solicitation messages to request immediate advertisements rather than waiting for
unsolicited messages.
IRDP offers several advantages over other methods of discovering addresses of neighboring routers.
Primarily, it does not require hosts to recognize routing protocols, nor does it require manual configuration by an
administrator.
Router-Advertisement messages enable hosts to discover the existence of neighboring routers, but not which
router is best to reach a particular destination. If a host uses a poor first-hop router to reach a particular
destination, it receives a Redirect message identifying a better choice.
Transmission Control Protocol (TCP)
The TCP provides reliable transmission of data in an IP environment. TCP corresponds to the transport layer
(Layer 4) of the OSI reference model. Among the services TCP provides are stream data transfer, reliability,
efficient flow control, full-duplex operation, and multiplexing.
With stream data transfer, TCP delivers an unstructured stream of bytes identified by sequence numbers. This
service benefits applications because they do not have to chop data into blocks before handing it off to TCP.
Instead, TCP groups bytes into segments and passes them to IP for delivery.
TCP offers reliability by providing connection-oriented, end-to-end reliable packet delivery through an
internetwork. It does this by sequencing bytes with a forwarding acknowledgment number that indicates to the
destination the next byte the source expects to receive. Bytes not acknowledged within a specified time period
are retransmitted. The reliability mechanism of TCP allows devices to deal with lost, delayed, duplicate, or
misread packets. A time-out mechanism allows devices to detect lost packets and request retransmission.
TCP offers efficient flow control, which means that, when sending acknowledgments back to the source, the
receiving TCP process indicates the highest sequence number it can receive without overflowing its internal
buffers.
Full-duplex operation means that TCP processes can both send and receive at the same time.
Finally, TCP‘s multiplexing means that numerous simultaneous upper-layer conversations can be multiplexed
over a single connection.
85
TCP Connection Establishment
To use reliable transport services, TCP hosts must establish a connection-oriented session with one another.
Connection establishment is performed by using a ―three-way handshake‖ mechanism.
A three-way handshake synchronizes both ends of a connection by allowing both sides to agree upon initial
sequence numbers. This mechanism also guarantees that both sides are ready to transmit data and know that the
other side is ready to transmit as well. This is necessary so that packets are not transmitted or retransmitted
during session establishment or after session termination.
Each host randomly chooses a sequence number used to track bytes within the stream it is sending and receiving.
Then, the three-way handshake proceeds in the following manner:
The first host (Host A) initiates a connection by sending a packet with the initial sequence number (X) and SYN
bit set to indicate a connection request. The second host (Host B) receives the SYN, records the sequence
number X, and replies by acknowledging the SYN (with an ACK = X + 1). Host B includes its own initial
sequence number (SEQ = Y). An ACK = 20 means the host has received bytes 0 through 19 and expects byte 20
next. This technique is called forward acknowledgment. Host A then acknowledges all bytes Host B sent with a
forward acknowledgment indicating the next byte Host A expects to receive (ACK = Y + 1). Data transfer then
can begin.
Positive Acknowledgment and Retransmission (PAR)
A simple transport protocol might implement a reliability-and-flow-control technique where the source sends
one packet, starts a timer, and waits for an acknowledgment before sending a new packet. If the acknowledgment
is not received before the timer expires, the source retransmits the packet. Such a technique is called positive
acknowledgment and retransmission (PAR).
By assigning each packet a sequence number, PAR enables hosts to track lost or duplicate packets caused by
network delays that result in premature retransmission. The sequence numbers are sent back in the
cknowledgments so that the acknowledgments can be tracked.
PAR is an inefficient use of bandwidth, however, because a host must wait for an acknowledgment before
sending a new packet, and only one packet can be sent at a time.
TCP Sliding Window
A TCP sliding window provides more efficient use of network bandwidth than PAR because it enables hosts to
send multiple bytes or packets before waiting for an acknowledgment.
In TCP, the receiver specifies the current window size in every packet. Because TCP provides a byte-stream
connection, window sizes are expressed in bytes. This means that a window is the number of data bytes that the
sender is allowed to send before waiting for an acknowledgment. Initial window sizes are indicated at connection
setup, but might vary throughout the data transfer to provide flow control. A window size of zero, for instance,
means ―Send no data.‖
In a TCP sliding-window operation, for example, the sender might have a sequence of bytes to send (numbered 1
to 10) to a receiver who has a window size of five. The sender then would place a window around the first five
bytes and transmit them together. It would then wait for an acknowledgment.
The receiver would respond with an ACK = 6, indicating that it has received bytes 1 to 5 and is expecting byte 6
next. In the same packet, the receiver would indicate that its window size is 5. The sender then would move the
sliding window five bytes to the right and transmit bytes 6 to 10. The receiver would respond with an ACK = 11,
indicating that it is expecting sequenced byte 11 next. In this packet, the receiver might indicate that its window
size is 0 (because, for example, its internal buffers are full). At this point, the sender cannot send any more bytes
until the receiver sends another packet with a window size greater than 0.
86
TCP Packet Format
Figure 10-10 illustrates the fields and overall format of a TCP packet.
Figure 10-10 Twelve fields comprise a TCP packet.
87
UDP is the transport protocol for several well-known application-layer protocols, including Network File System
(NFS), Simple Network Management Protocol (SNMP), Domain Name System (DNS), and Trivial File Transfer
Protocol (TFTP).
The UDP packet format contains four fields, as shown in Figure 10-11. These include source and destination
ports, length, and checksum fields.
Figure 10-11 A UDP packet consists of four fields.
Source and destination ports contain the 16-bit UDP protocol port numbers used to demultiplex datagrams for
receiving application-layer processes. A length field specifies the length of the UDP header and data. Checksum
provides an (optional) integrity check on the UDP header and data.
Internet Protocols Application-Layer Protocols
The Internet protocol suite includes many application-layer protocols that represent a wide variety
of applications, including the following:
• File Transfer Protocol (FTP)—Moves files between devices
• Simple Network-Management Protocol (SNMP)—Primarily reports anomalous network
conditions and sets network threshold values
• Telnet—Serves as a terminal emulation protocol
• X Windows—Serves as a distributed windowing and graphics system used for communication
between X terminals and UNIX workstations
• Network File System (NFS), External Data Representation (XDR), and Remote Procedure Call
(RPC)—Work together to enable transparent access to remote network resources
• Simple Mail Transfer Protocol (SMTP)—Provides electronic mail services
• Domain Name System (DNS)—Translates the names of network nodes into network addresses
Table 10-5 lists these higher-layer protocols and the applications that they support.
88