DC Notes
DC Notes
MODULE 1: INTRODUCTION
1) Message
Message is the information (or data) to be communicated.
Message may consist of
→ number/text
→ picture or
→ audio/video
2) Sender
Sender is the device that sends the data-message.
Sender can be
→ computer and
→ mobile phone
3) Receiver
Receiver is the device that receives the message.
Receiver can be
→ computer and
→ mobile phone
4) Transmission Medium
Transmission-medium is physical-path by which a message travels from sender to receiver.
Transmission-medium can be wired or wireless.
Examples of wired medium:
→ twisted-pair wire (used in landline telephone) →
coaxial cable (used in cable TV network)
→ fiber-optic cable
Examples of wireless medium:
→ radio waves
→ microwaves
→ infrared waves (ex: operating TV using remote control)
5) Protocol
A protocol is a set of rules that govern data-communications.
In other words, a protocol represents an agreement between the communicating-devices.
Without a protocol, 2 devices may be connected but not communicating.
DATA COMMUNICATION 18CS46
1) Simplex
The communication is unidirectional
(For ex: The simplex mode is like a one-way street). On
a link, out of 2 devices:
i) Only one device can transmit.
ii) Another device can only receive.
For example (Figure 1.2a):
The monitor can only accept output.
Entire-capacity of channel is used to send the data in one direction.
2) Half Duplex
Both the stations can transmit as well as receive but not at the same time.
(For ex: The half-duplex mode is like a one-lane road with 2 directional traffic).
When one station is sending, the other can only receive and vice-versa.
For example (Figure 1.2b): Walkie-talkies
Entire-capacity of a channel is used by one of the 2 stations that are transmitting the data.
3) Full Duplex
Both stations can transmit and receive at the same time.
(For ex: The full-duplex is like a 2-way street with traffic flowing in both directions at the
same time).
For example (Figure 1.2c):
Mobile phones (When 2 people are communicating by a telephone line, both can listen and
talk at the same time)
Entire-capacity of a channel is shared by both the stations that are transmitting the data.
• Advantages:
1) Less expensive: Each device needs only one link & one I/O port to connect it to any devices.
2) Easy installation & reconfiguration: Nodes can be added/removed w/o affecting the network.
3) Robustness: If one link fails, it does not affect the entire system.
4) Easy to detect and troubleshoot fault.
5) Centralized management: The hub manages and controls the whole network.
• Disadvantages:
1) Single point of failure: If the hub goes down, the whole network is dead.
2) Cable length required is the more compared to bus/ring topologies.
3) Number of nodes in network depends on capacity of hub.
1.2.2.2.3 Ring Topology
• Each device is connected to the next, forming a ring (Figure 1.6).
• There are only two neighbors for each device.
• Data travels around the network in one direction till the destination is reached.
• Sending and receiving of data takes place by the help of token.
• Each device has a repeater.
• A repeater
→ receives a signal on transmission-medium &
→ regenerates & passes the signal to next device.
• Advantages:
1) Easy installation and reconfiguration.
To add/delete a device, requires changing only 2 connections.
3) Fault isolation is simplified.
If one device does not receive a signal within a specified period, it can issue an alarm.
The alarm alerts the network-operator to the problem and its location.
3) Congestion reduced: Because all the traffic flows in only one direction.
• Disadvantages:
1) Unidirectional traffic.
2) A fault in the ring/device stops all transmission.
The above 2 drawbacks can be overcome by using dual ring.
3) There is a limit on
i) Cable length &
ii) Number of nodes that can be connected.
4) Slower: Each data must pass through all the devices between source and destination.
1.2.2.2.4 Mesh Topology
• All the devices are connected to each other (Figure 1.7).
• There exists a dedicated point-to-point link between all devices.
• There are n(n-1) physical channels to link n devices.
• Every device not only sends its own data but also relays data from other nodes.
• For ‘n’ nodes,
→ there are n(n-1) physical-links
→ there are n(n-1)/2 duplex-mode links
• Every device must have (n-1) I/O ports to be connected to the other (n-1) devices.
• Advantages:
1) Congestion reduced: Each connection can carry its own data load.
2) Robustness: If one link fails, it does not affect the entire system.
3) Security: When a data travels on a dedicated-line, only intended-receiver can see the data.
4) Easy fault identification & fault isolation: Traffic can be re-routed to avoid problematic links.
• Disadvantages:
1) Difficult installation and reconfiguration.
2) Bulk of wiring occupies more space than available space.
3) Very expensive: as there are many redundant connections.
4) Not mostly used in computer networks. It is commonly used in wireless networks.
5) High redundancy of the network-connections.
1.3 Network Types
• Two popular types of networks:
1) LAN (Local Area Network) &
2) WAN (Wide Area Network)
1.3.1 LAN
• LAN is used to connect computers in a single office, building or campus (Figure 1.8).
• LAN is usually privately owned network.
• A LAN can be simple or complex.
1) Simple: LAN may contain 2 PCs and a printer.
2) Complex: LAN can extend throughout a company.
• Each host in a LAN has an address that uniquely defines the host in the LAN.
• A packet sent by a host to another host carries both source host’s and destination host’s addresses.
• LANs use a smart connecting switch.
• The switch is able to
→ recognize the destination address of the packet & →
guide the packet to its destination.
• The switch
→ reduces the traffic in the LAN &
→ allows more than one pair to communicate with each other at the same time.
• Advantages:
1) Resource Sharing
Computer resources like printers and hard disks can be shared by all devices on the network.
2) Expansion
Nowadays, LANs are connected to WANs to create communication at a wider level.
1.3.2 WAN
• WAN is used to connect computers anywhere in the world.
• WAN can cover larger geographical area. It can cover cities, countries and even continents.
• WAN interconnects connecting devices such as switches, routers, or modems.
• Normally, WAN is
→ created & run by communication companies (Ex: BSNL, Airtel) →
leased by an organization that uses it.
• A WAN can be of 2 types:
1) Point-to-Point WAN
A point-to-point WAN is a network that connects 2 communicating devices through
atransmission media (Figure 1.9).
2) Switched WAN
A switched WAN is a network with more than two ends.
The switched WAN can be the backbones that connect the Internet.
A switched WAN is a combination of several point-to-point WANs that are connected by
switches (Figure 1.10).
1.3.2.1 Internetwork
• A network of networks is called an internet. (Internet inter-network) (Figure 1.12).
• For example (Figure 1.11):
Assume that an organization has two offices,
i) First office is on the east coast &
ii) Second office is on the west coast.
Each office has a LAN that allows all employees in the office to communicate with each other. To allow
communication between employees at different offices, the management leases a point-to-
point dedicated WAN from a ISP and connects the two LANs.
(ISP Internet service provider such as a telephone company ex: BSNL).
When a host in the west coast office sends a message to another host in the same office, the
router blocks the message, but the switch directs the message to the destination.
On the other hand, when a host on the west coast sends a message to a host on the east
coast, router R1 routes the packet to router R2, and the packet reaches the destination.
1.3.3 LAN vs. WAN
Parameters LAN WAN
Expands to Local Area Network Wide Area Network
Meaning LAN is used to connect computers WAN is used to connect computers
in a single office, building or in a large geographical area such
campus as countries
Ownership of network Private Private or public
¤ As shown in Figure 1.13, the 4 telephones at each side are connected to a switch. ¤
Theswitch connects a telephone at one side to a telephone at the other side.
¤ A high-capacity line can handle 4 voice communications at the same time.
¤ The capacity of high line can be shared between all pairs of telephones.
¤ The switch is used for only forwarding.
Advantage:
A circuit-switched network is efficient only when it is working at its full capacity.
Disadvantage:
Most of the time, the network is inefficient because it is working at partial capacity.
1.3.4.2 Packet Switched Network
In a computer network, the communication between the 2 ends is done in blocks of data called
packets.
The switch is used for both storing and forwarding because a packet is an independent entity that can
be stored and sent later.
¤ As shown in Figure 1.14, the 4 computers at each side are connected to a router. ¤
Arouter has a queue that can store and forward the packet.
¤ The high-capacity line has twice the capacity of the low-capacity line.
¤ If only 2 computers (one at each site) need to communicate with each other, there is no
waiting for the packets.
¤ However, if packets arrive at one router when high-capacity line is at its full capacity, the
packets should be stored and forwarded.
Advantages:
A packet-switched network is more efficient than a circuit switched network.
Disadvantage:
The packets may encounter some delays.
1.3.5 The Internet Today
• A network of networks is called an internet. (Internet inter-network)
• Internet is made up of (Figure 1.15)
1) Backbones
2) Provider networks &
3) Customer networks
1) Backbones
Backbones are large networks owned by communication companies such as BSNL and Airtel.
The backbone networks are connected through switching systems, called peering points.
2) Provider Networks
Provider networks use the services of the backbones for a fee.
Provider networks are connected to backbones and sometimes to other provider networks.
3) Customer Networks
Customer networks actually use the services provided by the Internet.
Customer networks pay fees to provider networks for receiving services.
• Backbones and provider networks are also called Internet Service Providers (ISPs).
• The backbones are often referred to as international ISPs.
The provider networks are often referred to as national or regional ISPs.
1.3.6 Accessing the Internet
• The Internet today is an internetwork that allows any user to become part of it.
• However, the user needs to be physically connected to an ISP.
• The physical connection is normally done through a point-to-point WAN.
1) Using Telephone Networks
Most residences have telephone service, which means they are connected to a telephone
network.
Most telephone networks have already connected themselves to the Internet.
Thus, residences can connect to the Internet using a point-to-point WAN.
This can be done in two ways:
A) Dial-up service
¤ A modem can be added to the telephone line. ¤
Amodem converts data to voice.
¤ The software installed on the computer
→ dials the ISP &
→ imitates making a telephone connection.
¤Disadvantages:
i) The dial-up service is very slow.
ii) When line is used for Internet connection, it cannot be used for voice
connection.
iii) It is only useful for small residences.
B) DSL Service
¤ DSL service also allows the line to be used simultaneously for voice & data
communication.
¤ Some telephone companies have upgraded their telephone lines to provide higher
speed Internet services to residences.
2) Using Cable Networks
A residence can be connected to the Internet by using cable service. Cable
service provides a higher speed connection.
The speed varies depending on the number of neighbors that use the same cable.
3) Using Wireless Networks
A residence can use a combination of wireless and wired connections to access the Internet. A
residence can be connected to the Internet through a wireless WAN.
4) Direct Connection to the Internet
A large organization can itself become a local ISP and be connected to the Internet. The
organization
→ leases a high-speed WAN from a carrier provider and →
connects itself to a regional ISP.
1.4 STANDARDS AND ADMINISTRATION
1.4.1 Internet Standards
• An Internet standard is a thoroughly tested specification useful to those who work with the Internet.
• The Internet standard is a formalized-regulation that must be followed.
• There is a strict procedure by which a specification attains Internet standard status.
• A specification begins as an Internet draft.
• An Internet draft is a working document with no official status and a 6-month lifetime.
• Upon recommendation from the Internet authorities, a draft may be published as a RFC.
• Each RFC is edited, assigned a number, and made available to all interested parties.
• RFCs go through maturity levels and are categorized according to their requirement
level.(working document a work in progress RFC Request for Comment)
1) Proposed Standard
Proposed standard is specification that is stable, well-understood & of interest to Internet
community.
Specification is usually tested and implemented by several different groups.
2) Draft Standard
A proposed standard is elevated to draft standard status after at least 2
successful
independent and interoperable implementations.
3) Internet Standard
A draft standard reaches Internet standard status after demonstrations of successful
implementation.
4) Historic
The historic RFCs are significant from a historical perspective. They
either
→ have been superseded by later specifications or
→ have never passed the necessary maturity levels to become an Internet standard.
5) Experimental
An RFC classified as experimental describes work related to an experimental situation. Such
an RFC should not be implemented in any functional Internet service.
6) Informational
An RFC classified as informational contains general, historical, or tutorial information related to the
Internet.
Usually, it is written by a vendor.
(ISOC Internet Society IAB Internet Architecture Board)
(IETF Internet Engineering Task Force IRTF Internet Research Task
Force)
(IESG Internet Engineering Steering Group IRSG Internet Research Steering Group)
1.4.1.2 Requirement Levels
• RFCs are classified into 5 requirement levels:
1) Required
An RFC labeled required must be implemented by all Internet systems to achieve minimum
conformance.
For example, IP and ICMP are required protocols.
2) Recommended
An RFC labeled recommended is not required for minimum conformance. It is
recommended because of its usefulness.
For example, FTP and TELNET are recommended protocols.
3) Elective
An RFC labeled elective is not required and not recommended.
However, a system can use it for its own benefit.
4) Limited Use
An RFC labeled limited use should be used only in limited situations. Most
of the experimental RFCs fall under this category.
5) Not Recommended
An RFC labeled not recommended is inappropriate for general use.
Normally a historic RFC may fall under this category.
1.5.1 Scenario
sFirst
Scenario
• In the first scenario, communication is so simple that it can occur in only one layer (Figure 2.1).
• Assume Maria and Ann are neighbors with a lot of common ideas.
• Communication between Maria and Ann takes place in one layer, face to face, in the same language
Second Scenario
• Maria and Ann communicate using regular mail through the post office (Figure 2.2).
• However, they do not want their ideas to be revealed by other people if the letters are intercepted.
• They agree on an encryption/decryption technique.
• The sender of the letter encrypts it to make it unreadable by an intruder; the receiver of the
letterdecrypts it to get the original letter.
1.5.1.1 Protocol Layering
• Protocol layering enables us to divide a complex task into several smaller and simpler tasks.
• Modularity means independent layers.
• A layer (module) can be defined as a black box with inputs and outputs, without concern about
howinputs are changed to outputs.
• If two machines provide the same outputs when given the same inputs, they can replace each other.
• Advantages:
1) It allows us to separate the services from the implementation.
2) There are intermediate systems that need only some layers, but not all layers.
• Disadvantage:
1) Having a single layer makes the job easier. There is no need for each layer to provide a
service to the upper layer and give service to the lower layer.
• As shown in the figure 2.6, the duty of the application, transport, and network layers is end-to-end.
• However, the duty of the data-link and physical layers is hop-to-hop. A hop is a host or router.
• The domain of duty of the top three layers is the internet.
The domain of duty of the two lower layers is the
link.
• In top 3 layers, the data unit should not be changed by any router or link-layer switch.
In bottom 2 layers, the data unit is changed only by the routers, not by the link-layer switches.
• Identical objects exist between two hops. Because router may fragment the packet at the network
layerand send more packets than received (Figure 2.7).
• The link between two hops does not change the object.
1.6.3 Description of Each
LayerPhysical Layer
• The physical layer is responsible for movements of individual bits from one node to another node.
• Transmission media is another hidden layer under the physical layer.
• Two devices are connected by a transmission medium (cable or air).
• The transmission medium does not carry bits; it carries electrical or optical signals.
• The physical layer
→ receives bits from the data-link layer &
→ sends through the transmission media.
Data Link Layer
• Data-link-layer (DLL) is responsible for moving frames from one node to another node over a link.
• The link can be wired LAN/WAN or wireless LAN/WAN.
• The data-link layer
→ gets the datagram from network layer
→ encapsulates the datagram in a packet called a frame. →
sends the frame to physical layer.
• TCP/IP model does not define any specific protocol.
• DLL supports all the standard and proprietary protocols.
• Each protocol may provide a different service.
• Some protocols provide complete error detection and correction; some protocols provide only
errorcorrection.
Network Layer
• The network layer is responsible for source-to-destination transmission of data.
• The network layer is also responsible for routing the packet.
• The routers choose the best route for each packet.
• Why we need the separate network layer?
1) The separation of different tasks between different layers.
2) The routers do not need the application and transport layers.
• TCP/IP model defines 5 protocols:
1) IP (Internetworking Protocol) 2) ARP (Address Resolution Protocol)
3) ICMP (Internet Control Message Protocol) 4) IGMP (Internet Group Message Protocol)
1) IP
IP is the main protocol of the network layer.
IP defines the format and the structure of addresses.
IP is also responsible for routing a packet from its source to its destination. It is a
connection-less & unreliable protocol.
i) Connection-less means there is no connection setup b/w the sender and the receiver.
ii)Unreliable protocol means
→ IP does not make any guarantee about delivery of the data. →
Packets may get dropped during transmission.
It provides a best-effort delivery service.
Best effort means IP does its best to get the packet to its destination, but with no guarantees. IP
does not provide following services
→ flow control
→ error control
→ congestion control services.
If an application requires above services, the application should rely only on the transportlayer
protocol.
2) ARP
ARP is used to find the physical-address of the node when its Internet-address is known.
Physical address is the 48-bit address that is imprinted on the NIC or LAN card.
Internet address (IP address) is used to uniquely & universally identify a device in the
internet.
3) ICMP
ICMP is used to inform the sender about datagram-problems that occur during transit.
4) IGMP
IGMP is used to send the same message to a group of recipients.
Transport Layer
• TL protocols are responsible for delivery of a message from a process to another process.
• The transport layer
→ gets the message from the application layer
→ encapsulates the message in a packet called a segment and →
sends the segment to network layer.
• TCP/IP model defines 3 protocols:1) TCP (Transmission Control Protocol)
2) UDP (User Datagram Protocol) &
3) SCTP (Stream Control Transmission Protocol)
1) TCP
TCP is a reliable connection-oriented protocol.
A connection is established b/w the sender and receiver before the data can be transmitted. TCP
provides
→ flow control
→ error control and
→ congestion control
2) UDP
UDP is the simplest of the 3 transport protocols.
It is an unreliable, connectionless protocol.
It does not provide flow, error, or congestion control.
Each datagram is transported separately & independently. It is
suitable for application program that
→ needs to send short messages &
→ cannot afford the retransmission.
3) SCTP
SCTP provides support for newer applications such as voice over the Internet. It
combines the best features of UDP and TCP.
Application Layer
• The two application layers exchange messages between each other.
• Communication at the application layer is between two processes (two programs running at this
layer).
• To communicate, a process sends a request to the other process and receives a response.
• Process-to-process communication is the duty of the application layer.
• TCP/IP model defines following protocols:
1) SMTP is used to transport email between a source and destination.
2) TELNET is used for accessing a site remotely.
3) FTP is used for transferring files from one host to another.
4) DNS is used to find the IP address of a computer.
5) SNMP is used to manage the Internet at global and local levels.
6) HTTP is used for accessing the World Wide Web (WWW).
1.6.5 Addressing
• We have logical communication between pairs of layers.
• Any communication that involves 2 parties needs 2 addresses: source address and
destinationaddress.
• We need 4 pairs of addresses (Figure 2.9):
1) At the application layer, we normally use names to define
→ site that provides services, such as vtunotesbysri.com, or →
e-mail address, such as [email protected].
2) At the transport layer, addresses are called port numbers.
Port numbers define the application-layer programs at the source and destination.
Port numbers are local addresses that distinguish between several programs running at the
same time.
3) At the network-layer, addresses are called IP addresses.
IP address uniquely defines the connection of a device to the Internet.
The IP addresses are global, with the whole Internet as the scope.
4) At the data link-layer, addresses are called MAC addresses
The MAC addresses defines a specific host or router in a network (LAN or WAN). The
MAC addresses are locally defined addresses.
1.6.6 Multiplexing and Demultiplexing
• Multiplexing means a protocol at a layer can encapsulate a packet from several next-higher
layerprotocols (one at a time) (Figure 2.10).
• Demultiplexing means a protocol can decapsulate and deliver a packet to several next-higher
layerprotocols (one at a time).
1) At transport layer, either UDP or TCP can accept a message from several application-
layerprotocols.
2) At network layer, IP can accept
→ a segment from TCP or a user datagram from UDP. → a
packet from ICMP or IGMP.
3) At data-link layer, a frame may carry the payload coming from IP or ARP.
1.7 OSI MODEL
• OSI model was developed by ISO.
• ISO is the organization, OSI is the model.
• Purpose: OSI was developed to allow systems with diff. platforms to communicate with each other.
• Platform means hardware, software or operating system.
• OSI is a network-model that defines the protocols for network communications.
• OSI has 7 layers as follows (Figure 2.11):
1) Application Layer
2) Presentation Layer
3) Session Layer
4) Transport Layer
5) Network Layer
6) Data Link Layer
7) Physical Layer
• Each layer has specific duties to perform and has to co-operate with the layers above & below it.
LAYERS IN THE OSI MODEL (Detailed OSI layers not in syllabus, it’s for your reference)
Physical Layer
• Main Responsibility:
Physical-layer (PL) is responsible for movements of individual bits from one node to another node.
Session Layer
• Main Responsibility:
Session-layer (SL) establishes, maintains, and synchronizes the interaction between 2 systems.
• Other responsibilities of session-layer (Figure 2.12):
1) Dialog Control
SL allows 2 systems to start communication with each other in half-duplex or full-duplex.
2) Synchronization
SL allows a process to add checkpoints into stream of data.
The checkpoint is a way of informing the status of the data transfer. For
example:
A checkpoint after first 500 bits of data will ensure that those 500 bits are not sent again in case
of retransmission at 650th bit. (Checkpoints Synchronization Points)
Presentation Layer
• Main Responsibility:
Presentation-layer (PL) is concerned with syntax & semantics of the info. exchanged b/w 2 systems.
Application Layer
• Main Responsibility: The application-layer (AL)
→ provides services to the user
→ enables the user to access the network.
Example 1.1
Example 1.2
Example 1.3
Example 1.4
B) Better Approximation
¤ To make the shape of the analog signal look more like that of a digital signal, we need to add
more harmonics of the frequencies (Figure 3.23).
¤ We can increase the bandwidth to 3N/2, 5N/2, 7N/2, and so on.
¤ In baseband transmission, the required bandwidth is proportional to the bit rate;
If we need to send bits faster, we need more bandwidth.
Example 1.5
Example 1.6
1.9.4.2 Broadband Transmission (Using Modulation)
• Broadband transmission or modulation means changing the digital signal to an analog signal
fortransmission.
• Modulation allows us to use a bandpass channel (Figure 3.24).
• Bandpass channel means a channel with a bandwidth that does not start from zero.
• This type of channel is more available than a low-pass channel.
1.10.1 Attenuation
• As signal travels through the medium, its strength decreases as distance increases. This is
calledattenuation (Figure 3.27).
• As the distance increases, attenuation also increases.
• For example:
Voice-data becomes weak over the distance & loses its contents beyond a certain distance.
• To compensate for this loss, amplifiers are used to amplify the signal.
1.10.1.1 Decibel
• The decibel (dB) measures the relative strengths of
→ 2 signals or
→ one signal at 2 different points.
• The decibel is negative if a signal is attenuated.
The decibel is positive if a signal is
amplified.
Example 1.7
Example 1.8
Example 1.9
Example 1.10
1.10.2 Distortion
• Distortion means that the signal changes its form or shape (Figure 3.29).
• Distortion can occur in a composite signal made of different frequencies.
• Different signal-components
→ have different propagation speed through a medium.
→ have different delays in arriving at the final destination.
• Differences in delay create a difference in phase if delay is not same as the period-duration.
• Signal-components at the receiver have phases different from what they had at the sender.
• The shape of the composite signal is therefore not the same.
1.10.3 Noise
• Noise is defined as an unwanted data (Figure 3.30).
• In other words, noise is the external energy that corrupts a signal.
• Due to noise, it is difficult to retrieve the original data/information.
• Four types of noise:
i) Thermal Noise
It is random motion of electrons in wire which creates extra signal not originally sent by
transmitter.
ii) Induced Noise
Induced noise comes from sources such as motors & appliances.
These devices act as a sending-antenna.
The transmission-medium acts as the receiving-antenna.
iii) Crosstalk
Crosstalk is the effect of one wire on the other.
One wire acts as a sending-antenna and the other as the receiving-antenna. iv)
Impulse Noise
Impulse Noise is a spike that comes from power-lines, lightning, and so on.
(spike a signal with high energy in a very short time)
• SNR is actually the ratio of what is wanted (signal) to what is not wanted (noise).
• A high-SNR means the signal is less corrupted by noise.
A low-SNR means the signal is more corrupted by noise.
• Because SNR is the ratio of 2 powers, it is often described in decibel units, SNRdB, defined as
Example 1.11
1.11 DATA RATE LIMITS
• Data-rate depends on 3 factors:
1) Bandwidth available
2) Level of the signals
3) Quality of channel (the level of noise)
• Two theoretical formulas can be used to calculate the data-rate:
1) Nyquist for a noiseless channel and
2) Shannon for a noisy channel.
Example 1.12
Example 1.13
Example 1.14
1.11.2 Noisy Channel: Shannon Capacity
In reality, we cannot have a noiseless channel; the channel is always noisy.
For a noisy channel, the Shannon capacity formula defines the theoretical maximum bit-rate.
Example 1.15
Example 1.16
Example 1.17
1.12 PERFORMANCE
1.12.1 Bandwidth
• One characteristic that measures network-performance is bandwidth.
• Bandwidth of analog and digital signals is calculated in separate ways:
(1) Bandwidth of an Analog Signal (in hz)
Bandwidth of an analog signal is expressed in terms of its frequencies.
Bandwidth is defined as the range of frequencies that the channel can carry.
It is calculated by the difference b/w the maximum frequency and the minimum frequency.
In figure 3.13, the signal has a minimum frequency of F1 = 1000Hz and maximum
frequency of F2 = 5000Hz.
Hence, the bandwidth is given by F2 - F1= 5000 - 1000 = 4000 Hz
(2) Bandwidth of a Digital Signal (in bps)
Bandwidth refers to the number of bits transmitted in one second in a channel (or link). For
example:
The bandwidth of a Fast Ethernet is a maximum of 100 Mbps. (This means that this
network can send 100 Mbps).
Relationship between (1) and (2)
• There is an explicit relationship between the bandwidth in hertz and bandwidth in bits per seconds.
• Basically, an increase in bandwidth in hertz means an increase in bandwidth in bits per second.
• The relationship depends on
→ baseband transmission or
→ transmission with modulation.
1.12.2 Throughput
• The throughput is a measure of how fast we can actually send data through a network.
• Although, bandwidth in bits per second and throughput seem the same, they are actually different.
• A link may have a bandwidth of B bps, but we can only send T bps through this link with T always
lessthan B.
• In other words,
1) The bandwidth is a potential measurement of a link.
2) The throughput is an actual measurement of how fast we can send
data.For example:
¤ We may have a link with a bandwidth of 1 Mbps, but the devices connected to the
endof the link may handle only 200 kbps.
¤ This means that we cannot send more than 200 kbps through this link.
Example 1.18
1.12.3 Latency (Delay)
• The latency defines how long it takes for an entire message to completely arrive at the destination
fromthe time the first bit is sent out from the source.
1) Propagation Time
Propagation time is defined as the time required for a bit to travel from source to destination.
Propagation time is given by
Example 1.19
2) Transmission Time
The time required for transmission of a message depends on
→ size of the message and
→ bandwidth of the channel.
The transmission time is given by
Example 1.20
Example 1.21
3) Queuing Time
Queuing-time is the time needed for each intermediate-device to hold the message before it can be
processed.
(Intermediate device may be a router or a switch)
The queuing-time is not a fixed factor. This is because
i) Queuing-time changes with the load imposed on the network.
ii) When there is heavy traffic on the network, the queuing-time increases.
Anintermediate-device
→ queues the arrived messages and
→ processes the messages one by one.
If there are many messages, each message will have to wait.
4) Processing Delay
Processing delay is the time taken by the routers to process the packet header.
1.12.4 Bandwidth Delay Product
• Two performance-metrics of a link are 1) Bandwidth and 2) Delay
• The bandwidth-delay product is very important in data-communications.
• Let us elaborate on this issue, using 2 hypothetical cases as examples.
Case 1: The following figure shows case 1 (Figure 3.32).
Let us assume,
Bandwidth of the link = 1 bps Delay of the link = 5s.
From the figure 3.32, bandwidth-delay product is 1 x 5 = 5. Thus, there can be maximum 5 bits on
the line.
There can be no more than 5 bits at any time on the link. Case
2: The following figure shows case 2 (Figure 3.33).
Let us assume,
Bandwidth of the link = 4 bps Delay of the link = 5s.
From the figure 3.33, bandwidth-delay product is 5 x 5 = 25. Thus, there can be maximum
25 bits on the line.
At each second, there are 5 bits on the line, thus the duration of each bit is 0.20s.
• The above 2 cases show that the (bandwidth X delay) is the number of bits that can fill the link.
• This measurement is important if we need to
→ send data in bursts and
→ wait for the acknowledgment of each burst.
• To use the maximum capability of the link
→ We need to make the burst-size as (2 x bandwidth x delay).
→ We need to fill up the full-duplex channel (two directions).
• Amount (2x bandwidth x delay) is the number of bits that can be in transition at any time (Fig 3.34).
1.12.5 Jitter
• Another performance issue that is related to delay is jitter.
• We can say that jitter is a problem
→ if different packets of data encounter different delays and
→ if the application using the data at the receiver site is time-sensitive (for ex: audio/video).
• For example:
If the delay for the first packet is 20
msthe delay for the second is 45 ms
and the delay for the third is 40 ms
then the real-time application that uses the packets suffers from jitter.
MODULE 1(CONT.): DIGITAL
TRANSMISSION
As shown in figure 4.3, we have a situation where the receiver has shorter bit duration.
The sender sends 10110001, while the receiver receives 110111000011.
A self-synchronizing digital-signal includes timing-information in the data being transmitted.
¤ This can be achieved if there are transitions in the signal that alert the receiver to the
beginning, middle, or end of the pulse.
¤ If the receiver’s clock is out-of-synchronization, these points can reset the clock.
8) Immunity to Noise & Interference
The code should be immune to noise and other interferences.
9) Complexity
A complex scheme is more costly to implement than a simple one.
For ex: A scheme that uses 4 signal-levels is more difficult to interpret than one that uses only
2 levels.
Example 1.22
Example 1.23
1.13.2 LINE CODING SCHEMES
• The Line Coding schemes are classified into 3 broad categories (Figure 4.4):
Disadvantages:
1) Compared to polar scheme, this scheme is very costly.
2) Also, the normalized power is double that for polar NRZ.
3) Not suitable for transmission over channels with poor performance around zero
frequency.(Normalized power power needed to send 1 bit per unit line
resistance)
1.13.2.2 Polar Schemes
• The voltages are on the both sides of the time axis.
• Polar NRZ scheme can be implemented with two voltages
(V).For example: -V for bit 1
+V for bit 0.
a) Non-Return-to-Zero (NRZ)
We use 2 levels of voltage amplitude.
Two versions of polar NRZ (Figure 4.6):
i) NRZ-L (NRZ-Level)
¤ The level of the voltage determines the value of the bit. ¤
For example: i) Voltage-level for 0 can be positive and
ii) Voltage-level for 1 can be negative.
ii) NRZ-I (NRZ-Invert)
¤ The change or lack of change in the level of the voltage determines the value of the
bit.
¤ If there is no change, the bit is 0;
If there is a change, the bit is 1.
Disadvantages:
1) Baseline wandering is a problem for both variations (NRZ-L NRZ-I).
i) In NRZ-L, if there is a long sequence of 0s or 1s, the average signal-
powerbecomes skewed.
The receiver might have difficulty discerning the bit value.
ii) In NRZ-I, this problem occurs only for a long sequence of 0s.
If we eliminate the long sequence of 0s, we can avoid baseline wandering.
2) The synchronization problem also exists in both schemes.
→ A long sequence of 0s can cause a problem in both schemes.
→ A long sequence of 1s can cause a problem in only NRZ-L.
3) In NRZ-L, problem occurs when there is a sudden change of polarity in the system.
¤ For example:
In twisted-pair cable, a change in the polarity of the wire results in
→ all 0s interpreted as 1s and
→ all 1s interpreted as 0s.
¤ NRZ-I does not have this problem.
¤ Both schemes have an average signal-rate of N/2 Bd.
4) NRZ-L and NRZ-I both have a DC component problem.
Example 1.24
b) Return-to-Zero (RZ)
In NRZ encoding, problem occurs when the sender-clock and receiver-clock are not
synchronized.
Solution: Use return-to-zero (RZ) scheme (Figure 4.7).
RZ scheme uses 3 voltages: positive, negative, and zero.
There is always a transition at the middle of the bit. Either
i) from high to zero (for 1) or
ii) from low to zero (for 0)
Disadvantages:
1) RZ encoding requires 2 signal-changes to encode a bit & .’. occupies greater bandwidth.
2) Complexity: RZ uses 3 levels of voltage, which is more complex to create and detect.
3) Problem occurs when there is a sudden change of polarity in the system. This result in
→ all 0s interpreted as 1s &
→ all 1s interpreted as 0s.
c) Biphase: Manchester & Differential Manchester
i) Manchester Encoding
This is a combination of NRZ-L & RZ schemes (RZ transition at the middle of the bit). There
is always a transition at the middle of the bit. Either
i) from high to low (for 0) or
ii) from low to high (for 1).
It uses only two voltage levels (Figure 4.8).
The duration of the bit is divided into 2 halves. The
voltage
→ remains at one level during the first half &
→ moves to the other level in the second half.
The transition at the middle of the bit provides synchronization. ii)
Differential Manchester
This is a combination of NRZ-I and RZ schemes.
There is always a transition at the middle of the bit, but the bit-values are determined at the
beginning of the bit.
If the next bit is 0, there is a transition. If the next bit is 1, there is none.
Advantages:
1) The Manchester scheme overcomes problems associated with NRZ-L.
Differential Manchester overcomes problems associated with NRZ-
I.
2) There is no baseline wandering.
3) There is no DC component ‘.’ each bit has a positive & negative voltage contribution.
Disadvantage:
1) Signal-rate: Signal-rate for Manchester & diff. Manchester is double that for NRZ.
1.13.2.3 Bipolar Schemes (or Multilevel Binary)
• This coding scheme uses 3 voltage levels (Figure 4.9):
i) positive
ii) negative &
iii) zero.
• Two variations of bipolar encoding:
i) AMI (Alternate Mark Inversion)
ii) Pseudoternary
i) AMI
Binary 0 is represented by a neutral 0 voltage (AMI Alternate 1 Inversion). Binary
1s are represented by alternating positive and negative voltages.
ii) Pseudoternary
Binary 1 is represented by a neutral 0 voltage.
Binary 0s are represented by alternating positive and negative voltages.
Advantages:
1) The bipolar scheme has the same signal-rate as NRZ.
2) There is no DC component ‘.’ each bit has a positive & negative voltage contribution.
3) The concentration of the energy is around frequency N/2.
Disadvantage:
1) AMI has a synchronization problem when a long sequence of 0s is present in the data.
MODULE-WISE QUESTIONS
MODULE 1: INTRODUCTION
2.1.1 PCM
• PCM is a technique used to change an analog signal to digital data (digitization).
• PCM has encoder at the sender and decoder at the receiver.
• The encoder has 3 processes (Figure 4.21):
1) Sampling
2) Quantization &
3) Encoding.
2.1.1.1 Sampling
• We convert the continuous time signal (analog) into the discrete time signal (digital).
• Pulses from the analog-signal are sampled every Ts sec
where Ts is the sample-interval or period.
• The inverse of the sampling-interval is called the sampling-frequency (or sampling-rate).
• Sampling-frequency is given by
2.1.2 Quantization
• The sampled-signal is quantized.
• Result of sampling is a set of pulses with amplitude-values b/w max & min amplitudes of the signal.
• Four steps in quantization:
1) We assume that the original analog-signal has amplitudes between Vmin & Vmax.
2) We divide the range into L zones, each of height Δ(delta).
2.1.3 Encoding
• The quantized values are encoded as n-bit code word.
• In the previous example,
A quantized value 2 is encoded as 010.
A quantized value 5 is encoded as 101.
• Relationship between number of quantization-levels (L) & number of bits (n) is given by
n=log2L or 2n=L
• The bit-rate is given by:
Example 2.1
Example 2.2
DATA COMMUNICATION 18CS46
Example 2.3
Example 2.4
• When 1/r = 1 (for a NRZ or bipolar signal) and c = (1/2) (the average situation), the minimum
bandwidth is
• This means the minimum bandwidth of the digital-signal is nb times greater than the bandwidth of the
analog-signal.
DATA COMMUNICATION 18CS46
2.1.3.3 Maximum Data Rate of a Channel
• The Nyquist theorem gives the data-rate of a channel as
• We can deduce above data-rate from the Nyquist sampling theorem by using the following
arguments.
1) We assume that the available channel is low-pass with bandwidth B.
2) We assume that the digital-signal we want to send has L levels, where each level is a
signalelement. This means r = 1/log2L.
3) We first pass digital-signal through a low-pass filter to cut off the frequencies above B Hz.
4) We treat the resulting signal as an analog-signal and sample it at 2 x B samples per second and
quantize it using L levels.
5) The resulting bit-rate is
This is the maximum bandwidth; if the case factor c increases, the data-rate is reduced.
• Advantage:
1) Speed: Parallel transmission can increase the transfer speed by a factor of n over serial
transmission.
• Disadvantage:
1) Cost: Parallel transmission requires n communication lines just to transmit the data-stream.
Because this is expensive, parallel transmission is usually limited to short distances.
• Advantage:
1) Cost: Serial transmission reduces cost of transmission over parallel by a factor of n.
• Disadvantage:
1) Since communication within devices is parallel, following 2 converters are required at interface:
i) Parallel-to-serial converter
ii) Serial-to-parallel converter
• Three types of serial transmission: asynchronous, synchronous, and isochronous.
DATA COMMUNICATION 18CS46
2.2.2.1 Asynchronous Transmission
• Asynchronous transmission is so named because the timing of a signal is not important (Figure 4.34).
• Prior to data transfer, both sender & receiver agree on pattern of information to be exchanged.
• Normally, patterns are based on grouping the bit-stream into bytes.
• The sender transmits each group to the link without regard to a timer.
• As long as those patterns are followed, the receiver can retrieve the info. without regard to a timer.
• There may be a gap between bytes.
• We send
→ 1 start bit (0) at the beginning of each byte →
1 stop bit (1) at the end of each byte.
• Start bit alerts the receiver to the arrival of a new group.
Stop bit lets the receiver know that the byte is finished.
• Here, the term asynchronous means “asynchronous at the byte level”.
However, the bits are still synchronized & bit-durations are the same.
• Disadvantage:
1) Slower than synchronous transmission. (Because of stop bit, start bit and gaps)
• Advantages:
1) Cheap & effective.
2) Useful for low-speed communication.
• Advantages:
1) Speed: Faster than asynchronous transmission. („.‟ of no stop bit, start bit and gaps).
2) Useful for high-speed applications such as transmission of data from one computer to another.
2.2.2.3 Isochronous
• Synchronization between characters is not enough; the entire stream of bits must be synchronized.
• The isochronous transmission guarantees that the data arrive at a fixed rate.
• In real-time audio/video, jitter is not acceptable. Therefore, synchronous transmission fails.
• For example: TV images are broadcast at the rate of 30 images per second. The images must be
viewed at the same rate.
DATA COMMUNICATION 18CS46
Example 2.5
Example 2.6
DATA COMMUNICATION 18CS46
2.3.2 Amplitude Shift Keying (ASK)
• The amplitude of the carrier-signal is varied to represent different signal-elements.
• Both frequency and phase remain constant for all signal-elements.
2.3.2.1 Binary ASK (BASK)
• BASK is implemented using only 2 levels. (Figure 5.3)
• This is also referred to as OOK (On-Off Keying).
2.3.3.1.1 Implementation
• Here, line coding method used = unipolar NRZ.
• Two implementations of BFSK: i) Coherent and ii) Non-Coherent.
Coherent BFSK Non Coherent BFSK
The phase continues through the boundary of There may be discontinuity in the phase when
two signal-elements (Figure 5.7). one signal-element ends and the next begins.
This is implemented by using one voltage- This is implemented by
controlled oscillator (VCO). → treating BFSK as 2 ASK modulations and
VCO changes frequency according to the input → using 2 carrier-frequencies
voltage.
When the amplitude of NRZ signal = 0, the VCO
keeps its regular frequency.
When the amplitude of NRZ signal = 0, the VCO
increases its frequency.
2.3.4.1.1 Implementation
• The implementation of BPSK is as simple as that for ASK. (Figure 5.10).
• The signal-element with phase 180° can be seen as the complement of the signal-element with
phase 0°.
• Here, line coding method used: polar NRZ.
• The polar NRZ signal is multiplied by the carrier-frequency coming from an oscillator.
1) When data-element = 1, the phase starts at 0°.
2) When data-element = 0, the phase starts at 180°.
• As shown in Figure 5.11, the 2 composite-signals created by each multiplier are 2 sine waves with the
same frequency, but different phases.
• When the 2 sine waves are added, the result is another sine wave, with 4 possible phases: 45°, -45°,
135°, and -135°.
• There are 4 kinds of signal-elements in the output signal (L=4), so we can send 2 bits per
signalelement (r=2).
Example 2.10
DATA COMMUNICATION 18CS46
2.3.4.3 Constellation Diagram
• A constellation diagram can be used to define the amplitude and phase of a signal-element.
• This diagram is particularly useful
→ when 2 carriers (one in-phase and one quadrature) are used. →
when dealing with multilevel ASK, PSK, or QAM.
• In a constellation diagram, a signal-element type is represented as a dot.
• The diagram has 2 axes (Figure 5.12):
1) The horizontal X axis is related to the in-phase carrier.
2) The vertical Y axis is related to the quadrature carrier.
• For each point on the diagram, 4 pieces of information can be deduced.
1) The projection of point on the X axis defines the peak amplitude of the in-phase component.
2) The projection of point on Y axis defines peak amplitude of the quadrature component.
3) The length of the line that connects the point to the origin is the peak amplitude of the
signal-element (combination of the X and Y components);
4) The angle the line makes with the X axis is the phase of the signal-element.
Example 2.11
DATA COMMUNICATION 18CS46
2.3.5 Quadrature Amplitude Modulation (QAM)
• This is a combination of ASK and PSK.
• Main idea: Using 2 carriers, one in-phase and the other quadrature, with different amplitude levels for
each carrier.
• There are many variations of QAM (Figure 5.14).
A) Figure 5.14a shows the 4-QAM scheme using a unipolar NRZ signal. This is same as BASK.
B) Figure 5.14b shows another QAM using polar NRZ. This is the same as QPSK.
C) Figure 5.14c shows another 4-QAM in which we used a signal with 2 positive levels to
modulate each of the 2 carriers.
D) Figure 5.14d shows a 16-QAM constellation of a signal with 8 levels, 4 positive & 4 negative.
2.4 MULTIPLEXING
• When bandwidth of a medium is greater than bandwidth needs of the devices, the link can be shared.
• Multiplexing allows simultaneous transmission of multiple signals across a single data-link (Fig 4.21).
• The traffic increases, as data/telecommunications use increases.
• We can accommodate this increase by
→ adding individual links, each time a new channel is needed or
→ installing higher-bandwidth links to carry multiple signals.
• Today's technology includes high-bandwidth media such as optical-fiber and satellite microwaves.
• Each has a bandwidth far in excess of that needed for the average transmission-signal.
• If the bandwidth of a link is greater than the bandwidth needs of the devices connected to it, the
bandwidth is wasted.
• An efficient system maximizes the utilization of all resources; bandwidth is one of the most precious
resources we have in data communications.
Example 2.13
Example 2.14
DATA COMMUNICATION 18CS46
2.4.1.3 Applications of FDM
1) To maximize the efficiency of their infrastructure, Telephone-companies have traditionally
multiplexed signals from lower-bandwidth lines onto higher-bandwidth lines.
2) A very common application of FDM is AM and FM radio broadcasting.
3) The first generation of cellular telephones (still in operation) also uses FDM.
1) Group: In the analog hierarchy, 12 voice channels are multiplexed onto a higher-bandwidth
line to create a group.
A group has 48 kHz of bandwidth and supports 12 voice channels.
2) Super Group: At the next level, up to five groups can be multiplexed to create a
compositesignal called a supergroup.
A supergroup has a bandwidth of 240 kHz and supports up to 60 voice channels.
Supergroups can be made up of either five groups or 60 independent voice channels.
3) Master Groups: At the next level, 10 supergroups are multiplexed to create a master
group.
A master group must have 2.40 MHz of bandwidth, but the need for guard bands
between the supergroups increases the necessary bandwidth to 2.52 MHz.
Master groups support up to 600 voice channels.
4) Jumbo Group: Finally, six master groups can be combined into a jumbo group.
A jumbo group must have 15.12 MHz (6 x 2.52 MHz) of bandwidth, but the need for
guard bands b/w the master groups increases the necessary bandwidth to 16.984 MHz
Example 2.15
DATA COMMUNICATION 18CS46
2.4.2 Wavelength Division Multiplexing (WDM)
• WDM is an analog multiplexing technique that combines analog signals (Figure 6.10).
• WDM is designed to use the high-data-rate capability of fiber optical-cable.
• The data-rate of optical-cable is higher than the data-rate of metallic-cable.
• Using an optical-cable for one single line wastes the available bandwidth.
• Multiplexing allows combining several lines into one line.
• WDM is same as FDM with 2 exceptions:
1) Multiplexing & demultiplexing involve optical-signals transmitted through optical-cable.
2) The frequencies are very high.
• Applications of WDM:
1) SONET network: Multiple optical-fiber lines can be multiplexed and demultiplexed.
2) Dense WDM (DWDM) can multiplex a very large number of channels by spacing channels very
close to one another. DWDM achieves even greater efficiency
DATA COMMUNICATION 18CS46
2.4.3 Time Division Multiplexing (TDM)
• TDM is a digital multiplexing technique that combines digital signals (Figure 6.12).
• TDM combines several low-rate channels into one high-rate one.
• FDM vs. TDM
1) In FDM, a portion of the bandwidth is shared.
2) In TDM, a portion of the time is shared.
• Each connection occupies a portion of time in the link.
• Several connections share the high bandwidth of a line.
• In Figure 6.14, n = 3.
• A set of data-units from each input-connection is grouped into a frame.
• For example:
If there are 3 connections, a frame is divided into 3 time-slots.
One slot is allocated for each data-unit.
One data-unit is used for each input-line.
DATA COMMUNICATION
Example 2.16
Example 2.17
2-26
DATA COMMUNICATION
Example 2.18
2-27
DATA COMMUNICATION
2.4.3.1.2 Interleaving
• TDM can be seen as 2 fast-rotating switches (Figure 6.15):
1) First switch on the multiplexing-side and
2) Second switch on the demultiplexing-side.
• The switches are synchronized and rotate at the same speed, but in opposite directions.
1) On the multiplexing-side (Figure 6.16)
As the switch opens in front of a connection, that connection has the opportunity to send a unit
onto the path. This process is called interleaving.
2) On the demultiplexing-side
As the switch opens in front of a connection, that connection has the opportunity to receive a unit
from the path.
Example 2.19
2-28
DATA COMMUNICATION
Example 2.20
2-29
DATA COMMUNICATION
2.4.3.1.4 Data Rate Management
• Problem in TDM: How to handle differences in the input data-rates?
• If data-rates are not the same, three strategies can be used.
• Three different strategies: 1) Multilevel multiplexing 2) Multiple-slot allocation and 3) Pulse stuffing
1) Multilevel Multiplexing
This technique is used when the data-rate of an input-line is a multiple of others.
For example:
As shown in Figure 6.19, we have 2 inputs of 20 kbps and 3 inputs of 40 kbps.
The first 2 input-lines can be multiplexed to provide a data-rate of 40 kbps.
2) Multiple Slot Allocation
Sometimes it is more efficient to allot more than 1 slot in a frame to a single input-line.
For example:
Data-rate of multiple input-lines can be data-rate of one input-line.
As shown in Figure 6.20, the input-line with a 50-kbps data-rate can be given 2 slots in the
output-line.
In first input line, serial-to-parallel converter is used. The converter creates two 25 kbps input
lines out of one 50 kbps input line.
3) Pulse Stuffing
Sometimes the bit-rates of sources are not multiple integers of each other. .‟. above 2
techniques cannot be used.
Solution:
→ Make the highest input data-rate the dominant data-rate. →
Then, add dummy bits to the input-lines with lower rates. →
This will increase data rates of input-line.
→ This technique is called pulse stuffing, bit padding, or bit stuffing.
As shown in Figure 6.21, the input-line with a lower data-rate = 46kbps is pulse-stuffed to
increase the data-rate to 50 kbps.
Now, multiplexing can take place.
2-30
DATA COMMUNICATION
2.4.3.1.5 Frame Synchronizing
• Problem: Synchronization between the multiplexer and demultiplexer is a major issue.
If the multiplexer and the demultiplexer are not synchronized, a bit belonging to one
channel may be received by the wrong channel.
Solution: Usually, one or more synchronization-bits are added to the beginning of each frame. These
bits are called framing-bits.
The framing-bits follow a pattern (frame-to-frame) that allows multiplexer and demultiplexer to
synchronize.
As shown in Figure 6.22, the synchronization-information
→ consists of 1 bit per frame and
→ alternates between 0 & 1.
Example 2.21
Example 2.22
2-31
DATA COMMUNICATION
2.4.3.2 Statistical TDM
• Problem: Synchronous TDM is not efficient.
For ex: If a source does not have data to send, the corresponding slot in the output-frame is empty.
Solution: Use statistical TDM.
Slots are dynamically allocated to improve bandwidth-efficiency.
Only when an input-line has data to send, the input-line is given a slot in the output-frame.
• The number of slots in each frame is less than the number of input-lines.
• The multiplexer checks each input-line in round robin fashion.
If the line has data to send;
Then, multiplexer allocates a slot for an input-line;
Otherwise, multiplexer skips the line and checks the next line.
• In synchronous TDM (Figure 6.26a), some slots are empty because the corresponding line does not
have data to send.
• In statistical TDM (Figure 6.26b), no slot is left empty.
1) Addressing
Synchronous TDM Statistical TDM
An output-slot needs to carry only data of the An output-slot needs to carry both data &
destination (Figure 6.26a). address of the destination (Figure 6.26b).
There is no need for addressing. There is no fixed relationship between the
Synchronization and pre-assigned relationships inputs and outputs because there are no pre-
between the inputs and outputs serve as an assigned or reserved slots.
address. We need to include the address of the receiver
inside each slot to show where it is to be
delivered.
2) Slot Size
Usually, a block of data is many bytes while the address is just a few bytes.
A slot carries both data and address.
Therefore, address-size must be very small when compared to data-size.
This results in efficient transmission.
For example:
It will be inefficient to send 1 bit per slot as data, when the address is 3 bits.
This means an overhead of 300%.
3) No Synchronization Bit
In statistical TDM, the frames need not be synchronized, so synchronization-bits are not
needed.
4) Bandwidth
Normally, the capacity of the link is less than the sum of the capacities of each channel.
The designers define the capacity of the link based on the statistics of the load for each
channel.
2-32
DATA COMMUNICATION
2.5 SPREAD SPECTRUM
• Spread-spectrum is used in wireless applications (Figure 6.27).
• In wireless applications, all stations use air (or a vacuum) as the medium for communication.
• Goal: Stations must be able to share the air medium without interception by an attacker.
Solution: Spread-spectrum techniques add redundancy i.e. they spread the original spectrum needed
for each station.
• If the required bandwidth for each station is B, spread-spectrum expands it to Bss such that Bss>>B.
• The expanded-bandwidth allows the source to place its message in a protective envelope for a more
secure transmission.
(An analogy is the sending of a delicate, expensive gift. We can insert the gift in a special box to
prevent it from being damaged during transportation).
2-33
DATA COMMUNICATION
2.5.1 Frequency Hopping Spread Spectrum (FHSS)
• This technique uses „M‟ different carrier-frequencies that are modulated by the source-signal.
• At one moment, the signal modulates one carrier-frequency.
At the next moment, the signal modulates another carrier-frequency.
• Although the modulation is done using one carrier-frequency at a time, 'M‟ frequencies are used in the
long run.
• The bandwidth occupied by a source is given by
2-34
DATA COMMUNICATION
• If there are many k-bit patterns & the hopping period is short, a sender & receiver can have privacy.
If an attacker tries to intercept the transmitted signal, he can only access a small piece of data
because he does not know the spreading sequence to quickly adapt himself to the next hop.
• The scheme has also an anti-jamming effect.
A malicious sender may be able to send noise to jam the signal for one hopping period
(randomly), but not for the whole period.
2-35
DATA COMMUNICATION
2.5.2 Direct Sequence Spread Spectrum (DSSS)
• This technique expands the bandwidth of the original signal.
• Each data-bit is replaced with „n‟ bits using a spreading-code.
• Each bit is assigned a code of „n‟ bits called chips.
• The chip-rate is „n‟ times that of the data-bit (Figure 6.32).
• The spread signal can provide privacy if the attacker does not know the code.
• It can also provide immunity against interference if each station uses a different code.
2-36
DATA COMMUNICATION
2.6 SWITCHING
• A network is a set of connected-devices.
• Problem: Whenever we have multiple-devices, we have the problem of how to connect them to make
one-to-one communication possible.
• Solution: Use Switching.
• A switched-network consists of a series of interlinked-nodes, called switches.
• Switches are devices capable of creating temporary connections between two or more devices.
• In a switched-network,
1) Some nodes are connected to the end-systems (For example: PC or TP).
2) Some nodes are used only for routing.
2-37
DATA COMMUNICATION
2.6.2 Switching and TCP/IP Layers
• Switching can happen at several layers of the TCP/IP protocol suite.
1) Switching at Physical Layer
At the physical layer, we can have only circuit switching.
There are no packets exchanged at the physical layer.
The switches at the physical layer allow signals to travel in one path or another.
2) Switching at Data-Link Layer
At the data-link layer, we can have packet switching.
However, the term packet in this case means frames or cells.
Packet switching at the data-link layer is normally done using a virtual-circuit approach.
3) Switching at Network Layer
At the network layer, we can have packet switching.
In this case, either a virtual-circuit approach or a datagram approach can be used.
Currently the Internet uses a datagram approach, but the tendency is to move to a virtualcircuit
approach.
4) Switching at Application Layer
At the application layer, we can have only message switching.
The communication at the application layer occurs by exchanging messages.
Conceptually, we can say that communication using e-mail is a kind of message-switched
communication, but we do not see any network that actually can be called a message-switched
network.
2-38
DATA COMMUNICATION
2.7 CIRCUIT SWITCHED NETWORK
• This is similar to telephone system.
• Fixed path (connection) is established between a source and a destination prior to the transfer of
packets.
• A circuit-switched-network consists of a set of switches connected by physical-links (Figure 8.3).
• A connection between 2 stations is a dedicated-path made of one or more links.
• However, each connection uses only one dedicated-channel on each link.
• Normally, each link is divided into „n‟ channels by using FDM or TDM.
• The resources need to be reserved during the setup phase.
The resources remain dedicated for the entire duration of data transfer until the teardown phase.
2-39
DATA COMMUNICATION
2.7.2 Efficiency
• Circuit-switched-networks are inefficient when compared to other two types of networks because
1) Resources are allocated during the entire duration of the connection.
2) These resources are unavailable to other connections.
2.7.3 Delay
• Circuit-switched-networks have minimum delay when compared to other two types of networks
• During data-transfer,
1) The data are not delayed at each switch.
2) The resources are allocated for the duration of the connection.
2-40
DATA COMMUNICATION
2.8 PACKET SWITCHED NETWORK
• The message is divided into packets of fixed or variable size.
• The packet-size is determined by
→ network and
→ governing protocol.
• There is no resource reservation; resources are allocated on-demand.
2.8.1 Datagram Networks
• This is analogous to postal system.
• Each packet is routed independently through the network.
• Each packet has a header that contains source and destination addresses.
• Each switch examines the header to determine the next hop in the path to the destination.
• If the transmission line is busy
then the packet is placed in the queue until the line becomes free.
• Packets are referred to as datagrams.
• Datagram switching is normally done at the network layer.
• In Internet, switching is done by using the datagram switching.
• Advantage:
1) High utilization of transmission-line can be achieved by sharing among multiple packets.
• Disadvantages:
1) Packets may arrive out-of-order, and re-sequencing may be required at the destination
2) Loss of packets may occur when a switch has insufficient buffer
The Figure 8.7 shows how the 4 packets are transferred from station-A to station-X.
The switches are referred to as routers.
All four packets (or datagrams) belong to the same message, but may travel different paths to
reach their destination.
This is so because the links may be involved in carrying packets from other sources and do not
have the necessary bandwidth available to carry all the packets from A to X.
This approach can cause the datagrams of a transmission to arrive at their destination out-of-
order with different delays between the packets.
Packets may also be lost or dropped because of a lack-of-resources.
It is the responsibility of an upper-layer protocol to
→ reorder the datagrams or
→ ask for lost datagrams.
The datagram-networks are referred to as connectionless networks. This is because
1) The switch does not keep information about the connection state.
2) There are no setup or teardown phases.
3) Each packet is treated the same by a switch regardless of its source or destination.
2-41
DATA COMMUNICATION
2.8.1.1 Routing Table
• Each switch has a routing-table which is based on the destination-address.
• The routing-tables are dynamic & updated periodically.
• The destination-addresses and the corresponding forwarding output-ports are recorded in the tables.
The Figure 8.9 gives an example of delay for one single packet.
The packet travels through two switches.
There are three transmission times (3T), three propagation delays (slopes 3t of the lines), and
two waiting times (W1+ W2).
2-42
DATA COMMUNICATION
2.8.2 Virtual Circuit Network (VCN)
• This is similar to telephone system.
• A virtual-circuit network is a combination of circuit-switched-network and datagram-network.
• Five characteristics of VCN:
1) As in a circuit-switched-network, there are setup & teardown phases in addition to the data
transfer phase.
2) As in a circuit-switched-network, resources can be allocated during the setup phase.
As in a datagram-network, resources can also be allocated on-demand.
3) As in a datagram-network, data is divided into packets.
Each packet carries an address in the header.
However, the address in the header has local jurisdiction, not end-to-end jurisdiction.
4) As in a circuit-switched-network, all packets follow the same path established during the
connection.
5) A virtual-circuit network is implemented in the data link layer.
A circuit-switched-network is implemented in the physical layer.
A datagram-network is implemented in the network layer.
2.8.2.1 Addressing
• Two types of addressing: 1) Global and 2) Local (virtual-circuit identifier).
1) Global Addressing
A source or a destination needs to have a global address.
Global address is an address that can be unique in the scope of the network or internationally if
the network is part of an international network.
2) Virtual Circuit Identifier
The identifier used for data-transfer is called the virtual-circuit identifier (VCI). A
VCI, unlike a global address, is a small number that has only switch scope. VCI is
used by a frame between two switches.
When a frame arrives at a switch, it has a VCI.
When the frame leaves, it has a different VCI.
Figure 8.11 show how the VCI in a data-frame changes from one switch to another.
2-43
DATA COMMUNICATION
2.8.2.2 Three Phases
• A source and destination need to go through 3 phases: setup, data-transfer, and teardown.
1) In setup phase, the source and destination use their global addresses to help switches
make table entries for the connection.
2) In the teardown phase, the source and destination inform the switches to delete the
corresponding entry.
3) Data-transfer occurs between these 2 phases.
2.8.2.2.1 Data Transfer Phase
• To transfer a frame from a source to its destination, all switches need to have a table-entry for this
virtual-circuit.
• The table has four columns.
• The switch holds 4 pieces of information for each virtual-circuit that is already set up.
As shown in Figure 8.13, each switch changes the VCI and routes the frame.
The data-transfer phase is active until the source sends all its frames to the destination.
The procedure at the switch is the same for each frame of a message.
The process creates a virtual circuit, not a real circuit, between the source and destination.
2-44
DATA COMMUNICATION
2.8.2.2.2 Setup Phase
• A switch creates an entry for a virtual-circuit.
• For example, suppose source A needs to create a virtual-circuit to B.
• Two steps are required: 1) Setup-request and
2) Acknowledgment.
1) Setup Request
A setup-request frame is sent from the source to the destination (Figure 8.14).
2-45
DATA COMMUNICATION
2) Acknowledgment
A special frame, called the acknowledgment-frame, completes the entries in the
switchingtables (Figure 8.15).
2.8.2.4 Efficiency
• Resource reservation can be made in 2 cases:
1) During the setup: Here, the delay for each packet is the same.
2) On demand: Here, each packet may encounter different delays.
• Advantage of on demand resource allocation:
The source can check the availability of the resources, without actually reserving it.
2-46
DATA COMMUNICATION
2-47
DATA COMMUNICATION
MODULE-WISE QUESTIONS
1) Define digital to analog conversion? List different types of digital to analog conversion. (2)
2) Describe ASK, FSK and PSK mechanisms and apply them over the digital data 101101. (4)
3) Discuss the bandwidth requirement for ASK, FSK and PSK. (4*)
4) Explain different aspects of digital-to-analog conversion? (6*)
5) Define ASK. Explain BASK. (6*)
6) Define FSK. Explain BFSK. (6*)
7) Define PSK. Explain BPSK. (6*)
8) Explain QPSK. (6)
9) Explain the concept of constellation diagram. (6)
10) Explain QAM. (6)
1) Explain the concepts of multiplexing and list the categories of multiplexing? (4)
2) Define FDM? Explain the FDM multiplexing and demultiplexing process with neat diagrams. (6*)
3) Define and explain the concept of WDM. (6*)
4) Explain in detail synchronous TDM. (6*)
5) What do you mean by interleaving? Explain (4)
6) Explain Data Rate Management in Multi-level Multiplexing. (4*)
7) Explain the concept of empty-slots and frame-synchronizing in Multi-level Multiplexing. (6)
8) Explain in detail Statistical TDM. (6*)
9) Define FHSS and explain how it achieves bandwidth multiplexing. (8*)
10) Define DSSS and explain how it achieves bandwidth multiplexing. (8*)
11) Explain the analog hierarchy used by the telephone companies. (6)
2-48
DATA COMMUNICATION 18CS46
3.1 INTRODUCTION
3.1.1 Types of Errors
• When bits flow from 1 point to another, they are subject to unpredictable-changes ‘.’ of interference.
• The interference can change the shape of the signal.
• Two types of errors: 1) Single-bit error 2) Burst-error.
1) Single-Bit Error
Only 1 bit of a given data is changed
→ from 1 to 0 or
→ from 0 to 1 (Figure 10.1a).
2) Burst Error
Two or more bits in the data have changed
→ from 1 to 0 or
→ from 0 to 1 (Figure 10.1b).
A burst-error occurs more than a single-bit error. This is because:
Normally, the duration of noise is longer than the duration of 1-bit.
When noise affects data, the noise also affects the bits.
The no. of corrupted-bits depends on
→ data-rate and
→ duration of noise.
3.1.2 Redundancy
• The central concept in detecting/correcting errors is redundancy.
• Some extra-bits along with the data have to be sent to detect/correct errors. These extra bits are called
redundant-bits.
• The redundant-bits are
→ added by the sender and
→ removed by the receiver.
• The presence of redundant-bits allows the receiver to detect/correct errors.
¤ Let us assume that the sent code-word x is at the center of a circle with radius s.
¤ All received code-words that are created by 0 to s errors are points inside the circle or on
the perimeter of the circle.
¤ All other valid code-words must be outside the circle
• For example: A code scheme has a Hamming distance dmin = 4.
This code guarantees the detection of upto 3 errors (d = s + 1 or s = 3).
DATA COMMUNICATION 18CS46
3.2.1.2 Linear Block Codes
• Almost all block codes belong to a subset of block codes called linear block codes.
• A linear block code is a code in which the XOR of 2 valid code-words creates another valid code-word.
(XOR Addition modulo-2)
• The code in Table 10.1 is a linear block code because the result of XORing any code-word with any
other code-word is a valid code-word.
For example, the XORing of the 2nd and 3rd code-words creates the 4th one.
Example 3.3
DATA COMMUNICATION 18CS46
3.3.2 Polynomials
• A pattern of 0s and 1s can be represented as a polynomial with coefficients of 0 and 1 (Figure 10.8).
• The power of each term shows the position of the bit; the coefficient shows the value of the bit.
Standard Polynomials
3.4.1.3 Algorithm
DATA COMMUNICATION 18CS46
3.4.2 Other Approaches to the Checksum
• If two 16-bit items are transposed in transmission, the checksum cannot catch this error.
• The reason is that the traditional checksum is not weighted: it treats each data item equally.
• In other words, the order of data items is immaterial to the calculation.
• Two approaches have been used to prevent this problem: 1)Fletcher and 2)Adler
• We divide a packet into N chunks, create the exclusive OR of all the chunks and send N + 1 chunks.
• If any chunk is lost or corrupted, it can be created at the receiver site.
• If N = 4, it means that we need to send 25 percent extra data and be able to correct the data if only one
out of four chunks is lost.
• In Figure 10.21, each packet is divided into 5 chunks (normally the number is much larger).
• Then, we can create data chunk-by-chunk (horizontally), but combine the chunks into packets
vertically.
• In this case, each packet sent carries a chunk from several original packets.
• If the packet is lost, we miss only one chunk in each packet.
• Normally, missing of a chunk is acceptable in multimedia communication.
DATA COMMUNICATION 18CS46
3.5.4 Combining Hamming Distance and Interleaving
• Hamming distance and interleaving can be combined.
• Firstly, we can create n-bit packets that can correct t-bit errors.
• Then, we interleave m rows and send the bits column-by-column.
• In this way, we can automatically correct burst-errors up to m×t bit errors.
3.6.1 Framing
• A frame is a group of bits.
• Framing means organizing the bits into a frame that are carried by the physical layer.
• The data-link-layer needs to form frames, so that each frame is distinguishable from another.
• Framing separates a message from other messages by adding sender-address & destination-address.
• The destination-address defines where the packet is to go.
The sender-address helps the recipient acknowledge the receipt.
• Q: Why the whole message is not packed in one frame?
Ans: Large frame makes flow and error-control very inefficient.
Even a single-bit error requires the re-transmission of the whole message.
When a message is divided into smaller frames, a single-bit error affects only that small frame.
(Our postal system practices a type of framing. The simple act of inserting a letter into an envelope
separates one piece of information from another; the envelope serves as the delimiter. In addition,
each envelope defines the sender and receiver addresses since the postal system is a many-to-many
carrier facility).
• Problem:
Character-oriented framing is suitable when only text is exchanged by the data-link-layers.
However, if we send other type of information (say audio/video), then any pattern used for the
flag can also be part of the information.
If the flag-pattern appears in the data-section, the receiver might think that it has reached the
end of the frame.
Solution: A byte-stuffing is used.
(Byte stuffing character stuffing)
• In byte stuffing, a special byte is added to the data-section of the frame when there is a character with
the same pattern as the flag.
• The data-section is stuffed with an extra byte. This byte is called the escape character (ESC), which has
a predefined bit pattern.
• When a receiver encounters the ESC character, the receiver
→ removes ESC character from the data-section and
→ treats the next character as data, not a delimiting flag.
• Problem:
What happens if the text contains one or more escape characters followed by a flag?
The receiver removes the escape character, but keeps the flag, which is incorrectly
interpreted as the end of the frame.
Solution:
Escape characters part of the text must also be marked by another escape character (Fig 11.2).
• In short, byte stuffing is the process of adding one extra byte whenever there is a flag or escape
character in the text.
DATA COMMUNICATION 18CS46
3.6.1.3 Bit Oriented Framing
• The data-section of a frame is a sequence of bits to be interpreted by the upper layer as text, audio,
video, and so on.
• However, in addition to headers and trailers, we need a delimiter to separate one frame from the
other.
• Most protocols use a special 8-bit pattern flag 01111110 as the delimiter to define the beginning and the
end of the frame (Figure 11.3).
• Problem:
If the flag-pattern appears in the data-section, the receiver might think that it has reached the
end of the frame.
Solution: A bit-stuffing is used.
• In bit stuffing, if a 0 and five consecutive 1 bits are encountered, an extra 0 is added. This extra
stuffed bit is eventually removed from the data by the receiver. (Figure 11.4).
• This guarantees that the flag field sequence does not inadvertently appear in the frame.
• In short, bit stuffing is the process of adding one extra 0 whenever five consecutive 1s follow a 0 in the
data, so that the receiver does not mistake the pattern 0111110 for a flag.
DATA COMMUNICATION 18CS46
3.6.2 Flow Control and Error Control
• One of the responsibilities of the DLC sublayer is flow and error control at the data-link layer.
3.6.2.1 Flow Control
• Whenever an entity produces items and another entity consumes them, there should be a balance
between production and consumption rates.
• If the items are produced faster than they can be consumed, the consumer can be overwhelmed and
may need to discard some items.
• We need to prevent losing the data items at the consumer site.
• At the sending node, the data-link layer tries to push frames toward the data-link layer at the
receiving node (Figure 11.5).
• If the receiving node cannot process and deliver the packet to its network at the same rate that the
frames arrive, it becomes overwhelmed with frames.
• Here, flow control can be feedback from the receiving node to the sending node to stop or slow down
pushing frames.
3.6.2.1.1 Buffers
• Flow control can be implemented by using buffer.
• A buffer is a set of memory locations that can hold packets at the sender and receiver.
• Normally, two buffers can be used.
1) First buffer at the sender.
2) Second buffer at the receiver.
• The flow control communication can occur by sending signals from the consumer to the producer.
• When the buffer of the receiver is full, it informs the sender to stop pushing frames.
3.7.1.1 Design
• Here is how it works (Figure 11.7):
1) At Sender
¤ The data-link-layer
→ gets data from its network-layer
→ makes a frame out of the data and →
sends the frame.
2) At Receiver
¤ The data-link-layer
→ receives a frame from its physical layer
→ extracts data from the frame and
→ delivers the data to its network-layer.
Data-link-layers of sender & receiver provide transmission services for their network-layers.
Data-link-layers use the services provided by their physical layers for the physical
transmission of bits.
DATA COMMUNICATION 18CS46
3.7.1.2 FSMs
• Two main requirements:
1) The sender-site cannot send a frame until its network-layer has a data packet to send.
2) The receiver-site cannot deliver a data packet to its network-layer until a frame arrives.
• These 2 requirements are shown using two FSMs.
• Each FSM has only one state, the ready state.
Example 3.6
DATA COMMUNICATION 18CS46
3.7.2 Stop & Wait Protocol
• This uses both flow and error control.
• Normally, the receiver has limited storage-space.
• If the receiver is receiving data from many sources, the receiver may
→ be overloaded with frames &
→ discard the frames.
• To prevent the receiver from being overloaded with frames, we need to tell the sender to slow down.
3.7.2.1 Design
1) At Sender
The sender
→ sends one frame & starts a timer
→ keeps a copy of the sent-frame and
→ waits for ACK-frame from the receiver (okay to go ahead).
Then,
1) If an ACK-frame arrives before the timer expires, the timer is stopped and the sender
sends the next frame.
Also, the sender discards the copy of the previous frame.
2) If the timer expires before ACK-frame arrives, the sender resends the previous frame
and restarts the timer
2) At Receiver
To detect corrupted frames, a CRC is added to each data frame.
When a frame arrives at the receiver-site, the frame is checked.
If frame’s CRC is incorrect, the frame is corrupted and discarded.
The silence of the receiver is a signal for the sender that a frame was either corrupted or lost.
3.7.2.2 FSMs
Example 3.7
DATA COMMUNICATION 18CS46
3.7.2.3 Sequence and Acknowledgment Numbers
• Q: How to deal with corrupted-frame?
Ans: If the corrupted-frame arrives at the receiver-site, then the frame is simply discarded.
• Q: How to deal with lost-frames?
Ans: If the receiver receives out-of-order data-frame, then it means that frames were lost. .’. The
lost-frames need to be resent.
• Problem in Stop and Wait protocols:
1) There is no way to identify a frame.
2) The received-frame could be the correct one, or a duplicate, or a frame out of order.
Solution: 1) Use sequence-number for each data frame.
2) Use Acknowledgment-number for each ACK frame.
Sequence Numbers
Frames need to be numbered. This is done by using sequence-numbers.
A sequence-number field is added to the data-frame.
Acknowledgment Numbers
An acknowledgment-number field is added to the ACK-frame.
Sequence numbers are 0, 1, 0, 1, 0, 1, . . .
The acknowledgment numbers can also be 1, 0, 1, 0, 1, 0, …
The acknowledgment-numbers always announce the sequence-number of the next frame
expected by the receiver.
For example,
If frame-0 has arrived safely, the receiver sends an ACK-frame with acknowledgment-1
(meaning frame-1 is expected next).
Example 3.8
3.7.3 Piggybacking
• A technique called piggybacking is used to improve the efficiency of the bidirectional protocols.
• The data in one direction is piggybacked with the acknowledgment in the other direction.
• In other words, when node A is sending data to node B, Node A also acknowledges the data received
from node B.
DATA COMMUNICATION 18CS46
3.8 High-Level Data Link Control (HDLC)
• HDLC is a bit-oriented protocol for communication over point-to-point and multipoint links.
• HDLC implements the ARQ mechanisms.
3.8.1 Configurations and Transfer Modes
• HDLC provides 2 common transfer modes that can be used in different configurations:
1) Normal response mode (NRM)
2) Asynchronous balanced mode (ABM).
NRM
• The station configuration is unbalanced (Figure 11.14).
• We have one primary station and multiple secondary stations.
• A primary station can send commands, a secondary station can only respond.
• The NRM is used for both point-to-point and multiple-point links.
ABM
• The configuration is balanced (Figure 11.15).
• Link is point-to-point, and each station can function as a primary and a secondary (acting as peers).
• This is the common mode today.
DATA COMMUNICATION 18CS46
3.8.2 Framing
• To provide the flexibility necessary to support all the options possible in the modes and
configurations, HDLC defines three types of frames:
1) Information frames (I-frames): are used to transport user data and control information
relating to user data (piggybacking).
2) Supervisory frames (S-frames): are used only to transport control information.
3) Unnumbered frames (U-frames): are reserved for system management.
Information carried by U-frames is intended for managing the link itself.
• Each type of frame serves as an envelope for the transmission of a different type of message.
Example 3.9
DATA COMMUNICATION 18CS46
3.9 POINT-TO-POINT PROTOCOL (PPP)
• PPP is one of the most common protocols for point-to-point access.
• Today, millions of Internet users who connect their home computers to the server of an ISP use PPP.
3.9.1 Framing
• PPP uses a character-oriented (or byte-oriented) frame (Figure 11.20).
MODULE-WISE QUESTIONS
MODULE 3: ERROR-DETECTION AND CORRECTION
4.1 Introduction
• When nodes use shared-medium, we need multiple-access protocol to coordinate access to medium.
• Analogy:
This problem is similar to the rules of speaking in an assembly.
We need to ensure
→ Each people has right to speak.
→ Two people do not speak at the same time
→ Two people do not interrupt each other (i.e. Collision Avoidance)
• Many protocols have been designed to handle access to a shared-link (Figure 12.1).
• These protocols belong to a sublayer in the data-link layer called Media Access Control (MAC).
1) Four random-access protocols (or Contention Methods):
i) ALOHA ii) CSMA iii) CSMA/CD iv) CSMA/CA
These protocols are mostly used in LANs and WANs.
2) Three controlled-access protocols:
i) Reservation ii) Polling iii) Token-passing
Some of these protocols are used in LANs.
3) Three channelization protocols:
i) FDMA ii) TDMA iii) CDMA
These protocols are used in cellular telephony.
• In Figure 12.4,
If station B sends a frame between t-Tfr and t, this leads to a collision between the frames from
station A and station B.
If station C sends a frame between t and t+Tfr, this leads to a collision between the frames
from station A and station C.
Example 4.1
4.2.1.1.2 Throughput
• The average number of successful transmissions is given by
Example 4.2
DATA COMMUNICATION 18CS46
4.2.1.2 Slotted ALOHA
• Slotted ALOHA was invented to improve the efficiency of pure ALOHA.
• The time is divided into time-slots of Tfr seconds (Figure 12.5).
• The stations are allowed to send only at the beginning of the time-slot.
• If a station misses the time-slot, the station must wait until the beginning of the next time-slot.
• If 2 stations try to resend at beginning of the same time-slot, the frames will collide again (Fig 12.6).
4.2.1.2.1 Throughput
• The average number of successful transmissions is given by
Example 4.3
DATA COMMUNICATION 18CS46
4.2.2 CSMA
• CSMA was developed to minimize the chance of collision and, therefore, increase the performance.
• CSMA is based on the principle “sense before transmit” or “listen before talk.”
• Here is how it works:
1) Each station checks the state of the medium: idle or busy.
2) i) If the medium is idle, the station sends the data.
i) If the medium is busy, the station defers sending.
• CSMA can reduce the possibility of collision, but it cannot eliminate it.
1) 1-Persistent
• Before sending a frame, a station senses the line (Figure 12.10a).
i) If the line is idle, the station sends immediately (with probability = 1). ii)
If the line is busy, the station continues sensing the line.
• This method has the highest chance of collision because 2 or more stations:
→ may find the line idle and
→ send the frames immediately.
2) Non-Persistent
• Before sending a frame, a station senses the line (Figure 12.10b).
i) If the line is idle, the station sends immediately.
ii) If the line is busy, the station waits a random amount of time and then senses the line again.
• This method reduces the chance of collision because 2 or more stations:
→ will not wait for the same amount of time and
→ will not retry to send simultaneously.
3) P-Persistent
• This method is used if the channel has time-slots with a slot-duration equal to or greater than the
maximum propagation time (Figure 12.10c).
• Advantages:
i) It combines the advantages of the other 2 methods.
ii) It reduces the chance of collision and improves efficiency.
• After the station finds the line idle, it follows these steps:
1) With probability p, the station sends the frame.
2) With probability q=1-p, the station waits for the beginning of the next time-slot and checks the
line again.
i) If line is idle, it goes to step 1.
ii) If line is busy, it assumes that collision has occurred and uses the back off procedure.
DATA COMMUNICATION 18CS46
4.2.3 CSMA/CD
• Disadvantage of CSMA: CSMA does not specify the procedure after a collision has occurred.
Solution: CSMA/CD enhances the CSMA to handle the collision.
• Here is how it works (Figure 12.12):
1) A station
→ sends the frame &
→ then monitors the medium to see if the transmission was successful or not.
2) If the transmission was unsuccessful (i.e. there is a collision), the frame is sent again.
Example 4.4
DATA COMMUNICATION 18CS46
4.2.3.2 Procedure
• CSMA/CD is similar to ALOHA with 2 differences (Figure 12.13):
1) Addition of the persistence process.
¤ We need to sense the channel before sending the frame by using non-persistent, 1-
persistent or p-persistent.
2) Frame transmission.
i) In ALOHA, first the entire frame is transmitted and then acknowledgment is waited for. ii)
In CSMA/CD, transmission and collision-detection is a continuous process.
4.2.3.4 Throughput
• The throughput of CSMA/CD is greater than pure or slotted ALOHA.
• The maximum throughput is based on
→ different value of G
→ persistence method used (non-persistent, 1-persistent, or p-persistent) and →
‘p‟ value in the p-persistent method.
• For 1-persistent method, the maximum throughput is 50% when G =1.
• For non-persistent method, the maximum throughput is 90% when G is between 3 and 8.
DATA COMMUNICATION 18CS46
4.2.4 CSMA/CA
• Here is how it works (Figure 12.15):
1) A station needs to be able to receive while transmitting to detect a collision.
i) When there is no collision, the station receives one signal: its own signal. ii)
When there is a collision, the station receives 2 signals:
a) Its own signal and
b) Signal transmitted by a second station.
2) To distinguish b/w these 2 cases, the received signals in these 2 cases must be different.
3) Acknowledgment
• There may be a collision resulting in destroyed-data.
• In addition, the data may be corrupted during the transmission.
• To help guarantee that the receiver has received the frame, we can use
i) Positive acknowledgment and
ii) Time-out timer
4.3.1 Reservation
• Before sending data, each station needs to make a reservation of the medium.
• Time is divided into intervals.
• In each interval, a reservation-frame precedes the data-frames.
• If no. of stations = N, then there are N reservation mini-slots in the reservation-frame.
• Each mini-slot belongs to a station.
• When a station wants to send a data-frame, it makes a reservation in its own minislot.
• The stations that have made reservations can send their data-frames.
4.4.1 FDMA
• The available bandwidth is divided into frequency-bands (Figure 12.21).
• Each band is reserved for a specific station.
• Each station can send the data in the allocated band.
• Each station also uses a bandpass filter to confine the transmitter frequencies.
• To prevent interferences, small guard bands are used to separate the allocated bands from one
another.
4.4.3.1 Implementation
• Let us assume we have four stations 1, 2, 3, and 4 connected to the same channel.
• The data from station-1 are d1, from station-2 are d2, and so on.
• The code assigned to the first station is c1, to the second is c2, and so on.
• We assume that the assigned codes have 2 properties.
1) If we multiply each code by another, we get 0.
2) If we multiply each code by itself, we get 4 (the number of stations).
The receiver multiplies the data on the channel by the code of the sender.
For example, suppose stations 1 and 2 are talking to each other.
Station-2 wants to hear what station-1 is saying.
Station-2 multiplies the data on the channel by c1 the code of station-1.
(c1.c1)=4, (c2.c1)=0, (c3.c1)=0, and (c4.c1)=0,
Therefore, station-2 divides the result by 4 to get the data from station-1.
DATA COMMUNICATION 18CS46
4.4.3.2 Chips
• CDMA is based on coding theory.
• Each station is assigned a code, which is a sequence of numbers called chips (Figure 12.24).
• These sequences were carefully selected & are called orthogonal sequences
• These sequences have the following properties:
1) Each sequence is made of N elements, where N is the number of stations.
2) Multiplication of a sequence by a scalar:
If we multiply a sequence by a number i.e. every element in the sequence is multiplied by
that element.
For example,
5) Adding 2 sequences means adding the corresponding elements. The result is another
sequence.
For example,
Example 4.5
Example 4.6
Example 4.7
DATA COMMUNICATION 18CS46
• The minimum length restriction is required for the correct operation of CSMA/CD.
• Minimum length of frame = 64 bytes.
1) Minimum data size = 46 bytes.
2) Header size + Trailer size = 14 + 4 = 18 bytes.
(i.e. 18 bytes 6 bytes source-address + 6 bytes dest-address + 2 bytes length + 4 bytes CRC).
• The minimum length of data from the upper layer = 46 bytes.
• If the upper-layer packet is less than 46 bytes, padding is added to make up the difference.
• Maximum length of frame =1518 bytes.
1) Maximum data size = 1500 bytes.
2) Header size + trailer size = 14 + 4 = 18 bytes.
• The maximum length restriction has 2 reasons:
1) Memory was very expensive when Ethernet was designed.
A maximum length restriction helped to reduce the size of the buffer.
2) This restriction prevents one station from
→ monopolizing the shared medium
→ blocking other stations that have data to send.
DATA COMMUNICATION 18CS46
4.6.2 Addressing
• In an Ethernet-network, each station has its own NIC (6-byte 48 bits).
• The NIC provides the station with a 6-byte physical-address (or Ethernet-address).
• For example, the following shows an Ethernet MAC address:
Example 4.8
Example 4.9
Example 4.10
DATA COMMUNICATION 18CS46
4.6.5 Implementation
• The Standard-Ethernet defines several physical-layer implementations (Table 13.1).
Advantages:
1) Thin coaxial-cable is less expensive than thick coaxial-cable.
2) Tee connections are much cheaper than taps.
3) Installation is simpler because the thin coaxial cable is very flexible.
Disadvantage:
1) Length of each segment cannot exceed 185m due to the high attenuation in the cable.
3) 10Base- T: Twisted Pair Ethernet
10Base-T uses a star topology to connect stations to a hub (Figure 13.9).
The stations are connected to a hub using two pairs of twisted-cable.
Two pairs of twisted cable create two paths between the station and the hub.
1) First path for sending.
2) Second path for receiving.
The collision can happen in the hub.
The maximum length of the cable is 100 m. This minimizes the effect of attenuation in the
cable.
4) 10Base-F: Fiber Ethernet
10Base-F uses a star topology to connect stations to a hub (Figure 13.10).
The stations are connected to the hub using two fiber-optic cables.
DATA COMMUNICATION 18CS46
4.6.6 Changes in the Standard
4.6.6.1 Bridged Ethernet
• Bridges have two effects on an Ethernet LAN:
i) They raise the bandwidth &
ii) They separate collision domains.
1) Raising the Bandwidth
• A bridge divides the network into two or more networks.
• Bandwidth-wise, each network is independent.
4.7.2.2 Implementation
• Fast-Ethernet can be classified as either a two-wire or a four-wire implementation (Table 13.2).
1) The 2-wire implementations use
→ Category 5 UTP (100Base-TX) or
→ Fiber-optic cable (100Base-FX)
2) The 4-wire implementations use category 3 UTP (100Base-T4).
DATA COMMUNICATION 18CS46
4.7.2.3 Encoding
• There are 3 different encoding schemes.
1) 100Base-TX
This uses 2 pairs of twisted-pair cable (either category 5 UTP or STP) (Figure 13.16a).
The MLT-3 encoding scheme is used for implementation.
This is because MLT-3 has good bandwidth performance.
However, 4B/5B block-coding is used to provide bit synchronization.
This is because MLT-3 is not a self-synchronous line coding scheme.
4B/5B coding creates a data-rate of 125 Mbps, which is fed into MLT-3 for encoding.
2) 100Base-FX
This uses 2 pairs of fiber-optic cables (Figure 13.16b).
Optical fiber can easily handle high bandwidth requirements.
The NRZ-I encoding scheme is used for implementation.
However, 4B/5B block-coding is used to provide bit synchronization.
This is because NRZ-I is not a self-synchronous line coding scheme.
4B/5B encoding increases the bit rate from 100 to 125 Mbps, which can easily be handled by
fiber-optic cable.
3) 100Base-T4
This uses 4 pairs of UTP for transmitting 100 Mbps (Figure 13.16c).
Each UTP cannot easily handle more than 25 Mbaud.
One pair switches between sending and receiving.
Three pairs of UTP can handle only 75 Mbaud (25 Mbaud) each.
Encoding/decoding is more complicated.
We need an encoding scheme that converts 100 Mbps to a 75 Mbaud signal. This requirement is
satisfied by 8B/6T.
The 8B/6T encoding scheme is used for implementation.
i) 8 data elements are encoded as 6 signal elements.
ii) This means that 100 Mbps uses only (6/8) x 100 Mbps, or 75 Mbaud.
DATA COMMUNICATION 18CS46
4.8 GIGABIT ETHERNET
• IEEE created Gigabit-Ethernet under the name 802.3z.
• Goals of Gigabit-Ethernet:
1) Upgrade the data-rate to 1 Gbps.
2) Make it compatible with Standard or Fast-Ethernet.
3) Use the same 48-bit address.
4) Use the same frame format.
5) Keep the same minimum and maximum frame-lengths.
6) To support auto-negotiation as defined in Fast-Ethernet.
4.8.2.3 Encoding
1) Two Wire Implementation
• The NRZ encoding scheme is used for two-wire implementation (Figure 13.17a).
• However, 8B/10B block-coding is used to provide bit synchronization.
This is because NRZ is not a self-synchronous line coding scheme.
• 8B/10B coding creates a data-rate of 1.25 Gbps.
• One wire (fiber or STP) is used for sending.
Another wire is used for receiving.
2) Four Wire Implementation
• In this, it is not possible to have 2 wires for input and 2 for output (Figure 13.17b).
• This is „.‟ each wire would need to carry 500 Mbps, which exceeds the capacity for category 5 UTP.
• As a solution, 4D-PAM5 encoding is used to reduce the bandwidth.
• Thus, all four wires are involved in both input and output.
Each wire carries 250 Mbps, which is in the range for category 5 UTP cable.
DATA COMMUNICATION 18CS46
4.9 TEN GIGABIT ETHERNET
• IEEE created Ten-Gigabit-Ethernet under the name 802.3ae.
• Goals of the Gigabit-Ethernet:
1) Upgrade the data-rate to 10 Gbps.
2) Make it compatible with Standard, Fast, and Gigabit-Ethernet.
3) Use the same 48-bit address.
4) Use the same frame format.
5) Keep the same minimum and maximum frame-lengths.
6) Allow the interconnection of existing LANs into a MAN or a WAN .
7) Make Ethernet compatible with technologies such as Frame Relay and ATM.
4.9.1 Implementation
• Ten-Gigabit-Ethernet operates only in full duplex mode.
• This means there is no need for contention; CSMA/CD is not used.
• Four implementations are the most common (Table 13.4):
1) 10GBase-SR
2) 10GBase-LR
3) 10GBase-EW and
4) 10GBase-X4
DATA COMMUNICATION 18CS46
4.11.1.2 ESS
• The ESS is made up of 2 or more BSSs with APs (Figure 15.5).
• The BSSs are connected through a distribution-system, which is usually a wired LAN.
• The distribution-system connects the APs in the BSSs.
• IEEE 802.11 does not restrict the distribution-system;
The distribution-system can be any IEEE LAN such as an Ethernet.
• The ESS uses 2 types of stations:
1) Mobile Stations are normal stations inside a BSS.
2) Stationary Stations are AP stations that are part of a wired LAN.
• When BSSs are connected, the stations within reach of one another can communicate without the use
of an AP.
• However, communication between two stations in two different BSSs usually occurs via two APs.
DATA COMMUNICATION 18CS46
4.11.1.3 Station Types
• IEEE 802.11 defines three types of stations based on their mobility in a wireless-LAN:
1) No-transition 2) BSS-transition 3) ESS-transition mobility
1) A station with no-transition mobility is either
→ stationary (not moving) or
→ moving only inside a BSS.
2) A station with BSS-transition mobility can move from one BSS to another, but the movement is
confined inside one ESS.
3) A station with ESS-transition mobility can move from one ESS to another.
However, IEEE 802.11 does not guarantee that communication is continuous during the move.
1) Before sending a frame, the source-station senses the medium by checking the energy-level at
the carrier-frequency.
i) The channel uses a persistence strategy with back-off until the channel is idle. ii)
After the station is found to be idle,
→ the station waits for a period of time called the DIFS.
→ then the station sends a control frame called the RTS.
2) After receiving the RTS and waiting a period of time called the SIFS, the destination-station
sends a control frame, called the CTS, to the source-station.
CTS frame indicate that the destination-station is ready to receive data.
3) The source-station sends data after waiting an amount of time equal to SIFS.
4) The destination-station, after waiting an amount of time equal to SIFS, sends an
acknowledgment to show that the frame has been received.
Acknowledgment is needed in this protocol because the station does not have any means to
check for the successful arrival of its data at the destination.
On the other hand, the lack of collision in CSMA/CD is a kind of indication to
the source that data have arrived.
(DIFS distributed inter frame space SIFS short inter frame space)
(RTS request to send CTS clear to send)
DATA COMMUNICATION 18CS46
4.11.2.1.1 Network Allocation Vector
• When a station sends an RTS frame, it includes the duration of time that it needs to occupy the
channel (NAV Network Allocation Vector).
• The stations that are affected by this transmission create a timer called a NAV.
• NAV shows how much time must pass before these stations are allowed to check the channel for
idleness.
• Each time a station accesses the system and sends an RTS frame, other stations start their NAV.
• In other words, each station, before sensing the medium to see if it is idle, first checks its NAV to see if
it has expired.
• During the repetition interval, the PC (point controller) can send a poll frame, receive data, send an
ACK, receive an ACK, or do any combination of these (802.11 uses piggybacking).
• At the end of the contention-free period, the PC sends a CF end (contention-free end) frame to allow the
contention-based stations to use the medium.
4.11.2.2.1 Fragmentation
• The wireless environment is very noisy; a corrupt frame has to be retransmitted.
• The protocol, therefore, recommends fragmentation--the division of a large frame into smaller ones. It
is more efficient to resend a small frame than a large one.
DATA COMMUNICATION 18CS46
4.11.2.2.2 Frame Format
2) D
In all frame types except one, this field defines the duration of the transmission that is used to
set the value of NAV.
In one control frame, this field defines the ID of the frame.
3) Addresses
There are four address fields, each 6 bytes long.
The meaning of each address field depends on the value of the ToDS and FromDS subfields.
4) Sequence Control
This field defines the sequence number of the frame to be used in flow control.
5) Frame Body
This field contains information based on the type and the subtype defined in the FC field.
This field can be between 0 and 2312 bytes,
6) FCS
The FCS contains a CRC-32 error detection sequence.
DATA COMMUNICATION 18CS46
4.11.2.2.3 Frame Types
• A wireless-LAN defined by IEEE 802.11 has three categories of frames: 1.management frames,
2.control frames, and 3.data-frames.
1) Management Frames
Management frames are used for the initial communication between stations and access
points.
2) Control Frames
Control frames are used for accessing the channel and acknowledging frames (Figure 15.10).
For control frames the value of the type field is 01; the values of the subtype fields for frames are
shown in the table 14.2.
3) Data Frames
Data-frames are used for carrying data and control information.
DATA COMMUNICATION 18CS46
4.11.3 Addressing Mechanism
• The IEEE 802.11 addressing mechanism specifies 4 cases, defined by the value of the 2 flags in the FC
field, To DS and From DS.
• Each flag can be either 0 or 1, resulting in 4 different situations.
• The interpretation of the 4 addresses (address 1 to address 4) in the MAC frame depends on the value
of these flags, as shown in the Table 15.3.
Case-2:01
In this case, To DS = 0 and From DS = 1 (Figure 15.11b).
This means that the frame is coming from a distribution-system (From DS = 1).
The frame is coming from an AP and going to a station.
The ACK should be sent to the AP.
The address 3 contains the original sender of the frame (in another BSS).
Case-3:10
In this case, To DS = 1 and From DS = 0 (Figure 15.11c).
This means that the frame is going to a distribution-system (To DS = 1).
The frame is going from a station to an AP. The ACK is sent to the original station.
The address 3 contains the final destination of the frame (in another BSS).
DATA COMMUNICATION 18CS46
Case-4:11
In this case, To DS = 1 and From DS = 1 (Figure 15.11d).
This is the case in which the distribution-system is also wireless.
The frame is going from one AP to another AP in a wireless distribution-system.
We do not need to define addresses if the distribution-system is a wired LAN because the framein
these cases has the format of a wired LAN frame (for example: Ethernet,).
Here, we need four addresses to define
→ original sender
→ final destination, and
→ two intermediate APs.
• The handshaking messages RTS and CTS cannot help in this case.
• Station C hears the RTS from A, but does not hear the CTS from B.
• Station C, after hearing the RTS from A, can wait for a time so that the CTS from B reaches A; it then
sends an RTS to D to show that it needs to communicate with D.
• Both stations B and A may hear this RTS, but station A is in the sending state, not the receiving
state.
• However, Station B responds with a CTS.
• The problem is here (Figure 15.12).
If station A has started sending its data, station C cannot hear the CTS from station D because of
the collision; it cannot send its data to D. It remains exposed until A finishes sending its data as the
figure shows.
DATA COMMUNICATION 18CS46
4.11.4 Physical Layer
(HRDSSS high-rate direct sequence spread spectrum CCK complementary code keying)
(OFDM orthogonal frequency-division multiplexing)
DATA COMMUNICATION 18CS46
4.11.4.3 IEEE 802.11 Infrared
• IEEE 802.11 infrared uses infrared light in the range of 800 to 950 nm (Figure 15.15).
• The modulation technique is called pulse position modulation (PPM).
• For a 1-Mbps data-rate, a 4-bit sequence is first mapped into a 16-bit sequence in which only one bit is
set to 1 and the rest are set to 0.
• For a 2-Mbps data-rate, a 2-bit sequence is first mapped into a 4-bit sequence in which only one bit is
set to 1 and the rest are set to 0.
• The mapped sequences are then converted to optical signals; the presence of light specifies 1, the
absence of light specifies 0.
4.12.1 Architecture
• Bluetooth defines 2 types of networks: 1) Piconet and 2) Scatternet.
4.12.1.1 Piconets
A Bluetooth network is called a piconet, or a small net. (Figure 15.17).
A piconet can have up to 8 stations. Out of which
i) One of station is called the primary.
ii) The remaining stations are called secondaries.
All the secondary-stations synchronize their clocks and hopping sequence with the primary station.
A piconet can have only one primary station.
The communication between the primary and the secondary can be one-to-one or one-to-many.
Although a piconet can have a maximum of 7 secondaries, an additional 8 secondaries can be in the
parked state.
A secondary in a parked state is synchronized with the primary, but cannot take part in
communication until it is moved from the parked state.
Because only 8 stations can be active in a piconet, activating a station from the parked state means that
an active station must go to the parked state.
4.12.1.2 Scatternet
Piconets can be combined to form a scatternet (Figure 15.18).
A station can be a member of 2 piconets.
A secondary station in one piconet can be the primary in another piconet. This is called mediator
station.
1) Acting as a secondary, mediator station can receive messages from the primary in the first
piconet.
2) Acting as a primary, mediator station can deliver the message to secondaries in the second
piconet.
DATA COMMUNICATION 18CS46
4.12.1.3 Bluetooth Devices
• A Bluetooth device has a built-in short-range radio transmitter.
• The current data-rate is 1 Mbps with a 2.4-GHz bandwidth.
• This means that there is a possibility of interference between the IEEE 802.11b wireless-LANs and
Bluetooth LANs.
For example,
The first channel uses carrier frequency 2402 MHz (2.402 GHz).
The second channel uses carrier frequency 2403 MHz (2.403 GHz).
DATA COMMUNICATION 18CS46
4.12.2.2 Baseband Layer
• The baseband layer is roughly equivalent to the MAC sublayer in LANs.
• The access method is TDMA.
• The primary and secondary communicate with each other using time slots.
• The length of a time slot is exactly the same as the dwell time, 625 μs.
• This means that during the time that one frequency is used, a sender sends a frame to a secondary, or
a secondary sends a frame to the primary.
• The communication is only between the primary and a secondary; secondaries cannot communicate
directly with one another.
4.12.2.2.1 TDMA
• Bluetooth uses a form of TDMA that is called TDD-TDMA (timedivision duplex TDMA).
• TDD-TDMA is a kind of half-duplex communication in which the secondary and receiver send and
receive data, but not at the same time (halfduplex);
• However, the communication for each direction uses different hops.
• This is similar to walkie-talkies using different carrier frequencies.
Single-Secondary Communication
If the piconet has only one secondary, the TDMA operation is very simple (Fig 15.21).
The time is divided into slots of 625 μs.
The primary uses even numbered slots (0, 2, 4, ...); the secondary uses odd-numbered slots (1,
3, 5,...).
TDD-TDMA allows the primary and the secondary to communicate in half-duplex mode.
In slot 0, the primary sends, and the secondary receives; in slot 1, the secondary sends, and the
primary receives. The cycle is repeated.
DATA COMMUNICATION 18CS46
4.12.2.2.2 Links
• Two types of links can be created between a primary and a secondary:
1) SCQ link (Synchronous Connection-oriented Link) and
2) ACL links (Asynchronous Connectionless Link).
1) SCA
This link is used when avoiding latency is more important than data-integrity.
(Latency delay in data delivery Integrity error-free delivery)
A physical-link is created between the primary and a secondary by reserving specific slots at
regular intervals.
The basic unit of connection is 2 slots. One slot is used for each direction.
If a packet is damaged, it is never retransmitted.
Application: Used for real-time audio where avoiding delay is all-important.
A secondary
→ can create up to 3 SCQ links with the primary
→ can send digitized audio (PCM) at 64 kbps in each link.
2) ACL
This link is used when data-integrity is more important than avoiding latency.
If a payload encapsulated in the frame is corrupted, it is retransmitted.
A secondary returns an ACL frame in the available odd-numbered slot if and only if the
previous slot has been addressed to it.
ACL can use one, three, or more slots and can achieve a maximum data-rate of 721 kbps.
MODULE-WISE QUESTIONS
MODULE 4: MULTIPLE ACCESS
1) Differentiate b/w wireless LAN & wired LAN with reference to architectural comparison (6)
2) Explain characteristics of wireless medium. (4)
3) Explain hidden station problem. (6*)
4) Explain architecture of IEEE 802.11 (10*)
5) Explain DCF in IEEE 802.11 (6)
6) Explain PCF in IEEE 802.11 (6)
7) Explain frame format of IEEE 802.11 (8*)
8) Explain frame types of IEEE 802.11 (8*)
9) Explain addressing in IEEE 802.11 (8*)
10) Explain exposed station problem. (6*)
11) Explain physical Layer of IEEE 802.11 (8)
12) Explain architecture of Bluetooth. (6*)
13) Explain layers of Bluetooth. (8*)
14) Explain radio Layer in Bluetooth. (6)
15) Explain baseband Layer in Bluetooth. (6)
16) Explain 2 types of links in Bluetooth. (6)
17) Explain frame format of Bluetooth. (6)
18) Explain L2CAP in Bluetooth. (6)