SyE2_chap3
SyE2_chap3
of CA UE Total
Code Credit
III ELC-232 II Digital communication 2 15 35 50
and Networking
3
B A
4
Q. What is Demultiplexer?
Demultiplexer is device that has one input and many output. Depending on select input
one of the input is routed to output
5
Types of Multiplexers
There are mainly two types of multiplexers, namely analog and
digital.
They are further divided into Frequency Division Multiplexing (FDM),
Wavelength Division Multiplexing (WDM), and Time Division
Multiplexing (TDM). The following figure gives a detailed idea about
this classification.
6
Analog Multiplexing
The signals used in analog multiplexing techniques are analog in
nature. The analog signals are multiplexed according to their
frequency (FDM) or wavelength (WDM).
Q. Explain FDM technique used in communication system. OCT 2023
FDM: In telecommunications, frequency-division multiplexing
(FDM) is a technique by which the total bandwidth available in a
communication medium is divided into a series of non-
overlapping frequency bands, each of which is used to carry a
separate signal. This allows a single transmission medium such as a
cable or optical fiber to be shared by multiple independent signals.
Another use is to carry separate serial bits or segments of a higher
rate signal in parallel.
7
The most natural example of frequency-division multiplexing
is radio and television broadcasting, in which multiple radio signals
at different frequencies pass through the air at the same time.
Another example is cable television, in which many television
channels are carried simultaneously on a single cable. FDM is also
used by telephone systems to transmit multiple telephone calls
through high capacity trunklines, communications satellites to
transmit multiple channels of data on uplink and downlink radio
beams.
FDM Advantages
FDM does not require synchronization of transmitters and receivers for operating.
Allows propagation of multiple signals at once.
Only a particular channel is affected by fading of slow narrow bands.
Demodulation in frequency modulation is relatively easy.
FDM Disadvantage
All the frequency division multiplexing channels get affected due to wideband fading.
A large number of modulators and filters are required.
The communication channel must have a very large bandwidth.
The frequency division multiplexing suffers from the problem of crosstalk.
8
Q. How many voice channels are multiplexed together in the basic
group of FDM (Aprl 22)
In frequency-division multiplexing (FDM), 12 separate voice signals, each of 4-
kilohertz bandwidth, are modulated onto carrier waves in the 60–108-kilohertz
range. These modulated signals are combined to form a single complex group
signal
9
10
Q. What is working principle of WDM? OCT 20
WDM is a technique in fiber optic transmission that enables the use
of multiple light wavelengths (or colors) to send data over the same
medium.
The term WDM is commonly applied to an optical carrier, which is
typically described by its wavelength, whereas frequency-division
multiplexing typically applies to a radio carrier which is more often
described by frequency
11
Q Short note on TDM Oct 20
Time-division multiplexing (TDM) is a method of transmitting and
receiving independent signals over a common signal path by means
of synchronized switches at each end of the transmission line so that
each signal appears on the line only a fraction of time in an
alternating pattern.
12
13
14
15
16
17
Q. WDM is very similar in concept to
1.TDM
2.FDM
3.AM
4.FM
2.FDM
a) analog signals
18
Q. Which multiplexing technique transmits digital signals?
a) FDM
b) TDM
c) WDM
d) Both FDM and TDM
b) TDM
Q. ______ is an analog multiplexing technique to combine optical
signals.
A) WDM
B) FDM
C) TDM
D) None of the above
A) WDM
19
Q. ____ is designed to use the high bandwidth capability
of fiber-optic cable.
A) WDM
B) FDM
C) TDM
D) None of the above
A) WDM
Q. Internet is classic example of.
A) FM
B) FDM
C) TDM
D) None of the above
C) TDM
20
Q .Write a short note on Code division Multiplexing
Q. State any five features of CDMA. OCT 20
CDM is a technique in which each communicating station is assigned a unique
code. All channels use same spectrum at the same time.
Code division multiplexing (CDM) is a multiplexing technique that uses spread
spectrum communication. In spread spectrum communications, a narrowband
signal is spread over a larger band of frequency or across multiple channels via
division. It does not constrict bandwidth’s digital signals or frequencies. It is less
susceptible to interference, thus providing better data communication capability
and a more secure private line.
CDM is used in cellular telephone system and for some satellite communication
Advantages
1. Bandwidth efficient
2. Synchronization is not required
3. Good protection against interference
Disadvantages
1. Varying user data rates
2. Complex signal is generated
21
Q. State Features of CDMA. OCT 20
Features of CDMA:
• At a defined time, it enables more users to
communicate and thus offers enhanced capacity for
voice and data communication.
• Many of the channels in CDMA use a complete
spectrum.
• To reduce interference & noise and thereby increase the
efficiency of the network, CDMA systems make use of
power control.
• To protect its signals, CDMA encodes user transmissions
into separate and special codes.
• The same frequency can also be used by all cells in
CDMA systems.
22
Applications of CDMA
• CDMA is used in the GPS (Global Positioning System)
23
24
Q .Write a short note on Spread spectrum
Spread Spectrum refers to a system originally developed for military applications,
to provide secure communications by spreading the signal over a large frequency
band.
Following figure represents a narrow band signal in the frequency domain. These
narrowband signals are easily jammed by any other signal in the same band.
Likewise, the signal can also be intercepted since the frequency band is fixed and
narrow (i.e. easy to detect).
The idea behind spread spectrum is to use more bandwidth than the original
message while maintaining the same signal power. A spread spectrum signal
does not have a clearly distinguishable peak in the spectrum. This makes the
signal more difficult to distinguish from noise and therefore more difficult to jam
or intercept. 25
The block diagram of a typical communication system with the difference that the
modulator/demodulator has as input the spreading generator.
27
28
Application of FHSS
AGB 29
Q .Explain DSSS in brief. 4 Marks
Direct sequence spread spectrum is very widely used technique due
to high data rates. The majority of wireless LAN equipment on the
market today uses DSSS technology.
The wide channel enables devices to transmit more information at a
higher data rate than FHSS system
The direct-sequence modulation makes the transmitted signal wider
in bandwidth than the information bandwidth.
DSSS technology breaks down the transmitted stream of data into
small pieces across a frequency channel. A redundant bit pattern
(known as a chipping code) is generated for each bit transmitted.
Generally, the longer the chipping code, the more likely it is that
the original transmitted data will be properly received. DSSS
technology uses more bandwidth than FHSS, but is considered more
reliable and resists interference. Because of the chipping code, data
can still be recovered without retransmission of the signal, even in
the case of damaged data bits.
Multiple Access Protocols
IEEE has actually made this division for LANs. The upper sublayer that
is responsible for flow and error control is called the logical link
control (LLC) layer; the lower sublayer that is mostly responsible for
multiple access resolution is called the media access control (MAC)
layer.
AGB 33
Random access methods Controlled access Channelization
AGB 35
CSMA/CD stands for Carrier Sense Multiple Access/ Collision
Detection. It is also a network protocol for transmission and operates
in the Medium Access Control Layer. In this protocol, each station
senses the collision by broadcast sensing. In case of collision, the
transmission is stopped and they send a jam signal and then wait for a
random time context before retransmission.
AGB 36
CONTROLLED ACCESS
In controlled access, the stations consult one another to find which
station has the right to send. A station cannot send unless it has been
authorized by other stations. We discuss three popular controlled-
access methods.
Reservation
In the reservation method, a station needs to make a reservation
before sending data. Time is divided into intervals. In each interval, a
reservation frame precedes the data frames sent in that interval.
If there are N stations in the system, there are exactly N reservation
minislots in the reservation frame. Each minislot belongs to a station.
When a station needs to send a data frame, it makes a reservation in
its own minislot. The stations that have made reservations can send
their data frames after the reservation frame.
Polling
Polling works with topologies in which one device is designated as a
primary station and the other devices are secondary stations. All data
exchanges must be made through the primary device even when the
ultimate destination is a secondary device. The primary device controls
the link; the secondary devices follow its instructions. It is up to the
primary device to determine which device is allowed to use the
channel at a given time.
AGB 38
If the primary wants to receive data, it asks the secondaries if they
have anything to send; this is called poll function. If the primary wants
to send data, it tells the secondary to get ready to receive; this is
called select function.
Select
The select function is used whenever the primary device has
something to send. Remember that the primary controls the link.
If it has something to send, the primary device sends it. What it does
not know, however, is whether the target device is prepared to
receive. So the primary must alert the secondary to the upcoming
transmission and wait for an acknowledgment of the secondary's
ready status. Before sending data, the primary creates and transmits
a select (SEL) frame, one field of which includes the address of the
intended secondary.
Poll
The poll function is used by the primary device to solicit transmissions
from the secondary devices. When the primary is ready to receive
data, it must ask (poll) each device in turn if it has anything to send.
When the first secondary is approached, it responds either with a
NAK frame if it has nothing to send or with data (in the form of a data
frame) if it does. If the response is negative (a NAK frame), then the
primary polls the next secondary in the same manner until it finds
one with data to send. When the response is positive (a data frame),
the primary reads the frame and returns an acknowledgment (ACK
frame), verifying its receipt.
Token Passing
In the token-passing method, the stations in a network are organized in
a logical ring. In other words, for each station, there is a predecessor
and a successor. The predecessor is the station which is logically before
the station in the ring; the successor is the station which is after the
station in the ring. The current station is the one that is accessing the
channel now. The right to this access has been passed from the
predecessor to the current station. The right will be passed to the
successor when the current station has no more data to send.
But how is the right to access the channel passed from one station to
another? In this method, a special packet called a token circulates
through the ring. The possession of the token gives the station the
right to access the channel and send its data. When a station has some
data to send, it waits until it receives the token from its predecessor. It
then holds the token and sends its data. When the station has no
more data to send, it releases the token, passing it to the next logical
station in the ring.
The station cannot send data until it receives the token again in the
next round. In this process, when a station receives the token and has
no data to send, it just passes the data to the next station.
Token management is needed for this access method. Stations must
be limited in the time they can have possession of the token. The
token must be monitored to ensure it has not been lost or
destroyed.
For example, if a station that is holding the token fails, the token will
disappear from the network. Another function of token
management is to assign priorities to the stations and to the types of
data being transmitted. And finally, token management is needed to
make low-priority stations release the token to highpriority stations.
Logical Ring
In a token-passing network, stations do not have to be physically
connected in a ring; the ring can be a logical one.
In the physical ring topology, when a station sends the token to its
successor, the token cannot be seen by other stations; the successor
is the next one in line. This means that the token does not have to
have the address of the next successor. The problem with this
topology is that if one of the links-the medium between two adjacent
stations fails, the whole system fails
The dual ring topology uses a second (auxiliary) ring which operates in
the reverse direction compared with the main ring. The second ring is
for emergencies only (such as a spare tire for a car). If one of the links
in the main ring fails, the system automatically combines the two
rings to form a temporary ring. After the failed link is restored, the
auxiliary ring becomes idle again. Note that for this topology to work,
each station needs to have two transmitter ports and two receiver
ports. The high-speed Token Ring networks called FDDI (Fiber
Distributed Data Interface) and CDDI (Copper Distributed Data
Interface) use this topology.
The dual ring topology uses a second (auxiliary) ring which operates
in the reverse direction compared with the main ring. The second
ring is for emergencies only (such as a spare tire for a car). If one of
the links in the main ring fails, the system automatically combines
the two rings to form a temporary ring. After the failed link is
restored, the auxiliary ring becomes idle again. Note that for this
topology to work, each station needs to have two transmitter ports
and two receiver ports. The high-speed Token Ring networks called
FDDI (Fiber Distributed Data Interface) and CDDI (Copper Distributed
Data Interface) use this topology.
In a star ring topology, the physical topology is a star. There is a hub,
however, that acts as the connector. The wiring inside the hub
makes the ring; the stations are connected to this ring through the
two wire connections. This topology makes the networkless prone to
failure because if a link goes down, it will be bypassed by the hub
and the rest of the stations can operate. Also adding and removing
stations from the ring is easier. This topology is still used in the Token
Ring LAN designed by IBM.
Q. In _________ each station sends a frame whenever it has to
send a frame
a) Pure ALOHA
b) Slotted ALOHA
c) A and B
d) none
ans a
Answer a
Q. In _________ method each station consults one another to
find which station has right to send.
a) Random access
b) Control access
c) Channelized
d) none
ans b
AGB 53
Typical TDMA Frame Structure
AGB 54
Q .What is difference between TDM and TDMA
The main difference between tdm and tdma (also fdm/fdma, etc) is
that with tdm (also fdm, etc.) the signals multiplexed (i.e. sharing a
resource) come from the same node, whereas for tdma (also fdm,
etc.) the signals multiplexed come from different
sources/transmitters.
AGB 56
Q .State advantages and disadvantages of TDMA
TDMA Advantages
TDMA allows the operator to do services like fax, voice band data,
and SMS as well as bandwidth-intensive application such as
multimedia and video conferencing. Since TDMA technology
separates users according to time, it ensures that there will be no
interference from simultaneous transmissions.
TDMA Disadvantages
In TDMA each user has a predefined time slot so that users roaming
from one cell to another are not allotted a time slot. ...
It is subjected to multipath distortion. ...
Network and spectrum planning is intensive.
Too few users result in ideal channels rural versus urban
environment.
High synchronization overhead.
Q. TDMA systems transmit in a continuous way.
a) True
b) False
Answer b: TDMA systems transmit data in a buffer and burst method. Thus, the
transmission for any user is not continuous.
Q. During the period of call, other users can share the same channel
in FDMA.
a) True
b) False
Answer b: In FDMA systems, no other user can share the same channel during the period
of call. In FDD systems, the users are assigned a channel as a pair of frequencies; one is
used for the forward channel while the other frequency is used for the reverse channel.
Q. The bandwidth of FDMA channel is ______
a) Wide
b) Narrow
c) Large
d) Zerov
Answer b: The bandwidth of FDMA channels is relatively narrow as each channel supports
only one circuit per carrier. That is, FDMA is usually implemented in narrow band systems.
75
Q. How many voice channels are multiplexed in a master group?
600 voice channel in master group.
Q. Define Backoff time in pure ALOHA.
Pure ALOHA dictates that when the time-out period passes,
each station waits a random amount of time before
resending its frame this period is called Backoff time
76