DC All Units-Dcet - Umar Coder
DC All Units-Dcet - Umar Coder
Introduction
Communication Models
Architecture of Internet
ISO-OSI Reference Model
7 layered Protocol Architecture
5 Layered Protocol Architecture
Communication Model
Simple model of communication is shown
Another example is exchange of voice signals between two telephone over same network.
Key elements of model are:
I. Source
Device generates data to be transmitted
Ex:-telephone or pcs
II. Transmitter
Data generated by source system are not as it is transmitted
Ex:-Modem takes digital bit stream from attached device such as PC & transforms bit stream into analog
signals that can be handled by telephone networks.
IV. Receiver
Receiver accepts signal from transmission system and converts it into a form that can be
handled by destination device.
Ex: - Modem will accept an analog signal coming from network or transmission line & convert it into
digital bit stream.
V. Destination
Takes incoming data from receiver key tasks that must be performed in data communication
streams are:
Frame Relay
There is considerable amount of overhead built into packet switching schemes to compensate for
errors.
The overhead includes additional bits added to each packet to introduce redundancy & additional
processing at the end stations and intermediate switching nodes to detect and recover from errors.
With the modern high speed tele-communication systems, this overhead is unnecessary and
counterproductive.
It is unnecessary because the rate of errors has been dramatically lowered and any remaining errors
can easily be caught in end system by logic that operates above the level of packet switching logic.
Frame relay was developed to take advantage of this high data rates and low error rates
Original packet switching networks were designed with a data rate to end user of about 64KBps, frame
relay network are designed to operate efficiency at user data rates of upto 2MBps
Key to achieve these high data rates is to strip out more of overhead involved with error control.
Wireless Networks
Wireless technology is common for both wide area voice and data networks
Wireless networks provide advantages in the areas of mobility and ease of installation and
configuration.
HISTORY
A network is group of connected communicating devices such as computers and printers
An internet (lowercase i) is two or more networks that can communicate with each other
Most notable internet is called Internet (uppercase I), a collection of more than hundreds of
thousands of interconnected networks.
In mid 1960s, mainframe computers in research organizations were stand-alone devices. Computers
from different manufacturers were unable to communicate with one another.
The Advanced Research Projects Agency(ARPA) in the Department of Defence(DoD) was interested in
finding way to connect computers so that researchers could share their findings.
ARPA presented its idea for ARPAnet (small network of connected computers). Each host computer
would be attached to specialized computer called IMP (Interface Message Processor).
The IMPs, in turn, would be connected to one another. One IMP had to be able to communicate with
other IMPs as well as its own attached host.
Main thing that support internet are TCP/IP reference model & TCP/IP protocol stack
Machine can be a part of internet when it can run TCP/IP protocol stack, has an IP address & also
should have the ability to send & receive IP packets from other machines on internet.
Machines must have the ability to call up ISP(Internet Service Provider) using modem.
Main applications of Internet:
1) Email
2) News
3) Remote Login
4) File Transfer
5) Streaming Media
6) WWW(World Wide Web)
7) Voice telephony (VOIP-Voice over Internet Protocol) etc.
Architecture of Internet
User (Client) who dials up on a telephone line using electronic device called MODEM
Modem converts digital signals generated by pc to subscribed ISP’s POP (Point Of Presence)
POP removes telephone connection & gives connection to the ISP’s regional network and again
converts signals back to digital form
The regional ISP, which consists of thousands of inter connected routers across number of backbone
networks, transfer packet-switched data to other backbones (if client is not present in the current ISP
network). These routers are connected by high-band width fiber optics.
Servers provide services for clients are connected directly to backbone networks. Backbone networks
are interconnected to each other through NAP (Network Access Points) which contains many routers to
forward packet from one backbone to other. In addition to NAP’s, larger backbones, have numerous
direct connections between their routers using technique called private peering.
Transport Layer
Data between communicating device should be exchanged reliably. Data should arrive at the
destination and in same order in which they were sent by sender. Thus transport layer provides
mechanism for providing reliability shared by all applications.
Application Layer
It contains logic needed to support the various user applications
Figure shows, three computers connected to network access, transport layer and application layer.
Let us say, sending application generates a block of data and passes this to the transport layer which
breaks this block into two smaller pieces to make it more manageable. To each of these pieces transport
layer appends a transport header, containing control information
The combination of data from the next higher level (layer) & control information is known as protocol
data unit (PDU).
If it belongs to transport layer, it is refers to as transport PDU. Header in each transport PDU contains
control information used by peer transport protocol at computer B
Header Includes
1) Destination SAP
When destination transport layer receives the transport PDU, it must know to who the data are
to be delivered
2) Sequence number
Transport protocol is sending a sequence of PDU’s, it numbers them sequentially so that if they
arrive out of order, destination transport entity may reorder them
3) Error Detection Code
Sending transport entity may include a code that is fun of content of remainder of PDU
The receiving transport protocol performs same calculation and compares the result with incoming
code.
A discrepancy result, if there has been some error in transmission; in that case, receiver can discard PDU
& take collective action.
Network Access Protocol appends network access header to data it receives from transport layer
creating network access PDU.
Header Includes
Destination computer Address
The network must know to which computer on the network data are to be delivered
Facilities Request
Network access protocol might want the network to make use of certain facilities such as
priority.
PHYSICAL LAYER
The physical layer covers physical interface between devices & rules by which bits are passed from one
to another. It deals with transmission of unstructured bit stream over physical medium.
Physical layer has four important characteristics
i. Mechanical
Relates to properties of interface to transmission medium. Specification is of pluggable
connector that joins one or more signal conductors, called circuits.
ii. Electrical
Relates to representation of bits (in terms of voltage levels), data transmission rate of bits.
iii. Functional
Specifies function performed by individual circuits of physical interface between system and
transmission media
iv. Procedural
Sequence of events by which bit streams are exchanged across physical medium.
NETWORK LAYER
Network Layer provides transfer of information between end systems across some sort of
communication network. At this layer, computer system engages in a dialogue with network to specify
the destination address & to request certain network facilities, such as priority.
TRANSPORT LAYER
Transport layer provides a mechanism for exchange of data between end systems. There are two
services ensures that data are delivered error free, in sequence with no losses or duplication.
Connectionless service does not ensure delivery of data.
Size & complexity of transport protocol depends on how reliable or unreliable the network and network
layers services are examples of some standard (ISO) protocols are TCP(Transmission control protocol)
(connection-oriented) & UDP(user-datagram protocol) connectionless
SESSION LAYER
Session layer provides mechanism for controlling the dialogue between applications in end systems
Services provided are
Dialogue Discipline
This can be two way simultaneous (full-duplex) or two way alternate (half-duplex))
Grouping
Flow of data can be marked to define groups of data
Recovery
Session layer can provide a check pointing mechanisms, so that if a failure of some sort occurs
between checkpoint sessions entity can retransmit all data since last checkpoint
PRESENTATION LAYER
Presentation Layer defines format of data to be exchanged between applications and offers applications
program a set of data transformation services. Examples of specific services at this layer include data
encryption and compression.
APPLICATION LAYER
Application Layer provides means for application program to access OSI environment
This layer contains management functions and generally useful mechanisms to support distributed
applications. Examples are file transfer application, electronic mail etc.
TCP/IP Protocol Architecture
TCP/IP model organizer communication task into five relatively independent layers
Physical Layer
Network Access Layer
Internet Layer
Host to Host & transport layer
Application Layer
Fig: Comparison of OSI & TCP/IP Protocol Architecture
TCP/IP Applications
1.) Simple Mail Transfer Protocol (SMTP)
Provides basic electronic mail facility. It provides mechanism for transferring messages among
separate hosts.
Features of SMTP includes
Mailing lists
Return receipts
Forwarding etc.
SMTP does not specify how messages are created messages & makes use of TCP to send it to an
SMTP module on another host. Target SMTP module will make use of local electronic mail
package to store incoming message in users mailbox.
2.) File Transfer Protocol (FTP)
It is used to send files from one system to another under user command. Both text & binary files
are accommodated. When user wishes to engage in file transfer, FTP sets up TCP connection to
target system for exchange of control messages. This connection allows user ID & password to
be transmitted & allows user to specify file & file actions desired. Once File transfer is approved,
second TCP connection is set up for actual data transfer. File is transferred over data
connection, without overhead of any headers or control information at application level. When
transfer is complete, control connection is used to signal completion & to accept new File
transfer commands
3.) TELNET
Provides remote login capability. This enables user at a terminal or PC to logon to remote
computer & function as if directly connected to that computer. TELNET is actually implemented
in two modules.
User TELNET
Internet with terminal without module to communicate with local terminal
Server TELNET
This interacts with an application, acting as surrogate terminal handler so that remote
terminals appears as local to application. Traffic between two is carried by TCP
connection.
DATA TRANSMISSION
Concept and terminology
Analog & Digital Transmission
Transmission Impairments
Transmission Media
Successful transmission of data depends principally on two factors
i. Quality of the signal
ii. Characteristics of the medium
Transmission Terminology
Data transmission occurs between transmitter and the receiver over same transmission medium
Transmission medium are of two types = guided and unguided media
i. Guided Media
Waves are guided along physical path
Ex:- Twisted Pair, Coaxial cable, Optical Fibre
ii. Unguided Media
(Wireless)provide means for transmitting electromagnetic wave but do not guide them
Ex:- propagation through air, vacuum & seawater
Direct Link
Used to refer to transmission path between two devices in which signals propagate directly
from transmitter to receiver with no intermediate devices(for both media)
Point to point:- A guided transmission medium is point to point if it provides a direct link
between two devices & those are only two devices sharing medium
Transmission may be
a. Simplex Signals
These are transmitted in only one direction, one station is transmitted & others is
receiver
b. Half Duplex
Both stations may transmit, but only one at a time
c. Full Duplex
Both stations may transmit simultaneously
T=1/f=period of signal
a) Peak Amplitude
Maximum values or strength of signal over time(volts)
b) Frequency
Rate(cycles/sec) or (Hz) at which it repeats (period)
c) Phase
Measure of relative position in time within a single period of signal
For periodic signals F(t), phase is functional part t/T of period T through which t has advanced relatix to
an arbitrary constant
d) Wavelength
Signal distance occupied by single cycle, or distance between two points of
corresponding phase of two consecutive cycles
1) Fundamental Frequency
When all frequency compose of signal are integer multiples of one frequency. Frequency is
reflected to as fundamental frequency.
2) Spectrum
Range of Frequency that signal contains
3) Absolute Bandwidth
It is the width of the signals
4) Effective Bandwidth
Most of energy of signal is contained in a relatively narrow band of frequencies. This band is
referred to as effective band width.
5) DC Component
If signal includes a component of zero frequency that component is direct element (de) or
constant component.
With no dc component, a signal has average amplitude of zero. With a dc component, it has
frequency term and non-zero avg amplitude.
Digital Signals
Represent data with sequence of voltage pulses
Both analog & digital signals may be transmitted on suitable transmission media
Way these signals are treated is function of transmission system
ANALOG SIGNAL DIGITAL SIGNAL
ANALOG DATA Signal occupies same spectrum Analog Data are encoded using
as analog data codec to produce a digital bit
Analog data are encoded to stream.
occupy different portion of
spectrum
DIGITAL DATA Digital data are encoded using Signal consists of two voltage
modem to produce analog signal levels to represent binary values
Digital data are encoded to
produce a digital signal with
digital properties
Treatment of Signals
Analog Signal – Analog Transmission
It is propagated through amplifiers
Same treatment whether signal is used to represent analog data or digital data
Analog Signal - Digital Transmission
Assumes that analog signal represents digital data
Signal is propagated through repeaters
At each repeater, digital data are received from inbound signal & used to generate a new analog
outbound signal
Digital Signal – Analog Transmission
Not used
Digital Signal – Digital Transmission
Digital signal represents a stream of 1’s and 0’s which may represent digital data or may be
encoding of analog data
Signals propagated through repeaters at each repeater stream of 1’s & 0s is recovered from
inbound signal & used to generate a new digital outbound signal
Mostly used transmission system is digital because of following points
Digital Technology
The advent of large scale integration(LSI) & VLSI technology has caused a continuing
drop in cost & sizes of digital circuitry.
Analog equipment has not shown a similar drop
Data Integrity
With use of repeater rather than amplifiers, effect of noise and other signal impairment
effect of noise and other signal impairment are not comulative
Thus it is possible to transmit data longer distances & over lower quality lines by digital
means while maintaining integrity of data.
Capacity Utilization
It has become economical to build transmission links of very high network, including
satellite channels & optical fibers.
High degree of multiplicating is needed to utilize such capacity effectively
This is more easily & cheaply achieved with digital rather than analog transmission
technology
Security and privacy
Encryption technology can be readily applied to digital data & to analog data that have
been digitalised
Integration
By treating analog & digital data digitally, all signals have same form & can be treated
similarly
Economies of scale & convenience can be achieved by integrating voice, video & digital
data.
Transmission Impairments
With any transmission system, the signal that is received may differ from the signal that is transmitted
due to various transmission impairments
For analog signals these impairments can degrade the signal quality.
For Digital signals, bit errors may be introduced a binary 1 is transferred into binary 0 & vice versa.
The most significant impairments are:
Attenuation & Attenuation Distortion(Change shape):
The strength of signal falls off with distance over any transmission medium
For guided media, this reduction in strength, or attenuation is generally exponential & thus is
typically expressed as constant number of decibels/unit distance
For unguided media, attenuation is more complex function of distance & makeup of atmosphere
DELAY DISTORTION
Delay distortion occurs because the velocity of propogation of signal through a guided medium varies
with frequency.
For band limited signal, the velocity tends to be the highest near the center frequency & fall off toward
the two edges of the band.
Thus various frequency components of a signal will arrive at the receiver at different times resulting in
phase shifts between the different frequencies.
The effect is referred to as delay distortion because the received signal is distorted due to varying delays
experienced at its constituent frequency
Equalising techniques can also be used for delay distortion
NOISE
For any data transmission event, the receiving signal will consist of the transmitted signal, modified by
various distortions imposed by transmission system, plus additional unwanted signal that are inserted
somewhere between transmission & reception
The latter, undesired signals are referred to as noise.
Noise is the major limiting factor in common system performance.
Noise may be divided into four categories
1) Thermal noise
2) Intermodulation noise
3) Crosstalk
4) Impulse noise
Thermal Noise
It is due to thermal agitation of electrons. It is present in all electronic devices & transmission media & is
a function of temperature. Thermal noise is uniformly distributed across the bandwidths typically used
in common systems. It is referred to as white noise.
Thermal noise cannot be eliminated & therefore places an upper bound on common system
performance. Because of weakness of signal received by satellite earth stations thermal noise is
particularly significant for satellite communication. The amount of thermal noise to be found in a
bandwidth of 1Hz in any device or conductor is
A measure of relative strength of two signals. Number of decibel is 10 times the log of ratio of power of
two signals.
The noise is assumed to be independent of frequency. Thus the thermal noise in watts present in a
bandwidth of B Hertz can be expressed as
Intermediate Noise
When signals at different frequency share the same transmission medium the result may be
intermodulation noise. The effect of intermediate noise is to produce signals at a frequency that is the
sum or difference of the two original frequencies or multiples of those frequencies. Ex: the mixing of
signals at frequencies F1 & F2 might produce frequency F1+F2. Intermodulation noise is produced by
non linarites in the transmitter, receiver &/or intervening transmission medium.
Cross Talk
Cross talk has been experienced by anyone who while using the telephone has been able to hear
another conversation. It is an unwanted coupling between signal paths. It can occur by electrical
coupling between nearby twisted pair or coaxial cable lines carrying multiple signals, although highly
directional antennas are used, microwave energy does spread during modulation. All the types of noise
discussed so far have reasonably magnitudes. Thus it is possible to engineer a transmission system to
cope with them.
Impulse Noise
It is non-continuous, consisting of irregular pulses or noise spikes of short duration & of relatively high
amplitude. It is generated from variety of causes, including external electromagnetic disturbances such
as lightning & faults and flaws in communication system.
Channel capacity
There are variety of impairments that distant or corrupt a signal. The maximum rate at which data can
be transmitted over a given communication path or channel under given condition is referred to as
channel capacity. There are four concepts here that are trying to relate to one another
1) Data rate : rate at which (bits/sec) data can be communicated
2) Bandwidth : Bandwidth of transmitted signal
3) Noise: A level of noise over communication path.
4) Error Rate: this is rate at which error occurs. Reception of 1 where 0 was transmitted and vice
versa.
NYQUIST BANDWIDTH
Let us consider that channel is noise free in this environment the limitation on data rate is simply the
bandwidth of signal. Nyquist states that the rate of signal transmission is 2B then a signal with
frequency no greater than B is sufficient to carry is also true. Converse is also true.
Given a bandwidth of B, the highest signal rate that can be carried is 2B.
SNR ratio is important in transmission of digital data because, it sets the upper bound on achievable
data rate. Shannon’s result is that the maximum channel capacity, in bits/second abbeys equation
Signal to noise ratio is more convenient for determining data rate & error arte
Parameter is .
Signal Encoding Techniques
1) Digital data, Digital signal
2) Digital data, Analog signal
3) Analog Data, Digital Signal
4) Analog Data, Analog Signal
For digital signalling, a data source g(t) which may be digital or analog is encoded into a digital signal x(t)
Actual form of x (t) depends on encoding technique & is chosen to optimize use of transmission medium
Encoding may be chosen to conserve B or to minimize errors.
The basis for analog signalling is continuous constant Frequency signal known as carrier signal.
Frequency of carrier signal is chosen to be compatible with transmission medium being used.
Types of line coding
Advantages
1. It requires two signals to encode 1 bit & therefore occupies more bandwidth.
2. It is very effective because an encoded signal must contain a provision for synchronization.
Scrambling Techniques
Biphase techniques are used in LAN but not used in long distance application, because they require high
signalling rate, relative to data rate.
To overcome this problem scrambling technologies are used
The approach is, sequence that would result in constant voltage level on line is replaced by filling
sequences must be recognized by receiver & replaced with original sequence.
So, there is no data rate increase (penalty) as filling sequence is of same length as original sequence
Design Goals are:
i. Mode component
ii. No long sequence of zero level line signals
iii. No reduction in data rate
iv. Error detection capability
Biphase Scheme
Manchester & differential Manchester encoding schemes & advantages
Synchronization (set clock codes)
No DC component (yields many benefits)
Error detection
Absence of an expected transmission can be used to detect errors
Noise on line
It would have to involve both signals before & after expected transition to cause undetected
error.
Modulation Rate
When signal encoding techniques are used, a distinction needs to be made between data rate (bits/sec)
and modulation rate (band )
i. Data rate : (Bit rate)=1/Tb; Tb-Bit duration
ii. Modulation rate: rate at which signal element are generated.
B8ZS
We have seen that drawback of Amts rule is that long string of zeros may result in loss of
synchronization.
To overcome this problem, encoding is amended with following rules.
a) If an octet of all zeros occurs & the last voltage pulse preceding this octet was +ve, than eight
zeros of octet are encoded as
b) If an octet of all zeros occurs & last voltage pulse preceding this octet was –ve then eight zeros
are encoded as
A coding scheme that is commonly used in Europe & Japan is known as High Density Bipolar 3 Zeros
(HDB3)
This scheme replaces strings of four zeros with sequences containing one or two pulses.
In each case, fourth zero is replaced with code variation.
In addition, a rule is needed to ensure that successive violations are alternate polarity so that no dc
component is introduced.
If last violation was +ve, this violations must be –ve & vice versa.
There are three basic encoding or modulation techniques for transforming digital data into analog
signals.
a) Amplitude Shift Keying(ASK)
b) Frequency Shift Keying(FSK)
c) Phase Shift Keying(PSK)
In all cases resulting signal occupies a bandwidth centred on carrier frequency.
Where F1, F2 are typically offset from carrier frequency Fc by equal but opposite units
FSK is used for fuel duplex operation over voice grade line
Voice grade line will pass frequencies in range of 300 to 3400 Hz
To achieve Full Duplex transmission, this bandwidth is splitted
In one direction (Transmit or Receive), the frequency used to represent 1 & 0 are centred on 1170
Hz with shift of 100Hz on either side.
BFSK is less susceptible to error than ASK, on verse grade lines, it is typically used upto 1200bps.It is
also commonly used for high frequency (3 to 30 MHz) radio transmission.
It can also be used at even higher frequency on local area network that uses coaxial cable
MFSK
More than two frequencies are used in this case, each signalling element represents more than one
bit.
Transmitted MFSK signal for one signal element time can be defined as
PCM starts with continuous amplitude (analog) signal, from which a digital signal is produced as in figure
Digital signal consist of block of n-bits, where each n-bit is amplitude of PCM pulse.
On reception, process is reversed to produce analog data.
By quantizing PAM pulse original signal is now only approximated & can’t be received property.
This effect is quantizing errors or quantizing noise.
Signal to Noise Ratio (SNR) for quantizing increases SNR by about 6dB which is factor of 4.
Typically PCM scheme is refined using a technique known as non-linear encoding.
Means, quantization levels are not equally spaced.
The problem with equal spacing is that the mean absolute error for each sample is same regardless of
signal level.
Consequently, lower amplitude values are relatively more distorted.
By using greater no. of quantizing steps for signals of low amplitude, smaller no. Of quantizing
steps for signal of large amplitude a mark reduction in overall signal distortion is achieved.
Non-linear encoding can significally improve PCM SNR ratio for rare signal improvement.
Variety of techniques has been used to improve performance of PCM or to reduce its
complexity.
One of most popular alternative to PCM is delta modulation.
With delta modulation, an analogue IP approximated by staircase function that moves up or
down by one quantification level at each sampling interval (TS).
Example:
Figure shows staircase function is overlaid on the original analog waveform.
Behaviour of staircase function is binary.
At each sampling time function moves up or down a constant amplitude, thus O/P of delta
modulation process can be represented as single binary digit for each sample.
Bit stream is produced by approximating derivative of an analog signal rather that its
amplitude.
A 1 is generated if staircase function is to go up during next inter val.
O is generated otherwise.
Staircase function tracks original analog waveform as closely as possible.
Logic A Process: (f/b mechanism)
1. For transmission:
At each sampling time, analog I/P are compared to most recent value of approx.
Staircase function.
If value of sampled waveform exceeds that of staircase function, 1 is generated,
otherwise 0.
Staircase is always changed in direction of i/p signal.
o/p of SM is thus binary signal that can be used at receiver to reconstruct staircase
function.
There are two important parameters in DM.
1) Step of step must be chosen to produce base two errors or noise.
2) Sampling rate.
Accuracy of scheme can be improved by increasing sampling rate. However this increases data
rate of O/P signal.
When analog wave is changing very slowly, there will be quantizing noise. This noise increases
as delta.
When analog wave is changing more rapidly their staircase function, slope overload noise is
there increases as delta decreases.
AM Bandwidth:
Bandwidth is twice bandwidth of modulating signal and covers range centred on carrier.
Signal components above and below carrier frequency carry exactly same info.
Frequency Modulation:
In FM, frequency of carrier is modulated to follow changing voltage level of modulating signal.
Peak amplitude and phase of carrier signal remain constant, but amplitude of info signal
changes, frequency of carrier changes correspondingly.
FM is normally implemented by using voltage-controlled oscillator as with FSK.
Frequency of oscillator changes according to i/p voltage which is amplitude of modulating signal.
FM Bandwidth:
Actual bandwidth is difficult to determine exactly, but it can be shown empirically that it is
several times that of analog signal or 2(1+b) B.
Phase Modulation (PM):
In PM transmission, phase of carrier signal is modulated to follow changing voltage level
(amplitude) of modulating signal.
Peak amplitude and frequency of carrier signal remain constant, the phase of carrier frequency
chages correspondingly.
PM is same as FM with one difference.
In FM, instantaneous change in carrier frequency is proportional to amplitude of modulating
signal whereas in OM, instantaneous change in carrier is propotional to modulating signal.
Transmission Media:
Transmission medium is physical path between transmitter and receiver.
There are two types of transmission media.
1) Unguided Media: Electromagnetic waves are guided along a solid medium, such as copper
twisted pair, copper coaxial cable, and optimal fiber.
2) Unguided Media: Wireless transmission occurs through the atmosphere, outer space or
water.
Characteristics and quality of data transmission are determined by
Characteristics of medium.
Characteristics of signal.
For guided media:
Media itself is more important in determining the limitations of transmission
For unguided media:
Bandwidth of signal produced by transmitting antenna is more important than medium in determining
transmission characteristics
Property of signal is directionality
1) Lower frequency signals are omnidirectional(signal propagates in all directions from
antenna)
2) At higher frequencies, it is possible to focus signal into beam(directional)
There are number of design factors responsible to transmission medium & signal which determine data
rate & distance.
i) Bandwidth
Increase in bandwidth of signal, increase or higher data rate
ii) Transmission Impairments
Impairments, limit the distance for guided media, twisted pair generally suffers more
impairment than coaxial cable which in turn suffers more than optical fiber
iii) Interference
Interference is more in unguided media than guided media
iv) Number of Receivers
A guided medium can be used to construct a point to point link or a shared link with
multiple attachments
Each attachment introduces some attenuation & distortion on line, limiting distance & or
data rate.
Twisted pair
It is expensive & most widely used guided transmission medium
Physical Description
A twisted pair consists of two insulated copper wires arranged in regular spiral pattern.
A wire pair acts as single communication link.
Numbers of these pairs are bundled together into cable by wrapping them in tough protective
sheath.
Cables may contain hundreds of pairs
Twisting tends to decrease crosstalk interference between adjacent pairs in cable.
Neighbouring pairs in bundle have different twist lengths to reduce crosstalk interference.
Twist length typically varies from 5 to 15mm.
Thickness of wire varies from 0.4 to 0.9 mm.
Applications
Used for both analog & digital signal transmission.
Most commonly used in telephone network & for communication within buildings.
In telephone system, individual residential telephone sets are connected to local exchange (end
office) by twisted pair wire
These are called subscriber lops.
Within office building, each telephone is also connected to twisted pair, which goes to private
branch exchange (PBX) system.
Twisted pair installations were designed to support voice traffic using analog signalling
Using modem, this can also handle digital data traffic at modest data rate.
Twisted pair is also used for digital signalling data rate of 64 kbps in common
Also used for LAN supporting pcs with data rate of 10Mbps
Data rate of 1Gbps is also achieved with limited number of devices & geographical scope of
network.
For long distance application data rate of 4 Mbps or more is achieved.
Transmission Characteristics
Both analog & digital signalling is done using twisted pair
For Analog signals-amplifiers are requires every 5-6 km
For digital transmission repeaters are requires every 2-3 km
Twisted pair is limited in distance and data as compared to other guided transmission media.
Attenuation for twisted pair is very strong function of frequency; other impairments are also
severe for twisted pair.
Medium is quite susceptible to interference & noise because of its easy coupling with
electromagnetic fields, also impulse noise is easily intrudes in twisted pair.
Several measures are taken to reduce impairments like
Shielding the wire with metallic braid (sheathing reduces interference).
Twisting reduces low frequency interference
A differential twist length in adjacent pairs reduces crosstalk.
Coaxial Cable, consists of two conductors but constructed differently to permit it to operate
over wider range of frequencies
Consists of hollow outer cylindrical conductor surrounded by single inner wire conductor
Inner conductor is used in place by either regularly spaced insulating rings or solid dielectric
material
Outer conductor is covered with jacket or shield.
Diameter of cable varies from 1 to 2.5 cm
Coaxial cable can be used over long distances & support more stations on shared line than
twisted pair.
Applications
Television distribution
Long distance telephone transmission
Short run computer system links
LANs
Coaxial cable is widely used as means of distributing TV signals to individuals homes
Cable TV
Used for distant telephone network
Using FDM (Frequency Division Multiplexing), coaxial cable can carry over 10,000 voice channels
simultaneously.
Using digital signalling, coaxial cable can be used to provide high speed I/O channels on
computer system.
Transmission Characteristics
Used to transmit both analog & digital signals
Coaxial Cable has superior frequency characteristics than twisted pair & hence can be used at
higher frequencies & data rates
Because of its shielded, concentric construction coaxial cable is much less susceptible to
interference & crosstalk.
For long distance transmission of analog signals, amplifiers are needed every few kilometre with
closer spacing required if higher frequency are use
Usable spectrum for analog signalling extends to 500 MHz
For digital signalling, repeaters are used every kilometre or so
OPTICAL FIBER
Physical Description
An optical fiber is thin (2 to 12.5micrometer) Flexible medium capable of guiding an optical ray.
Various glasses & plastics can be used to make optical Fibres.
An optical fiber cable has cylindrical shape & consists of three concentric sections.
Core:
Innermost section & consists of one or more very thin strands, fibers of glass plastic.
Diameter of case range from 8-100 micrometres
Cladding:
Even fiber surrounded by cladding. Glass or plastic coating that has properties different from core.
Interference between core and cladding acts as reflector to confine light that would otherwise
escape core.
Outermost layer, surrounding one or more bundle of cladded fibers (jacket).
Jacket composed of plastic & other materials layered to protect moisture, abrasion, crusting &
other environment dangers.
Applications
Most significant development of practical fiber optic communication system
Optical fiber already use in long distance telecommunications.
Military applications
LANs
Characteristics of optical fiber
i) Greater capacity
More bandwidth, more data rate of hundreds of Gbps over tens of kilometres
For coaxial cable -> 100 (hundreds of) Mbps for 7 km
For twisted pair -> Few Mbps over 1 km or upto 100 Mbps to 1 Gbps over few tens
of meters
ii) Smaller size & lighter weight
Optical fibers are thinner than coaxial and twisted pair of cables
For cramped conduits in buildings & underground along public right-of-way,
advantage of small size is considerable
Corresponding reduction in weight reduces structural support requirements
iii) Lower attenuation
Attenuation is significantly lower for optical fiber & constant over wide range
iv) Electromagnetic isolation
Optical fiber systems are not affected by external electromagnetic fields
Thus system is not vulnerable to interference, impulse noise or crosstalk
Fibers do not radiate energy, so there is little interference with other equipment
Fiber is inherently difficult to tap
v) Greater repeater spacing
Fewer repeater means lower cost & fewer sources of error
Repeater spacing is tens of kilometres for optical fiber is common
Spacing of hundreds of kilometres have been demonstrated
Coaxial & twisted pair have repeaters every few kilometres
Characteristic Applications
i) Long Haul Trunks
Long haul transmission in telephone networks
Long haul routes average about 1500 km in length & offer high capacity (20,000-
60,000 voice channels).
ii) Metropolitan trunks
Metropolitan trunking circuits have an average length of 12km & may have as many
as 1,00,000 voice channels in trunk group.
Most facilities are installed in underground conduits & are repeater less, joining
telephone exchanges in metropolitan or city area.
iii) Rural exchange trunks
Rural exchange trunks have circuit length ranging from 40 to 160 km & link town to
villages
iv) Subscriber loops
Subscriber loop circuit are fibers that run directly from central exchange to
subscriber
Full service network capable of handling not only voice & data but also image and
video
v) LANs
Standards have been developed & products introduced for optical fiber networks
that have total capacity of 100 Mbps to 10 Gbps & can support hundreds or even
thousands of stations in large office building or complex of buildings
Composite graph
Transmission Characteristics
Optical fiber transmits a single-encoded beam of light by means of total internal
reflection
Total internal reflection can occur in any transparent medium that has higher index
of refraction than surrounding medium
Optical fiber acts as waveguide for frequencies in range of 10^14-10^15 Hz (Portion
of infrared and visible spectra)
It refers to variety of angles that will reflect
With multimode transmission, multiple propagation paths exist, each with different path length
& hence time to traverse fiber
This causes signal elements (pulses) to spread out in time, which limits rate at which data can be
accurately received.
This type of fiber is best suited for transmission over very short distances
Single-Mode
When fiber core radius is reduced, fewer angles will reflect
By reducing radius of core to the order of wavelength, only a single angle or mode can pass;
coaxial ray
This single mode propagation provides superior performance
Distortion which is found in multimode cannot occur in single mode
Used for long distance application (telephone & cable television)
Wireless Transmission
1 GHz – 40 GHz -> microwave frequency
Microwave is suitable for point to point transmissions at these frequency highly directional
beams are possible.
30 MHz to 1 GHz frequency-> range is suitable for omnidirectional application (radio range)
Infrared portion of spectrum 3x1011 to 2x10^14^meters
Useful for point to point & multiport (local) application within confined areas (single room)
In wireless media, transmission & reception are achieved by means of an antenna.
Antennas
Electrical conductor or system of conductors used either for radiating electromagnetic energy or
for collecting electromagnetic energy
For transmission, electrical energy from transmitter is converted into electromagnetic energy by
antenna & radiated into surrounding environment
Vice versa for reception
Performance of antenna is radiation pattern which is graphical representation of an antenna as
function of space coordinates.
i) Isotropic Antenna
(Idealized antenna) is point in space that radiates power in all directions equally
Actual radiation pattern for isotropic antenna is a sphere with antenna at centre
ii) Parabolic Reflective antenna
Generally used in terrestrial microwave & satellite application
Parabola: is locus of all points equidistant from fixed line & a fixed point on a
line
Fix point is focus & fix line is directrix.
Antenna gain: measure of directionality of antenna
Power output, in particular direction, compared to that produced in any direction by perfect
omnidirectional antenna (isotropic antenna)
Effective area of an antenna-> is related to physical size of antenna & to its shape.
Relation between effective area & antenna gain
Terrestrial Microwave
Physical Description
Most common type of microwave antenna is parabolic dish
Size is about 3m in diameter
Antenna is fixed rigidly & focuses a narrow beam to achieve line of sight transmission, on to
receiving antenna
Microwave antennas are located at substantial heights above ground level to extend the range
between antennas & to be able to transmit over intervening obstacles
To achieve long distance transmission, series of microwave relay towers is used
Application
Long haul communication service as an alternative to coaxial cable or optical fiber
Microwave facility requires fewer amplifiers or repeaters than coaxial cable over same distance
but require line of sight transmission
Used for both voice & television transmission
Short point to point link between building
Cellular Systems
Short haul microwave can also be used for by pass application
(A business can establish, a microwave link to long distance telecommunication facility in same city,
by parsing local telephone company)
Transmission Characteristics
Covers substantial portion of electromagnetic spectrum
Frequency range is 1 to 40 GHz
Higher frequency used, higher B and therefore higher data rate
As with any transmission system, main source of loss is attenuation
For microwave (& radio frequency) loss is
d= distance
Loss varies as square of distance
In cables, loss varies exponentially with distance (linear in dB)
Repeaters, Amplifiers may be placed further apart for microwave system 10-100 km
i) Attenuation is increased with rainfall – noticeable attenuation in rainfall is above 10 GHz
ii) Interference – with growing popularity of microwave, transmission areas overlap &
interference is always danger
Assignment of frequency band is strictly regulated
i) For long haul telecommunication system – 4 GHz to 6 GHz band (11GHz is used due to
congestion)
ii) For cable TV system – 12 GHz band
iii) Short point to point link – High frequency band 22 GHz is used
For higher frequency, antennas are smaller & cheaper
Satellite Microwave
Physical description
Communication satellite is, microwave relay station
It is used to link 2 or more ground based stations.
Satellite receives transmission on one frequency band (uplink), amplifies or repeats the signal &
transmits it on another frequency (downlink)
A single orbiting satellite can operate on number of frequency bands (transponder
channels/transponders)
For proper functioning of satellite for communications it is required that it remain stationary
with respect to its position over earth.
Otherwise it would not be within line of sight of its earth stations at all times
To remain stationary, satellite must have a period of rotation equal to earth’s period of rotation.
This match occurs at height of 35863km at equator
If two satellite using same frequency band, if close enough together, interference with each
other, to avoid standard require -4 degree spacing in 4/6 GHz band & 3 degree spacing at 12/14
GHz
Applications
Television distribution
Long haul telephone transmission
Private business networks
Programs are transmitted to satellite & then broadcast down to number of stations, which then
distribute programs to individual viewers.
PBS (Public Broadcasting Service)- distributes television programming almost exclusively by use
of satellite channels
DBS (Direct Broadcasting Satellite)- video signals are transmitted directly to home user
Satellite providers can divide total capacity into number of channels & lease these channels to
individual business users.
User equipped with antennas at number of sites, can use a satellite channel for private network
Transmission Characteristics
Frequency range (optimum) for satellite is 1 to 10 GHz
Below 1 GHz – there is significant noise from natural sources, including galactic, solar &
atmospheric noise & human made interference from various electronic devices.
Above 10 GHz – signal is attenuated to atmospheric absorption & precipitation
Most satellite providing point to point service today use frequency band
-5.925 to 6.425 GHz (uplink) earth to satellite & 3.7 to 4.2 GHz (downlink) satellite to earth
Combination is referred to as 4/6 GHz band
For continuous operation without interference a satellite can’t transmit & receive on same
frequency
Terrestrial Microwave
12(d)/14(u) GHz band
Uplink 14 to 14.5 GHz Once saturated 20/30 GHz -> 27.5 to 30 GHz
Downlink 11.7 to 12.2 GHz to 17.7 – 20.20 GHz
Because of long distances, there is propagation delay of about quarter second from transmission
from one earth station to reception by another station
Broadcast Radio
Physical Description
Broadcast radio is omnidirectional & microwave is directional
Broadcast radio does not require dish shaped antennas & antennas need not be rigidly mounted
to a precise alignment
Application
Radio is general term used to encompass frequency in range of 3 KHz to 300 GHz
Broadcast radio covers VHF & past of UHF band; 30 MHz to 1 GHz
This range covers FM radio & UHF & VHF television
Range is also used for data networking application
Transmission Characteristics
Range 30 MHz to 1 GHz is an effective one for broadcast communication
Broadcast radio waves are less sensitive to attenuation from rainfall
As in microwave, amount of attenuation due to distance obeys equation
Sources Of Impairment
1) Multipath interference
2) Reflection from land, water, natural or human made objects, can create multipath between
antennas (ex TV reception displays multiple images as airplane parses by)
Infrared
Infrared communication is achieved using transmitter/receivers (transreceiver) that modulate
non coherent infrared light
Transreceiver must be within a line of sight of each other directly or via reflection from light
coloured surface such as ceiling of room
Infrared does not penetrate wall, thus security & interference problem encountered in
microwave systems are not present.
There is no frequency allocation issue with infrared, because no licensing is required.
UNIT II
Data Communication Interface
Asynchronous and Synchronous Transmission
Line Configuration
Interfacing
Transmission of binary data across a link can be accomplished in either parallel or serial mode.
Serial transmission of data means data is transferred over a single patch rather than parallel set of
lines.
With serial transmission signaling elements are sent down the line one at a time.
Data Transmissiom
Serial Parallel
Synchronous Asynchronous
Parallel Transmission:
m/sm for parallel transmission is conceptually simple one.
Use n wires to send n-bits at one time. Each bit has its own wire , and all n bits of a group can be
transmitted with each clock track from one device to another.
If n=8(data bits)
Eight wires are bounded in a cable with a connector at each end.
Advantage: Parallel transmission can increase transfer speed by a factor of n over serial
transmission.
Disadvantage: Requires n-communication lines just to transmit bit stream.
-Limited to short distances.
Serial Transmission
In serial transmission one bit follows another, so we need only one communication rather than n
to transmit data between two communication devices.
Asynchronous Transmission
In Asynchronous Transmission timing of signal is not important. Information is received and
transmitted upon by agreed upon patterns.
Pattern is based up on grouping of the bit straight into bytes.
In each group usually 8-bits are sent along the link as a unit.
Sending system handles each group independently without regard to a timer.
Without Synchronization receiver can’t use timing to predict when the next group will arrive.
To alert the receiver the arrival of new group, extra bits were added. We send a bit(0)at beginning
and one or more step bits (1’s) at end of each byte.
There may be gap between each byte. Gap can be represented either by an idle channel or a
stream of additional step bits.
This mechanism is called asynchronous because, at the byte level sender and receiver need not
have to be synchronized.
o Fig: Asynchronous transfer
Synchronous Transmission
In synchronous transmission bit stream is combined into longer frames which may contain
multiple bytes.
We send(Frames) bits one after another without start/stop bits or gaps.
It is responsibility of the receiver to group bits into bytes for decoding purpose.
Line configuration:
Two characteristics that distinguish various data link configuration are:
Topology:
The topology of a data link refers to the physical arrangement of stations on a trans-mission
medium.
If there are only two stations (e.g., a terminal and a computer or two computers), the link is point
to point.
If there are more than two stations, then it is a multipoint topology.
If each terminal has a point-to-point link to its computer, then the computer must have one I/O
port for each terminal.
Also there is a separate transmission line from the computer to each terminal. In a multipoint
configuration, the computer needs only a single I/O port and a single transmission line, which
saves costs.
Interfacing:
With digital data processing devices have limited data processing capability. Typically, they
generate simple digital signal, such as NRZ-L and DCE, across which they can transmit data is
limited. Consequently it is rare for such a device to attach directly to a transmission or a
networking facility.
DTE: (data terminal equipment)- Includes terminals and computers. DTE makes use of
transmission system through the mediation of data circuit terminating equipment (DCE).
Ex of DCE is modem
The DCE is responsible for transmitting and receiving bits, one at a time, over
a transmission medium or network.
This requires both data and control information to be exchanged. This is done over a set of wires
referred to as interchange circuits.
The two DCEs that exchange signals over the transmission line or network must understand each
other. That is, the receiver of each must use the same encoding scheme (e.g., Manchester, PSK)
and data rate as the transmitter of the other.
Each DTE-DCE pair must be designed to interact cooperatively.
To ease the burden on data processing equipment manufacturers and users, standards have been
developed that specify the exact nature of the interface between the DTE and the DCE.
Such an interface has four important characteristics:
• Mechanical
• Electrical
• Functional
• Procedural
Mechanical Characteristics:
The mechanical characteristics pertain to the actual physical connection of the DTE to the DCE.
the signal and control interchange circuits are bundled into a cable with a terminator connector,
male or female, at each end.
The DTE and DCE must present connectors of opposite genders at one end of the cable, effecting
the physical connection.
This is analogous to the situation for residential electrical power. Power is provided via a socket
or wall outlet, and the device to be attached must have the appropriate male connector (two-
pronged, two-pronged polarized, or three-pronged) to match the socket.
Electrical Characteristics:
The electrical characteristics deals with the voltage levels and timing of voltage changes.
Both DTE and DCE must use the same code (e.g., NRZ-L), must use the same voltage levels to
mean the same things, and must use the same duration of signal elements. These characteristics
determine the data rates and distances that can be achieved.
Functional Characteristics:
Functional characteristics specify the functions that are performed by assigning meanings to each
of the interchange circuits.
Functions can be classified into the broad categories of data, control, timing, and electrical
ground.
Procedural Characteristics:
Procedural characteristics specify the sequence of events for transmitting data, based on the
functional characteristics of the interface.
Two main standard interfaces are:
V.24/EIA-232-F
ISDN Physical Interface.
V.24/EIA-232-F
One of the most widely used interfaces is specified in the ITU-T standard, V.24. In fact, this
standard specifies only the functional and procedural aspects of the interface; V.24 references
other standards for the electrical and mechanical aspects.
In the United States, there is a corresponding specification, virtually identical, that covers all four
aspects: EIA-232-F.
The correspondence is as follows:
• Mechanical: ISO 2110
• Electrical: V.28
• Functional: V.24
• Procedural V.24
EIA-232 was first issued by the Electronic Industries Alliance in 1962, as RS-232. It is currently
in its sixth revision, EIA-232-F, issued in 1997. The current V.24 and V.28 specifications were
issued in 1996 and 1993, respectively.
This interface is used to connect DTE devices to voice-grade modems for use on public analog
telecommunications systems. It is also widely used for many other interconnection applications.
Mechanical Specifications:
The mechanical specification for EIA-232-F is illustrated in Figure above. It calls for a 25-pin
connector, defined in ISO 2110, with a specific arrangement of leads.
This connector is the terminating plug or socket on a cable running from a DTE (e.g., terminal) or
DCE (e.g., modem).
Though a 25-wire cable could be used to connect the DTE to the DCE, many applications require
far fewer wires.
Electrical Specifications:
The electrical specification defines the signaling between DTE and DCE. Digital signaling is used
on all interchange circuits. Depending on the function of the interchange circuit, the electrical
values are interpreted either as binary data or as control signals.
The convention specifies that, with respect to a common ground, a voltage more negative than –3
volts is interpreted as binary 1 and a voltage more positive than +3 volts is interpreted as binary 0.
This is the NRZ-L code. The interface is rated at a signal rate of <20 kbps and a distance of <15
meters.
The same voltage levels apply to control signals: a voltage more negative than –3 volts is
interpreted as an OFF condition and a voltage more positive than +3 volts is interpreted as an ON
condition.
Functional Specifications:
Table below summarizes the functional specification of the interchange circuits
The circuits can be grouped into the categories of data, control, timing, and ground.
There is one data circuit in each direction, so full duplex operation is possible. In addition, there
are two secondary data circuits that are useful when the device operates in a half-duplex fashion.
There are 16 control circuits. The first 10 of these listed in Table relate to the transmission of data
over the primary channel.
For asynchronous transmission, six of these circuits are used (105, 106, 107, 108.2, 125, 109).
In addition to these six circuits, three other control circuits are used in synchronous transmission.
The Signal Quality Detector circuit is turned ON by the DCE to indicate that the quality of the
incoming signal over the telephone line has deteriorated beyond some defined threshold.
The Data Signal Rate Selector circuits are used to change speeds; either the DTE or DCE may
initiate the change.
Circuit 133 enables a receiver to turn the flow of data on circuit 104 on and off.
The next three control circuits (120, 121, 122) are used to control the use of the secondary
channel, which may be used as a reverse channel or for some other auxiliary purpose.
The last group of control signals relates to loopback testing. These circuits allow the DTE to
cause the DCE to perform a loopback test. These circuits are only valid if the modem or other
DCE supports loopback control.
Local loopback: In the local loopback function, the transmitter output of the modem is connected
to the receiver input, disconnecting the modem from the transmission line.
A stream of data generated by the user device is sent to the modem and looped back to the user
device.
Remote loopback: the local modem is connected to the transmission facility in the usual fashion,
and the receiver output of the remote modem is connected to the modem's transmitter input.
Loopback control is a useful fault isolation tool. For example, suppose that a user at a personal
computer is communicating with a server by means of a modem connection and communication
suddenly ceases. The problem could be with the local modem, the communications facility, the
remote modem, or the remote server.
A network manager can use loopback tests to isolate the fault.
• Table: Loopback Circuit Settings for V.24/EIA-232
Procedural Specifications:
The procedural specification defines the sequence in which the various circuits are used for a
particular application.
Examples:
For connecting two devices over a short distance within a building. It is known as an
asynchronous private line modem, or a limited distance modem.
The limited distance modem accepts digital signals from a DTE, such as a terminal or computer,
converts these to analog signals, and then transmits these over a short length of medium, such as
twisted pair.
On the other end of the line is another limited distance modem, which accepts the incoming
analog signals, converts them to digital, and passes them on to another terminal or computer.
The exchange of data is two way.
The following interchange circuits are actually required:
• Signal Ground (102)
• Transmitted Data (103)
• Received Data (104)
• Request to Send (105)
• Clear to Send (106)
• DCE Ready (107)
• Received line Signal Detector (109)
The circuits just listed are sufficient for private line point-to-point modems, but additional circuits
are required to use a modem to transmit data over the telephone network.
In this case, the initiator of a connection must call the destination device over the network. Two
additional leads are required:
• DTE Ready (108.2)
• Ring Indicator (125)
With the addition of these two lines, the DTE-modem system can effectively use the telephone
network in a way analogous to voice telephone usage.
The wide variety of functions available with V.24/EIA-232 is provided by the use of a large
number of interchange circuits. This is a rather expensive way to achieve results.
An alternative would be to provide fewer circuits but to add more logic at the DTE and DCE
interfaces.
This approach reduces costs of logic circuitry.
This approach was taken in the X.21 standard for interfacing to public circuit-switched networks,
specifying a 15-pin connector.
More recently, the trend has been carried further with the specification of an 8-pin physical
connector to an Integrated Services Digital Network (ISDN).
ISDN is an all-digital replacement for existing public telephone and analog telecommunications
networks.
Physical Connections:
In ISDN terminology, a physical connection is made between terminal equipment (TE) and
network-terminating equipment (NT).
These terms correspond, rather closely, to DTE and DCE, respectively.
The physical connection, defined in ISO 8877, specifies that the NT and TE cables shall
terminate in matching connectors that provide for eight contacts.
In a typical application, it may be desirable to provide for power transfer from the network side
toward the terminal to, for example, maintain a basic telephony service in the event of failure of
the locally provided power.
This power transfer can be accomplished using the same leads used for digital signal transmission
(c, d, e, f), or on additional wires, using access leads g-h.
The remaining two leads are not used in the ISDN configuration but may be useful in other
configurations.
Electrical connections:
The ISDN electrical specification dictates the use of balanced transmission. With balanced
transmission, signals are carried on a line, such as twisted pair, consisting of two conductors.
Signals are transmitted as a current that travels down one conductor and returns on the other, the
two conductors forming a complete circuit.
For digital signals, this technique is known as differential signaling,1 as the binary value depends
on the direction of the voltage difference between the two conductors.
Unbalanced transmission, which is used on older interfaces such as EIA-232, uses a single
conductor to carry the signal, with ground providing the return path.
Figure below shows contact assignments for each of eight lines on both NT and TE sides.
Two pins are used to provide data transmission in each direction. These contact pins are used to
connect twisted pair leads coming from NT and TE devices.
Because there are no specific functional circuits, transmit/receive circuits are used to carry both
data and control signals.
Control information is framed in the form of messages.
Specifications provides for capability to transfer power across interface.
Direction of power depends on application.
The balanced mode tolerates more, and produces less, noise than unbalanced mode.
The data encoding format used on the ISDN interface depends on the data rate. For the basic rate
of 192 kbps, the standard specifies the use of pseudo ternary coding.
Binary one is represented by the absence of voltage, and binary zero is represented by a positive
or negative pulse of 750 mV ±10%.
For the primary rate, there are two options:
1.544 Mbps using alternate mark inversion (AMI) with B8ZS (Figure 5.6)
2.048 Mbps using AMI with HDB3.
Null Modems:
If the distances between devices are so close as to allow two DTEs to signal each other directly.
In this case, the V.24/EIA-232 interchange circuits can still be used, but no DCE equipment is
provided.
For this scheme to work, a null modem is needed, which interconnects leads in such a way as to
fool both DTEs into thinking that they are connected to modems.
Fig: Example of a Null Modem
Types of Errors:
In digital transmission system,an error occurs when a bit is altered between transmission and
reception; i.e. binary 1 is transmitted and binary 0 is received or vice versa.
Two types of errors can occur i.e. single bit error and burst error.
Single bit error does not affect nearby bits;it is isolated one.
A burst error of length B is contiguous sequence of B bits in which the first and last bits and any
number of intermediate bits are received in error.
Error Detection:
Regardless of design of transmission system,there will be errors,resulting in change of one or
more bits in a transmitted frame.We assume that data are transmitted as one or more contiguous
sequence of bits,called frames.
We define these probabilities w.r.t. errors in transmitted frames.
Pb:Probability that bit is received with error(BER).
For a given frame of bits, additional bits that constitute an error-detecting code are added by the
transmitter.
This code is calculated as a function of the other transmitted bits.
For a data block of k bits, the error-detecting algorithm yields an error-detecting code of n - k
bits, where (n-k)<k.
The error-detecting code, also referred to as the check bits, is appended to the data block to
produce a frame of n bits, which is then transmitted.
The receiver separates the incoming frame into the k bits of data and (n-k) bits of the error-
detecting code.
The receiver performs the same error-detecting, calculation on the data bits and compares this
value with the value of the incoming error-detecting code.
A detected error occurs if and only if there is a mismatch.
Parity Check
The simplest error-detecting scheme is to append a parity bit to the end of a block of data.
The value of parity bit is selected so that the character has aneven number of 1s (even parity) or
an odd number of 1s (odd parity).
Note, however, that if two (or any even number) of bits are inverted due to error, an undetected
error occurs.
Typically, even parity is used for synchronous transmission and odd parity for asynchronous
transmission.
Cyclic Redundancy Check (CRC)
One of the most common, and one of the most powerful, error-detecting codes is the cyclic
redundancy check (CRC).
Given k-bit block of bits, or message, the transmitter generates an (n-k) bit sequence, known as a
frame check sequence (FCS), such that the resulting frame, consisting of n bits is exactly divisible
by some predetermined number.
The receiver then divides the incoming frame by that number and, if there is no remainder,
assumes there was no error.
To clarify this, various procedures are there:
i) Modulo 2 Arithmetic.
ii) Polynomials.
iii) Digital Logic.
Modulo 2 Arithmetic
Modulo 2 arithmetic uses binary addition with no carries,which is just the exclusive-OR (XOR)
operation.
Binary subtraction with no carries is also interpreted as the XOR operation.
For example,
1111 1111 11001
+1010 -0101 * 11
T = 2n-k.D+R = 2n-k.D + R
P P P P
T=Q+R+R
P P P
T = Q + R+R = Q
P P
EXAMPLE:
Given
o Message D = 1010001101 (10 bits)
o Pattern P = 110101 (6 bits)
o FCS R = to be calculated (5 bits)
Thus, n = 15, k = 10, (n–k)= 5.
The message is multiplied by 25 , yielding 101000110100000.
This product is divided by P:
Polynomials
A second way of viewing the CRC process is to express all values as polynomials in a dummy
variable X, with binary coefficients.
The coefficients correspond to the bits in the binary number.
Thus, for D = 110011 we have
D(X) = X5+X4+X+1
and for P = 11001 we have P(X)= X4+X3+1
Arithmetic operations are again modulo 2.The CRC process can now be described as
Xn-k.D(X) = Q(X) + R(X)
P(X) P(X)
EXAMPLE:
Using the preceding example, for D = 1010001101,we have
D(X) = X9+X7+X3 +X2+1.
For P = 110101,we have P(X) = X5+X4+X2+1.
We should end up with R = 01110 which corresponds to
R(X) = X3 +X2+X.
An error E(X) will only be undetectable if it is divisible by P(X).
Following errors are not divisible by a suitably chosen P(X) and hence are detectable:
o All single-bit errors, if P(X) has more than one nonzero term.
o All double-bit errors, as long as P(X) is a special type of polynomial, called a primitive
polynomial.
(iii)Any odd number of errors.
(iv)Any burst error for which the length of the burst is less than or equal to n – k (FCS).
Four versions of P(X) are widely used
CRC-12 = x12+x11+x3+x2+x+1
CRC-16 = x16+x15+x2+1
CRC-CCITT = x16+ x12+x5+1
CRC-32 = x32+x26+x23+x22+ x16+ x12+x11+x10+x8+x7+x5+x4+ x2+x+1
The CRC-12 system is used for transmission of streams of 6-bit characters and generates a 12-bit
FCS.
Both CRC-16 and CRC-CCITT are used for 8-bit characters,
in the United States and Europe, respectively, and both result in a 16-bit FCS.
CRC-32 is specified as an option in some point-to-point synchronous transmission standards and
is used in IEEE 802 LAN standards.
Digital Logic
The CRC process can be represented by, and indeed implemented as, a dividing circuit consisting
of XOR gates and a shift register.
The shift register is a string of 1-bit storage devices.
Each device has an output line, which indicates the value currently stored, and an input line.
At clock times, the value in the storage device is replaced by the value indicated by its input line.
The entire register is clocked simultaneously, causing a 1-bit
shift along the entire register.
The circuit is implemented as follows:
The register contains n-k bits, equal to the length of the FCS.
There are up to n-k XOR gates.
The presence or absence of XOR gate corresponds to the presence or absence of a term in the
divisor polynomial, P(X), excluding the terms 1 and Xn-k.
To send data over data communication link, control logic is added above physical interfacing
called data link control or data link control protocol.
When data link control protocol is used transmission medium between systems is referred to a
data link.
To see the need for data link control, we list some of the requirements and objectives for effective
data communication between two directly connected transmitting-receiving stations:
Frame synchronization: Data are sent in blocks called frames. The beginning and end of each
frame must be recognizable. We briefly introduced this topic with the discussion of synchronous
frames.
• Flow control: The sending station must not send frames at a rate faster than the receiving
station can absorb them.
• Error control: Bit errors introduced by the transmission system should be corrected.
• Addressing: On a shared link, such as a local area network (LAN), the identity of the
two stations involved in a transmission must be specified.
Control and data on same link: It is usually not desirable to have a physically separate
communications path for control information. Accordingly, the receiver must be able to
distinguish control information from the data being transmitted.
Link management: The initiation, maintenance, and termination of a sustained data exchange
require a fair amount of coordination and cooperation among stations. Procedures for the
management of this exchange are required.
None of these requirements is satisfied by the techniques
a data link protocol satisfies these requirements.
Two key mechanisms that are part of data link control:
flow control and error control.
Flow Control
Flow control is a technique for assuring that a transmitting entity does not overwhelm a receiving
entity with data.
The receiving entity typically allocates a data buffer of some maximum length for a transfer.
When data are received, the receiver must do a certain amount of processing before passing the
data to the higher-level software. In the absence of flow control, the receiver’s buffer may fill up
and overflow while it is processing old data.
The model we will see is a vertical-time sequence diagram, showing time dependencies and
illustrating the correct send-receive relationship.
Each arrow represents a single frame transiting a data link between two stations.The data are sent
in a sequence of frames, with each frame containing a portion of the data and some control
information.
Transmission time: The time it takes for a station to emit all of the bits of a frame onto the
medium is the transmission time. This is proportional to the length of the frame.
Propagation time: The propagation time is the time it takes for a bit to traverse the link between
source and destination.
A source entity transmits a frame. After the destination entity receives the frame, it indicates its
willingness to accept another frame by sending back an acknowledgment to the frame just
received.
The source must wait until it receives the acknowledgment before sending the next frame. The
destination can thus stop the flow of data simply by withholding acknowledgment.
A source will break up a large block of data into smaller blocks and transmit the data in many
frames. This is done for the following reasons:
The buffer size of the receiver may be limited.
• The longer the transmission, the more likely that there will be an error, necessitating
retransmission of the entire frame. With smaller frames, errors are detected sooner, and a
smaller amount of data needs to be retransmitted.
• On a shared medium, such as a LAN, it is usually desirable not to permit one station to
occupy the medium for an extended period, thus causing long delays at the other sending
stations.
With the use of multiple frames for a single message, the stop-and-wait procedure may be
inadequate. The essence of the problem is that only one frame at a time can be in transit. To
explain we first define the bit length of a link as follows:
B= length of the link in bits; this is the number of bits present on the link at an instance in time
when a stream of bits fully occupies the link
V = velocity of propagation, in m/s
d = length, or distance, of the link in meters
R = data rate of the link, in bps
In situations where the bit length of the link is greater than the frame length, serious inefficiencies
result.
we can express a as
where L is the number of bits in the frame (length of the frame in bits).
When a is less than 1, the propagation time is less than the transmission time. In this case, the
frame is sufficiently long that the first bits of the frame have arrived at the destination before the
source has completed the transmission of the frame.
When a is greater than 1, the propagation time is greater than the transmission time. In this case,
the sender completes transmission of the entire frame before the leading bits of that frame arrive
at the receiver.
Sliding window flow control is potentially much more efficient than stop-and-wait flow control.
As with sliding window flow control, transmission link is treated as pipeline that may be filled
with frames in transit.
In stop-and-wait, only one frame may be in the pipe at a time.
Example assumes a 3-bit sequence number field and a maximum window size of seven frames.
Initially, A and B have windows indicating that A may transmit seven frames, beginning with
frame 0 (F0).
After transmitting three frames (F0, F1, F2) without acknowledgment, A has shrunk its window
to four frames and maintains a copy of the three transmitted frames. The window indicates that A
may transmit four frames, beginning with frame number 3.
B then transmits an RR (receive ready) 3,which means “I have received all frames up through
frame number 2 and am ready to receive frame number 3 and am prepared to receive seven
frames, beginning with frame number 3.”
A may discard the buffered frames as acknowledgment has been received for them.
A Proceeds to transmit frames 3, 4, 5, and 6.
B returns RR 4, which acknowledges F3, and allows transmission of F4.
By the time this RR reaches A, it has already transmitted F4, F5, and F6, and therefore A may
only open its window to permit sending four frames beginning with F7.
The mechanism so far described provides a form of flow control.
Most protocols also allow a station to cut off the flow of frames from the other side by sending a
Receive Not Ready (RNR) message.
RNR 5 means “I have received all frames up through number 4 but am unable to accept any
more.”
We have discussed transmission in one direction only. If two stations exchange data, each needs
to maintain two windows, one for transmit and one for receive, and each side needs to send the
data and acknowledgments to the other.
To support this requirement, a feature known as piggybacking is provided.
Each data frame includes a field that holds the sequence number of that frame plus a field that
holds the sequence number used for acknowledgment.
If a station has data to send and an acknowledgment to send, it sends both together in one frame,
saving communication capacity.
If a station has an acknowledgment but no data to send,it sends a separate acknowledgment
frame.
If a station has data to send but no new acknowledgment to send, it must repeat the last
acknowledgment sequence number that it sent.
Receiving stations ignores repeated acknowledgment of frames.
ERROR CONTROL
Error control refers to mechanisms to detect and correct errors that occur in the transmission of
frames.
data are sent as a sequence of frames;
frames arrive in the same order in which they are sent and potentially variable amount of delay
before reception.
There is the possibility of two types of errors:
Lost frame: A frame fails to arrive at the other side.For example,a noise burst may damage a
frame to the extent that the receiver is not aware that a frame has been transmitted.
Damaged frame: Some of the frame bits are in error (have been altered during transmission).
Error detection techniques are based on the following aspects:
Error detection:
Positive acknowledgment: The destination returns a positive acknowledgment for error-free
frames.
Retransmission after timeout: The source retransmits a frame that has not been acknowledged
after timeout.
Negative acknowledgment and retransmission: The destination returns a negative
acknowledgment to frames and the source retransmits such frames.
Collectively, these mechanisms are all referred to as automatic repeat request (ARQ).
Three versions of ARQ have been standardized.
1)Stop-and-wait ARQ:
This is based on the stop-and-wait flow control technique.
The source station transmits a single frame and then must await an acknowledgment (ACK).
No other data frames are sent until the destination station’s reply arrives in the form of an
acknowledgment at the source station.
Two sorts of errors could occur.
I)The frame that arrives at the destination is damaged.
The receiver detects this by using the error-detection technique referred to earlier and discards the
frame.
To overcome this, the source station is equipped with a timer.
After a frame is transmitted, the source station waits for an acknowledgment. If no
acknowledgment is received by the time that the timer expires, then the same frame is sent again.
For this, source station should maintain a copy of a transmitted frame until an acknowledgment is
received.
II)Acknowledgment is damaged.
Station A sends a frame.
The frame is received correctly by station B.
Station B responds with an acknowledgment (ACK).
The ACK is damaged in transit and is not recognizable by A.
Now ,after time out at A,A will resend the same frame.
This will make duplicate copies of frames at the receiver side.
B has accepted two copies of the same frame as if they were separate.
To avoid this problem,
Frames are alternately labeled with 0 or 1, and positive acknowledgments are of the form
ACK0 and ACK1.
According to sliding window flow control ACK0-means received frame 1 and ready to receive
frame 0.
Figure shows example of Stop and wait ARQ
Fig: Stop and wait ARQ
Principle advantage of Stop and wait ARQ is its simplicity and disadvantage is that its inefficient
mechanism.
Sliding window flow control technique can be adapted to provide efficient line use.
Damaged frame:
If the received frame is invalid (i.e., B detects an error, or the frame is so damaged that B does not
even perceive that it has received a frame)
B discards the frame and takes no further action as the result of that frame. There are two sub
cases:
o Within a reasonable period of time, A subsequently sends frame(i+1)
o B receives frame (i+1) out of order and sends a REJ i.
o A must retransmit frame i and all subsequent frames.
o A does not soon send additional frames. B receives nothing and returns neither an RR nor
a REJ.
o When A’s timer expires, it transmits an RR frame that includes a bit known as the P bit,
which is set to 1.
o B interprets the RR frame with a P bit of 1 as a command that must be acknowledged by
sending an RR indicating the next frame that it expects, which is frame i.
When A receives the RR, it retransmits frame i. Alternatively, A could just
retransmit frame i when its timer expires.
Damaged RR:
There are two sub cases:
o B receives frame i and sends RR (i+1) which suffers an error in transit.
o Because acknowledgments are cumulative (e.g., RR 6 means that all frames through 5 are
acknowledged),it may be that A will receive a subsequent RR to a subsequent frame and
that it will arrive before the timer associated with frame i expires.
o If A’s timer expires, it transmits an RR command as in Case 1b.
o It sets another timer, called the P-bit timer.
o If B fails to respond to the RR command, or if its response suffers an error in transit, then
A’s P-bit timer will expire.
o At this point, A will try again by issuing a new RR command and restarting the P-bit
timer.
o This procedure is tried for a number of iterations. If A fails to obtain an acknowledgment
after some maximum number of attempts, it initiates a reset procedure.
Damaged REJ:
If a REJ is lost, this is equivalent to Case 1b
When frame 5 is received out of order, B sends a SREJ 4, indicating that frame 4 has not been
received
At this point B continues to accept incoming frame and buffers them until frame 4 is received
B can place all frames in order for delivery to higher-layer software
Selective regret is more efficient than go back N because it minimizes amount of retransmission
Receiver must maintain buffer large enough
Mostly useful in satellite link because of long propagation delay.
3)Selective-Reject ARQ
With selective-reject ARQ, the only frames retransmitted are those that receive a negative
acknowledgment.
In this case called SREJ, or those that time out.
Figure illustrates this scheme
HIGH-LEVEL DATA LINK CONTROL (HDLC)
The most important data link control protocol is HDLC (ISO 3009, ISO 4335). Not only is HDLC
widely used, but it is the basis for many other important data link control protocols, which use the
same or similar formats and the same mechanisms as employed in HDLC.
Basic Characteristics
HDLC defines three types of stations, two link configurations, and three data transfer modes of
operation. The three station types are
• Primary station: Responsible for controlling the operation of the link.
Frames issued by the primary are called commands.
• Secondary station: Operates under the control of the primary station.
Frames issued by a secondary are called responses. The primary
maintains a separate logical link with each secondary station on the line.
• Combined station: Combines the features of primary and secondary. A
combined station may issue both commands and responses.
The two link configurations are
• Unbalanced configuration: Consists of one primary and one or more
secondary stations and supports both full-duplex and half-duplex
transmission.
• Balanced configuration: Consists of two combined stations and supports
both full-duplex and half-duplex transmission.
The three data transfer modes are
• Normal response mode (NRM): Used with an unbalanced configuration.
The primary may initiate data transfer to a secondary, but a secondary
may only transmit data in response to a command from the primary.
• Asynchronous balanced mode (ABM): Used with a balanced
configuration. Either combined station may initiate transmission without
receiving permission from the other combined station.
• Asynchronous response mode (ARM): Used with an unbalanced
configuration. The secondary may initiate transmission without explicit
permission of the primary.
The primary still retains responsibility for the line, including initialization, error recovery, and
logical disconnection.
NRM is used on multidrop lines, in which a number of terminals are connected to a host
computer.
The computer polls each terminal for input.
NRM is also sometimes used on point-to-point links.
2) ABM is the most widely used of the three modes; it makes more efficient use of a full-duplex
point-to-point link because there is no polling overhead.
3) ARM is rarely used; it is applicable to some special situations in which a secondary may need
to initiate transmission.
Frame Structure
HDLC uses synchronous transmission. All transmissions are in the form of frames, and a single
frame format suffices for all types of data and control exchanges.
Figure shows the structure of the HDLC frame. The flag, address, and control fields that precede
the information field are known as a header.
The FCS and flag fields following the data field are referred to as a trailer.
Flag Fields: Flag fields delimit the frame at both ends with the unique pattern 01111110.
A single flag may be used as the closing flag for one frame and the opening flag for the next.
On both sides of the user-network interface, receivers are continuously hunting for the flag
sequence to synchronize on the start of a frame.
While receiving a frame, a station continues to hunt for that sequence to determine the end of the
frame.
There is no assurance that the pattern 01111110 will not appear somewhere inside the frame, thus
destroying synchronization.
To avoid this problem, a procedure known as bit stuffing is used.
1 bit error may merge or split two frames.
Fig: An inverted bit splits a frame in two
Address Field: The address field identifies the secondary station that transmitted or is to receive
the frame. This field is not needed for point-to-point links but is always included for the sake of
uniformity.
The address field is usually 8 bits long but, by prior agreement, an extended format may be used
in which the actual address length is a multiple of 7 bits.
The leftmost bit of each octet is 1 or 0 according as it is or is not the last octet of the address field.
The remaining 7 bits of each octet form part of the address.
Between the starting and ending flags, the transmitter inserts an extra 0 bit after each occurrence
of five 1s in the frame.
After detecting a starting flag, the receiver monitors the bit stream. When a pattern of five 1s
appears, the sixth bit is examined.
If this bit is 0, it is deleted. If the sixth bit is a 1 and the seventh bit is a 0, the combination is
accepted as a flag.
If the sixth and seventh bits are both 1, the sender is indicating an abort condition.
With the use of bit stuffing, arbitrary bit patterns can be inserted into the data field of the frame.
This property is known as data transparency.
Example:
Control Field: HDLC defines three types of frames, each with a different control field format.
Information frames(I-frames) carry the data to be transmitted for the user (the logic above HDLC
that is using HDLC). Additionally, flow and error control data, using the ARQ mechanism, are
piggybacked on an information frame.
Supervisory frames (S-frames) provide the ARQ mechanism when piggybacking is not used.
Unnumbered frames (U-frames) provide supplemental link control functions.
The first one or two bits of the control field serves to identify the frame type.
All of the control field formats contain the poll/final (P/F) bit.
Its use depends on context. Typically, in command frames, it is referred to as the P bit and is set
to 1 to solicit (poll) a response frame from the peer HDLC entity.
In response frames, it is referred to as the F bit and is set to 1 to indicate the response frame
transmitted as a result of a soliciting command.
Information Field: The information field is present only in I-frames and some U frames.
The field can contain any sequence of bits but must consist of an integral number of octets.
The length of the information field is variable up to some system defined maximum.
Frame Check Sequence Field: The frame check sequence (FCS) is an error detecting code
calculated from the remaining bits of the frame, exclusive of flags.
The normal code is the 16-bit CRC-CCITT defined in Section 6.3.
An optional 32-bit FCS, using CRC-32, may be employed if the frame length or the line
reliability dictates this choice.
Operation
HDLC operation consists of the exchange of I-frames, S-frames, and U-frames between two
stations.
The various commands and responses defined for these frame types are as follows:
The operation of HDLC involves three phases.
Initialization: one side or another initializes the data link so that frames may be exchanged in an
orderly fashion.
Exchange of data and the control information
Termination of the operation.
Initialization: Either side may request initialization by issuing one of the six set mode
commands. This command serves three purposes:
It signals the other side that initialization is requested.
It specifies which of the three modes (NRM, ABM, ARM) is requested.
It specifies whether 3- or 7-bit sequence numbers are to be used.
• If the other side accepts this request, then the HDLC module on that end transmits an
unnumbered acknowledged (UA) frame back to the initiating side. If the request is
rejected, then a disconnected mode (DM) frame is sent.
Data Transfer: When the initialization has been requested and accepted, then a logical
connection is established.
Both sides may begin to send user data in I frames, starting with sequence number 0.
The N(S) and N(R) fields of the I-frame are sequence numbers that support flow control and error
control.
An HDLC module sending a sequence of I-frames will number them sequentially, modulo 8 or
128, depending on whether 3- or 7-bit sequence numbers are used, and place the sequence
number in N(S).
N(R) is the acknowledgment for I-frames received; it enables the HDLC module to indicate
which number I-frame it expects to receive next.
S-frames are also used for flow control and error control.
The receive ready (RR) frame acknowledges the last I-frame received by indicating the next I-
frame expected.
Receive not ready (RNR) acknowledges an I-frame, as with RR, but also asks the peer entity to
suspend transmission of I-frames.
When the entity that issued RNR is again ready, it sends an RR.
REJ initiates the go-back-NARQ.
It indicates that the last I-frame received has been rejected and that retransmission of all I-frames
beginning with number N(R) is required.
• Disconnect: Either HDLC module can initiate a disconnect, either on its own initiative if
there is some sort of fault, or at the request of its higher-layer user.
• The remote entity must accept the disconnect by replying with a UA and informing its
layer 3 user that the connection has been terminated.
• Examples of operation:
1. The HDLC protocol entity for one side issues an SABM command to the other side and starts a
timer.
• On other side, upon receiving the SABM, returns a UA response and sets local variables
and counters to their initial values.
• The initiating entity receives the UA response, sets its variables and counters, and stops
the timer.
• The logical connection is now active.
• The same figure shows the disconnect procedure.
• One side issues a DISC command, and the other responds with a UA response.
2. Figure illustrates the full-duplex exchange of I-frames.
• When an entity sends a number of I-frames in a row with no incoming data, then receives
sequence number is simply repeated (e.g., I,1,1; I,2.1 in the A-to-B direction).
When an entity receives a number of I-frames in a row with no outgoing frames, then they receive
sequence number in the next outgoing frame must reflect the cumulative activity (e.g., I,1,3 in the
B-to-A direction).
Note that, in addition to I-frames, data exchange may involve supervisory frames.
3.Busy condition may arise because an HDLC entity is not able to process I-frames as fast as
they are arriving, or the intended user is not able to accept data as fast as they arrive in I-frames.
In either case, the entities receive buffer fills up and it must halt the incoming flow of I-frames,
using an RNR command.
In this example, A issues an RNR, which requires B to halt transmission of I-frames.
The station receiving the RNR will usually poll the busy station at some periodic interval by
sending an RR with the P bit set.
This requires the other side to respond with either an RR or an RNR. When the busy condition
has cleared, A returns an RR, and I-frame transmission from B can resume.
4.Reject Recovery:
5.Timeout Recovery:
Error Detection:
Fig: Error correction process
On the transmission end, each k-bit block of data is mapped into an n-bit block (n>k) called a
codeword, using an FEC (forward error correction) encoder.
The codeword is then transmitted. During transmission, the signal is subject to impairments,
which may produce bit errors in the signal.
At the receiver, the incoming signal is demodulated to produce a bit string that is similar to the
original codeword but may contain errors.
This block is passed through an FEC decoder, with one of four possible outcomes:
If there are no bit errors, the input to the FEC decoder is identical to the original codeword, and
the decoder produces the original data block as output.
For certain error patterns, it is possible for the decoder to detect and correct those errors. Thus,
even though the incoming data block differs from the transmitted codeword, the FEC decoder is
able to map this block into the original data block.
For certain error patterns, the decoder can detect but not correct the errors. In this case, the
decode simply reports an uncorrectable error.
For certain, typically rare, error patterns, the decoder does not detect that any errors have
occurred and maps the incoming n-bit data block into a k-bit block that differs from the original
k-bit block.
The error-correcting code follows the same general layout as for error-detecting codes.
The FEC algorithm takes as input a k-bit block and adds (n-k) bits of check bits to that block to
produce an n-bit block of data.
For some FEC algorithms, the FEC algorithm maps the k-bit input into an n-bit codeword in such
a way that the original k bits do not appear in the codeword.
To begin, we define a term that shall be of use to us. The Hamming distance d(v1,v2) between
two n-bit binary sequences v1 and v2 is the number of bits in which v1 and v2 disagree.
For example, if v1 = 011011, v2 = 110001
V1: 011011
V2: 110001
101010 No. of 1’s is 3
Then d(v1 , v2) = 3
Now let us consider the block code technique for error correction.
Suppose we wish to transmit blocks of data of length k bits. Instead of transmitting each block as
k bits, we map each k-bit sequence into a unique n-bit codeword.
UNIT-III
Control Unit
Performs:
i. Establishment of connection
ii. Control Unit must maintain connection
iii. Control Unit must tear down the connection either in response to requirement from one of the
parties or for its own reason
Blocking
Occurs when network is unable to connect two stations because all possible paths are in use
Advantage:
The number of cross points are reduced, increasing cross bar utilization – total number of cross
points for 10 stations is reduced from 100 to 48
There is more than one path through network to connect two endpoints increasing reliability
Multistage network requires more complex control scheme
To establish path in single stage network, it is only necessary to enable a single gate
In multistaging network, a for path through the stage must be determined & appropriate gate is
enabled
Multistage space division may be blocking whereas single stage cross bar matrix is non-blocking
(path is always available to connect an input to output)
Heavier lines indicate the lines that are already in use
Ex: input line can’t be connected to 3,h,s even though all these output lines are available
An multiple stage switch can be made non blocking by increasing number of size of intermediate
switch, but this will increase cost also
Control Signaling
In circuit switching control signals are means by which the network is managed & by which calls
are established , maintained & terminated
Both calls management & overall network management require that information be exchange
between subscriber & switch, among switches, between switch & network management center
For large public telecommunication network, a relatively complex control signaling scheme is
required
Signaling Functions
Control signal affect network behavior, including both network services visible to the subscriber
& internal mechanism
As network become complex, number of the functions performed by control signal grows
Audible communication with subscriber , including dial tone, ringing tone, busy signal…
Transmission of number dialed to switching offices that will attempt to complete a connection
Transmission of information between switches indicating that a call cannot be completed
Transmission of information between switches indicating that a call has ended & path can be
disconnected
A signal to make a telephone ring
Transmission of information used for billing purpose
Transmission of information used in diagnosing & isolating system failures
Control of special equipment such as satellite channel equipment
Example: Telephone connection
Supervisory:
Generally used to refer to control function that have a binary character ()true/false ; on/off)
Ex: Request for service, answer, alerting & return to idle
They deal with the availability of called subscriber & if the needed resource is available, if so, to
seize it
They are used to communicate state of required resources
Address:
Signals identify subscriber
Ex: Dialing telephone number
Call Information:
Signals that provide information subscriber about the status of call – call information signals are
audible tones.
Above three signals are directly involved in the establishment & termination of all.
Network Management:
Used for maintenance, troubleshooting & overall operation of network – signals are in the form
of messages.
Location of Signaling
Control signaling needs to be considered in two contexts.
i. Signaling between subscriber & network
Needs human user
ii. Signaling within network
Computer to computer
Signaling operates differently within these two contexts
Local switching office to which subscriber is attached must provide mapping between the
relatively less complex signaling technique used by subscriber & more complex technique used
within network
Common Channel Signaling
Comments
In Channel Band Transmits control signals in same Simple reach necessary
band of frequency used by voice for call information
signals signal
Can be used over any
type of subscriber line
Out of Band Transmits control signal using Out of band signaling provides
same facilities as voice signal but continuous supervision for
different part of frequency band duration of connection
Inchannel:
Same channel is used to carry control signals as is used to carry call to which control signals relate.
Disadvantages:
As public tele communication network become complex & provide a richer set of services, the
drawbacks of inchanel signaling become more apparent
Information transfer rate is quite limited with Inchannel signaling
More amount of delay from time a subscriber enters an address (phone number & connection
establishment)
Out Bound:
Very narrow band width is available
Both of these problems can be addressed with common channel signaling
In which control signals are carried over paths completely independent of voice channel
One independent control signal path can carry the signals for number of subscriber channels &
hence is a common control channel for these subscriber channels.
It reduces call set up time compared with inchannel method.
Common channel can be configured with bandwidth required to carry control signals for variety
of functions.
Two modes of operation are used in common signaling
Associated mode
Common channel closely tracks, along its entire length, the inter switch track group
Disassociated mode
Control signals are on different channel from subscriber signals & inside switch control signals are
routed directly to control signal processor
Disadvantages
Network is augmented by additional nodes called signal transfer points
Two separate network will link between them
Network Management is more easily exerted in disassociated mode
Ex: ISDN
Softswitch Architecture
Latest trend in development of circuit switching technology is generally referred to as Softswitch
Softswitch is general purpose computer running specialized software that turns it into smart
phoe switch
Softswitch cost significantly less than traditional circuit switches & can provide more
functionality
Softswitch can convert a stream of digitized voice bits into packets
In any telephone network switch, the most complex element is software that controls call
processing
This software performs call routing & implements call processing logic
Typically this software runs on processor that is integrated with physical circuit switching
hardware
More flexible approach is to physically separate the call processing function from hardware
switching function
In Softswitch terminology, the physical switching function is performed by Media Getaway (MG)
Call processing logic resides in Media Gateway Controller (MGC)
Packet Switching Principles
For voice connection, circuit switching will enjoy a high percentage of utilization, because most
of the time one party or other is talking
However, as circuit switching network began to be used increasingly fore data connections two
short comings became apparent
In typical user/host data connection (PC on which user logged on to database server) most of
the time line is idle, thus with data connections, a circuit switching approach is inefficient
In circuit switching network, the connection provides for transmission at constant data rate
Thus each of two devices that are connected must transmit & receive at same data rate as the
other
In packet switching data are transmitted in short packets typical upper bound on packet legth is
1000 octects (bytes)
If source has longer message to send, it is broken up into series of packets
Each packet contains portion of user data plus control information
Control Information
Information network requires to be able to rote packet through network & deliver it to intended
destination
Advantages
Line efficiency is greater, because single node to node link can be dynamically shared by many
packets over time.
Packets are queued up & transmitted as rapidly as possible over the link
Packet Switching network performs data rate conversion
Two stations of different data rate can exchange packets because each connects to its node at
proper data rate
When traffic becomes heavy on circuit switching network some calls are blocked on the other
hand, in packet switching network, packets are still accepted, but delivery delay increases
Switching techniques
If a station has message to send through a packet switching network that is of length greater
than maximum packet size, it breaks message up into packets & sends these packets one at a
time to network
Now network will handle this stream of packets as it attempts to route tem through network &
delivers to intended destination
Datagram Approach
Each packet is treated independently with no reference to packets that have gone before
Advantages
If two stations wish to exchange data over an extended period of time, there are certain
advantages to virtual circuit:
Network may provide services related to virtual circuit, including sequencing & error control
Packets are transmitted in network more rapidly with virtual circuit
It is not necessary to make routing decisions
Packet Size
There is significant relationship between packet size & transmission time
There is virtual circuit from station-x to station-y via nodes a & b
Message to be sent comprises of 43 octets & each packet contains 30 octets of control
information at beginning of each packet i.e. header
COMPARISON of circuit switching & Packet Switching
1) Performance
Concerned with three types of delays
2) Propagation Delay
Time taken to propagate signal from one node to next – negligible time – speed is
equivalent to 2x10^8 m/s
3) Transmission Time
Time it takes for transmitter to send out block of data
4) Node Delay
Time it takes for node to perform necessary processing as it switches data
Circuit Switching Virtual circuit packet switching Datagram Packet Switching
Dedicated path No dedicated path NO dedicated path
Continuous Transmission of data Transmission of packets Transmission of packets
Messages are not stored Packets may be stored until Packet may be stored until
delivered delivered
Path is established for entire Route is established for entire Route is established for each
conversation conversation packet
Call Setup Delay Call Setup Delay
Transmission delay is negligible Packet transmission delay Packet transmission delay
usually no speed or code Speed & code conversion Speed & code conversion
conversion
Fixed Bandwidth Dynamic use of bandwidth Dynamic use of bandwidth
No overhead bits after call setup Overhead bits in each packet Overhead bits in each packet
X.25 Interface
Technical aspect of packet switching network is interface between attached devices and network
In packet switching, attached stations must organize their data into packets for transmission
This requires certain level of cooperation between network & attached stations
This cooperation is embodied in an interface standard X.25
X.25 is an ITU-T standard that specifies an interface host system & packet switching network
X.25 functionality is specified on three levels
Physical level
o Deals with physical interface between attached station & link that attaches station to
packet switching mode
Link level
o Provides reliable transfer of data across physical link, data is transmitted as dequence of
frames
o Link level standard is referred to as LAPB (link Access Protocol Balanced)
Packet Level
o Packet Level provides virtual circuit service
X.25 Packet
Identifying by number particular virtual circuit with which this data is to be associated
Provide sequence number used for flow & error control
PCS) - Send sequence number – outgoing data packet on virtual circuit
PCR) – Receive sequence number – acknowledgement of packet received on virtual circuit
Protocol Architecture
It is similar to packet switching using X.25 & frame relay
Data transfer in form of chunk
ATM allows multiple logical connections to be multiplexed over single physical interface
In ATM, information flow on each logical connection is organized into fixed size packets called
cells
ATM is streamlined protocol with minimum error & flow control capability
This reduces overhead & processing ATM cells & reduced numbers of overhead bits required
with each cell, thus enabling ATM it to operate at high data rate
Standards issued for ATM by ITU-T are based on protocol architecture, as shown
It provides interface between users & network
1) Physical Layer
Involves specification of transmission medium & signal encoding scheme
Data rates in physical layer ranges from 25.6 Mbps to 622.08 Mbps
2) ATM Layer
Provides packet transfer capabilities related to ATM Functions
3) AAL Layer
Service dependent (common to all source)
ATM layer defines transmission of data in fixed cells & defines use of logical connections
Use of ATM creates the need for adaption layer to support information transfer protocols which
are not based on ATM
AAL maps higher level information into ATM cells to be transported over an ATM network
Collects information from ATM cells for delivery to higher layers
User Plane – provides user information transfer along with associated control (flow/error)
Control Plane – performs all control & connection control functions
Management Plane – includes plane management which perform management function related
to system as whole & provides coordination between all planes & layer management
For ATM, a second sublayer of processing has been introduced that deals with concept of virtual path
Advantages:
1. Simplified Network Architecture
Network transport function can be separated into those related to individual logical
connection (virtual channels)
Those related to group of logical connections (virtual path)
2. Increased Network Performance & Reliability
Network deals with fewer aggregated entities
3. Reduced processing & short connection setup time
Much of work is done when virtual path is setup
By reserving capacity on virtual path connection in anticipation of latter call arrivals,
new virtual channel connection can be established by exceuting simple control function
at endpoints of virtual path connection
No call processing is required at transit nodes
Thus addition of new virtual channel to existing virtual path involves minimal processing
4. Enhanced Network Services
Virtual path is used internal to network, but is also visible to end user, thus user may define closed user
group or closed network of virtual channel bundles
General way for all virtual call establishment process using virtual channel
Virtual path control mechanism:
Include calculating routes, allocating capacity & storing connection static information
To set virtual channel:
There must first be virtual path connection to the required destination node with sufficient available
capacity to support virtual channel with appropriate quality of service
Virtual channel is setup by storing required state information (virtual channel – virtual path mapping)
VPI
Identifier for particular VP link
VCC uses
Between end users
Carry end to end user data , control information between users
VPC between end users provide them with overall capacity set of VCCs does not exceed VPC capacity
Between end user and network entity
Used for user to network control signaling
User to network VPC can be used to aggregate traffic from end user to network exchange or network
server
Between Two network entities
Used for network management & routing function
Network – network VPC can be used to define common route for exchange of network management
information
Switched (on demand connection) & Semi permanent virtual channel connection (long duration)
Require call control signaling for setup & tearing down
ATM Cells
ATM must make use of fixed size cells, consisting of 5 octet header +48 octet info field
Use small cells may reduce queuing delay for high priority cell, because it waits less if it arrives slightly
behind a lower priority cell that has granted access to resource
It appears that fixed size cells can be switched more efficiently, which is important for very high data
rate of ATM
HEC Algorithm
At initialization, receivers error correction algorithm B in default mode for single bit error correction
Transmission of ATM cells
ITUT – I.432 standard specifies that ATM cells may be transmitted at one of several data rates
->622.08 Mbps
->155.52 Mbps
->51.84 Mbps
->25.4 Mbps
We need to specify transmission structure that will be used to carry this payload
Two approaches are defined in I.432
Cell Based Physical Layer:
For cell based physical layer, no framing is imposed
The interface structure consists of continuous stream of 53-octet cells
Because there is no external frame imposed in cell based approach, some form of
synchronization is needed
Synchronization is achieved on the basis of header error control field (HEC) in cell header
Unit 4
Traditional Ethernet:
Topologies & Transmission media ,LAN protocol architecture ,MAC sub layer-CSMA/CD ,physical layer
,implementation bridged, switched & full duplex Ethernet layer 2 &3 switches.
Fast Ethernet:
MAC sub layer ,physical layer implementation
Gigabit Ethernet:
Topologies:
Network topologies:
Logical connection of various computers in network.
Devices are arranged in the form of ring, each having two neighbouring devices.
To send data to destination node which is far apart, data should be passed through many
intermediate node.
Easy to install &configure.
Fault isolation is easy because a signal that circulates all the time in ring helps in identifying
faulty node.
Data transmission in only one direction any faulted node can break whole ring.
Cannot connect large no. of devices.
X. 5.Mesh topology
Also called complete topology.
Each node is connected to every other node in network.
For n-nodes ,there are n(n-1)/2 links.
As ,there is dedicated links, topology does not have congestion problems.
Further, it does not need a special MAC protocol to prevent simultaneous access to
transmission media, since links are dedicated ,not shared.
Data security is provided.
Complex network& cost associated with able length
LAN is a computer network that is designed for a limited geographic area such as building or
campus.
Although LAN can be used as an isolated network to connect computers in an organisation for
the sole purpose of sharing resources .
Most LAN today are also linked to a WAN or internet.
LAN market has seen several technologies such as Ethernet ,token ring, token bus, FDDI(Fibre
Distributed Data Interfacing),LAN’S.
These are designed to regulate manufacturing &interconnectivity between different event
LANS.
XIV.
Enables intercommunication between among equipment from a variety of manufactures.
Project 802 does not replace any part of OSI or internet model instead ,it is way of specifying
functions of physical& data link layer of major LAN protocol.
IEEE has subdivided data link layer into
-Logical Link Layer .
-Media Access control.
IEEE has also created several physical layer standard for different LAN protocols.
XVII. Framing :
LLC defines protocol data unit (PDU) some what similar to HDLC.
Header contains control field like HDLC .
Two other header fields define upper layer at source &destination that uses LLC
These fields are :
DSAP-Destination Service Access Point.
SSAP-Source Service Access Point.
MAC contains no. of distinct modules ,each defines access method &framing format specific to
corresponding LAN protocol.
B. Physical layer:
Physical layer is dependent on implementations and type of physical media used.
There is only one MAC sub layer for std. Ethernet but different physical layer specifications for
each Ethernet implementation.
C. Standard Ethernet:
Ethernet evolution through 4 generations.
1. Preamble-
7 bytes of alternate 0’s & is coming frame & enables it to synchronise its i/p timing.
Pattern provides only at least & timing pulses.
Preamble is added at phy. Layer & is not part of frame.
a) SFD-Signals Beginning of frame:
SFD warns the stations that this last chance for synchronisation.
Last 2 bits is parallel& alerts receiver that next field is destination address.
b) Destination Address:
6 bytes contains physical address of destination station or stations to receive packet.
c) Source Address:
6 bytes field contains physical address of sender of packet.
d) Length/type:
Length field/type field ->to define upper layer protocol using MAC frame .
e) DATA:
Carries data encapsulated from upper layer protocols.
f) CRC:
Error detection information CRC-32 is used.
XXII. Addressing :
Each station on Ethernet n/w has its own n/w interface card .
NIC fits inside the station &provides station with 6 byte phy. Address.
Address is in hex form with colon between bytes .
06:01:02:01:2c:4b
(1) Multicast address in which all bits are 1’s broadcast address .
Examples
1. 4A:30:10:21:10:1A
2. 47:20:1B:2E:08:EF
3. FF:FF:FF:FF:FF:FF
Address sent left →right byte by byte→ for each byte, it is sent right→ left bit by bit
7 4 0 2
CSMA/CD and its precursors can be termed random access or contention, techniques, they are
random access in the sense that there is no predictable or scheduled time for any station to
transmit; station transmissions are ordered randomly.
They exhibit contention in the sense that stations struggle for time on shared medium.
It does not sense the common channel before initiating transmission because of which it does not
have any information bout states of other users.
Later CSMA protocol were developed that sensed the channel before initiating the transmission in
order to achieve quarter efficiency.
Using CSMA protocol each of device that are connected to N/W are able to examine states of
channel before, sending information transmission takes place only if the communication channel is
idle.
In this type of CSMA device first senses the communication channel if it is ideal then transmission is
initiated but if the channel is busy, station waits for a period of time before starting the transmission.
2. P-persistent csma
This type of csma is basically used in slotted aloha ,where a packet is transmitted into slots ,that is
available then packet is transmitted to next slot with probability i-p.
3. I- persistent csma.
Every device in network that wish to transmit first sense if channel is free or not ,it transmit the pack
longer delays .
Back off algorithm is combined with carrier sensing scheme in order to gain efficiency among
devices that are completing with each other when channel is busy.
Slot Time:
The choice of 512 bit slot time was chosen for proper functioning of CSMA/CD.
Case 1 :
Sender has opportunity to abort sending of frames to send again sequence to inform other station
collision.
Round trip time + time required to send jam sequence should be less than time required for sender to
send min. frame 512 bits.
(1) Case 2:
If station has sent out first-512 bits & has not heard a collision it is guaranteed
That collision will never occur during the transmission of this frame.
The reason is that signal will reach the end of N/Win less than one –half slot time.
If all stations follow CSMA/CD protocol ,they have already sensed existence of signal.
If they want sent a signal on the line before one half slot time expired ,a collision has occurred
&sender has sensed the collision.
In other words ,collision can only occur during first half of slot time &if it does it can sensed by
sender during slot time.
This means that after sender sends the first 512 bits, it is guaranteed that collision will not occur
during transmission of this frame.
Medium belongs to sender & no other station will use it.
Sender needs to Listen to collision only during first -512 are sent.
IOBASE 5 was first Ethernet specification to use a bus topology with external transceiver connected via
thick tap to coaxial cable.
Transceiver is connected to station via a transceiver cable that provides separate paths for sending
&receiving.
B. 2.IOBASE 2:
C. 3.IOBASE T:
2. FAST Ethernet
Transmit data 10 times faster at rate of 100 Mbps .
Goals of fast Ethernet
1. Upgrade data rate to 100 Mbps .
2. Make it compatible with std. Ethernet .
3. Keep same 48 bit address ,frame format ,& min & max frame length.
however ,a decision was made to drop the bus topology & keep only star topology .
The access method is some CSMA/CD for half duplex approach, for full duplex fast Ethernet
there is no need for CSMA/CD.
However ,the implementation keep CSMA/CD for backward compatibility with Ethernet.
B. Auto Negotiation :
1. 100 Base TX
1. MLT Encoding –
Uses three levels +v,0,-v
The need for even higher data rate resulted in designed of gigabit Ethernet protocol (1000
Mbps)
Goals of gigabit Ethernet design .
1.upgrade data rate to 1 gbps .
A. Traditional
B. Carrier extension:
To allow for longer N/W ,we increase min frame length.
Carrier extension approach defines min length of frame as 512 bytes .
This means that min length is 8 times longer .
This method forces station to add extension bits to any frame that is less than 4096 bits.
In this way max length of N/w can be increased 8 times to length of 200m.
C. Frame bursting:
Carrier extension is very in efficient if we have a series of short frames to send.
To improve efficiency frame was proposed instead of adding an extension to each frame
,multiple frames are sent.
To make these multiple frames look like single frame padding is added between frames so that
channel is not idle..
1.
2. Implementation :
a) Goals:
1. Upgrade data rate to 14 Gbps.
2. Make it compatible with other Ethernet.
3. Use same 48 bit address
4. Use same frame format.
5. Keep same min & max frame length
6. Allow interconnection of exiting LAN into metropolitan area N/w or WAN
7. Make Ethernet compatible with technologies such as frame relay & ATM .
C. Physical layer:
Physical layer in ten gigabit Ethernet is designed using Fibre optics cable over long distances
a) Passive hub
It is just a connector .
Connects wires coming from different branches .
Its location in internet model is below physical layer
b) Repeaters :
2. Active Hubs:
It is multiport repeater.
It is used to create connections between stations in physical star topology.
Hubs can also be used to create multiple levels of hierarchy.
Hubs are implemented in some Ethernet .
3. Bridges :
A bridge operates in both physical & data link layer.
As physical layer device –it generates signal.
As data link layer –check physical (MAC) address source & destination contained in frame.
4. 2-Layer switches:
D. Routers:
A router is 3-layer device that routes packets based on their logical address .
Router normally connects LAN’S & WAN’S in internet & has routing table that is used for making
decisions about route.
Routing tables are normally dynamic & are updated using routing protocols .
F. 3- layer – Switches
3 layer switch is router ,but faster & more sophisticated.
The switching fabric in 3 layer switch allows faster table faster table 100 kbps& forwarding.
G. Gateway:
A gateway is normally a computer that operates in all 5 layers of internet or 7 layer of OSI
model.
A gateway takes application msg, reads it, interprets it.
Can be used as connecting device between two internets networks that use diff models.
UNIT - V
Cellular Wireless Networks:
->Cellular radio is a technique that was developed to increase the capacity available for mobile radio
telephone service.
->Prior to cellular radio, mobile radio telephone service was only provided by a high-power
transmitter/receiver.
->A typical system would support about 25 channels with an effective radius of about 80 km.
->way to increase the capacity of the system is to use lower-power systems with shorter radius and to use
numerous transmitters/receivers.
->Because the range of transmitter is small, an area can be divided into cells, each having its own
antenna.
->Each cell is allocated a band of frequencies and is served by a base station, consisting of transmitter,
receiver, and control unit.
->Adjacent cells are assigned different frequencies to avoid interference or crosstalk or cells are
sufficiently apart from each other so as to use same band.
Shape of cells:
i) Square:
->If the width of a square cell is d, then a cell has four neighbors at a distance d and four neighbors at a
distance squareroot(2d) .
ii)Hexagon:
->radius of a hexagon is defined to be the radius of the circle that circumscribes it (equivalently, the distance
from the center to each vertex; also equal to the length of a side of a hexagon.
->For a cell radius R, the distance between the cell center and each adjacent cell center is
d = squareroot(3) R.
Frequency reuse:
->In a cellular system, each cell has a base transceiver. The trans-mission power is carefully controlled to allow
communication within the cell using a given frequency while limiting the power at that frequency that escapes the cell
into adjacent ones.
->objective is to use the same frequency in other nearby cells, thus allowing the frequency to be used for multiple
simultaneous conversations.
Increasing capacity:
->more customers use the system, traffic may build up so that there are not enough frequencies assigned to a cell to
handle its calls.
->when a system is set up in a region, not all of the channels are used.
->growth and expansion can be managed in an orderly fashion by adding new channels.
->According to technique, split each cell into smaller cells to increase the capacity of cell.
->cell is divided into a number of wedge-shaped sectors, each with its own set of channels, typically three
or six sectors per cell.
->Each sector is assigned a separate subset of the cell’s channels, and directional antennas at the base
station are used to focus on each sector.
v) Microcells:
->As cells become smaller, antennas move from the tops of tall buildings to the tops of small buildings
and even to lamp posts to form microcells.
->Due to this power will be reduced and it is good for city streets,along roads and it is also useful in our
inside buildings.
->BS includes an antenna, a controller, and a number of transceivers, for communicating on the channels
assigned to that cell.
->Controller is used to handle the call process between the mobile unit and the rest of the network.
->Link between an MTSO and a BS is by a wire line, although a wireless link is also possible.
->MTSO can also be connected to the public telephone or telecommunications network and can make a
connection between a fixed subscriber to the public network and a mobile subscriber to the cellular network.
->MTSO assigns the voice channel to each call, performs handoffs, and monitors the call for billing information.
->Use of a cellular system is fully automated and requires no action on the part of the user other than
placing or answering a call.
->Two types of channels are available between the mobile unit and the base station (BS):
i) Control channels:
->The handshake mechanism is used in between the mobile device and MTSO.
->A mobile unit originates a call by sending the number of the called unit on the preselected setup
channel.
->Receiver at the mobile unit first checks that the setup channel is idle by examining information in the
forward (from the BS) channel.
->If channel is idle then mobile device sends request to BS and BS passes this request to MTSO.
Fig: Request for connection
iii) Paging:
->MTSO sends a paging message to certain BSs depending on the called mobile number.
->Each BS transmits the paging signal on its own assigned setup channel.
Fig: Paging
->Called device identifies its number from setup channel and gives response to mobile device through
base station and MTSO.
->A circuit is created between the calling and called BSs by MTSO.
->MTSO choose a traffic channel within range of each base station cell and identifies all base stations.
v) Ongoing call:
-> While the connection is maintained, the two mobile units exchange voice or data signals, going through
their respective BSs and the MTSO.
vi) Handoff:
->When a mobile device is out of covering area of particular cell and enters into the range of another cell
while establishing a connection, then traffic channel has to transform to new cell without any interruption
for call.
Fig: Handoff
Call blocking:
->During the mobile-initiated call stage, if all the traffic channels assigned to the nearest BS are busy,
then the mobile unit makes a preconfigured number of repeated attempts.
->After a certain number of failed tries, a busy tone is returned to the user.
Call termination:
->When one of the two users hangs up, the MTSO is informed and the traffic channels at the two BSs are
released.
Call drop:
->During a connection, because of interference or weak signal spots in certain areas, if the BS cannot
maintain the minimum required signal strength for a certain period of time, the traffic channel to the user
is dropped and the MTSO is informed.
->Thus MTSO can make connection with a mobile user in its area and a fixed subscriber via the
telephone net-work.
->If quality of signal is so strong then it leads to co-channel interference with other cells.
->Strength of signal depends on mobile device,as we know mobile devices moves from one place to
another.
->Sometimes it may happen that strength of signal is within a proper coverage area, signal broadcast
effects may interrupt the signal and cause errors.
Types of fading:
->As mobile unit moves down a street in an urban environment rapid variations in signal strength occur
over distance of about one half a wavelength.
->At frequency of 900MHz,which is typical for mobile cellular applications, wavelength is 0.33m.
a) Fast fading:
->Changes of amplitude can be as much as 20 o 30 dB over a short distances.
b) Slow fading:
->It refers to slower changes due to mobile user who moves to different height buildings and gaps in
between the buildings.
->In this all frequency components of the received signal fluctuate in the same proportions simultaneously.
d) As mobile device moves from one place to another then amount of LOS(line of sight) increases.
Since mobile antenna moves,location of various obstacles changes; hence the number,magnitude and timing of
secondary pulses charge.
Scattering:
->scattering can also occur when lamp posts and traffic signs are used.
Fig: Sketch of Three Important Propagation Mechanisms: Reflection (R), Scatter-ing (S), Diffraction
(D)
->In a fixed environment, fading is affected by changes in atmospheric conditions, such as rainfall.
->But in a mobile environment, where one of the two antennas is moving relative to the other, the relative
location of various obstacles changes over time, creating complex transmission effects.
Multipath propagation:
i) Reflection:
->It is electromagnetic signal which happens on surface that is corresponding to wavelength of signals.
ii) Diffraction:
->It occurs at surface of an object which is relatively large compared to wavelength of electromagnetic wave.
-> If attenuation occurs over a portion of the bandwidth of the signal, the fading is considered to be selective.
->Original cellular telephone networks provided analog traffic channels, these are now referred to as first generation
system.
->Most common first generation system in north America has been Advanced mobile phone service(AMPS)
developed by AT&T.
System uses 2 separate analog channels, one for forward(BS to mobile station) communication and one
for reverse(mobile station to BS) communication.
->Each band is divided into 832 channels 21 out of 832 channels are used for control.
->AMPS has frequency reuse factor of 7, this means only one-seventh of these 395 traffic channels are
actually available in a cell.
Transmission:
-> AMPS uses FM and FSK for modulation.
->Voice channels are modulated using FM and control channels use FSK to create 30KHz analog signals
for this AMPS uses FDMA to divide each 25MHz band into 30KHz channels.
Operation:
->Each AMPS-capable cellular telephone includes a numeric assignment module (NAM) in read-only memory.
->NAM contains the telephone number of the phone, which is assigned by the service provider, and the serial number
of the phone, which is assigned by the manufacturer.
->When the phone is turned on, it transmits its serial number and phone number to the MTSO.
i) Subscriber initiates a call by keying in the telephone number of the called party and presses the send
key.
ii) MTSO verifies that the telephone number is valid and that the user is authorized to place the call; some service
providers require the user to enter a PIN (personal identification number) as well as the called number to counter
theft.
iii) MTSO issues a message to the user’s cell phone indicating which traffic channels to use.
v) When the called party answers, the MTSO establishes a circuit between the two parties and initiates
billing information.
vi) When one party hangs up, the MTSO releases the circuit, frees the radio channels, and completes the
billing information.
->Second generation systems provide higher quality signals, higher data rates for support of digital
services, and greater capacity.
->The most notable difference between the two generations is that first-generation systems are almost
purely analog, whereas second-generation systems are digital.
->First generation systems are designed to support voice channels using FM whereas Second generation
systems provide digital traffic channels which readily support digital data.
ii) Encryption:
->User and control traffic is digitized in second generation systems, so it is simple matter to encrypt all
traffic to prevent eavesdropping whereas first-generation systems send user traffic the clear, providing no
security.
->2G uses time division multiple access (TDMA) or code division multiple access (CDMA).
->For full-duplex communication, a mobile unit uses both reverse and forward channels.
->CDMA for cellular systems uses direct-sequence spread spectrum (DS-SS), which uses a chipping code
to increase the data rate of the transmission, resulting in an increased signal bandwidth.
->Multiple access is provided by assigning orthogonal chipping codes to multiple users, so that the
receiver can recover the transmission of an individual unit from multiple transmissions.
Advantages of CDMA:
i) Frequency diversity:
-> Because the transmission is spread out over a larger bandwidth, frequency-dependent transmission
impairments, such as noise bursts and selective fading, have less effect on the signal.
->Chipping codes used for CDMA not only exhibit low cross correlation but also low autocorrelation.
Therefore, a version of the signal that is delayed by more than one chip interval does not interfere with the
dominant signal as much as in other multipath environments.
iii) Privacy:
->With CDMA, as more users access the system simultaneously, the noise level and hence the error rate increases;
only gradually does the system degrade to the point of an unacceptable error rate.
Drawbacks of CDMA:
i) Self-jamming:
->Unless all of the mobile users are perfectly synchronized, the arriving transmissions from multiple users will
not be perfectly aligned on chip boundaries.
->Thus the spreading sequences of the different users are not orthogonal and there is some level of cross
correlation.
->In TDMA or FDMA, there is reasonable gap (guard bands of frequency or time) therefore received signals are
orthogonal or nearly so.
-> Signals closer to the receiver are received with less attenuation than signals farther away.
->The objective of the third generation (3G) of wireless communication is to provide fairly high-speed
wireless communications to support multimedia, data, and video in addition to voice.
3G capabilities:
->Alternative schemes that have been adopted as part of IMT 2000 which covers a set of radio interfaces for
optimized performance in different radio environments.
fully exploits CDMA technology to provide high data rates with efficient use of bandwidth.
iii) TD-CDMA
Bluetooth:
->Bluetooth is a wireless LAN technology designed to connect devices of different functions
network is formed spontaneously; the devices, sometimes called gadgets, find each
->Bluetooth LAN network cannot be large. If there are many gadgets that try to connect, there is chaos.
Applications:
mouse or keyboard can communicate with the computer through this technology.
ii) Monitoring devices can communicate with sensor devices in a small health care center.
iii) Home security devices can use this technology to connect different sensors to the main security
controller.
iv) Conference attendees can synchronize their laptop computers at a conference.
->Bluetooth technology is the implementation of a protocol defined by the IEEE 802.15 standard which
defines a wireless personal-area network (PAN) operable in an area the size of a room or a hall.
Architecture:
i) piconet
ii)scatternet
i) Piconet:
-> A piconet can have up to eight stations, one of which is called the primary and the rest are called
secondaries.
-> All the secondary stations synchronize their clocks with primary.
-> communication between the primary and the secondary can be one-to-one or one-to-many.
-> A secondary in a parked state is synchronized with the primary, but cannot take part in communication
until it is moved from the parked state.(only eight stations can be active in a piconet)
ii) Scatternet:
-> Secondary station in one piconet can be the primary in another piconet.
-> This station can receive messages from the primary in the first piconet (as a secondary) and, acting as
a primary, deliver them to secondaries in the second piconet.
Bluetooth Devices:
-> There is a possibility of interference between the IEEE 802.11b wireless LANs and Bluetooth LANs.
Bluetooth Layers:
-> Bluetooth uses several layers that do not exactly match those of the Internet model.
i) Radio Layer:
-> Bluetooth uses a 2.4-GHz ISM band divided into 79 channels of 1 MHz each.
-> Bluetooth uses the frequency-hopping spread spectrum (FHSS) method in the physical
-> To transform bits to a signal, Bluetooth uses a sophisticated version of FSK, called
-> access method is TDMA, The primary and secondary communicate with
-> communication is only between the primary and a secondary; secondaries cannot communicate
directly with one another.
-> TDMA: Bluetooth uses a form of TDMA that is called TDD-TDMA (timedivision duplex TDMA).
-> TDD-TDMA is a kind of half-duplex communication in which the secondary and receiver send and
receive data, but not at the same time (halfduplex).
-> Bluetooth hops 1600 times/second , therefore each device changes its modulation frequency 1600
times/second.
-> Device uses frequency for only 625 microseconds(1/1600 sec) before it hops to another frequency.
Physical links:
-> SCO used when avoiding delay in data delivery is more important than error free delivery(integrity).
Frame format:
(i) One-slot
(ii) Three-slot
(iii) Five-slot
iii) L2CAP:
-> Logical Link Control and Adaptation Protocol, or L2CAP (L2 here means LL).
(a) Multiplexing
(b) Segmentation
(c) Reassembly
(d) QOS(quality of service)
(e) Group management
WIRELESS LANs:
-> Wireless LANs were less used until relatively because of high prices,low data rates,occupational safety
concerns and licensing requirement.
-> As these problems have been addressed popularity of wireless LANs has grown rapidly.
Applications:
(a) LAN extension
(b) Cross-Building Interconnect
(c) Nomadic Access
(d) Ad Hoc Networking
-> However, this motivation for wireless LANs was overtaken by events.
(i)as awareness of the need for LANs became greater,architects designed new buildings to include
extensive prewiring for data applications.
(ii)with advances in data transmission technology, there is an increasing reliance on twisted pair cabling
for LANs and, in particular, Category 3 and Category 5 unshielded twisted pair.
(iii)Thus, the use of a wireless LAN to replace wired LANs has not happened to any
great extent.
-> Nomadic access provides a wireless link between a LAN hub and a mobile data terminal equipped with
an antenna, such as a laptop computer or notepad computer.
-> An ad hoc network is a peer-to-peer network (no centralized server) set up temporarily to meet some
immediate need.
-> For example, a group of employees, each with a laptop or palmtop computer, may convene in a
conference room for a business or classroom meeting.
-> The employees link their computers in a temporary network just for the duration of the meeting.
-> In number of environments,there is a role for wireless LAN as alternative to wired LAN.
Example:
(i) Building with large open areas such as manufacturing plants,stock exchange trading floors and
warehouses.
(ii) Historical buildings with insufficient twisted pair of wire and where drilling for new wiring is prohibited.
(iii) Small offices where installation and maintenance of wired LANs is not economical.
1) Throughput: medium access control (MAC) protocol should make as efficient use as possible of the
wireless medium to maximize capacity.
2) Number Of Nodes: support hundreds of nodes across multiple cells.
3) Connection to backbone LAN: For infrastructure wireless LANs, this is easily accomplished through the
use of control modules that connect to both types of LANs.
4) Service Area: A typical coverage area for a wireless LAN has a diameter of 100 to 300 m.
5) Battery Power Consumption: Mobile workers use battery-powered workstations that need to have a
long battery life when used with wireless adapters.
Typical wireless LAN implementations have features to reduce power consumption while not using the
network, such as a sleep mode.
6) Transmission robustness and security: design of a wireless LAN must permit reliable transmission
even in a noisy environment and should provide some level of security from eavesdropping.
7) Collocated network operation: when two or more wireless LANs to operate in the same area or in some
area where interference between the LANs is possible. Such interference may disturb the normal
operation of a MAC algorithm and may allow unauthorized access to a particular LAN.
8) License-free operation: Users would prefer to buy and operate wireless LAN products without having to
secure a license for the frequency band used by the LAN.
9) Handoff/roaming: The MAC protocol used in the wireless LAN should enable mobile stations to move
from one cell to another.
10) Dynamic configuration: The MAC addressing and network management aspects of the LAN should
permit dynamic and automated addition, deletion, and relocation of end systems without disruption to
other users.
-> Wireless LANs are generally categorized according to the transmission technique that is used.
-> An individual cell of an IR LAN is limited to a single room, because infrared light does not penetrate
opaque walls.
-> Optical wireless communication in the infrared portion of the spectrum is commonplace in most homes,
where it is used for a variety of remote control devices.
-> The two competing transmission media for wireless LANs are microwave radio using either spread
spectrum or narrow band transmission,infrared.
(a) spectrum for infrared is virtually unlimited, which presents the possibility of achieving extremely high
data rates. The infrared spectrum is unregulated worldwide.
(b) infrared shares some properties of visible light that make it attractive for certain types of LAN
configurations.
-> Infrared light is diffusely reflected by light-colored objects; thus it is possible to use ceiling reflection to
achieve coverage of an entire room.
-> Infrared light does not penetrate walls or other opaque objects.
1) infrared communications can be more easily secured against eavesdropping than microwave.
2) separate infrared installation can be operated in every room in a building without interference, enabling
the construction of very large infrared LANs.
-> Infrared data transmission typically uses intensity modulation, so that IR receivers need to detect only
the amplitude of optical signals, whereas most microwave receivers must detect frequency or phase.
Transmission Techniques:
1) Directed-beam IR:
->used to create point-to-point links.
->range depends on the emitted power and on the degree of focusing.( remote TV control)
2) Omnidirectional configuration:
-> involves a single base station that is within ine of sight of all other stations on the LAN.
3) Diffused configuration:
-> all of the IR transmitters are focused and aimed at a point on a diffusely reflecting ceiling. IR radiation
striking the ceiling is reradiated omnidirectionally and picked up by all of the receivers in the area.
-> This type of LAN makes use of spread spectrum transmission technology.
-> Except for quite small offices, a spread spectrum wireless LAN makes use of a multiple-cell
arrangement.
-> Adjacent cells make use of different center frequencies within the same band to avoid interference.
-> Within a given cell, the topology can be either hub or peer to peer.
-> Regardless of access control mechanism,each station may broadcast using an omnidirectional
antenna so that all other stations in cell may receive.
-> A peer-to-peer topology is one in which there is no hub. CSMA is used to control access.
-> Wireless LAN can be usable without having to go through a licensing procedure.
-> Narrowband microwave refers to the use of microwave radio frequency band for signal
transmission,with relatively narrow bandwidth
Unlicensed Narrowband RF
IEEE 802.11
-> IEEE has defined specifications for wireless LAN,called IEEE 802.11,which covers physical and data
link layers.
Architecture:
(i) BSS:
-> It is made of stationary or mobile wireless stations and optional central base station called Access point
(AP).
-> BSS without AP,is stored-alone network and cannot send data to other BSSs.
-> In this case, the BSSs are connected through a distribution system, which is usually a wired
LAN.
-> Communication between 2 stations in 2 different BSSs usually occurs via 2 APs.
Station Types:
-> three types of stations according to IEEE 802.11 based on their mobility in a wireless LAN:
(a) No Transition:
-> Station with no transition mobility is either stationary or moving inside BSS.
(a) DCF:
-> DCF uses CSMAICA as the access method. Wireless LANs cannot implement CSMAfCD for three
reasons:
(i) For collision detection a station must be able to send data and receive collision signals at the same
time.
(ii) Collision may not be detected because of the hidden station problem.
Signal fading could prevent a station at one end from hearing a collision at the other end.
Process Flowchart:
-> Fig shows flowchart for CSMA/CA as used in wireless LANs
DIFS- distributed interframe space
-> AP performs polling for stations that are capable of being polled.
-> stations are polled one after another, sending any data they have to the AP.
-> To give priority to PCF over DCF, another set of interframe spaces has been defined:
-> This means that if, at the same time, a station wants to use only DCF and an AP wants to use PCF, the
AP has priority.
-> Due to the priority of PCF over DCF, stations that only use DCF may not gain access to the medium.
-> To prevent this, a repetition interval has been designed to cover both contention-free (PCF) and
contention-based (DCF) traffic.
-> repetition interval,which is repeated continuously, starts with a special control frame, called a beacon
frame.
-> When the stations hear the beacon frame, they start their NAV for the duration of the contention-free
period of the repetition interval.
-> During the repetition interval, the PC (point controller) can send a poll frame, receive data, send an
ACK, receive an ACK, or do any combination of these.
-> At the end of the contention-free period, the PC sends a CF end (contention-free end) frame to allow
the contention-based stations to use the medium.
-> Fragmentation:
division of a large frame into smaller ones. It is more efficient to resend a small frame than a large one.
Frame Format:
Subfields:
(ii) D- In all frame types except one, this field defines the duration of the transmission that is used to set
the value of NAY.
The meaning of each address field depends on the value of the To DS and From DS subfields
(iv) Sequence control- This field defines the sequence number of the frame to be used in flow control.
(v) Frame body- between 0 and 2312 bytes, contains information based on the type and the subtype
defined in the FC field.
Frame Types:
-> IEEE 802.11 has three categories of frames types for wireless LAN
(i) Management frame- used for initial communication between station and APs
(ii) Control frame- used for accessing channels and acknowledging frames
Control Frames:
-> For control frame value of type field is 01.
Addressing mechanism:
-> The IEEE 802.11 addressing mechanism specifies four cases, defined by the value of the two flags in
the FC field, To DS and From DS.
->In this case, To DS = 0 and From DS = O. This means that the frame is not going to a distribution
system (To DS = 0) and is not coming from a distribution system(from DS=0)
-> frame is going from one station in a BSS to another without passing through the distribution system.
Case 2: 01
Case 3: 10
Case 4: 11
-> This is the case in which the distribution system is also wireless.
-> The frame is going from one AP to another AP in a wireless distribution system.
a wired LAN because the frame in these cases has the format of a wired LAN frame
Physical layer:
->Six Specifications:
-> All implementations, except the infrared, operate in the industrial, scientific,
and medical (ISM) band, which defines three unlicensed bands in the three ranges