CN-1 Module
CN-1 Module
MODULE1
Introduction: Data Communications, Networks, Network Types, Internet History, Standards and
Administration, Networks Models: Protocol Layering, TCP/IP Protocol suite, The OSI model, Introduction
to Physical Layer-1: Data and Signals, Digital Signals, Transmission Impairment, Data Rate limits,
Performance, Digital Transmission: Digital to digital conversion (Only Line coding: Polar, Bipolar and
Manchester coding).
DATA COMMUNICATIONS
Data communication is the exchange of data between two devices via some form of
transmission medium such as a wire cable.
For data communications to occur, the communicating devices must be part of a
communication system made up of a combination of hardware (physical equipment)
and software (programs).
The effectiveness of a data communications system depends on four fundamental
characteristics: delivery, accuracy, timeliness, and jitter.
1. Delivery. The system must deliver data to the correct destination. Data must be
received by the intended device or user and only by that device or user.
2. Accuracy. The system must deliver the data accurately. Data that have been altered in
transmission and left uncorrected are unusable.
3. Timeliness. The system must deliver data in a timely manner. Data delivered late are
useless. In the case of video and audio, timely delivery means delivering data as they
are produced, in the same order that they are produced, and without significant delay.
This kind of delivery is called real-time transmission.
4. Jitter. Jitter refers to the variation in the packet arrival time. It is the uneven delay in
the delivery of audio or video packets. For example, let us assume that video packets
are sent every 30 ms. If some of the packets arrive with 30-ms delay and others with
40-ms delay, an uneven quality in the video is the result.
DATA REPRESENTATION
1. Text
In data communications, text is represented as a bit pattern, a sequence of bits (0s or 1s).
The American Standard Code for Information Interchange (ASCII), developed some
decades ago in the United States, now constitutes the first 127 characters in Unicode and
is also referred to as Basic Latin. Appendix A includes part of the Unicode.
2. Numbers
Numbers are also represented by bit patterns. However, a code such as ASCII is not used
to represent numbers; the number is directly converted to a binary number to simplify
mathematical operations.
3. Images
Images are also represented by bit patterns. In its simplest form, an image is composed of
a matrix of pixels (picture elements), where each pixel is a small dot.
The size of the pixel depends on the resolution. For example, an image can be divided
into 1000 pixels or 10,000 pixels. In the second case, there is a better representation of the
image (better resolution), but more memory is needed to store the image.
After an image is divided into pixels, each pixel is assigned a bit pattern. The size and the
value of the pattern depend on the image. For an image made of only black-and-white
dots (e.g., a chessboard), a 1-bit pattern is enough to represent a pixel. If an image is not
made of pure white and pure black pixels, we can increase the size of the bit pattern to
include gray scale. For example, to show four levels of gray scale, we can use 2-bit
patterns. A black pixel can be represented by 00, a dark gray pixel by 01, a light gray
pixel by 10, and a white pixel by 11.
There are several methods to represent color images. One method is called RGB, so
called because each color is made of a combination of three primary colors: red, green,
and blue. The intensity of each color is measured, and a bit pattern is assigned to it.
Another method is called YCM, in which a color is made of a combination of three other
primary colors: yellow, cyan, and magenta.
4. Audio
Audio refers to the recording or broadcasting of sound or music. Audio is by nature
different from text, numbers, or images. It is continuous, not discrete. Even when we use
a microphone to change voice or music to an electric signal, we create a continuous
signal.
5. Video
Video refers to the recording or broadcasting of a picture or movie. Video can either be
produced as a continuous entity (e.g., by a TV camera), or it can be a combination of
images, each a discrete entity, arranged to convey the idea of motion.
DATA FLOW
Communication between two devices can be simplex, half-duplex, or full-duplex as shown in
Figure 1.2.
1. Simplex
In simplex mode, the communication is unidirectional, as on a one-way street. Only one
of the two devices on a link can transmit; the other can only receive (see Figure 1.2a).
Keyboards and traditional monitors are examples of simplex devices. The keyboard can
only introduce input; the monitor can only accept output.
The simplex mode can use the entire capacity of the channel to send data in one direction.
3. Full-Duplex
In full-duplex mode (also called duplex), both stations can transmit and receive
simultaneously.
The full-duplex mode is like a two-way street with traffic flowing in both directions at the
same time. In full-duplex mode, signals going in one direction share the capacity of the
link with signals going in the other direction.
One common example of full-duplex communication is the telephone network. When two
people are communicating by a telephone line, both can talk and listen at the same time.
The full-duplex mode is used when communication in both directions is required all the
time. The capacity of the channel, however, must be divided between the two directions.
NETWORKS
A network is the interconnection of a set of devices capable for communication. Here a
device can be a host (sometimes called end system) such as a large computer, desktop,
laptop, workstation, cellular phone, or security system.
A device can also be a connecting device such as a router-which connects the network to
other networks, a switch-which connects devices together, a modem (modulator-
demodulator)-which changes the form of data, and so on.
Network Criteria
A network must be able to meet a certain number of criteria. The most important of these
are performance, reliability, and security.
1. Performance
Performance can be measured in many ways, which includes transit time and
response time. Performance is often evaluated by two networking metrics:
throughput and delay.
We often need more throughput and less delay. However, these two criteria are often
contradictory. If we try to send more data to the network, we may increase throughput
but we increase the delay because of traffic congestion in the network.
2. Reliability
Network reliability is measured by the frequency of failure, the time it takes a link to
recover from a failure, and the network’s robustness in a catastrophe.
3. Security
Network security issues include protecting data from unauthorized access, protecting
data from damage and development, and implementing policies and procedures for
recovery from breaches and data losses.
PHYSICAL STRUCTURE
Type of Connection
A network is the collection of two or more devices connected through links. A link is a
communications pathway that transfers data from one device to another.
There are two possible types of connections: point-to-point and multipoint.
1. Point-to-Point
A point-to-point connection provides a dedicated link between two devices.
The entire capacity of the link is reserved for transmission between those two devices.
Most point-to-point connections use an actual length of wire or cable to connect the two
ends, but other options, such as microwave or satellite links, are also possible.
When we change television channels by infrared remote control, we are establishing a
point-to-point connection between the remote control and the television’s control system.
2. Multipoint
A multipoint (also called multidrop) connection is one in which more than two specific
devices share a single link.
In a multipoint environment, the capacity of the channel is shared, either spatially or
temporally. If several devices can use the link simultaneously, it is a spatially shared
connection. If users must take turns, it is a timeshared connection.
Network Topology
Network topology refers to the arrangement of elements in a communication network
such as links, nodes, and so on.
Network topologies are classified into two types: physical and logical:
While logical topology emphasizes the pattern of data transfer between network nodes,
physical topology emphasizes the physical layout of the connected devices and nodes.
Types of Network Topologies In computer networks, there are primarily six types of physical
topology. They are as follows:
1. Bus Topology: The simplest type of topology is called a bus topology, in which network
communication takes place over a single bus or channel. There are numerous taps and drop
lines connected to the bus. Drop Lines are cables that connect the bus to the computer, and taps
are connectors. In other words, each node is connected to a single transmission line.
The following are the benefits of Bus topology:
Easy to install and use.
Economical to implement.
The bus's limited length means that only a certain number of nodes can connect to it.
As messages are broadcast to all nodes, there are more security concerns and risks.
2.Ring Topology: When two computers are connected to form a ring, the topology is known as a ring
topology. The message passing is circular and unidirectional. A fixed amount of time is allotted for
each computer to access the network for transmission in this deterministic network topology. Each
node is a part of a closed loop.
3.Star Topology: A computer network topology known as a star topology connects each node to a
central hub. The hub or switch acts as a bridge between the nodes. Any node making a service request or
offering a service must first get in touch with the hub. The other connected devices function as clients in
a star topology, while the hub and switch serve as a server.
Centralized management.
Simple to scale.
4.Mesh Topology: Mesh technology is a network configuration in which computers are linked to one
another by numerous redundant connections. There are numerous methods for transferring from one
computer to another. It lacks a switch, hub, or any other central computer that acts as a communication
hub.
Mesh topology has the benefits listed below:
Direct communication is facilitated by dedicated links.
Due to each node having its own dedicated path, fault tolerance is good.
Quick communication.
Implementation is expensive.
5.Tree Topology: A computer network topology known as a "tree topology" is one in which all nodes
are either directly or indirectly connected to the main bus cable. Bus and Star topologies are combined
to create tree topology. With a tree topology, the network is split up into manageable segments that can
be easily maintained.
Implementation is difficult.
6.Hybrid Topology: A hybrid topology is a computer topology made up of two or more topologies. All
topologies in this topology are interconnected based on their needs to form a hybrid.
Very Dependable.
Implementation is costly.
NETWORK TYPES
The criteria of distinguishing one type of network from another are difficult and
sometimes confusing. We use a few criteria such as size, geographical coverage, and
ownership to make this distinction.
Point-to-Point WAN
A point-to-point WAN is a network that connects two communicating devices through a
transmission media (cable or air). Figure 1.9 shows an example of a point-to-point WAN.
Internetwork
Today, it is very rare to see a LAN or a WAN in isolation; they are connected to one
another. When two or more networks are connected, they make an internetwork, or
internet.
As an example, assume that an organization has two offices, one on the east coast and the
other on the west coast. Each office has a LAN that allows all employees in the office to
communicate with each other.
To make the communication between employees at different offices possible, the
management leases a point-to-point dedicated WAN from a service provider, such as a
telephone company, and connects the two LANs.
Now the company has an internetwork, or a private internet (with lowercase i).
Communication between offices is now possible. Figure 1.11 shows this internet.
When a host in the west coast office sends a message to another host in the same office,
the router blocks the message, but the switch directs the message to the destination. On
the other hand, when a host on the west coast sends a message to a host on the east coast,
router R1 routes the packet to router R2, and the packet reaches the destination.
PROTOCOL LAYERING
In data communication and networking, a protocol defines the rules that both the sender
and receiver and all intermediate devices need to follow to be able to communicate
effectively.
When communication is simple, we may need only one simple protocol; when the
communication is complex, we may need to divide the task between different layers, in
which case we need a protocol at each layer, or protocol layering.
Scenarios
Let us develop two simple scenarios to better understand the need for protocol layering.
First Scenario
In the first scenario, communication is so simple that it can occur in only one layer.
Assume Maria and Ann are neighbors with a lot of common ideas. Communication
between Maria and Ann takes place in one layer, face to face, in the same language, as
Second Scenario
In the second scenario, we assume that Ann is offered a higher-level position in her
company, but needs to move to another branch located in a city very far from Maria.
They decide to continue their conversation using regular mail through the post office.
However, they do not want their ideas to be revealed by other people if the letters are
intercepted.
They agree on an encryption/decryption technique. The sender of the letter encrypts it to
make it unreadable by an intruder; the receiver of the letter decrypts it to get the original
letter.
Now we can say that the communication between Maria and Ann takes place in three
layers, as shown in Figure 1.13. We assume that Ann and Maria each have three machines
(or robots) that can perform the task at each layer.
At Ann’s side, the first layer machine picks up the letter from Ann’s mail box,
recognizing the letter from Maria by the sender address. The machine takes out the
ciphertext from the envelope and delivers it to the second layer machine.
The second layer machine decrypts the message, creates the plaintext, and passes the
plaintext to the third-layer machine.
The third layer machine takes the plaintext and reads it as though Maria is speaking.
1. Physical Layer
We can say that the physical layer is responsible for carrying individual bits in a frame
across the link.We need to know that the transmission medium does not carry bits; it
carries electrical or optical signals. So the bits received in a frame from the data-link layer
are transformed and sent through the transmission media, but we can think that the logical
unit between two physical layers in two devices is a bit.
2. Data-link Layer
We have seen that an internet is made up of several links (LANs and WANs) connected
by routers.
The routers are responsible for choosing the best links. However, when the next link to
travel is determined by the router, the data-link layer is responsible for taking the
datagram and moving it across the link.
The link can be a wired LAN with a link-layer switch, a wireless LAN, a wired WAN, or
a wireless WAN.
In each case, the data-link layer is responsible for moving the packet through the link.
The data-link layer takes a datagram and encapsulates it in a packet called a frame.
3. Network Layer
The network layer is responsible for creating a connection between the source computer
and the destination computer.
The communication at the network layer is host-to-host. However, since there can be
several routers from the source to the destination, the routers in the path are responsible
for choosing the best route for each packet.
We can say that the network layer is responsible for host-to-host communication and
routing the packet through possible routes.
The network layer in the Internet includes the main protocol, Internet Protocol (IP) that
defines the format of the packet, called a datagram at the network layer. IP also defines
the format and the structure of addresses used in this layer. IP is also responsible for
routing a packet from its source to its destination, which is achieved by each router
forwarding the datagram to the next router in its path. IP is a connectionless protocol that
provides no flow control, no error control, and no congestion control services. This means
that if any of these services is required for an application, the application should rely only
on the transport-layer protocol.
The network layer also has some auxiliary protocols such as Dynamic Host Configuration
Protocol (DHCP), Address Resolution Protocol (ARP) these help IP in its delivery and
routing tasks.
4. Transport Layer
The logical connection at the transport layer is end-to-end. The transport layer at the
source host gets the message from the application layer, encapsulates it in a transport
layer packet (called a segment or a user datagram) and sends it, through the logical
(imaginary) connection, to the transport layer at the destination host.
In other words, the transport layer is responsible for giving services to the application
layer: to get a message from an application program running on the source host and
deliver it to the corresponding application program on the destination host.
The transport layer should be independent of the application layer.
Mrs. Shalet Benvin, Asst. Prof, Dept. of CSE, BGSIT Page 13
Computer Networks and Security 18CS52
In addition, we will see that we have more than one protocol in the transport layer, which
means that each application program can use the protocol that best matches its
requirement.
The main protocol, Transmission Control Protocol (TCP), is a connection-oriented
protocol that first establishes a logical connection between transport layers at two hosts
before transferring data. It creates a logical pipe between two TCPs for transferring a
stream of bytes. TCP provides flow control (matching the sending data rate of the source
host with the receiving data rate of the destination host to prevent overwhelming the
destination), error control (to guarantee that the segments arrive at the destination without
error and resending the corrupted ones), and congestion control to reduce the loss of
segments due to congestion in the network.
The other common protocol, User Datagram Protocol (UDP), is a connectionless protocol
that transmits user datagrams without first creating a logical connection. In UDP, each
user datagram is an independent entity without being related to the previous or the next
one. UDP is a simple protocol that does not provide flow, error, or congestion control.
5. Application Layer
The two application layers exchange messages between each other as though there were a
bridge between the two layers. However, we should know that the communication is done
through all the layers. Communication at the application layer is between two processes
(two programs running at this layer). To communicate, a process sends a request to the
other process and receives a response. Process-to-process communication is the duty of
the application layer.
The Hypertext Transfer Protocol (HTTP) is a vehicle for accessing the World Wide Web
(WWW). The Simple Mail Transfer Protocol (SMTP) is the main protocol used in
electronic mail (e-mail) service. The File Transfer Protocol (FTP) is used for transferring
files from one host to another.
Addressing
It is worth mentioning another concept related to protocol layering in the Internet,
addressing. As we discussed before, we have logical communication between pairs of
layers in this model.
Any communication that involves two parties needs two addresses: source address and
destination address. Although it looks as if we need five pairs of addresses, one pair per
layer, we normally have only four because the physical layer does not need addresses; the
unit of data exchange at the physical layer is a bit, which definitely cannot have an
address. Figure 1.17 shows the addressing at each layer.
The OSI model is a layered framework for the design of network systems that allows
communication between all types of computer systems.
It consists of seven separate but related layers, each of which defines a part of the process
of moving information across a network (see Figure 1.18).
DIGITAL SIGNALS
Digital data can be represented as digital signal.
For example, a 1 can be encoded as a positive voltage and a 0 as zero voltage.
A digital signal can have more than two levels. In this case, we can send more than 1 bit
for each level.
Figure 1.22 shows two signals, one with two levels and the other with four.
We send 1 bit per level in part a of the figure and 2 bits per level in part b of the figure.
Figure 1.22 Two digital signals: one with two signal levels and the other with four signal levels
Example 1
A digital signal has eight levels. How many bits are needed per level? We calculate the number of
bits from the following formula. Each signal level is represented by 3 bits.
Solution:
Number of bits per level = log28 = 3
Example 2
A digital signal has nine levels. How many bits are needed per level?
Solution:
Each signal level is represented by 3.17 bits. However, this answer is not realistic. The number of
bits sent per level needs to be an integer as well as a power of 2. For this example, 4 bits can
represent one level.
Bit Rate
The bit rate is the number of bits sent in 1s, expressed in bits per second (bps).
Example 3
Assume we need to download text documents at the rate of 100 pages per second. What is the
required bit rate of the channel?
Solution
A page is an average of 24 lines with 80 characters in each line. If we assume that one character
requires 8 bits, the bit rate is
100 * 24 * 80 * 8 = 1,536,000 bps = 1.536 Mbps
Example 4
A digitized voice channel is made by digitizing a 4-kHz bandwidth analog voice signal. We need
to sample the signal at twice the highest frequency (two samples per hertz). We assume that each
sample requires 8 bits. What is the required bit rate?
Solution
The bit rate can be calculated as
2 * 4000 * 8 = 64,000 bps = 64 kbps
Bit Length
The bit length is the distance one bit occupies on the transmission medium.
Bit length = propagation speed * bit duration
TRANSMISSION IMPAIRMENT
Signals travel through transmission media, which are not perfect.
The imperfection causes signal impairment.
This means that the signal at the beginning of the medium is not the same as the signal at
the end of the medium.
What is sent is not what is received.
Three causes of impairment are attenuation, distortion, and noise (figure 1.23).
1. Attenuation
Attenuation means a loss of energy.
When a signal, simple or composite, travels through a medium, it loses some of its energy
in overcoming the resistance of the medium.
That is why a wire carrying electric signals gets warm, if not hot, after a while. Some of
the electrical energy in the signal is converted to heat.
To compensate for this loss, amplifiers are used to amplify the signal.
Figure 1.24 shows the effect of attenuation and amplification.
Decibel
The decibel (dB) measures the relative strengths of two signals or one signal at two
different points.
Note that the decibel is negative if a signal is attenuated and positive if a signal is
amplified.
Example 5
Suppose a signal travels through a transmission medium and its power is reduced to one-half.
Calculate the attenuation?
Solution:
Example 5
A signal travels through an amplifier, and its power is increased 10 times. This means that P2
=10P1. Calculate attenuation?
Solution:
Example 6
The loss in a cable is usually defined in decibels per kilometer (dB/km). If the signal at the
beginning of a cable with -0.3 dB/km has a power of 2 mW, what is the power of the signal at 5
km?
Solution:
The loss in the cable in decibels is 5 * (-0.3) = -1.5 dB. We can calculate the power as
2. Distortion
Distortion means that the signal changes its form or shape.
Distortion can occur in a composite signal made of different frequencies.
Each signal component has its own propagation speed through a medium and, therefore,
its own delay in arriving at the final destination.
Differences in delay may create a difference in phase if the delay is not exactly the same
as the period duration.
3. Noise
Noise is another cause of impairment.
Several types of noise, such as thermal noise, induced noise, crosstalk, and impulse noise,
may corrupt the signal.
Thermal noise is the random motion of electrons in a wire, which creates an extra signal
not originally sent by the transmitter.
Induced noise comes from sources such as motors and appliances. These devices act as a
sending antenna, and the transmission medium acts as the receiving antenna.
Crosstalk is the effect of one wire on the other. One wire acts as a sending antenna and
the other as the receiving antenna.
Impulse noise is a spike (a signal with high energy in a very short time) that comes from
power lines, lightning, and so on.
Because SNR is the ratio of two powers, it is often described in decibel units, SNRdB,
defined as
Example 7
The power of a signal is 10 mW and the power of the noise is 1 W; what are the values of SNR
and SNRdB?
Solution
The values of SNR and SNRdB can be calculated as follows:
Example 8
The values of SNR and SNRdB for a noiseless channel are
Example 9
A signal with 200 milliwatts power passes through 10 devices, each with an average noise of 2
microwatts. What is the SNR? What is the SNRdB?
Solution
Total noise in the chnnel is 2 W * 10 = 20 W
SNR = (200 * 10-3)/(20 * 10 -6)
SNR = 10000
SNRdB = 10 * log1010000 = 10 * 4 = 40 dB
Example 10
If the peak voltage value of a signal is 20 times the peak voltage value of the noise, what is the
SNR? What is the SNRdB?
Solution
Where bandwidth is the bandwidth of the channel, L is the number of signal levels used
to represent data, and BitRate is the bit rate in bits per second.
Example 11
Consider a noiseless channel with a bandwidth of 3000 Hz transmitting a signal with two signal
levels. What is maximum bit rate?
Solution:
BitRate = 2 * 3000 * log22 = 6000 bps
Example 12
Consider the same noiseless channel transmitting a signal with four signal levels (for each level,
we send 2 bits). What is maximum bit rate?
Solution:
BitRate = 2 * 3000 * log24 = 12,000 bps
Where bandwidth is the bandwidth of the channel, SNR is the signal-to-noise ratio, and
capacity is the capacity of the channel in bits per second.
Example 12
Consider an extremely noisy channel in which the value of the signal-to-noise ratio is almost zero.
Calculate Channel Capacity.
Solution:
Example 13
A telephone line normally has a bandwidth of 3000 Hz (300 to 3300 Hz) assigned for data
communications. The signal-to-noise ratio is usually 3162. What is the channel capacity?
Solution:
Example 14
Assume that SNRdB 5 36 and the channel bandwidth is 2 MHz. What is the theoretical channel
capacity?
Solution:
Example 13.
What is the theoretical capacity of a channel in each of the following cases?
a. Bandwidth: 20 KHz SNRdB = 40
b. Bandwidth: 200 KHz SNRdB = 4
c. Bandwidth: 1 MHz SNRdB = 20
Solution:
(Practice Question)
PERFORMANCE
One important issue in networking is the performance of the network—how good is it? Following
metrics are used to know the performance of the network.
1. Bandwidth
One characteristic that measures network performance is bandwidth. However, the term
can be used in two different contexts with two different measuring values: bandwidth in
hertz and bandwidth in bits per second.
Higher the bandwidth betters the performance of the network.
2. Throughput
The throughput is a measure of how fast we can actually send data through a network.
A link may have a bandwidth of B bps, but we can only send T bps through this link with
T always less than B.
For example, we may have a link with a bandwidth of 1 Mbps, but the devices connected
to the end of the link may handle only 200 kbps. This means that we cannot send more
than 200 kbps through this link.
Example 14
A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per minute
with each frame carrying an average of 10,000 bits. What is the throughput of this network?
Solution
We can calculate the throughput as
Throughput = (12,000 * 10,000) / 60 = 2000000 = 2 Mbps
3. Latency (Delay)
The latency or delay defines how long it takes for an entire message to completely arrive
at the destination from the time the first bit is sent out from the source.
We can say that latency is made of four components: propagation time, transmission time,
queuing time and processing delay.
Propagation Time
Propagation time measures the time required for a bit to travel from the source to the
destination. The propagation time is calculated by dividing the distance by the
propagation speed.
Example 15
What is the propagation time if the distance between the two points is 12,000 km? Assume the
propagation speed to be 2.4 × 108 m/s in cable.
Solution
We can calculate the propagation time as
Propagation time = (12,000 * 10,000) / (2.4 * 28) = 50 ms
Transmission Time
In data communications we don’t send just 1 bit, we send a message.
The first bit may take a time equal to the propagation time to reach its destination; the last
bit also may take the same amount of time.
However, there is a time between the first bit leaving the sender and the last bit arriving at
the receiver.
The first bit leaves earlier and arrives earlier; the last bit leaves later and arrives later.
The transmission time of a message depends on the size of the message and the
bandwidth of the channel.
Example 16
What are the propagation time and the transmission time for a 2.5-KB (kilobyte) message (an
email) if the bandwidth of the network is 1 Gbps? Assume that the distance between the sender
and the receiver is 12,000 km and that light travels at 2.4 × 108 m/s.
Solution
We can calculate the propagation and transmission time as
Propagation time = (12,000 * 1000) / (2.4 * 108) = 50 ms
Transmission time = (2500 * 8) / 109 = 0.020 ms
Queuing Time
The third component in latency is the queuing time, the time needed for each
intermediate or end device to hold the message before it can be processed.
The queuing time is not a fixed factor; it changes with the load imposed on the network.
4. Bandwidth-Delay Product
Bandwidth and delay are two performance metrics of a link.
Example 17
How many bits can fit on a link with a 2 ms delay if the bandwidth of the link is
a. 1 Mbps? b. 10 Mbps? c. 100 Mbps?
Solution:
a. Number of Bits = delay * bandwidth = 2 * 10-3 * 1 * 106 = 2 * 103 = 2000 bits
b. and c. (Practice questions)
5. Jitter
DIGITAL-TO-DIGITAL CONVERSION
Digital data to digital signals conversion involves three techniques: line coding, block
coding, and scrambling.
Line coding is always needed; block coding and scrambling may or may not be needed.
1. Line Coding
Line coding is the process of converting digital data to digital signals.
Line coding converts a sequence of bits to a digital signal. At the sender, digital data are
encoded into a digital signal; at the receiver, the digital data are recreated by decoding the
digital signal.
Figure 1.29 shows the process.
Advantages
The advantages of Unipolar NRZ are −
It is simple.
A lesser bandwidth is required, B=N/2, where N is data rate.
Disadvantages
The disadvantages of Unipolar NRZ are −
No error correction done.
Suffers from DC components.
No clock is present, leads to no self synchronization (Especially for long strings of 1s and
0s).
POLAR SCHMES
In polar schemes, the voltages are on both sides of the time axis. For example, the
voltage level for 0 can be positive and the voltage level for 1 can be negative.
Advantages
The advantages of Polar NRZ are −
It is simple.
A lesser bandwidth is required, B=N/2, where N is data rate.
Disadvantages
The disadvantages of Polar NRZ are −
No error correction.
No clock is present leads to no self synchronization.
Suffers from DC components.
Polar RZ scheme
The main problem with NRZ encoding occurs when the sender and receiver clocks are
not synchronized.
The receiver does not know when one bit has ended and the next bit is starting. One
solution is the return-to-zero (RZ) scheme, which uses three values: positive, negative,
and zero.
In RZ, the signal changes not between bits but during the bit.
In Figure 1.33 we see that the signal goes to 0 in the middle of each bit. It remains there
until the beginning of the next bit.
Advantages
The advantages of Polar RZ are −
It is simple.
Disadvantages
The disadvantages of Polar RZ are −
High bandwidth is required, B=N, where N is data rate.
No error correction.
No clock is present leads to no self synchronization.
Suffers from DC components.
Differential Manchester, on the other hand, combines the ideas of RZ and NRZ-I.
There is always a transition at the middle of the bit, but the bit values are determined at
the beginning of the bit. If the next bit is 0, there is a transition; if the next bit is 1, there is
none.
Figure 1.34 shows both Manchester and differential Manchester encoding.
Advantages
The advantages of Biphase are −
It is simple.
Self synchronization.
No DC components.
Disadvantages
The disadvantages of Polar RZ are −
High bandwidth is required, B=N, where N is data rate.
No error correction.
BIPOLAR SCHMES
In bipolar encoding (sometimes called multilevel binary), there are three voltage levels:
positive, negative, and zero. The voltage level for one data element is at zero, while the
voltage level for the other element alternates between positive and negative.
AMI means alternate 1 inversion. A neutral zero voltage represents binary 0. Binary 1s
are represented by alternating positive and negative voltages.
A variation of AMI encoding is called pseudoternary in which the 1 bit is encoded as a
zero voltage and the 0 bit is encoded as alternating positive and negative voltages.
Advantages
Following are the advantages −
It is simple.
Occupies low bandwidth, B=N, where N is data rate.
A single error detection capability is present in this.
Disadvantages
Following are the disadvantages −
High bandwidth is required, B=N, where N is data rate.
No clock is present leads to no self synchronization.
Suffers from DC components.