Professional Documents
Culture Documents
BSC VI Sem CN Unit I
BSC VI Sem CN Unit I
BSC VI Sem CN Unit I
UNIT – I
INTRODUCTION
(b) Computers can have fax system integrated with them. This allows them to send
pictures along with the text. Thus the newspaper reports can be prepared and sent
all over the world at a very high speed by composing and publishing them from
different centers.
(c) The time taken to transmit the messages is very small. Hence different
computers can be connected together and the users can work together as a
1
group. Software packages have been developed for group working in Data Base
Management (DBMS) and graphic works.
Data Communication:
Data Communication is defined as the exchange of data between two devices via
some form of transmission medium such as a wire cable. The communicating
devices must be a part of a communication system made up of a combination of
hardware ( physical equipment) and software (programs).
Timeliness: The system must deliver data in a timely manner. Data delivered late
are useless. Timely delivery means delivering data as they are produced, in the
same order that they are produced, and without significant delay. This kind of
delivery is called real –time transmission.
Components:
The components of a data communication are Message, Sender, Receiver,
Medium and Protocol
2
Message: The message is the information to be communicated. It can consist of
text, pictures, numbers, sound, video or audio .
Sender: The sender is the device that sends the data message. It can be a
computer or workstation telephone handset, video camera and so on..
Receiver: The receiver is the device that receives the message. It can be a
computer or workstation telephone handset, video camera and so on..
Medium: The transmission medium is the physical path by which a message travels
from sender to receiver. It could be a twisted pair wire , coaxial cable, fiber optic
cable, or radio waves.
Data representation.
Information comes in different forms such as text, numbers, images, audio and
video.
Text.
Text is represented as a bit pattern,
The number of bits in a pattern depends on the number of symbols in the language.
Different sets of bit patterns have been designed to represent text symbols. Each set
is called a code. The process of representing the symbols is called coding.
ASCII
The American National Standards Institute developed a code called the American
Standard code for Information Interchange .This code uses 7 bits for each
symbol.
Extended ASCII
To make the size of each pattern 1 byte(8 bits),the ASCII bit patterns are augmented
with an extra 0 at the left.
Unicode
To represent symbols belonging to languages other than English, a code with much
greater capacity is needed. Unicode uses 16 bits and can represent up to 65,536
symbols.
ISO
The international organization for standardization known as ISO has designed a
code using a 32 – bit pattern. This code can represent up to 4,294,967,296 symbols.
Numbers
Numbers are also represented by using bit patterns. ASCII is not used to represent
numbers. The number is directly converted to a binary number.
Images
3
Images are also represented by bit patterns. An image is divided into a matrix of
pixels, where each pixel is a small dot. Each pixel is assigned a bit pattern. The size
and value of the pattern depends on the image. The size of the pixel depends on
what is called the resolution.
Audio
Audio is a representation of sound. Audio is by nature different from text, numbers or
images. It is continuous not discrete
Video
Video can be produced either a continuous entity or it can be a combination of
images.
SIMPLEX Mode
In this type of transmission mode, data can be sent only in one direction i.e.
communication is unidirectional. We cannot send a message back to the sender.
Unidirectional communication is done in Simplex Systems where we just need to
send a command/signal, and do not expect any response back.
Examples of simplex Mode are loudspeakers, television broadcasting, television and
remote, keyboard and monitor etc.
4
FULL DUPLEX Mode
In full duplex system we can send data in both the directions as it is
bidirectional at the same time in other words, data can be sent in both
directions simultaneously.
Example of Full Duplex is a Telephone Network in which there is communication
between two persons by a telephone line, using which both can talk and listen at the
same time.
In full duplex system there can be two lines one for sending the data and the
other for receiving data.
Network: Definition :
Uses of networks
5
Line Configuration in Computer Networks (Type of connection)
A Network is nothing but a connection made through connection links between two
or more devices. Devices can be a computer, printer or any other device that is
capable to send and receive data. There are two ways to connect the devices :
1. Point-to-Point connection
2. Multipoint connection
Point-To-Point Connection
It is a protocol which is used as a communication link between two devices. It is
simple to establish. The most common example for Point-to-Point connection (PPP)
is a computer connected by telephone line. We can connect the two devices by
means of a pair of wires or using a microwave or satellite link.
Example: Point-to-Point connection between remote control and Television for
changing the channels.
MultiPoint Connection
It is also called Multidrop configuration. In this connection two or more devices share
a single link.
There are two kinds of Multipoint Connections :
If the links are used simultaneously between many devices, then it is spatially
shared line configuration.
If user takes turns while using the link, then it is time shared (temporal) line
configuration.
6
Topologies:
Physical Topology refers to the way in which network is laid out physically. Two or
more links form a topology. The topology of a network is the geometric
representation of the relationship of all the links and the linking devices tone another.
BUS Topology
Bus topology is a network type in which every computer and network device is
connected to single cable. When it has exactly two endpoints, then it is called Linear
Bus topology.
RING Topology
It is called ring topology because it forms a ring as each computer is connected to
another computer, with the last one connected to the first. Exactly two neighbours for
each device.
7
Features of Ring Topology
1. A number of repeaters are used for Ring topology with large number of nodes,
because if someone wants to send some data to the last node in the ring
topology with 100 nodes, then the data will have to pass through 99 nodes to
reach the 100th node. Hence to prevent data loss repeaters are used in the
network.
2. The transmission is unidirectional, but it can be made bidirectional by having 2
connections between each Network Node, it is called Dual Ring Topology.
3. In Dual Ring Topology, two ring networks are formed, and data flow is in
opposite direction in them. Also, if one ring fails, the second ring can act as a
backup, to keep the network up.
4. Data is transferred in a sequential manner that is bit by bit. Data transmitted,
has to pass through each node of the network, till the destination node.
Advantages of Ring Topology
1. Transmitting network is not affected by high traffic or by adding more nodes,
as only the nodes having tokens can transmit data.
2. Cheap to install and expand
Disadvantages of Ring Topology
1. Troubleshooting is difficult in ring topology.
2. Adding or deleting the computers disturbs the network activity.
3. Failure of one computer disturbs the whole network.
STAR Topology
In this type of topology all the computers are connected to a single hub through a
cable. This hub is the central node and all others nodes are connected to the central
node.
8
1. Fast performance with few nodes and low network traffic.
2. Hub can be upgraded easily.
3. Easy to troubleshoot.
4. Easy to setup and modify.
5. Only that node is affected which has failed, rest of the nodes can work
smoothly.
Disadvantages of Star Topology
1. Cost of installation is high.
2. Expensive to use.
3. If the hub fails then the whole network is stopped because all the nodes
depend on the hub.
4. Performance is based on the hub that is it depends on its capacity
MESH Topology
It is a point-to-point connection to other nodes or devices. All the network nodes are
connected to each other. Mesh has n(n-1)/2 physical channels to link n devices.
There are two techniques to transmit data over the Mesh topology, they are :
1. Routing
2. Flooding
9
Advantages of Mesh Topology
1. Each connection can carry its own data load.
2. It is robust.
3. Fault is diagnosed easily.
4. Provides security and privacy.
Disadvantages of Mesh Topology
1. Installation and configuration is difficult.
2. Cabling cost is more.
3. Bulk wiring is required.
TREE Topology
It has a root node and all other nodes are connected to it forming a hierarchy. It is
also called hierarchical topology. It should at least have three levels to the hierarchy.
HYBRID Topology
It is two different types of topologies which is a mixture of two or more topologies.
For example if in an office in one department ring topology is used and in another
star topology is used, connecting these topologies will result in Hybrid Topology (ring
topology and star topology).
10
Features of Hybrid Topology
1. It is a combination of two or topologies
2. Inherits the advantages and disadvantages of the topologies included
Advantages of Hybrid Topology
1. Reliable as Error detecting and trouble shooting is easy.
2. Effective.
3. Scalable as size can be increased easily.
4. Flexible.
Disadvantages of Hybrid Topology
1. Complex in design.
2. Costly.
Categories of Network
The three primary categories are of network are Local Area Network (LAN),
Metropolitan Area Network (MAN), and Wide Area Network(WAN). The category into
which a network fall is determined by its size, ownership, the distance it covers and
its physical architecture.
LAN
A LAN is usually privately owned and links the devices in a single office, building or
campus.
A LAN can be as simple as two PCs or it can extend throughout a company. LAN
size is limited to a few kilometers. The most widely used LAN system is the Ethernet
system developed by the Xerox Corporation.
It is designed to allow resources (hardware , software or data) to be shared between
PC’s or workstations. It may be used to provide a (shared) access to remote
organizations through a router connected to a Metropolitan Area Network (MAN) or a
Wide Area Network (WAN).
One of the computers may be given a large capacity disk drive and may become a
server to other clients. Software can be stored on this server and used by the whole
group.
11
The size of the LAN may be determined by the licensing restrictions on the numbers
per copy of software. or the number of users licensed to access the operating
system.
Also differentiated from other types of network by transmission media and topology.
12
Internetwork
When two or more networks are connected they become an internetwork or internet
Protocols
A protocol is a set of rules that governs data communication. It defines what is
communicated, how it is communicated, and when it is communicated. The key
elements of a protocol are syntax, semantics and timing
Syntax
It refers to the structure or format of the data. This refers the order in which the data
are presented.
Example
The first 8 bits of data to be the address of the sender.
The second 8 bits to be the address of the receiver.
The rest of the stream may be the message itself
Semantics
It refers to the meaning of each section of bits. How a particular pattern to be
interpreted
13
What action is to be taken based on that interpretation
Example
An address specifies the route to be taken or the final destination of the message.
Timing
It refers to two characteristics
When data should be sent and how fast they can be sent.
Example
If a sender produces data at 100 Mbps and the receiver process data at only 1
Mbps, it will overload the receiver and data will be lost.
Standards
Why do we need standards ?
To create and maintain an open and competitive market for equipment
manufacturers
To guarantee national and international interoperability of data,
telecommunication technology and process
To give a fixed quality and product to the customer
To allow the same product to be re used again elsewhere
To aid the design and implementation of ideas
To provide guidelines to manufacturers, vendors, government agencies and
other service providers to ensure kind of interconnectivity.
14
It aims to advance theory, creativity, and product quality in the fields of
electrical engineering , electronics radio and in all related branches of
Engineering.
It oversees the development and adoption of international standards for
computing and communications. See http://standards.ieee.org/
EIA, Electronic Industries Association:
It is a nonprofit organization devoted to the promotion of electronics
manufacturing concerns.
Its activities include public awareness education and lobbying efforts in
addition to standards development.
It also made significant contributions by defining physical connection
interfaces and electronic signaling specifications for data communication.
Forums
It work with universities and users to test, evaluate ,and standardize new
technologies.
The forums are able to speed acceptance and use of those technologies in
the telecommunications community.
It present their conclusions to standard bodies.
Regulatory Agencies:
Its purpose is to protect the public interest by regulating radio, television and
wire cable communications.
It has authority over interstate and international commerce as it relates to
communication.
Internet Standards
It is a thoroughly tested specification that is useful to and adhered to by those
who work with the internet.
It is a formalized regulation that must be followed.
A specification begins as an internet draft and attains Internet standard status.
An Internet draft is a working document and it may be published as Request
for Comment(RFC).RFC is edited, assigned a number, and made available to
all interested parties.
Layered architecture:
The OSI model is a layered framework for the design of network systems that allows
communication between all types of computer systems. It consists of seven separate
15
but related layers, each of which defines a part of the process of moving information
across a network
Each layer provides services to the next higher layer and shields the
upper layer from the details implemented in the lower layers.
Each layer appears to be in direct (virtual) communication with its
associated layer on the other computer. Actual communication
between adjacent layers takes place on one computer only.
Layering simplifies design, implementation, and testing. Only the
lowest level (Physical layer) can directly communicate with its peer
communications process into parts.
Peer-to-Peer Processes
The processes on each machine that communicate at a given layer are
called peer-to-peer processes.
At higher layers communication must move down through the layers on
device A aver to device B and then back up through the layers.
Each layer in the sending device adds its own information to the message it
receives from the layer just above it. and passes the whole package to the
layer just below and transferred to the receiving device.
16
Interfaces between layers
The passing of data and network information down through the layers of the
sending device and back up through the layers of the receiving device is made
possible by an interface between each pair of adjacent layers.
Each interface defines what information and services a layer must provide for
the layer above it.
Well defined interfaces and functions provide modularity to a network.
17
Functions of Layers:
Physical Layer
It coordinates the functions required to transmit a bit stream over a
physical medium.
It deals with the mechanical and electrical specifications of the
interface and transmission media.
Mechanical: cable, plugs, pins...
Electrical/optical: modulation, signal strength, voltage levels,
bit times,
It also defines the procedures and functions that physical devices and
interfaces have to perform for transmission to occur
Major responsibilities of Physical layer are
Physical characteristics of interfaces and media:
It defines the characteristics of the interface between the devices and the
transmission media. Also defines the type of transmission medium.
Representation of bits:
To transmit the bits, it must be encoded into electrical or optical
signals. It defines the type of representation how 0s and 1s are
changed to signals.
Data rate:
The number of bits sent each second is also defined by the physical
layer.
Synchronization of bits:
Sender and the receiver must be synchronized at the bit level .i.e the
sender and the receiver clocks must be synchronized.
18
Information flows from top to bottom at the sender and bottom to top at the receiver.
19
Network Layer
The network layer is responsible for source-to-destination delivery of a packet across
multiple networks. It ensures that each packet gets from its point of origin to its final
destination .It does not recognize any relationship between those packets. It treats
each one independently as though each belong to separate message.
The functions of the network layer are
Logical Addressing: If a packet has to cross the network boundary then the
header contains information of the logical addresses of the sender and the
receiver.
Networking: When independent networks or links are connected to create an
internetwork or a large network the connective devices route the packet to the final
destination.
Transport Layer
The network layer is responsible for process-to-process delivery ,that is source to
destination delivery of the entire message.
The responsibilities of Transport layer are
Service-point (port) addressing :Computers run several programs at the same
time. source-to-destination delivery means delivery from a specific process on
one computer to a specific process on the other. The transport layer header
therefore include a type of address called a service – point address.
Segmentation and reassembly: A message is divided into segments and each
segment contains a sequence number. These numbers enable the Transport
layer to reassemble the message correctly upon arriving at the destination.
The packets lost in the transmission is identified and replaced.
Connection control : The transport layer can be either connectionless or
connection-oriented. A connectionless transport layer treats segment as an
independent packet and delivers it to the transport layer. A connection-
oriented transport layer makes a connection with the transport layer at the
destination machine and delivers the packets. After all the data are
transferred the connection is terminated.
Flow control :Flow control at this layer is performed end to end .
Error Control: Error control is performed end to end. At the sending side ,the
transport layer makes sure that the entire message arrives at the receiving
transport layer with out error. Error correction is achieved through
retransmission.
21
Using logical connections makes it easier for us to think about the duty of each layer.
As the figure shows, the duty of the application, transport, and network layers is
end-to-end. However, the duty of the data-link and physical layers is hop-to-
hop, in which a hop is a host or router. In other words, the domain of duty of the
top three layers is the internet, and the domain of duty of the two lower layers
is the link.
Another way of thinking of the logical connections is to think about the data unit
created from each layer. In the top three layers, the data unit (packets) should not be
changed by any router or link-layer switch. In the bottom two layers, the packet
created by the host is changed only by the routers, not by the link-layer switches.
Below figure shows the second principle discussed previously for protocol layering.
We show the identical objects below each layer related to each device.
22
COMPARISION OF OSI AND TCP/IP REFERENCE MODEL
When we compare the two models, we find that two layers, session and
presentation, are missing from the TCP/IP protocol suite. These two layers were not
added to the TCP/IP protocol suite after the publication of the OSI model. The
application layer in the suite is usually considered to be the combination of three
layers in the OSI model.
Two reasons were mentioned for this decision. First, TCP/IP has more than one
transport-layer protocol. Some of the functionalities of the session layer are available
in some of the transport- layer protocols. Second, the application layer is not only
one piece of software. Many Applications can be developed at this layer. If some of
the functionalities mentioned in the session and presentation layers are needed for a
particular application, they can be included in the development of that piece of
software.
23
TRANSMISSION MEDIA:
Transmission media are actually located below the physical layer and are directly
controlled by the physical layer. We could say that transmission media belong to
layer zero. Below figure shows the position of transmission media in relation to the
physical layer.
GUIDED MEDIA:
Guided media, which are those that provide a conduit from one device to another,
include twisted-pair cable, coaxial cable, and fiber-optic cable. A signal traveling
along any of these media is directed and contained by the physical limits of the
medium. Twisted-pair and coaxial cable use metallic (copper) conductors that accept
and transport signals in the form of electric current. Optical fiber is a cable that
accepts and transports signals in the form of light.
Twisted-Pair Cable
A twisted pair consists of two conductors (normally copper), each with its own plastic
insulation, twisted together, as shown in following figure.
24
One of the wires is used to carry signals to the receiver, and the other is used only
as a ground reference. The receiver uses the difference between the two. In addition
to the signal sent by the sender on one of the wires, interference (noise) and
crosstalk may affect both wires and create unwanted signals. If the two wires are
parallel, the effect of these unwanted signals is not the same in both wires because
they are at different locations relative to the noise or crosstalk sources (e.g., one is
closer and the other is farther). This results in a difference at the receiver. By twisting
the pairs, a balance is maintained. For example, suppose in one twist, one wire is
closer to the noise source and the other is farther; in the next twist, the reverse is
true. Twisting makes it probable that both wires are equally affected by external
influences (noise or crosstalk). This means that the receiver, which calculates the
difference between the two, receives no unwanted signals. The unwanted signals
are mostly canceled out. From the above discussion, it is clear that the number of
twists per unit of length (e.g., inch) has some effect on the quality of the cable.
Coaxial Cable
Coaxial cable (or coax) carries signals of higher frequency ranges than those in
twistedpair cable, in part because the two media are constructed quite differently.
Instead of having two wires, coax has a central core conductor of solid or stranded
wire (usually copper) enclosed in an insulating sheath, which is, in turn, encased in
an outer conductor of metal foil, braid, or a combination of the two. The outer metallic
wrapping serves both as a shield against noise and as the second conductor, which
completes the circuit. This outer conductor is also enclosed in an insulating sheath,
and the whole cable is protected by a plastic cover.
Applications
Coaxial cable was widely used in analog telephone networks where a single coaxial
network could carry 10,000 voice signals. Later it was used in digital telephone
networks where a single coaxial cable could carry digital data up to 600 Mbps.
25
However, coaxial cable in telephone networks has largely been replaced today with
fiberoptic cable.
Fiber-Optic Cable
Optical fibers use reflection to guide light through a channel. A glass or plastic core
is surrounded by a cladding of less dense glass or plastic. The difference in density
of the two materials must be such that a beam of light moving through the core is
reflected off the cladding instead of being refracted into it. See below figure.
Propagation Modes
Current technology supports two modes (multimode and single mode) for
propagating light along optical channels, each requiring fiber with different physical
characteristics. Multimode can be implemented in two forms: step-index or graded-
index
Multimode
Multimode is so named because multiple beams from a light source move through
the core in different paths. How these beams move within the cable depends on the
structure of the core.
In multimode step-index fiber, the density of the core remains constant from the
center to the edges. A beam of light moves through this constant density in a straight
26
line until it reaches the interface of the core and the cladding. A second type of fiber,
called multimode graded-index fiber, decreases this distortion of the signal
through the cable. The word index here refers to the index of refraction. As we saw
above, the index of refraction is related to density.
Single-mode uses step-index fiber and a highly focused source of light that limits
beams to a small range of angles, all close to the horizontal. The single-mode fiber
itself is manufactured with a much smaller diameter than that of multimode fiber, and
with substantially lower density (index of refraction). The decrease in density results
in a critical angle that is close enough to 90° to make the propagation of beams
almost horizontal. In this case, propagation of different beams is almost identical,
and delays are negligible. All the beams arrive at the destination "together" and can
be recombined with little distortion to the signal.
Applications
Fiber-optic cable is often found in backbone networks because its wide bandwidth is
cost-effective. Today, with wavelength-division multiplexing (WDM), we can transfer
data at a rate of 1600 Gbps. The SONET network that we discuss in Chapter 14
provides such a backbone.
Some cable TV companies use a combination of optical fiber and coaxial cable, thus
creating a hybrid network. Optical fiber provides the backbone structure while coaxial
cable provides the connection to the user premises. This is a cost-effective
configuration since the narrow bandwidth requirement at the user end does not
justify the use of optical fiber. Local-area networks such as 100Base-FX network
(Fast Ethernet) and 1000Base-X also use fiber-optic cable.
27
Unidirectional light propagation. Propagation of light is unidirectional. If we need
bidirectional communication, two fibers are needed.
- Cost. The cable and the interfaces are relatively more expensive than those of
other guided media. If the demand for bandwidth is not high, often the use of optical
fiber cannot be justified.
Below figure shows the part of the electromagnetic spectrum, ranging from 3 kHz to
900 THz, used for wireless communication. Unguided signals can travel from the
source to the destination in several ways: ground propagation, sky propagation, and
line-of-sight propagation, as shown in below figure.
In ground propagation, radio waves travel through the lowest portion of the
atmosphere, hugging the earth. These low-frequency signals emanate in all
directions from the transmitting antenna and follow the curvature of the planet.
Distance depends on the amount of power in the signal: The greater the power, the
greater the distance.
28
In sky propagation, higher-frequency radio waves radiate upward into the
ionosphere (the layer of atmosphere where particles exist as ions) where they are
reflected back to earth. This type of transmission allows for greater distances with
lower output power.
In line-of-sight propagation, very high-frequency signals are transmitted in straight
lines directly from antenna to antenna.
Radio Waves
Although there is no clear-cut demarcation between radio waves and microwaves,
electromagnetic waves ranging in frequencies between 3 kHz and 1 GHz are
normally called radio waves; waves ranging in frequencies between I and 300 GHz
are called microwaves. However, the behavior of the waves, rather than the
frequencies, is a better criterion for classification. Radio waves, for the most part, are
omnidirectional. When an antenna transmits radio waves, they are propagated in all
directions. This means that the sending and receiving antennas do not have to be
aligned. A sending antenna sends waves that can be received by any receiving
antenna. The omnidirectional property has a disadvantage, too. The radio waves
transmitted by one antenna are susceptible to interference by another antenna that
may send signals using the same frequency or band. Radio waves, particularly those
waves that propagate in the sky mode, can travel long distances. This makes radio
waves a good candidate for long- distance broadcasting such as AM radio.
29
Applications
The omnidirectional characteristics of radio waves make them useful for multicasting,
in which there is one sender but many receivers. AM and FM radio, television,
maritime radio, cordless phones, and paging are examples of multicasting.
Radio waves are used for multicast communications, such as radio and
television, and paging systems.
Microwaves
Electromagnetic waves having frequencies between 1 and 300 GHz are called
microwaves. Microwaves are unidirectional. When an antenna transmits
microwaves, they can be narrowly focused. This means that the sending and
receiving antennas need to be aligned. The unidirectional property has an obvious
advantage. A pair of antennas can be aligned without interfering with another pair of
aligned antennas.
The following describes some characteristics of microwave propagation:
The microwave band is relatively wide, almost 299 GHz. Therefore wider
subbands can be assigned, and a high data rate is possible.
Applications
Microwaves, due to their unidirectional properties, are very useful when unicast (one
to- one) communication is needed between the sender and the receiver. They are
used in cellular phone, satellite networks, and wireless LANs
Microwaves are used for unicast communication such as cellular telephones,
satellite networks, and wireless LANs.
30
Infrared
Infrared waves, with frequencies from 300 GHz to 400 THz (wavelengths from 1 mm
to 770 nrn), can be used for short-range communication. Infrared waves, having high
frequencies, cannot penetrate walls. This advantageous characteristic prevents
interference between one system and another; a short-range communication system
in one room cannot be affected by another system in the next room. When we use
our infrared remote control, we do not interfere with the use of the remote by our
neighbors. However, this same characteristic makes infrared signals useless for
long-range communication. In addition, we cannot use infrared waves outside a
building because the sun's rays contain infrared waves that can interfere with the
communication.
Multiplexing:
Concept of Multiplexing
As shown in fig multiplexer takes 4 input lines and diverts them to single output line.
The signal from 4 different devices is combined and carried by this single line. At the
receiving side, a demultiplexer takes this signal from a single line & breaks it into the
original signals and passes them to the 4 different receivers.
31
Advantages of Multiplexing
If no multiplexing is used between the users at two different sites that are distance
apart, then separate communication lines would be required as shown in fig.
This is not only costly but also become difficult to manage. If multiplexing is used
then, only one line is required. This leads to the reduction in the line cost and also it
would be easier to keep track of one line than several lines. Multiplexing efficient for
utilization of bandwidth.
The following are several examples of different multiplexing methods:
32
2. Time Division Multiplexing (TDM) –
This happens when data transmission rate of media is greater than that of the
source, and each signal is allotted a definite amount of time. These slots are so
small that all transmissions appear to be parallel. In frequency division multiplexing
all the signals operate at the same time with different frequencies, but in time division
multiplexing all the signals operate with same frequency at different times.
It is of following types:
1. Synchronous TDM –
The time slots are pre-assigned and fixed. This slot is even given if the source
is not ready with data at this time. In this case the slot is transmitted empty. It
is used for multiplexing digitized voice stream.
33