Professional Documents
Culture Documents
DCN UNIT1 Complete
DCN UNIT1 Complete
UNIT 1 – PART1
Introduction: Communication Network and services, Approaches to Network Design,
Network Functions and Network Topology, Message ,packet and circuit Switching , Internet,
Packet Switching ; Key factors in Communication Network Evolution ; Layered Architecture
and Applications – Examples of Layering , OSI Reference Model, TCP/IP Model ,Telnet FTP
and IP Utilities.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 1
18. Explain the functionality of data link layer. 4m
19. Expand SMTP and SNMP. 2m
20. Explain TCP/IP architecture. 10m
Transmission Control Protocol/Internet Protocol (TCP/IP) Model 8m
21. Explain HTTP. Where it is used? 2m
22. What are the differences between between OSI and TCP/IP models. 5m
23. What is the use of Telnet? 2m
24. Explain the working of File Transfer Protocol (FTP) 6marks
25. What are the various TCP/IP diagnostic utilities?5m
26. Define NETSTAT command. 2m
27. Explain the properties of digital transmission system. 5m
28. What are the characteristics of Analog signals? 2m
What are the characteristics of digital s
ignal? 2m
29. Define Time and Frequency Domain with the representation of any 2 frequency signals.
6M
30. Bit interval and Bit rate and baud rate.
31. Define Attenuation. 2m
32. DEFINE SNR 2M
32. what are the fundamental limits in digital communications? 4m
33. Write note on Noiseless Channel: Nyquist Signal Rate 3Marks
34. Noisy Channel: Shannon Capacity 5marks
35. problem : For a channel with bandwidth of 3KHz and with a SNR value of 1000, like that
of a typical telephone line, what is the maximum channel capacity ?
36. What is digital-to-digital encoding? 2m
37. How to convert digital data into digital signals?.
38. Explain in detail Line Coding: 10m
39. Write the signal waveforms when 101101 is transmitted using line coding. 5m
a> polar NRZ b> bipolar 5m
Draw using the above wave forms
40. Explain AM, FM and PM. 6m
41. Explain the Evolution of Network Architecture and services 5m
42. Explain connection and connectionless services. 5m 18
43. Explain digital representation of information. 7m 18
44. what is modem? 2m
Data communications are the exchange of data between two devices via some form of
transmission medium such as a wire cable. For data communications to occur, the
communicating devices must be part of a communication system made up of a combination of
hardware (physical equipment) and software (programs).
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 2
Explain the 5 components of data communication. 5m
Message.
Sender.
Receiver.
Transmission medium.
The transmission medium is the physical path by which a message travels from sender
to receiver.
Some examples of transmission media include twisted-pair wire, coaxial cable, fiber-
optic cable, and radio waves.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 3
Protocol.
example: FTP (file transfer protocol), HTTP ( hyper text transfer protocol)
High reliability: By replicating files on different machines and having spare CPU’S,
users are more protected from hardware/software failure.
Less cost: a local area network LAN can be cheaply installed. It is easy to increase
the capacity by adding new machines.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 4
What are types or categories of network? explain. 5m
or Explain classification of networks based on size. 5m
Local Area Network (LAN):
Metropolitan Area Network (MAN):
Wide Area Network (WAN):
WAN is a network that provides long-distance transmission of data, image, audio and
video information over large geographical area
It covers different cities, states and even countries.
A WAN could be a connection of LAN connecting to other LAN’s via telephone lines
and radio waves and may be limited to an organization.
The technology is high speed and relatively expensive.
A Communication medium used for WAN is Satellite Link.
Due to long distance transmission, the noise and error tend to be more in WAN.
Devices used for transmission of data through WAN are: Optic wires, Microwaves
and Satellites.
Example home computer connected to the Internet.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 5
(what is network topology? list any 2 types. 2m)
What are the factors that must be considered while making choice of particular
topology? 2m
easy to install
easy to reconfigure
easy to trouble shoot
Bus
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 6
Fault identification is difficult
Failure in the cable affects all devices
Performance will go down when more computers are added.
Star Topology
A star topology is a topology for a Local Area Network (LAN) in which all nodes
are individually connected to a central connection point, like a hub or a switch.
A star takes more cable than a bus. but the benefit is that if a cable fails, only one
node will be brought down.
Star topology
Tree Topology
Tree topology
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 7
A tree topology combines characteristics of linear bus and star topologies.
It consists of groups of star-configured workstations connected to a linear bus
backbone cable .
Tree topologies allow for the expansion of an existing network, and enable schools
to configure a network to meet their needs.
Ring Topology:
A ring network is a network topology in which each node connects to exactly two
other nodes, forming a single continuous pathway for signals through each node -
a ring.
Data travels from node to node, with each node along the way handling every packet.
Advantages:
A ring is relatively easy to install and reconfigure
Disadvantages:
Unidirectional traffic can be disadvantage
A break in the ring can disable the entire network
Mesh topology:
A mesh network is a network topology in which each node sends data for the
network.
All mesh nodes cooperate in the distribution of data in the network.
Mesh networks can send messages using a routing technique..
It is commonly used in wireless networks.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 8
Advantages:
Robust and reliable (The use of dedicated link guarantees that each connection can
carry its data load, thus eliminating the traffic problems )
Mesh topology is robust. If one link becomes unusable, it does not harm the entire
system
Privacy and security are ensured
Fault identification would be easy
DisAdvantages:
This type of topology is very expensive (as there are many redundant connections,
thus it is not mostly used in computer networks.)
Large number of i/o ports are required
Difficult of reconfiguration and installation
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 9
SWITCHING TECHNIQUES
CIRCUIT SWITCHING
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 10
advantages:
Disadvantages
MESSAGE SWITCHING
both hosts (stations) must be available at the same time for data exchange
Resources must be available and dedicated through network between two hosts.
It is a concept of Store and Forward Networks. The message is stored temporarily before
sending it. When this form of switching is used, no physical path is established in advance
between sender and receiver. Instead, when the sender has a block of data to be sent, it is
stored in the first switching office (i.e., router) and then forwarded later, one hop at a time.
ex: telegrams
advantages:
3. in expensive
Disadvantages
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 11
Explain switching and forwarding (or packet switching) techniques with a neat
diagram. 6m
PACKET SWITCHING
advantages:
2. It does not require large amount of buffers to store the entire message like message
switching.
Disadvantages
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 12
What is the difference between datagram and virtual circuit? 3m
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 13
UNIT1 – PART 2
Define Routing. 2m
selecting best path for sending a packet from source to destination when more than one path
is available.
A network is considered effective and efficient if the following criteria are met
1.Performance – Performance is measured in many ways including transit time and response
time.
i> Transit time – amount of time required for the message to travel from one device to
another
ii> Response time – the elapsed time between an inquiry and response.
(time taken after a user enter key and requested web page is displayed by the browser)
Role of Technology
Ex: Best tools for overseas meeting – Video Conference, Gathering of knowledge
Role of Regulation
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 14
Traditional communication services in the form of telephony and telegraphy have
been government regulated.
Governments often chose to operate communications networks as monopolies
(dominating) because of the importance of controlling communications.
Standards are basically agreements, with industry wide, national, and possibly
international scope.
Standards applying to data communications between computers specify the hardware
and software procedures through which computers can correctly and reliably "talk to
one another."
Standards are extremely important in communications.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 15
SEVEN LAYERS OF OSI REFERENCE MODEL
The OSI Reference Model is composed of seven layers, each specifying particular
network functions.
• The process of breaking up the functions or tasks of networking into layers reduces
complexity.
• Each layer provides a service to the layer above it in the protocol specification.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 16
The flow of communications during the connection between two computer systems is
maintained by this layer.
This flow of communication is called a session.
The layer ensures that a new request is accepted only when one request is completed.
Layer 4. The Transport Layer
The Transport layer also ensures reliability of data transmission like the Data Link
layer. (Network layer does not deal with lost messages.)
Data arrives as a sequence of packets and this layer identifies the original sequence
before they are passed to the Sessions layer.
Breaks the message (from sessions layer) into smaller packets, assigns sequence
number and sends them.
Two types of Protocols used :
TCP : (Transmission Control Protocol) Internet transport protocol. TCP/IP Widely used for
network/transport layer (UNIX).
UDP: (Universal Datagram Protocol) Internet connectionless transport layer protocol.
(Application programs that do not need connection-oriented protocol generally use UDP.)
Layer 3 : Network Layer
The Network Layer establishes the communications with computer systems and is
concerned with the transmission of packets.
It does not have error detection / correction mechanisms.
It establishes a route between the source and destination computers and for reliability
depends on the Data Link Layer & chooses the best path to send a packet (routing).
It has its own routing architecture and uses protocols like IP.
Connection-Oriented :
Sender and receiver first establish a connection, possibly
Eg.Telephone connection.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 17
Connectionless :
No advance setup is needed.
This layer defines the hardware, cable wiring, power output etc.
Physical layer in the OSI model plays the role of interacting with actual hardware and
signalling mechanism.
Physical layer is the only layer of OSI network model which actually deals with the
physical connectivity of two different stations.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 18
Data-link layer hands over frames to physical layer. 00-14-22-01-23-45 MAC ADD
255.255.255.255.255
Physical layer converts them to electrical pulses, which represent binary data. The
binary data is then sent over the wired or wireless media.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 19
The Application Layer
The application layer is the highest layer of TCP/IP.
The application layer is provided by the program that uses TCP/IP for
communication.
An application is a user process cooperating with another process usually on a
different host.
Examples of applications include Telnet and the File Transfer Protocol (FTP).
The interface between the application and transport layers is defined by port numbers
and sockets,
Protocol Function
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 20
(Simple Mail Transfer Protocol)
SMTP
-SMTP is used by an email client to
send messages to its local email server.
The local server then decides if the
message is destined for a local mailbox
or if the message is addressed to a
mailbox on another server.
Simple Network Management Protocol
SNMP (SNMP) is a popular protocol for
network management. It is used for
collecting information from, and
configuring, network devices, such as
servers, printers, hubs, switches, and
routers on an Internet Protocol (IP)
network
Protocol Functions
Reliable
Used in mail services.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 21
Protocol (UDP) Sending data without
establishing connection
Fast but unreliable
Used in multimedia(games)
communication.
IPSecurity (IPSec)
is a collection of protocols designed by the Internet Engineering Task Force (IETF)
(INTERNATIONAL COMMUNITY) to provide security for a packet at the network
level.
is a network protocol suite that authenticates and encrypts the packets of data sent
over a network
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 22
What are the differences between between OSI and TCP/IP models. 5m
OSI TCP/IP
OSI is a reference model TCP/IP is an implementation of OSI model
The OSI model however is a TCP/IP Protocols are considered to be
"generic, protocol- independent standards around which the internet has
standard." developed.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 23
Application Layer Protocols and TCP/IP utilities :
Telnet, FTP, HTTP and IP utilities like PING, TRACEROUTE, IPCONFIG, NETSTAT
Remote Login.
The telnet protocol gives you the ability to connect to a machine, by giving
commands and instructions interactively to that machine.
In such a case, the local system becomes transparent to the user, who gets the feeling
that he is connected directly to the remote computer.
The commands typed by the user are transmitted directly to the remote machine and
the response from the remote machine is displayed on the user’s monitor screen. An
interactive connection is also known as remote login.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 24
Transferring data from one host to another is one of the most frequently used
operations.
Both need to upload data (transfer data from a client to a server) and download data
(retrieve data from a server to a client) are addressed by FTP.
Additionally, FTP provides security and authentication measures to prevent
unauthorized access to data.
FTP uses TCP as a transport protocol to provide reliable end-to-end connections.
The FTP client initiates the first connection, an FTP server listens for and accepts
new connections.
The control connection is used for all of the control commands a client user uses to
log on to the server, manipulate files, and terminate a session.
The FTP client’s user interface communicates with the protocol interpreter, which
manages the control connection.
This protocol interpreter translates and communicates control commands to the FTP
server.
The FTP server’s PI receives these commands, and then initiates the appropriate
processes to service the client’s requests.
If the requests require the transfer of data, data management is performed by the
DTPS on both the client and server applications.
Following the completion of the data transfer, the data connection is closed, and
control is returned to the PIs of the client and server applications.
FTP operations
HTTP
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 25
The Hypertext Transfer Protocol is a protocol designed to allow the transfer of
Hypertext Markup Language (HTML) documents.
HTML is a tag language used to create hypertext documents.
Hypertext documents include links to other documents that contain additional
information about the highlighted subject.
Such documents can contain other elements apart from text, such as graphic images,
audio and video clips, Java applets.
HTTP is based on request-response activity.
https://www.youtube.com/watch?v=AimCNTzDlVo
IP utilities like PING, TRACEROUTE, IPCONFIG, NETSTAT
PING is one of the easiest way to test connectivity across the network to determine whether a
host is online and available.
Ping Commands
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 26
Trace Route
Trace Route is a computer network diagnostic tool for displaying the route (path) and
measuring transit delays of packets across an Internet Protocol (IP) network.
Traceroute is the program that shows you the route over the network between two systems,
listing all the intermediate routers a connection must pass through to get to its destination. It
can help you determine why your connections to a given server might be poor, and can often
help you figure out where exactly the problem is. It also shows you how systems are
connected to each other, letting you see how your ISP connects to the Internet as well as how
the target system is connected.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 27
NETSTAT Define NETSTAT command. 2m
netstat (network statistics) is a command-line tool displays network connections (both
incoming and outgoing) , routing tables and number of network interface statistics.
IPCONFIG
Ipconfig utility is be used to display TCP/IP information about a host. This command when
executed displays the IP address, subnet mask and default gateway for the host.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 28
Digital Transmission
Explain the properties of digital transmission system. 5m
Transmitter
Converts information into signal suitable for transmission.
Ex: Telephone converts voice into electric current
Ex: Modem converts bits into tones
Receiver
Receives energy from medium
Converts received signal into form suitable for delivery to user
Ex: Telephone converts current into voice
ex: Modem converts tones into bits
Communication medium
Between transmitter and receiver carries data between them.
Both data and the signals that represent them can be either analog or digital in form. Analog
and Digital Signal. Analog signals can have an infinite number of values in a range. Digital
signals can have only a limited number of values.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 29
Characteristic of Digital signals
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 30
Period and Frequency
Period refers to the amount of time, in seconds, a signal needs to complete 1 cycle.
Frequency refers to the number of occurrences of a periodic event per time and is measured
in cycles/second
Period is the inverse of frequency, and frequency is the inverse of period,
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 31
Ans: Let T be the period and F be the frequency
T = 1/F => 1/4000 => 0.00025 => 0.25sec
Define Time and Frequency Domain with the representation of any 2 frequency signals.
6m
A sine wave is comprehensively defined by its amplitude (It refers to the height of the signal)
, frequency, and phase.
The time-domain plot shows changes in signal amplitude with respect to time .
A frequency-domain plot is concerned with only the peak value and the frequency.
Phase
Phase describes the position of the waveform relative to time zero. The phase is measured in
degrees or radians (360 degrees is 2p radians)
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 32
Wavelength
It is the distance signal can travel in one period.
Wavelength = Propagation speed * period
OR
Wavelength = Propogation speed / Frequency
Problem: A periodic signal has a bandwidth of 20Hz. The highest frequency is 60Hz. What is
the lowest frequency?
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 33
Ans: Let f2 be the highest frequency = 60Hz
Let f1 be the lowest frequency.
Bandwidth = 20Hz
By definition, Bandwidth = f2 – f1
20 = 60 – f1
F1 = 60 – 20 = 40 Hz
The bit interval is the time required to send one single bit.
The bit rate is the number of bit intervals in one second, usually expressed in bits per second
(bps).
Baud rate refers to the number of signal or symbol changes that occur per second. A symbol
is one of several voltage, frequency, or phase changes.
Problem: A digital signal has a bit rate of 2000bps. What is the duration of each bit (bit
interval)?
Amplitude
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 34
It refers to the height of the signal
Transmission Impairment
It means the signal at the beginning of the medium is not the same as the signal at the end of
the medium.
3 reasons
Define Attenuation. 2m
1. attenuation - Attenuation is a general term that refers to any reduction in the strength
of a signal. Usually amplifiers are used to strengthen the signal.
2. distortion - Distortion is the alteration of the original shape (or other characteristic) of
something, such as an object, image, sound or waveform.
3. Noise – disturbance caused due to heat, loss in energy. Lighting etc.
DEFINE SNR 2M
We need to consider the average signal power and the average noise power because these
may change with time.
SNR is actually the ratio of what is wanted (signal) to what is not wanted (noise).
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 35
A high SNR means the signal is less corrupted by noise; a low SNR means the
signal is more corrupted by noise.
c) DATA RATE LIMITS (what are the fundamental limits in digital communications?
4m
A very important consideration in data communications is how fast we can send data, in bits
per second over a channel.
1. Data rate depends on three factors:
2. Bit error Rate
1. Data rate depends on three factors:
The bandwidth available
The level of the signals we use
The quality of the channel (the level of noise)
Two theoretical formulas were developed to calculate the data rate: one by Nyquist for a
noiseless channel. Another by Shannon for a noisy channel.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 36
2.Bit error rate : It defines what percentage of bits are in error from the point where the data
originates to the point where user receives at the other end. If the error rate is less than
0.0001 to 0.0002 percent, it is considered as good data .
For a noiseless channel, the Nyquist signal rate formula defines the theoretical maximum bit
rate
In this formula,
bandwidth is the bandwidth of the channel,
L is the number of signal levels used to represent data, and
Bit Rate is the bit rate in bits per second.
According to the formula, we might think that, given a specific bandwidth, we can have any
bit rate we want by increasing the number of signal levels. Although the idea is theoretically
correct, practically there is a limit. When we increase the number of signal levels, we impose
a burden on the receiver. If the number of levels in a signal is just 2, the receiver can easily
distinguish between a 0 and a 1. If the level of a signal is 64, the receiver must be very
sophisticated to distinguish between 64 different levels. In other words, increasing the levels
of a signal reduces the reliability of the system.
In reality, we cannot have a noiseless channel; the channel is always noisy. In 1944, Claude
Shannon introduced a formula, called the Shannon capacity, to determine the Theoretical
highest data rate for a noisy channel:
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 37
In this formula,
bandwidth is the bandwidth of the channel;
SNR is the signal-to-noise ratio, and
capacity is the capacity of the channel in bits per second.
Note that in the Shannon formula there is no indication of the signal level, which means that
no matter how many levels we have, we cannot achieve a data rate higher than the capacity of
the channel. In other words, the formula defines a characteristic of the channel, not the
method of transmission.
problem : For a channel with bandwidth of 3KHz and with a SNR value of 1000, like that of
a typical telephone line, what is the maximum channel capacity ?
Capacity = bandwidth * log2 (1+ SNR)
C = 3000 * log2(1+ 1000)
= 30000bps (approx)
__________________________________________________________________________
Encoding
For the information to be transmitted across a communication medium, it must be encoded
into signals. The signals must be manipulated so that it contains the information in the form
of recognizable to the sender and receiver. This process is known as encoding.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 38
The process for converting digital data into digital signal is said to be Line Coding.
Digital data is found in binary format. It is stored as series of 1s and 0s.
Digital signal is denoted by discreet signal, which represents digital data. There are three
types of line coding schemes available:
Line Coding:
1. Uni-polar Encoding: Unipolar encoding schemes use single voltage level to represent
data. In this case, to represent binary 1, high voltage is transmitted and to represent 0, no
voltage is transmitted. It is also called Unipolar-Non-return-to-zero(NRZ), because there is
no rest condition i.e. it either represents 1 or 0.
2.Polar Encoding:
Polar encoding scheme uses multiple voltage levels to represent binary values. Polar
encodings is available in three types:
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 39
I> Polar Non-Return to Zero (Polar NRZ); It uses two different voltage levels to
represent binary values. Generally, positive voltage represents 1 and negative
value represents 0. It is also NRZ because there is no rest condition.
NRZ-L changes voltage level at when a different bit is encountered whereas NRZ-I
changes voltage when a 1 is encountered.
II> Return to Zero (RZ): Problem with NRZ is that the receiver does not know when
a bit ended and when the next bit is started, in case when sender and receiver’s
clock are not synchronized.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 40
zero is one is
RZ uses three voltage levels, positive voltage to represent 1, negative voltage to represent 0
and zero voltage for none.
Disadvantage:
It requires two signal changes to encode each bit and therefore occupies more
bandwidth.
Advantage: But it is more effective method than NRZ method.
III> Biphase
The best solution for the problem of synchronization is Biphase.
Signal changes at the middle of the bit interval instead of RZ.
There are 2 types:
Manchester:
This encoding scheme is a combination of RZ and NRZ-L. Bit time is divided into
two halves. It transits in the middle of the bit and changes phase when a different bit
is encountered.
Negative-to-positive transition(low-to-high) represents binary 1 and positive-to-
negative (high-to-low) represents binary 0.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 41
3. Bipolar Encoding:
Bipolar encoding uses three voltage levels, positive, negative and zero. Zero voltage
represents binary 0 and bit 1 is represented by altering positive and negative voltages.
Write the signal waveforms when 101101 is transmitted using line coding. 5m
a> polar NRZ b> bipolar 5m
Draw using the above wave forms
Analog-to-Digital Encoding
Microphones create analog voice and camera creates analog videos, which are treated as
analog data. To transmit this analog data over digital signals, we need analog to digital
conversion.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 42
Analog data is a continuous stream of data in the wave form whereas digital data is discrete.
To convert analog wave into digital data, we use Pulse Code Modulation (PCM).
PCM is one of the most commonly used method to convert analog data into digital form.
It involves three steps: Sampling, Quantization and Encoding.
Sampling:
The quantization is done between the maximum amplitude value and the minimum
amplitude value.
Encoding:
In encoding, each approximated value is then converted into binary format.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 43
Digital-to-Analog encoding
When data from one computer is sent to another via some analog carrier(circuits), it is first
converted into analog signals. Analog signals are modified to reflect digital data. An analog
signal is characterized by its amplitude, frequency, and phase.
There are three kinds of digital-to-analog conversions:
In this conversion technique , When binary data represents digit 1, the amplitude is held;
otherwise it is set to 0. Both frequency and phase remain constant while amplitude changes.
Frequency Shift Keying(FSK): In this conversion technique, the frequency of the analog
carrier signal is modified to reflect binary data.
This technique uses two frequencies, f1 and f2. One of them, for example f1, is chosen to
represent binary digit 1 and the other one is used to represent binary digit 0.
Phase Shift Keying(PSK): In this conversion scheme, the phase of the original carrier signal
is altered to reflect the binary data.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 44
When a new binary symbol is encountered, the phase of the signal is altered.
Analog-to-Analog Encoding:
example : radio – government assigns a bandwidth to each radio station. The analog signal
produced by each station is a low-pass all in same range. To be able to listen to different
stations, low-pass signals need to be shifted to different ranges.
Analog to analog (example audio and video transmission) conversion can be done in three
ways:
Explain AM, FM and PM. 6m
Amplitude Modulation: In this modulation, the amplitude of the carrier signal is modified to
reflect the analog data.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 45
Frequency Modulation: In this modulation technique, the frequency of the carrier signal is
modified to reflect the change in the voltage levels of the modulating signal (analog data).
Phase Modulation: In the modulation technique, the phase of carrier signal is modulated in
order to reflect the change in voltage (amplitude) of analog data signal.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 46
Modems and Digital modulation: Amplitude shift keying, Frequency shift keying, Phase
shift keying.
Note: Modulation is the process of transforming digital information (1's an 0's) into analog
(perceived as sound) signals. In the case of modems, capable of being transmitted over
telephone lines. Demodulation: the process of transforming analog signals, previously
modulated, back into digital information.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 47
Below are the four versions of a computer Modem found in computers.
Onboard Modem - Modem built onto the computer motherboard. These Modems
cannot be removed, but can be disabled.
External Modem - Modem within a box that connects to the computer externally,
usually the Serial Ports or USB port.
DCN notes – UNIT1 VBCA A – PRESIDENCY COLLEGE FACULTY: Ms. Anitha Page 48