Professional Documents
Culture Documents
Data & Teleommunications
Data & Teleommunications
Reference Books:
1) Behrouz A. Forouzan, Data Communications and Networking, 4th Edition.
2) William Stallings, Data and Computer Communications, Published by Pearson, 8th Edition.
148 | Data and Telecommunications
CHAPTER 1 PAGE NO: 153
INTRODUCTION TO DATA COMMUNICATION MODEL
1) What is data communication? (2021,2020, 2017,2016,2015,2014,2013,2012,2009)
2) Explain data communication characteristics. (2020, 2017,2015)
3) Describe simplified data communication model with proper diagram.(2021,2016, 2014,2013)
4) Briefly describe major communication tasks that involved in data communication. (2008)
5) Describe different types of LAN topologies. (2017)
6) Distinguish between LAN and WAN. (2008)
7) State the difference between TCP/IP with OSI reference Model. (2020, 2017, 2013)
8) What is protocol? What are the key elements of protocol? (2021,2017, 2014, 2013)
9) State the differences between connections less and connection oriented Protocol.
(2016, 2013)
10) Discuss the layers of OSI reference model. (2021,2020, 2016,2014)
11) Describe the layers of TCP/IP model. (2015)
12) Write down the difference between simplex, half duplex and full duplex transmission mode.
(2016, 2013)
13) Write down the difference between circuit switching and packet switching. (2014)
14) What is the difference between a port address, a logical address and a physical address?
[2014]
15) Describe VSAT configuration. [2015,2018]
16) What is transmission impairments? Explain it. [2015]
17) What is IP address? Classify its types. [2015]
18) How does sky propagation differ from line of sight propagation? [2014]
19) What is ISDN? Describe different types of channels used in ISDN? [2021]
20) What is the fundamental purpose of data communication? [2021,2010]
21) Define ATM. Describe ATM architecture protocol. [2021,2015]
22) Define Standard. [2011]
23) Define different type of noise? [2020,2018]
24) What do you understand by QoS of ATM? Brief about ATM service categories. [2021]
CHAPTER 1
INTRODUCTION
1) What is data communication? (2021,2020,2017,2016,2015,2014,2013,2012,2009)
Solution: Data communication refers to the exchange of data between a source and a receiver
via form of transmission media such as a wire cable. Data communication is said to be local if
communicating devices are in the same building or a similarly restricted geographical area.
8) What is protocol? What are the key elements of protocol? (2021,2017, 2014, 2013)
Solution: Communication is achieved by having the corresponding, or peer, layers in two systems
communicate. The peer layers communicate by means of formatted blocks of data that obey a set
of rules or conventions known as a protocol. The key features of a protocol are:
Syntax – The term ‘Syntax’ refers to the structure or format of the data, meaning the order in
which they are presented.
Semantics – The word ‘Semantics’ refers to the meaning of each section of bits.
Timing – The term ‘Timing ‘refers to two characteristics: when data should be sent and how
fast they can be sent.
164 | Data and Telecommunications
9) State the differences between connections less and connection oriented Protocol.
(2016, 2013)
Solution:
BASIS OF CONNECTION-ORIENTED CONNECTION-LESS PROTOCOL
COMPARISON PROTOCOL
Prior Connection Necessary Not required
Requirement
Reliability Ensures reliable transfer of data. Not guaranteed.
Congestion Unlikely Occur likely.
Packet forwarding Packets sequentially travel to their Packets reach the destination
destination node and follows the randomly without following the
same route. same route.
Delay There is a delay in transfer of Because to the absence of
information, but once the connection connection establishment phase,
is established faster delivery can be the transmission is faster.
achieved.
Resource Need to be allocated. No prior allocation of the
Allocation resource is required.
The transmitting computer software gives the data to be transmitted to the applications layer,
where it is processed and passed from layer to layer down the stack with each layer performing
its designated functions. The data is then transmitted over the physical layer of the network until
the destination computer or another device receives it. At this point the data is passed up through
the layers again, each layer performing its assigned operations until the data is used by the
receiving computer’s software.
All of the necessary and desirable operations required are grouped together in a logical sequence
at each of the layers. Each layer is responsible for specific functions:
Layer 7 – application: This layer works with the application software to provide
communications functions as required. It verifies the availability of a communications partner and
the resources to support any data transfer. It also works with end applications such as domain
name service (DNS), file transfer protocol (FTP), hypertext transfer protocol (HTTP), Internet
message access protocol (IMAP), post office protocol (POP), simple mail transfer protocol (SMTP),
Telenet, and terminal emulation.
Layer 6 – presentation: This layer checks the data to ensure that it is compatible with the
communications resources. It ensures compatibility between the data formats at the applications
level and the lower levels. It also handles any needed data formatting or code conversion, as well
as data compression and encryption.
Layer 5 – session: Layer 5 software handles authentication and authorization functions. It also
manages the connection between the two communicating devices, establishing a connection,
maintaining the connection, and ultimately terminating it. This layer verifies that the data is
delivered as well.
Layer 4 – transport: This layer provides quality of service (QoS) functions and ensures the
complete delivery of the data. The integrity of the data is guaranteed at this layer via error
correction and similar functions.
Layer 3 – network: The network layer handles packet routing via logical addressing and
switching functions.
Layer 2 – data link: Layer 2 operations package and unpack the data in frames.
166 | Data and Telecommunications
Layer 1 – physical: This layer defines the logic levels, data rate, physical media, and data
conversion functions that make up the bit stream of packets from one device to another.
12) Write down the difference between simplex, half duplex and full duplex transmission
mode. (2016, 2013)
Solution:
BASIS FOR SIMPLEX HALF DUPLEX FULL DUPLEX
COMPARISON
Direction of Communication is Communication is two- Communication is
Communication unidirectional. directional but, one at two directional and
a time. done
simultaneously.
Send/Receive A sender can send data A sender can send as A sender can send as
but, cannot receive. well as receive the data well as receive the
but one at a time. data simultaneously.
Performance The half duplex and full The full duplex mode Full duplex has
duplex yields better yields higher better performance
performance than the performance than half as it doubles the
Simplex. duplex. utilization of
168 | Data and Telecommunications
bandwidth.
Example Keyboard and monitor. Walkie-Talkies. Telephone.
13) Write down the difference between circuit switching and packet switching. (2014)
Solution: Circuit Switching vs. Packet Switching: Comparison Chart
Circuit Switching Packet Switching
A physical path is established which is Data is divided into small units called packets
dedicated to a single connection between the with each packet carrying small header
two end points. containing signaling information.
Data transmission takes place after the circuit is Dynamic route is established for each packet
established for the duration of the transmission. which carries the routing information.
A dedicated routing path is followed Each data packet may take a different route to
throughout the transmission and no other user reach the destination, making it flexible
is allowed to use the circuit. throughout the session.
It follows a uniform path throughout the There is no end to end reservation of links.
session.
Data doesn’t carry the signaling information Each data packet carries the signaling
and moves on its own. information containing source and
destination addresses in the packet header.
It’s ideal for voice communication and the delay It’s mainly used for data and voice
is uniform. communication, and the delay is not uniform.
It is connection oriented which is implemented It is connectionless and is implemented at
at physical layer. network layer.
14) What is the difference between a port address, a logical address and a physical address?
(2014)
Through logical address the systems identify a network (source to destination). after identifying
the network physical address is used to identify the host on that network. The port address is
used to identify the particular application running on the destination machine.
Logical Address: An IP address of the system is called logical address. This address is the
combination of Net ID and Host ID. This address is used by network layer to identify a particular
network (source to destination) among the networks. This address can be changed by changing
the host position on the network. So it is called logical address.
Physical address: Each system having a NIC(Network Interface Card) through which two systems
physically connected with each other with cables. The address of the NIC is called Physical
address or mac address. This is specified by the manufacturer company of the card. This address
is used by data link layer.
Port Address: There are many application running on the computer. Each application run with a
port no.(logically) on the computer. This port no. for application is decided by the Kernal of the
OS. This port no. is called port address.
Data and Telecommunications - 169
15) Describe VSAT configuration. [2015]
Solution: VSATs (Very Small Aperture Terminals) is a two way, lost cost, Ground micro station for
transmitting data to and from communication satellites. A VSAT has a dish antenna with
diameters between 75 cm to 1 m, which is very small in comparison with 10 m diameter of a
standard GEO antenna. It accesses satellites in geosynchronous orbits or geostationary orbits.
Data rates in VSATs ranges from 4 Kbps to 16 Mbps.
Configurations of VSATs:
Star Topology – This has a central uplink site which transmits data from and to each VSAT
through the satellite.
Mesh Topology − Each VSAT transmits data via the satellite to the other stations. The above
diagram shows mesh topology of VSATs.
Combination of the above
Uses of VSATs:
In narrowband data − e.g. point – of – sale transactions using debit cards or credit cards, RFID
data
In broadband data − e.g. Internet access to remote locations, VoIP
Mobile communications
Maritime communication
Attenuation – It means loss of energy. The strength of signal decreases with increasing distance
which causes loss of energy in overcoming resistance of medium. This is also known as attenuated
signal. Amplifiers are used to amplify the attenuated signal which gives the original signal back.
Attenuation is measured in decibels (dB). It measures the relative strengths of two signals or one
signal at two different point.
Attenuation (dB) = 10 log10 (P2/P1)
P1 is power at sending end and P2 is power at receiving end.
Distortion – It means change in the shape of signal. This is generally seen in composite signals
with different frequencies. Each frequency component has its own propagation speed travelling
through a medium. Every component arrive at different time which leads to delay distortion.
Therefore, they have different phases at receiver end from what they had at senders end.
Noise – The random or unwanted signal that mixes up with the original signal is called noise.
There are several types of noise such as induced noise, crosstalk noise, thermal noise and impulse
noise which may corrupt the signal.
Induced noise comes from sources such as motors and appliances. These devices act as sending
antenna and transmission medium act as receiving antenna. Thermal noise is movement of
electrons in wire which creates an extra signal.
18) How does sky propagation differ from line of sight propagation? [2014]
Solution:
Sky propagation is not limited to send signals to receivers, line-of-sight is dependent on direction,
range and objects which may occur between sender and receiver.
Sky propagation is not limited in sense of distance of source and destination and not restricted by
being in range or in direction with antennas. In this case, signals are sent towards space and then
signals have vast range to reach receivers back to the earth. We should consider this thing, Sky is
the beyond the troposphere and ionosphere. When signals gone beyond these spheres so when
satellite will reflect those signals back, they will have much vast access to receivers.
On other hand line-of-sight propagation is limited because of earth curvature. If antennas (source
and target) are not directional, not facing each other or something preventing to establish the
connection so communication won’t be made.
24) What do you understand by QoS of ATM? Brief about ATM service categories. [2021]
Quality of Service (QoS) is a type of Networking Technology that can guarantee a specific level
of output for a specific connection, path, or type of traffic. QoS mechanisms provide control on
both quality and availability of bandwidth whereas another network provides only a best-effort
delivery.
QoS feature is used when there is traffic congestion in-network, it gives priority to certain real-
time media. A high level of QoS is used while transmitting real-time multimedia to eliminate
latency and dropouts. Asynchronous Transfer Mode (ATM) is a networking technology that uses
a certain level of QoS in data transmission.
The Quality of Service in ATM is based on following: Classes, User-related attributes, and
Network-related attributes.
Data and Telecommunications - 175
These are explained as following below.
1. Classes :
The ATM Forum defines four service classes that are explained below –
1. Constant Bit Rate (CBR) –
CBR is mainly for users who want real-time audio or video services. The service
provided by a dedicated line. For example, T line is similar to CBR class service.
2. Variable Bit Rate (VBR) –
VBR class is divided into two sub classes –
(i) Real-time (VBR-RT) :
The users who need real-time transmission services like audio and video and they also use
compression techniques to create a variable bit rate, they use VBR-RT service class.
(ii) Non-real Time (VBR-NRT) :
The users who do not need real-time transmission services but they use compression
techniques to create a variable bit rate, then they use VBR-NRT service class.
3. Available Bit Rate (ABR) –
ABR is used to deliver cells at a specific minimum rate and if more network capacity is
available, then minimum rate can be exceeded. ABR is very much suitable for applications
that have high traffic.
4. Unspecified Bit Rate (UBR) –
UBR class and it is a best-effort delivery service that does not guarantee anything.
CHAPTER 2
DATA TRANSMISSION
1) Define analog and digital signal. (2021,2017)
Solution: Analog Signal
An analog signal is a continuous wave denoted by a sine wave (pictured below) and may vary in
signal strength (amplitude) or frequency (time). The sine wave's amplitude value can be seen as
the higher and lower points of the wave, while the frequency (time) value is measured in the sine
wave's physical length from left to right.
There are many examples of analog signals around us. The sound from a human voice is analog,
because sound waves are continuous, as is our own vision, because we see various shapes and
colors in a continuous manner due to light waves. Even a typical kitchen clock having its hands
moving continuously can be represented as an analog signal.
Attenuation – It means loss of energy. The strength of signal decreases with increasing distance
which causes loss of energy in overcoming resistance of medium. This is also known as attenuated
signal. Amplifiers are used to amplify the attenuated signal which gives the original signal back.
Distortion – It means change in the shape of signal. This is generally seen in composite signals
with different frequencies. Each frequency component has its own propagation speed travelling
through a medium. Every component arrive at different time which leads to delay distortion.
Therefore, they have different phases at receiver end from what they had at senders end.
Noise – The random or unwanted signal that mixes up with the original signal is called noise.
There are several types of noise such as induced noise, crosstalk noise, thermal noise and impulse
noise which may corrupt the signal.
Noise may be divided into four categories:
• Thermal noise
• Intermediation noise
Data and Telecommunications - 179
• Crosstalk
• Impulse noise
8) What is unguided transmission media? What are the drawback of this? (2013)
Unguided Media:
It is also referred to as Wireless or unbounded transmission media. No physical medium is
required for the transmission of electromagnetic signals.
Features:
Signal is broadcasted through air
Less Secure
Used for larger distances
There are 3 major types of Unguided Media:
(i) Radio waves –
These are easy to generate and can penetrate through buildings. The sending and receiving
antennas need not be aligned. Frequency Range:3KHz – 1GHz. AM and FM radios and cordless
phones use Radio waves for transmission.
Further Categorized as: (i) Terrestrial and (ii) Satellite.
(ii) Microwaves –
It is a line of sight transmission i.e. the sending and receiving antennas need to be properly
aligned with each other. The distance covered by the signal is directly proportional to the height
of the antenna. Frequency Range:1GHz – 300GHz. These are majorly used for mobile phone
communication and television distribution.
(iii) Infrared –
Infrared waves are used for very short distance communication. They cannot penetrate through
obstacles. This prevents interference between systems. Frequency Range:300GHz – 400THz. It is
used in TV remotes, wireless mouse, keyboard, printer, etc.
Disadvantages:
Very costly.
Radio waves travel through lowest portion of atmosphere
Radio wave communication is an insecure communication.
Radio wave propagation is susceptible to weather effects like rain,thunder and storm etc.
182 | Data and Telecommunications
9) Explain with figure of a fiber optic cable with its characteristics. (2017)
Or, what is optical fiber communication? Explain the characteristics of this
communication system? (2013)
Fiber Optic Cable
A fibre-optic cable is made of glass or plastic and transmits signals in the form of light. For better
understanding we first need to explore several aspects of the nature of light. Light travels in a
straight line as long as it is mobbing through a single uniform substance. If ray of light travelling
through one substance suddenly enters another substance (of a different density), the ray changes
direction. The below figure shows how a ray of light changes direction when going from a more
dense to a less dense substance.
Parts of a Frame
A frame has the following parts −
Frame Header − It contains the source and the destination addresses of the frame.
Payload field − It contains the message to be delivered.
Trailer − It contains the error detection and error correction bits.
Flag − It marks the beginning and end of the frame.
17. What are the reason for breaking up large data block into smaller data blocks for
transmission?[2021]
Breaking a large data block into smaller data blocks for transmission is beneficial for several
reasons:
1. Reliability: When transmitting data, there is always a chance of errors or data loss during
transmission. By breaking the data into smaller blocks, the impact of such errors is limited to
individual blocks rather than the entire data set. If an error occurs in one block, only that
block needs to be retransmitted, reducing the overall data loss and improving the reliability of
the transmission.
2. Efficiency: Large data blocks can be more challenging to handle and transmit efficiently.
Smaller blocks allow for better utilization of available network resources. They can be
transmitted more quickly, reducing the time required for transmission and improving overall
efficiency.
3. Error detection and correction: Breaking data into smaller blocks enables the use of error
detection and correction mechanisms at the block level. For example, checksums or error-
correcting codes can be applied to each block individually. If errors are detected, they can be
corrected within the specific block without affecting the entire data set.
4. Adaptability to network conditions: Network conditions can vary during transmission, and
different blocks may experience different levels of congestion, latency, or packet loss. By
dividing data into smaller blocks, the transmission protocol can adapt more effectively to
Data and Telecommunications - 187
varying network conditions. It allows for more flexible routing and retransmission strategies
to optimize data delivery.
5. Parallel processing: Breaking data into smaller blocks enables parallel processing and
transmission. Multiple blocks can be sent simultaneously over different channels, improving
the throughput and reducing the overall transmission time.
6. Compatibility with protocols and devices: Some communication protocols or devices may
have limitations on the maximum data size they can handle. By breaking the data into smaller
blocks, it ensures compatibility with such constraints and facilitates seamless transmission
across different systems.
188 | Data and Telecommunications
CHAPTER 3
Digital modulation
1) Briefly explain: ASK, FSK, PSK and QPSK techniques with principal advantages and
disadvantages. (2017,2014,2013,2012,2010)
Solution: Amplitude Shift Keying (ASK) is a type of Amplitude Modulation which represents
the binary data in the form of variations in the amplitude of a signal.
Any modulated signal has a high frequency carrier. The binary signal when ASK modulated, gives
a zero value for Low input while it gives the carrier output for High input.
The following figure represents ASK modulated waveform along with its input.
To find the process of obtaining this ASK modulated wave, let us learn about the working of the
ASK modulator.
ASK Advantages
Following points summarizes ASK advantages:
➨It offers high bandwidth efficiency.
➨It has simple receiver design.
➨ASK modulation can be used to transmit digital data over optical fiber.
➨ASK modulation and ASK demodulation processes are comparatively inexpensive.
➨Its variant OOK is used at radio frequencies to transmit morse codes.
ASK Disadvantages
Following points summarizes ASK disadvantages:
➨It offers lower power efficiency.
➨ASK modulation is very susceptible to noise interference. This is due to the fact that noise
affects the amplitude. Hence another alternative modulation technique such as BPSK which is less
susceptible to error than ASK is used.
Data and Telecommunications - 189
Frequency Shift Keying (FSK) is the digital modulation technique in which the frequency of the
carrier signal varies according to the digital signal changes. FSK is a scheme of frequency
modulation.
The output of a FSK modulated wave is high in frequency for a binary High input and is low in
frequency for a binary Low input. The binary 1s and 0s are called Mark and Space frequencies.
The following image is the diagrammatic representation of FSK modulated waveform
along with its input.
To find the process of obtaining this FSK modulated wave, let us know about the working of a
FSK modulator.
Benefits or advantages of FSK
Following are the benefits or advantages of FSK:
➨It has lower probability of error (Pe).
➨It provides high SNR (Signal to Noise Ratio).
➨It has higher immunity to noise due to constant envelope. Hence it is robust against variation in
attenuation through channel.
➨FSK transmitter and FSK receiver implementations are simple for low data rate application.
Drawbacks or disadvantages of FSK
Following are the disadvantages of FSK:
➨It uses larger bandwidth compare to other modulation techniques such as ASK and PSK. Hence
it is not bandwidth efficient.
➨The BER (Bit Error Rate) performance in AWGN channel is worse compare to PSK modulation.
Phase Shift Keying (PSK) is the digital modulation technique in which the phase of the carrier
signal is changed by varying the sine and cosine inputs at a particular time. PSK technique is
widely used for wireless LANs, bio-metric, contactless operations, along with RFID and Bluetooth
communications.
PSK is of two types, depending upon the phases the signal gets shifted. They are −
Binary Phase Shift Keying (BPSK)
This is also called as 2-phase PSK or Phase Reversal Keying. In this technique, the sine wave
carrier takes two phase reversals such as 0° and 180°.
190 | Data and Telecommunications
BPSK is basically a Double Side Band Suppressed Carrier (DSBSC) modulation scheme, for
message being the digital information.
Quadrature Phase Shift Keying (QPSK)
This is the phase shift keying technique, in which the sine wave carrier takes four phase reversals
such as 0°, 90°, 180°, and 270°.
If this kind of techniques are further extended, PSK can be done by eight or sixteen values also,
depending upon the requirement.
Benefits or advantages of PSK
Following are the benefits or advantages of PSK:
➨It carries data over RF signal more efficiently compare to other modulation types. Hence it is
more power efficient modulation technique compare to ASK and FSK.
➨It is less susceptible to errors compare to ASK modulation and occupies same bandwidth as
ASK.
➨Higher data rate of transmission can be achieved using high level of PSK modulations such as
QPSK (represents 2 bits per constellation), 16-QAM (represents 4 bits per constellation) etc.
Drawbacks or disadvantages of PSK
Following are the disadvantages of PSK:
➨It has lower bandwidth efficiency.
➨The binary data is decoded by estimation of phase states of the signal. These detection and
recovery algorithms are very complex.
➨Multi-level PSK modulation schemes (QPSK, 16QAM etc.) are more sensitive to phase
variations.
➨It is also one form of FSK and hence it also offers lower bandwidth efficiency compare to ASK
modulation type.
The Quadrature Phase Shift Keying (QPSK) is a variation of BPSK, and it is also a Double Side
Band Suppressed Carrier (DSBSC) modulation scheme, which sends two bits of digital
information at a time, called as bigits.
Instead of the conversion of digital bits into a series of digital stream, it converts them into bit
pairs. This decreases the data bit rate to half, which allows space for the other users.
QPSK Modulator
The QPSK Modulator uses a bit-splitter, two multipliers with local oscillator, a 2-bit serial to
parallel converter, and a summer circuit. Following is the block diagram for the same.
Data and Telecommunications - 191
At the modulator’s input, the message signal’s even bits (i.e., 2nd bit, 4th bit, 6th bit, etc.) and odd
bits (i.e., 1st bit, 3rd bit, 5th bit, etc.) are separated by the bits splitter and are multiplied with the
same carrier to generate odd BPSK (called as PSKI) and even BPSK (called as PSKQ).
The PSKQ signal is anyhow phase shifted by 90° before being modulated.
The QPSK waveform for two-bits input is as follows, which shows the modulated result for
different instances of binary inputs.
A 8-PSK. The diagram shows information is transmitted as one of 8 "symbols", each representing
3 bits of data. Each symbol is encoded as a different phase shift of the carrier sine wave: 0°, 45°,
90°, 135°, 180°, 225°, 270°, 315°
8) A signal is carrying four bits in each signal element. If 1000 signal elements are sent per
second, find the bit rate and baud rate? (2012,2010)
Solution:
Block Coding
To ensure accuracy of the received data frame redundant bits are used. For example, in even-
parity, one parity bit is added to make the count of 1s in the frame even. This way the original
number of bits is increased. It is called Block Coding.
Block coding is represented by slash notation, mB/nB.Means, m-bit block is substituted with n-bit
block where n > m. Block coding involves three steps:
Division,
Substitution
Combination.
After block coding is done, it is line coded for transmission.
Data and Telecommunications - 197
10) Describe the classification of line code.
Solution: Line code can be classified based on symbol mapping functions (ak) like,
Unipolar: In unipolar signalling, binary symbol 0 is represented by the absence of a pulse called
space and the other binary symbol 1 is represented by the presence of a pulse called mark. It is
also called on-off keying.
Polar:In polar signalling a binary 1 is represented by a pulse p(t) and a binary 0 by the opposite
(or antipodal) pulse –p(t).
Bipolar:Bipolar Signalling is also called ‘Alternate Mark Inversion’ (AMI) which uses three voltage
levels (+V, 0, –V) to represent binary symbols. Zeros, as in unipolar, are represented by the
absence of a pulse and ones (or marks) are representedby alternating voltage levels of +V and –V.
Line code can again be classified based on pulse shapes p(t) like,
NRZ (Nonreturn-to-zero): The pulse occupies the full duration of a symbol.
RZ (Return to Zero):The pulse occupies the half of duration of a symbol.
Manchester (split phase): In Manchester encoding, the duration of the bit is divided into two
halves. The voltage remains at one level during the first half and moves to the other level during
the second half. Binary logic 1 is +ve in 1st half and -ve in 2nd half. Binary logic 0 is -ve in 1st half
and +ve in 2nd half.
Tb (
Ac 0
-
A 0
A (
1 1 0 -
(
0
18) An analog signal has a bit rate of 8000 bps and a baud rate of 1000 band.How many
data elements are carried by each signal element? How many signal elements do we
need? (2021)
Data element per signal elements is given as;
Data Element (N) = i
Signal elements (S) is Calculated as:
S= 2
Where,
N= Data Elements
Calculation:
Given: Bit rate= 8000 bps= 8000 data elements/sec
Baud Rate= 1000 baud = 1000 signal elements/sec
Bipolar AMI:
Manchester:
Data and Telecommunications - 203
CHAPTER 4
DATA COMMUNICATION TECHNIQUES
1. Distinguish between asynchronous and synchronous data transmission. (2017)
Solution:
Comparison between Asynchronous and Synchronous:
Asynchronous Synchronous
Form of Signal In one form of asynchronous In synchronous transmission, the
required for transmission, there is only one stream of data to be transferred is
Transmission wire/signal carrying the encoded as fluctuating voltages in
transmission. one wire, and a periodic pulse of
voltage is put on another wire
(often called the "clock" or
"strobe").
Transformation of sender provides a synchronization sender and receiver use the same
Message Methods signal to the receiver before clock signal
starting the transfer of each
message
Properties Does not need clock signal supports high data transfer rate
between the sender and the needs clock signal between the
receiver sender and the receiver
Slower data transfer rate require master/slave
configuration
Advantages Simple, doesn't require Lower overhead and thus, greater
synchronization of both throughput
communication sides
Cheap, because Asynchronous
transmission require less
hardware
Set-up is faster than other
transmissions, so well suited for
applications where messages are
generated at irregular intervals,
for example data entry from the
keyboard and the speed depends
on different applications
Disadvantages Large relative overhead, a high Slightly more complex
proportion of the transmitted bits Hardware is more expensive
are uniquely for control purposes
and thus carry no useful
information
Communication This communication works much This communication works much
Examples like the postal system like a phone call.
204 | Data and Telecommunications
2. What do you mean by HDLC? (2021,2016)
Answer: HDLC (High-level Data Link Control) is a group of protocols or rules for
transmitting data between network points (sometimes called nodes). In HDLC, data is organized
into a unit (called a frame) and sent across a network to a destination that verifies its successful
arrival. The HDLC protocol also manages the flow or pacing at which data is sent. HDLC is one of
the most commonly-used protocols in what is layer 2 of the industry communication reference
model called Open Systems Interconnection (OSI). (Layer 1 is the detailed physical level that
involves actually generating and receiving the electronic signals.
Even parity -- Even parity means the number of 1's in the given word including the parity bit
should be even (2,4,6, ... ).
Odd parity -- Odd parity means the number of 1's in the given word including the parity bit
should be odd (1,3,5, ... ).
Use of Parity Bit
The parity bit can be set to 0 and 1 depending on the type of the parity required.
For even parity, this bit is set to 1 or 0 such that the no. of "1 bits" in the entire word is even.
Shown in fig. (a).
For odd parity, this bit is set to 1 or 0 such that the no. of "1 bits" in the entire word is odd.
Shown in fig. (b).
206 | Data and Telecommunications
8. Discuss Fundamentals of Scrambling Techniques. [2011]
Solution: Scrambling is a binary bit-level processing applied to the transmission rate signal in
order to make the resulting binary sequence appear more random. The scrambler performing
this scrambling function can be implemented simply using a few shift registers and exclusive-
OR gates; and the descramblers reconstructing the original bit stream out of the scrambled data
stream has the same structure but with the reversed data flow. For a proper reconstruction of
the original bit stream the shift registers in the descrambler should get synchronized to their
counterparts in the scrambler. Depending on the synchronization method used, scrambling
techniques are classified into three categories, namely the frame-synchronous scrambling (FSS),
the distributed sample scrambling (DSS), and the self-synchronous scrambling (SSS). In the FSS,
the states of the scrambler and the descrambler shift registers get synchronized by being
simultaneously reset to the pre specified states at the start of each frame; in the DSS, samples
taken from the scrambler shift registers are transmitted to the descrambler in a distributed
manner for use in synchronizing the descrambler shift registers; and in the SSS, the states of the
scrambler and descrambler shift registers are automatically synchronized without any
additional synchronization processes.
CHAPTER 5
WIRELESS TRANSMISSION & MULTIPLEXING
1. What is multiplexing? Describe synchronous time division multiplexing with figure.
(2021,2017, 2016)
Answer: Multiplexing is a technique by which different analog and digital streams of
transmission can be simultaneously processed over a shared link. Multiplexing divides the high
capacity medium into low capacity logical medium which is then shared by different streams.
Communication is possible over the air (radio frequency), using a physical media (cable), and
light (optical fiber). All mediums are capable of multiplexing.
When multiple senders try to send over a single medium, a device called Multiplexer divides the
physical channel and allocates one to each. On the other end of communication, a De-multiplexer
receives data from a single medium, identifies each, and sends to different receivers.
192.16.00/29;
The first octet of this class has its first 3 bits set to 192. Class C IP addresses range from 192.0.0.x
to 223.255.255.x. So , this is class C type.
The default subnet mask for Class C is 255.255.255.x.
Data and Telecommunications - 213
172.17.0.0/23:
The first octet of this class has its first 3 bits set to 172. Class B IP Addresses range from 128.0.x.x
to 191.255.x.x. So , this is class B type.
The default subnet mask for Class B is 255.255.x.x.
10.0.0.0/12
The first octet of this class has its first 3 bits set to 010. The class A address only include IP
starting from 1.x.x.x to 126.x.x.x. The IP range 127.x.x.x is reserved for loop back IP addresses. So ,
this is class B type.
The default subnet mask for class A IP address is 255.0.0.0.
07) How data exchange over a full duplex data communication? [2010]
Solution: Full-duplex refers to a system which transmits and receives data in two directions at
the same time. The telephone system is full-duplex as one can talk and listen simultaneously. A
walkie-talkie is half duplex because a user can either receive or press the "talk" button to
transmit. Half-duplex means that data can be transmitted in both directions on a signal carrier,
but not at the same time.
Digit radio modems use a half-duplex radio channel but have full-duplex serial data buffers which
allow the radios to simulate a full-duplex radio channel. The radios transfer data one direction
while buffering data going the other direction. The radio channel will then switch directions to
transfer the data in the reverse direction. This mechanism works best when the data transfer
requirements are much smaller than the throughput available on the Digit radio modems.
Use these parameters to simulate full-duplex communication between two Digit RF Modems.
These settings are only needed if communication may be initiated by two RF Modems
simultaneously.
09) Define WDM. And compare between TDM & WDM. [2018]
Solution:
WDM: Wavelength division multiplexing (WDM) is a technology or technique modulating
numerous data streams, i.e. optical carrier signals of varying wavelengths (colors) of laser light,
onto a single optical fiber. WDM enables bi-directional communication as well as multiplication of
signal capacity.
214 | Data and Telecommunications
Basic difference between TDM and WDM:
Following are the key difference between TDM and WDM systems.
• In TDM, resulting capacity is the aggregate or sum of all the input signals/channels. In WDM,
each signal is transmitted independent of the others and hence each channel will have its own
dedicated bandwidth.
• In WDM, all signals will arrive at the same time while in TDM they will arrive one after the other.
This is because in TDM the signals are broken up and multiplexed time wise before transmission.
This is same as TDMA frame, where in data from various stations are multiplexed and then
transmitted.
11) What do you mean by HDLC? Describe the basic characteristics of HDLC protocol.
[2016]
Solution:
HDLC: High-Level Data Link Control (HDLC) is a bit-oriented code-transparent synchronous data
link layer protocol developed by the International Organization for Standardization (ISO).
Data and Telecommunications - 215
Basic characteristics of HDLC protocol:
1) It also supports serial transmission.
2) Communication mode of HDLC is both synchronous and asynchronous.
3) It uses TWA and TWS directional mode.
4) It also supports both point to point and point to multipoint configuration.
5) It follows sliding window flow control protocol.
6) To content errors it uses CRC method.
7) For framing transparency it follows ZERO stuffing.
In the Synchronous Time Division Multiplexing (STDM), the multiplexer assigns an equal time slot
to every device at all times, whether or not a device has anything to send. Time slot A, for
instance, is authorized to device A alone and cannot be used by any other device.
Each time is assigned a time slot and it shows up. Then, a device has the time to transmit a portion
of its data. If a device cannot send or does not have data to send, its time slot remains null.
The time slots are consolidated into frames, and every frame includes one or more time slots
committed to each sending device. If there are n sending devices, the frame consists of n slots,
where each slot will be allocated to each of the sending devices. This happens if all the sending
devices transmit at the same rate as shown in the figure.
In the diagram given below, there are four inputs to multiplexer A. Each frame is having four slots
corresponding each of the sending devices.
216 | Data and Telecommunications
13. ”Thestart and stop bits can be eliminated when character interleaving is used in
synchronous TDM”- Justify your answer. [2021]
Data and Telecommunications - 217
CHAPTER 6
HIGH SPEED DIGITAL ACCESS
1) What is packet switching network? Mention the advantages of packet switching over
circuit switching network. (2021,2017)
Packet switching is a method of transferring the data to a network in form of packets. In order to
transfer the file fast and efficient manner over the network and minimize the transmission
latency, the data is broken into small pieces of variable length, called Packet. At the destination, all
these small-parts (packets) has to be reassembled, belonging to the same file. A packet composes
of payload and various control information. No pre-setup or reservation of resources are needed.
The packet switching has two approaches: Virtual Circuit approach and Datagram approach. WAN,
ATM, frame relay and telephone networks use connection oriented virtual circuit approach;
whereas internet relies on connectionless datagram based packet switching.
3) Given the following information. find the minimum bandwidth required for the path :
(2017,2015)
FDM Multiplexing
Five devices, each requiring 4000 Hz
200 Hz guard band. for each device
Solution:
No. of devices = 5
No. of guard bands required between these is 4.
Hence total bandwidth = (4000 x 5) + (200 x 4)= 20.8 KHz.
4) What is router and routing table? Explain the important characteristics of routing
function. (2021,2017)
Answer: A routing table is a set of rules, often viewed in table format, that is used to determine
where data packets traveling over an Internet Protocol (IP) network will be directed. All IP-
enabled devices, including routers and switches, use routing tables.
A routing table contains the information necessary to forward a packet along the best path toward
its destination. Each packet contains information about its origin and destination. When a packet
is received, a network device examines the packet and matches it to the routing table entry
providing the best match for its destination. The table then provides the device with instructions
for sending the packet to the next hop on its route across the network.
5) What is SONET? Describe the propagation of light through optical fiber. (2021,2016)
Answer: Synchronous optical networking (SONET) is a standardized digital communication
protocol that is used to transmit a large volume of data over relatively long distances using a fiber
optic medium. With SONET, multiple digital data streams are transferred at the same time over
optical fiber using LEDs and laser beams.
SONET is a product of the American National Standards Institute (ANSI).
Optical fibres are the wires which are used for long distance data transmission. The contain a core
which is covered by a cadding. The refractive index of core is more than cadding. So when light
collides the core-caddinginterface, it shows total internal reflection.
Optical fibre is more advantageous as,the loss of data is less even after travelling long distances
When light passes from a medium with one index of refraction (m1) to another medium with a
lower index of refraction (m2), it bends or refracts away from an imaginary line perpendicular to
the surface (normal line). As the angle of the beam through m1 becomes greater with respect to
the normal line, the refracted light through m2 bends further away from the line.
At one particular angle (critical angle), the refracted light will not go into m2, but instead will
travel along the surface between the two media (sine [critical angle] = n2/n1 where n1 and n2 are
the indices of refraction [n1 is greater than n2]). If the beam through m1 is greater than the
critical angle, then the refracted beam will be reflected entirely back into m1 (total internal
reflection), even though m2 may be transparent!
Circuit switching was designed for voice applications. Telephone is the best suitable example of
circuit switching. Before a user can make a call, a virtual path between caller and callee is
established over the network.
Message Switching
This technique was somewhere in middle of circuit switching and packet switching. In message
switching, the whole message is treated as a data unit and is switching / transferred in its
entirety.
A switch working on message switching, first receives the whole message and buffers it until
there are resources available to transfer it to the next hop. If the next hop is not having enough
resource to accommodate large size message, the message is stored and switch waits.
This technique was considered substitute to circuit switching. As in circuit switching the whole
path is blocked for two entities only. Message switching is replaced by packet switching. Message
switching has the following drawbacks:
Every switch in transit path needs enough storage to accommodate entire message.
Because of store-and-forward technique and waits included until resources are available,
message switching is very slow.
Message switching was not a solution for streaming media and real-time applications.
Data and Telecommunications - 221
Packet Switching
Shortcomings of message switching gave birth to an idea of packet switching. The entire message
is broken down into smaller chunks called packets. The switching information is added in the
header of each packet and transmitted independently.
It is easier for intermediate networking devices to store small size packets and they do not take
much resources either on carrier path or in the internal memory of switches.
Packet switching enhances line efficiency as packets from multiple applications can be
multiplexed over the carrier. The internet uses packet switching technique. Packet switching
enables the user to differentiate data streams based on priorities. Packets are stored and
forwarded according to their priority to provide quality of service.
https://networkencyclopedia.com/x-25/#google_vignette
222 | Data and Telecommunications
X-25 predates the OSI Reference Model, but the X-25 layers are analogous to the physical layer,
data link layer and network layer of the standard OSI model.
With the widespread acceptance of Internet Protocol (IP) as a standard for corporate networks,
X.25 applications migrated to cheaper solutions using IP as the network layer protocol and
replacing the lower layers of X.25 with Ethernet or with new ATMhardware.
8) Explain about virtual circuit and datagram approach of packet switching network with
necessary diagram. . (2016)
Answer: Switching is process to forward packets coming in from one port to a port leading
towards the destination. When data comes on a port it is called ingress, and when data leaves a
port or goes out it is called egress. A communication system may include number of switches and
nodes. At broad level, switching can be divided into two major categories:
Connectionless: The data is forwarded on behalf of forwarding tables. No previous
handshaking is required and acknowledgements are optional.
Connection Oriented: Before switching data to be forwarded to destination, there is a
need to pre-establish circuit along the path between both endpoints. Data is then
forwarded on that circuit. After the transfer is completed, circuits can be kept for future
use or can be turned down immediately.
Circuit Switching
When two nodes communicate with each other over a dedicated communication path, it is called
circuit switching. There 'is a need of pre-specified route from which data will travels and no
other data is permitted. In circuit switching, to transfer the data, circuit must be established so
that the data transfer can take place.
Circuits can be permanent or temporary. Applications which use circuit switching may have to go
through three phases:
Establish a circuit
Transfer the data
Disconnect the circuit
Circuit switching was designed for voice applications. Telephone is the best suitable example of
circuit switching. Before a user can make a call, a virtual path between caller and callee is
established over the network.
Data and Telecommunications - 223
Message Switching
This technique was somewhere in middle of circuit switching and packet switching. In message
switching, the whole message is treated as a data unit and is switching / transferred in its
entirety.
A switch working on message switching, first receives the whole message and buffers it until
there are resources available to transfer it to the next hop. If the next hop is not having enough
resource to accommodate large size message, the message is stored and switch waits.
This technique was considered substitute to circuit switching. As in circuit switching the whole
path is blocked for two entities only. Message switching is replaced by packet switching. Message
switching has the following drawbacks:
Every switch in transit path needs enough storage to accommodate entire message.
Because of store-and-forward technique and waits included until resources are available,
message switching is very slow.
Message switching was not a solution for streaming media and real-time applications.
Packet Switching
Shortcomings of message switching gave birth to an idea of packet switching. The entire message
is broken down into smaller chunks called packets. The switching information is added in the
header of each packet and transmitted independently.
It is easier for intermediate networking devices to store small size packets and they do not take
much resources either on carrier path or in the internal memory of switches.
224 | Data and Telecommunications
Packet switching enhances line efficiency as packets from multiple applications can be
multiplexed over the carrier. The internet uses packet switching technique. Packet switching
enables the user to differentiate data streams based on priorities. Packets are stored and
forwarded according to their priority to provide quality of service.
10) A channel has a bit rate of 4kbps and a propagation delay of 20 msec. For what range of
frame sizes does stop-and-wait give an efficiency of at least 50 percent?
(2015)
Solution:
Efficiency will be 50% when the time to transmit the frame equals the round trip propagation
delay. At a transmission rate of 4bits/ms, 160 bits takes 40 ms. For frame sizes above 160bits,
stop-and-wait is reasonably efficient.
11) Compare space-division and time division switches. [2014]
Solution:
Time-division multiplexing: Time-division multiplexing (TDM) is a method of transmitting and
receiving independent signals over a common signal path by means of synchronized switches at
each end of the transmission line so that each signal appears on the line only a fraction of time in
an alternating pattern.
Space-division switch: Any switching mechanism that is based on the through connection of a
set of input lines selectively to a set of output lines. Space-division switches are implemented
either by electromechanical or electronic means. Prior to the advent of time-division switching, all
telephone and telegraph switching machines were implemented using a variety of space-division
switching techniques, particularly stronger (step-by-step) switches and crossbar switches.
Data and Telecommunications - 225
12) Discuss the function of Transport layer and network layer. [2013]
Solution:
Network Layer: Network layer works for the transmission of data from one host to the other
located in different networks. It also takes care of packet routing i.e. selection of the shortest path
to transmit the packet, from the number of routes available. The sender & receiver’s IP address
are placed in the header by the network layer.
The functions of the Network layer are:
1) Routing: The network layer protocols determine which route is suitable from source to
destination. This function of network layer is known as routing.
2) Logical Addressing: In order to identify each device on internetwork uniquely, network layer
defines an addressing scheme. The sender & receiver’s IP address are placed in the header by
network layer. Such an address distinguishes each device uniquely and universally.
Transport Layer: Transport layer provides services to application layer and takes services from
network layer. The data in the transport layer is referred to as Segments. It is responsible for the
End to End Delivery of the complete message. The transport layer also provides the
acknowledgement of the successful data transmission and re-transmits the data if an error is
found
The functions of the transport layer are:
1) Segmentation and Reassembly: This layer accepts the message from the (session) layer,
breaks the message into smaller units. Each of the segment produced has a header associated
with it. The transport layer at the destination station reassembles the message.
2) Service Point Addressing: In order to deliver the message to correct process, transport layer
header includes a type of address called service point address or port address. Thus by
specifying this address, transport layer makes sure that the message is delivered to the
correct process.
Circuit Switching:
Circuit switching is a switching technique that establishes a dedicated path between sender
and receiver.
In the Circuit Switching Technique, once the connection is established then the dedicated path
will remain to exist until the connection is terminated.
Circuit switching in a network operates in a similar way as the telephone works.
A complete end-to-end path must exist before the communication takes place.
In case of circuit switching technique, when any user wants to send the data, voice, video, a
request signal is sent to the receiver then the receiver sends back the acknowledgment to
ensure the availability of the dedicated path. After receiving the acknowledgment, dedicated
path transfers the data.
Circuit switching is used in public telephone network. It is used for voice transmission.
Fixed data can be transferred at a time in circuit switching technology.
228 | Data and Telecommunications
CHAPTER 7
ERROR DETECTION AND CORRECTION TECHNIQUES
1. How to works Parity Check of Error Detection?
It is the simplest technique for detecting and correcting errors. The MSB of an 8-bits word is used
as the parity bit and the remaining 7 bits are used as data or message bits. The parity of 8-bits
transmitted word can be either even parity or odd parity.
Even parity -- Even parity means the number of 1's in the given word including the parity bit
should be even (2,4,6, ... ).
Odd parity -- Odd parity means the number of 1's in the given word including the parity bit
should be odd (1,3,5, ... ).
Use of Parity Bit
The parity bit can be set to 0 and 1 depending on the type of the parity required.
For even parity, this bit is set to 1 or 0 such that the no. of "1 bits" in the entire word is even.
Shown in fig. (a).
For odd parity, this bit is set to 1 or 0 such that the no. of "1 bits" in the entire word is odd.
Shown in fig. (b).
Addressing:
In a virtual-circuit network, two types of addressing are involved: global and local (virtual-circuit
identifier).
Global Addressing:
Virtual-Circuit Identifier:
The identifier that is actually used for data transfer is called the virtual-circuit identifier (VCI). A
VCI, unlike a global address, is a small number that has only switch scope. It is used by a frame
between two switches. When a frame arrives at a switch, it has a VCI; when it leaves, it has a
different VCI. The following figure show how the VCI in a data frame changes from one switch to
another. Note that a VCI does not need to be a large number since each switch can use its own
unique set of VCIs.
Three Phases:
As in a circuit-switched network, a source and destination need to go through three phases in a
virtual-circuit network: setup, data transfer, and teardown.
Setup phase, the source and destination use their global addresses to help switches make table
entries for the connection.
In the teardown phase, the source and destination inform the switches to delete the
corresponding entry.
Data transfer occurs between these two phases.
Data Transfer Phase
To transfer a frame from a source to its destination, all switches need to have a table entry for this
virtual circuit. The table, in its simplest form, has four columns. This means that the switch holds
four pieces of information for each virtual circuit that is already set up. We show later how the
Data and Telecommunications - 235
switches make their table entries, but for the moment we assume that each switch has a table with
entries for all active virtual circuits.
The following figure shows a frame arriving at port 1 with a VCI of 14. When the frame arrives, the
switch looks in its table to find port 1 and a VCI of 14. When it is found, the switch knows to
change the VCI to 22 and send out the frame from port 3.
Setup Phase:
In the setup phase, a switch creates an entry for a virtual circuit. For example, suppose source A
needs to create a virtual circuit to B. Two steps are required: the setup request and the
acknowledgment.
Setup Request: A setup request frame is sent from the source to the destination. The following
figure shows the process.
4) VSAT; (2017,2016)
Answer: VSAT (Very Small Aperture Terminal) is a satellite communications system that serves
home and business users. A VSAT end user needs a box that interfaces between the user's
computer and an outside antenna with a transceiver. The tranceiver receives or sends a signal to a
satellite transponder in the sky. The satellite sends and receives signals from an earth station
computer that acts as a hub for the system. Each end user is interconnected with the hub station
via the satellite in a star topology. For one end user to communicate with another, each
transmission has to first go to the hub station which retransmits it via the satellite to the other
end user's VSAT. VSAT handles data, voice, and video signals.
VSAT is used both by home users who sign up with a large service such as DirecPC and by private
companies that operate or lease their own VSAT systems. VSAT offers a number of advantages
over terrestrial alternatives. For private applications, companies can have total control of their
own communication system without dependence on other companies. Business and home users
also get higher speed reception than if using ordinary telephone service or ISDN.
5) HDLC; (2017)
Answer: High-Level Data Link Control (HDLC) is a bit-oriented code-
transparent synchronous data link layer protocol developed by the International Organization for
Standardization (ISO). The original ISO standards for HDLC are as follows:
ISO 3309-1979 – Frame Structure
ISO 4335-1979 – Elements of Procedure
ISO 6159-1980 – Unbalanced Classes of Procedure
ISO 6256-1981 – Balanced Classes of Procedure
The current standard for HDLC is ISO/IEC 13239:2002, which replaces all of those standards.
HDLC provides both connection-oriented and connectionless service.
HDLC can be used for point-to-multipoint connections via the original master-slave modes Normal
Response Mode (NRM) and Asynchronous Response Mode (ARM), but they are now rarely used; is
now used almost exclusively to connect one device to another, using Asynchronous Balanced
Mode (ABM).
HDLC frames can be transmitted over synchronous or communication links.Those links have no
mechanism to mark the beginning or end of a frame, so the beginning and end of each frame has
to be identified. This is done by using a unique sequence of bits as a frame delimiter, or flag, and
Data and Telecommunications - 237
encoding the data to ensure that the flag sequence is never seen inside a frame. Each frame begins
and ends with a frame delimiter. A frame delimiter at the end of a frame may also mark the start
of the next frame.
On both synchronous and asynchronous links, the flag sequence is binary "01111110",
or hexadecimal 0x7E, but the details are quite different.
The transmitting computer software gives the data to be transmitted to the applications layer,
where it is processed and passed from layer to layer down the stack with each layer performing
its designated functions. The data is then transmitted over the physical layer of the network until
the destination computer or another device receives it. At this point the data is passed up through
the layers again, each layer performing its assigned operations until the data is used by the
receiving computer’s software.
All of the necessary and desirable operations required are grouped together in a logical sequence
at each of the layers. Each layer is responsible for specific functions:
Layer 7 – application: This layer works with the application software to provide
communications functions as required. It verifies the availability of a communications partner and
the resources to support any data transfer. It also works with end applications such as domain
name service (DNS), file transfer protocol (FTP), hypertext transfer protocol (HTTP), Internet
message access protocol (IMAP), post office protocol (POP), simple mail transfer protocol (SMTP),
Telenet, and terminal emulation.
Layer 6 – presentation: This layer checks the data to ensure that it is compatible with the
communications resources. It ensures compatibility between the data formats at the applications
238 | Data and Telecommunications
level and the lower levels. It also handles any needed data formatting or code conversion, as well
as data compression and encryption.
Layer 5 – session: Layer 5 software handles authentication and authorization functions. It also
manages the connection between the two communicating devices, establishing a connection,
maintaining the connection, and ultimately terminating it. This layer verifies that the data is
delivered as well.
Layer 4 – transport: This layer provides quality of service (QoS) functions and ensures the
complete delivery of the data. The integrity of the data is guaranteed at this layer via error
correction and similar functions.
Layer 3 – network: The network layer handles packet routing via logical addressing and
switching functions.
Layer 2 – data link: Layer 2 operations package and unpack the data in frames.
Layer 1 – physical: This layer defines the logic levels, data rate, physical media, and data
conversion functions that make up the bit stream of packets from one device to another.
Frequency Reuse
Frequency reusing is the concept of using the same radio frequencies within a given area, that
are separated by considerable distance, with minimal interference, to establish communication.
Frequency reuse offers the following benefits −
Allows communications within cell on a given frequency
Limits escaping power to adjacent cells
Allows re-use of frequencies in nearby cells
Uses same frequency for multiple conversations
10 to 50 frequencies per cell
For example, when N cells are using the same number of frequencies and Kbe the total number of
frequencies used in systems. Then each cell frequency is calculated by using the formulae K/N.
In Advanced Mobile Phone Services (AMPS) when K = 395 and N = 7, then frequencies per cell on
an average will be 395/7 = 56. Here, cell frequency is 56.
3. Frequency range of working: Amplitude modulation works between 540-1650 KHz while FM
works at 88-108MHz.
4. Power Consumption: FM based signal transmission consumes a higher amount of power than
an equivalent AM based signal transmission system.
AM vs FM: Signal Quality: Signal quality is a lot superior in FM than AM as amplitude based
signals are more susceptible to noise than those which use frequency. Moreover, noise signals are
difficult to filter out in AM reception whereas FM receivers easily filter out noise using the capture
effect and pre-emphasis, de-emphasis effects. In capture effect, the receiver locks itself to catch
stronger signal so that signals received are more synced with that at the transmitting end.
In pre-emphasis, de-emphasis process, the signal is further amplified to a higher frequency at
sending end (pre-emphasis) and vice versa at receiver end (de-emphasis). These two processes
reduce down the chances of a signal to get mixed with other signals and make FM more immune
to noise than AM.
6. Fading: Fading refers to power variation during signal transmission. Due to fading, the power
with the signal received can vary significantly and reception wouldn’t be of a good quality. Fading
is more prominent in amplitude modulation as compared to frequency modulation. That is why,
AM radio channels often face the problem where sound intensity varies while FM radio channels
have constant good reception.
7. Wavelength Difference between AM and FM: AM waves work in the range of KHz while in FM
waves work in MHz range. As a result, AM waves have a higher wavelength than the FM ones. A
higher wavelength increases the range of AM signals as compared to FM which have a limited area
of coverage.
8. Bandwidth consumption: AM signals consume 30KHz of bandwidth for each while in FM
80KHz is the bandwidth consumed by each signal. Hence, over a limited range of bandwidth, more
number of signals can be sent in AM than FM.
9. Circuit Complexity: Aforesaid, Amplitude Modulation is an older process and has a very
simple circuitry. On the other hand, frequency modulation requires a complicated circuitry for
transmission and reception of signal. The signals sent in FM are more modulated and emphasized
at the transmitter and they are thoroughly checked and corrected at the receiving end. This is why
circuitry for FM signals is very complicated.
10. Commercial Aspects: Setting up an AM based radio communication system is very economic
as there is no complicated circuitry and processes are easy to understand.
Data and Telecommunications - 241
9) FDM (2016)
Answer: Frequency division multiplexing (FDM) is a technique of multiplexing which means
combining more than one signal over a shared medium. In FDM, signals of different frequencies
are combined for concurrent transmission.
Concept and Process
In FDM, the total bandwidth is divided to a set of frequency bands that do not overlap. Each of
these bands is a carrier of a different signal that is generated and modulated by one of the sending
devices. The frequency bands are separated from one another by strips of unused frequencies
called the guard bands, to prevent overlapping of signals.
The modulated signals are combined together using a multiplexer (MUX) in the sending end. The
combined signal is transmitted over the communication channel, thus allowing multiple
independent data streams to be transmitted simultaneously. At the receiving end, the individual
signals are extracted from the combined signal by the process of demultiplexing (DEMUX).
Example
The following diagram conceptually represents multiplexing using FDM. It has 4 frequency bands,
each of which can carry signal from 1 sender to 1 receiver. Each of the 4 senders is allocated a
frequency band. The four frequency bands are multiplexed and sent via the communication
channel. At the receiving end, a demultiplexer regenerates the original four signals as outputs.
Here, if the frequency bands are of 150 KHz bandwidth separated by 10KHz guard bands, then the
capacity of the communication channel should be at least 630 KHz (channels : 150 × 4 + guard
bands : 10 × 3).
Uses and Applications
It allows sharing of a single transmission medium like a copper cable or a fiber optic cable, among
multiple independent signals generated by multiple users.
FDM has been popularly used to multiplex calls in telephone networks. It can also be used in
cellular networks, wireless networks and for satellite communications.
Orthogonal Frequency Division Multiplexing
OFDM is a technique where the channel bandwidth is split into many closely packed sub-carriers
or narrowband channels each of which transmits signals independently using techniques like
QAM (Quadrature Amplitude Modulation). Consequently, they do not need any guard bands and
thus have better utilization of available bandwidth.
242 | Data and Telecommunications
10)CRC techniques (2021,2016)
Answer: Cyclic Redundancy Check (CRC)
CRC is a different approach to detect if the received frame contains valid data. This technique
involves binary division of the data bits being sent. The divisor is generated using polynomials.
The sender performs a division operation on the bits being sent and calculates the remainder.
Before sending the actual bits, the sender adds the remainder at the end of the actual bits. Actual
data bits plus the remainder is called a codeword. The sender transmits data bits as codewords.
At the other end, the receiver performs division operation on codewords using the same CRC
divisor. If the remainder contains all zeros the data bits are accepted, otherwise it is considered
as there some data corruption occurred in transit.
11)CDMA (2021)
CDMA stands for Code Division Multiple Access. It is a channel access method used by several
radio communication technologies. It is a digital cellular technology and an example of multiple
access. It is generally used for mobile communication.
Multiple access means that several transmitters can send information simultaneously over a
single communication channel. In this system, different CDMA codes are assigned to different
users, and the user can access the whole bandwidth for the entire duration. It optimizes the use of
available bandwidth as it transmits over the entire frequency range and does not limit the user's
frequency range.
Thus, CDMA allows several users to share a band of frequencies without undue interference
between the users. It is used as an access method in many mobile phone standards.
CDMA technology was developed during World War II. It was developed by English allies to
protect their wireless transmissions from jamming. When the war ended, Qualcomm patented this
technology and made it commercially available. The first CDMA system was launched in
September 1995 in Hong Kong by Hutchison Telephone Co.